Back to Top
Go Back
Journal Photo for International Journal of Computer Science and Information Technology Research
Peer reviewed only Open Access

International Journal of Computer Science and Information Technology Research (IJCSITR)

Publisher : scholarly publication
Computer Science Deep Learning Artificial Intelligence
e-ISSN 9471-1297
Issue Frequency Monthly
Est. Year 2020
Mobile 09726621188
DOI YES
Language English
APC YES
Impact Factor Assignee Google Scholar
Email editor@ijcsitr.com, ijcsitr@gmail.com

Journal Descriptions

The International Journal of Computer Science and Information Technology Research (IJCSITR) is a scholarly publication established in 2020, dedicated to advancing research in the fields of computer science and information technology. It serves as a platform for academics, researchers, and professionals to share their latest findings, innovative ideas, and technological advancements in areas such as algorithms, artificial intelligence, data science, cyber security, software engineering, networking, and more. The journal aims to contribute to the collective knowledge base in these disciplines, fostering collaboration and driving progress in the rapidly evolving fields of computer science and information technology.

International Journal of Computer Science and Information Technology Research (IJCSITR) is :-

  • International, Peer-Reviewed, Open Access, Refereed, Computer Science, Deep Learning, Artificial Intelligence, AI Tools, Internet of Things (IoT), SAP, Cyber Security, Robotics, Mobile Computing, Augmented Reality (AR), Virtual Reality (VR), Cloud Security, information technology , Online , Monthly Journal

  • UGC Approved, ISSN Approved: P-ISSN E-ISSN: 9471-1297, Established: 2020,
  • Provides Crossref DOI
  • Not indexed in Scopus, WoS, DOAJ, PubMed, UGC CARE

Publications of IJCSITR

Sandhya Guduru August, 2024
Quantum Key Distribution (QKD) protocols, particularly the decoy-state BB84, offer a promising approach to enhancing network security by enabling theoretically unbreakable encryption. Integr...
Sandhya Guduru August, 2022
This paper proposes a serverless, automated incident response framework tailored for cloud-native environments. The workflow integrates AWS Lambda for EBS snapshot acquisition, Velociraptor ...
Sandhya Guduru February, 2025
The increasing sophistication of cyber threats necessitates the adoption of advanced, autonomous defense mechanisms. Large Language Models (LLMs) have emerged as a powerful tool f...
Sai Teja May, 2021
The success of many companies hinges on the timely deployment of their products to the market. Even if a product offers exceptional utility, its value diminishes if its availability falls sh...
Krishnakumar Jayachadran December, 2022
Customer Relationship Management (CRM) has evolved into a critical strategy for businesses aiming to enhance customer satisfaction, retention, and profitability. This paper explores the conc...
Managed File Transfer (MFT) and Secure File Transfer Protocol (SFTP) are known to be critical secure file transfer technologies. While both ensure data security, they cater to different use ...
Sai Teja June, 2022
Blockchain technology has radically transformed the landscape of digital transactions with its decentralized architecture, ensuring security, transparency, and immutability. Traditional bloc...
Data breaches are the primary concern for organizations and significant resources need to be allocated to protect data files doing file transfer. This writing is all about identifying the ch...
Jyoti Prakash July, 2023
The convergence of advanced technologies such as artificial intelligence (AI), blockchain, Internet of Things (IoT), and quantum computing has initiated a paradigm shift, shaping innovations...
ShivaDutt Jangampeta January, 2024
From identity theft to disinformation and social engineering schemes, threat actors and state-sponsored hacker groups continue to ravage businesses and disrupt critical government operations...