Articles pp. 01-09 Published: 2026-04-02 Automation of Compliance Control Processes According to PCI DSS Standards in Hybrid Cloud Environments Aghasi Gevorgyan (Author) https://doi.org/10.55640/ijctisn-v03i04-01 π 0 β¬οΈ 0 PDF View Article
Articles pp. 10-21 Published: 2026-04-06 Cybersecurity Governance and Resilience in Small and Medium-Sized Enterprises: A Socio-Technical, Resource-Based, and Regulatory Framework for Sustainable Digital Competitiveness Dr. Elena Marovic, Dr. Sofia Markovic (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 22-30 Published: 2026-04-16 Detection of Malicious Query Attack Weaknesses within Online Software Systems Using Byte-Level Pattern Matching Dr. Ahmed Saeed Al-Mansoori (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 31-43 Published: 2026-04-16 Study of Threat Evaluation and Forecasting Framework for Communication Infrastructure Using Neural Intelligence Techniques Dr. Arben Kola, Dr. Elira Hoxha, Dr. Gentian Leka (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 44-55 Published: 2026-04-17 Research on Unusual Transmission Pattern Recognition in Telecommunication Infrastructure Using Fuzzy Equation Approach Dr. Elena Petrova (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 56-65 Published: 2026-04-17 Research on Unusual Transmission Pattern Recognition in Telecommunication Infrastructure Using Fuzzy Equation Approach Dr. Arjun Pratap Singh, Dr. Neha Verma (Author) π 0 β¬οΈ 0 PDF View Article
Articles pp. 66-77 Published: 2026-04-23 Algorithmic Abuse: How Social Platforms Amplify Revenge Porn, digital grooming and Sexual Coercion Muhammad Hasnain (Author) https://doi.org/10.55640/ijctisn-v03i04-07 π 0 β¬οΈ 0 PDF View Article