Journal of Internet Services and Information Security最新文献

筛选
英文 中文
Anomaly Detection for Internet of Things Security Attacks Based on Recent Optimal Federated Deep Learning Model 基于最新最优联合深度学习模型的物联网安全攻击异常检测
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.007
Udayakumar Dr.R., Anuradha Dr.M., Dr. Yogesh Manohar Gajmal, Elankavi Dr.R.
{"title":"Anomaly Detection for Internet of Things Security Attacks Based on Recent Optimal Federated Deep Learning Model","authors":"Udayakumar Dr.R., Anuradha Dr.M., Dr. Yogesh Manohar Gajmal, Elankavi Dr.R.","doi":"10.58346/jisis.2023.i3.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.007","url":null,"abstract":"The mushrooming of IoTs (Internet of Things) and decentralised paradigm in cyber security have attracted a lot of interest from the government, academic, and business sectors in recent years. The use of MLT-assisted techniques in the IoT security arena has attracted a lot of attention in recent years. Many current studies presume that massive training data is readily accessible from IoT devices and transferable to main servers. However, since data is hosted on single servers, security and privacy concerns regarding this data also increase. It is suggested to use decentralised on-device data in OFDL (Optimal Federated Deep Learning) based anomaly detections to proactively identify infiltration in networks for IoTs. The GRUs (Gated Recurrent Units) used in OFDL's training rounds share only learned weights with the main OFDL servers, protecting data integrity on local devices. The model's training costs are reduced by the use of appropriate parameters, which also secures the edge or IoT device. In order to optimise the hyper-parameter environments for the limited OFDL environment, this paper suggests an MSSO (Modified Salp Swarm Optimisation) approach. Additionally, ensembles combine updates from multiple techniques to enhance accuracies. The experimental findings show that this strategy secures user data privacy better than traditional/centralized MLTs and offers the best accuracy rate for attack detection.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44788536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and Compensation of SIC Imperfection in IRS-NOMA based 5G-System 基于IRS-NOMA的5g系统SIC缺陷建模与补偿
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.003
Basman M. Alnedawi, W. Ibraheem, Z. Al-Abbasi
{"title":"Modelling and Compensation of SIC Imperfection in IRS-NOMA based 5G-System","authors":"Basman M. Alnedawi, W. Ibraheem, Z. Al-Abbasi","doi":"10.58346/jisis.2023.i3.003","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.003","url":null,"abstract":"This article considers the impairments in the application of successive interference cancellation (SIC) at the detection phase of non-orthogonal multiple access (NOMA) users. A practical approach is proposed to model the SIC impairment which takes into account the number of multiplexed users in NOMA’s power domain, in addition to the overall number of shared radio resources. In such case the imperfection of the SIC varies in accordance with the number of users. This strategy is closer to the situation in practice than the case where the SIC is modeled with fixed error factor as in the previous research articles that already considered the matter. A channel estimation approach is also proposed, which depends on the user’s channel gain variations to predict the change in its peers’ channel so as to compensate for the error resulting from SIC imperfection. The outcome of the proposed compensation strategy is promising as the simulation results reflect significant improvement in the achievable rate and energy efficiency.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42015424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web-Service Security and The Digital Skills of Users: An Exploratory Study of Countries in Europe 网络服务安全和用户的数字技能:欧洲国家的探索性研究
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.004
B. Blažič, Primoz Cigoj, Andrej Jerman Blažič
{"title":"Web-Service Security and The Digital Skills of Users: An Exploratory Study of Countries in Europe","authors":"B. Blažič, Primoz Cigoj, Andrej Jerman Blažič","doi":"10.58346/jisis.2023.i3.004","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.004","url":null,"abstract":"This study explores the impact of internet users’ and web owners’ knowledge, measured by the level of digital skills, on the number of insecure websites based on a survey of the internet. The influence of the affordability of internet access to the web space on the vulnerability of a particular European country is also considered. The study introduces a quantifiable index for assessing the insecurity of websites that is incorporated into a newly developed tool that scans websites and identifies the vulnerability in the Web Content Management System (WCMS). The collected vulnerability data and the digital skills are analyzed with statistical methods for finding the interdependences and relationships. Higher levels of digital skills and lower fixed-internet-access costs contribute to a smaller number of insecure websites. The vulnerability of the websites for different economic sectors is explored as well. The paper discusses the differences in the digital development pathways and governmental policies applied in European countries that have been affected by user knowledge and digital skills. The study brings original results and findings, as there are no similar studies addressing the impact of the knowledge of a country’s population on the level of insecurity found in the WCMS, including plug-ins.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45228900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-based Spam Detection Techniques for Online Social Networks: Challenges and Opportunities 基于人工智能的在线社交网络垃圾邮件检测技术:挑战与机遇
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.006
A. A. Abdo, Khaznah Alhajri, Assail Alyami, Aljazi Alkhalaf, Bashayer Allail, Esra Alyami, Hind Baaqeel
{"title":"AI-based Spam Detection Techniques for Online Social Networks: Challenges and Opportunities","authors":"A. A. Abdo, Khaznah Alhajri, Assail Alyami, Aljazi Alkhalaf, Bashayer Allail, Esra Alyami, Hind Baaqeel","doi":"10.58346/jisis.2023.i3.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.006","url":null,"abstract":"In recent years, online social networks (OSNs) have become a huge used platform for sharing activities, opinions, and advertisements. Spam content is considered one of the biggest threats in social networks. Spammers exploit OSNs for falsifying content as part of phishing, such as sharing forged advertisements, selling forged products, or sharing sexual words. Therefore, machine learning (ML) and deep learning (DL) techniques are the best methods for detecting phishing attacks and minimize their risk. This paper provides an overview of prior studies of OSNs spam detection modeling based on ML and DL techniques. The research papers are classified into three categories: the features used for prediction, the dataset size corresponding language used, real-time based applications, and machine learning or deep learning techniques. Challenges and opportunities in phishing attacks prediction using ML and DL techniques are also concluded in our study.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49537950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hybrid Lexicon Ensemble Learning Model for Sentiment Classification of Consumer Reviews 一种新的用于消费者评论情感分类的混合词典集成学习模型
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.002
Sourav Sinha, Dr. Revathi Sathiya Narayanan
{"title":"A Novel Hybrid Lexicon Ensemble Learning Model for Sentiment Classification of Consumer Reviews","authors":"Sourav Sinha, Dr. Revathi Sathiya Narayanan","doi":"10.58346/jisis.2023.i3.002","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.002","url":null,"abstract":"In recent past during the era of consumerism with easy accessibility to social networking world, the consumers usually give comments and opinions on daily usable ingredients, electronic goods and services offered on payments. These comments or opinions are innumerable and huge on each item, hence need the special attention for sentimental value particularly on their text parts. The present study is an attempt to perform sentiment prediction on Amazon Electronic products, gift cards and Kindle dataset. In this paper, the HLESV (Hybrid Lexicon Ensemble based Soft Voting) model is proposed by combining lexicon and ensemble approaches using optimally weighted voting to predict the sentiment, subsequently to evaluate model using various performance metrics like precision, recall, F1-score. This paper computes an additional metric namely subjectivity score along with sentiment score and proposes non-interpretive sentiment class label to evaluate the polarity of the reviews using our proposed HLESV model for sentiment classification. The accuracy score of our proposed HLESV model is evaluated to assess its effectiveness on Amazon consumer product review datasets and observed an increase of 1-6% accuracy over existing state-of-the-art ensemble methodology.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41972152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake Face Detection Based on Colour Textual Analysis Using Deep Convolutional Neural Network 基于颜色文本分析的深度卷积神经网络假人脸检测
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.009
Wasin AlKishri, Setyawan Widyarto, Jabar H. Yousif, M. Al-Bahri
{"title":"Fake Face Detection Based on Colour Textual Analysis Using Deep Convolutional Neural Network","authors":"Wasin AlKishri, Setyawan Widyarto, Jabar H. Yousif, M. Al-Bahri","doi":"10.58346/jisis.2023.i3.009","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.009","url":null,"abstract":"Detecting fake faces has become a crucial endeavour within the realm of computer vision. The widespread availability of digital media has facilitated the creation and dissemination of deceptive and misleading content. A prominent strategy for identifying counterfeit faces employs advanced deep-learning methodologies that scrutinise both colour and textural attributes. This investigation is geared towards devising a method for discerning fake faces by leveraging the capabilities of convolutional neural networks (CNNs). These networks are trained to discriminate between authentic and forged images by discerning nuances in their colour characteristics. To achieve this, the MSU MFSD dataset will be harnessed, allowing for exploring colour textures and extracting facial traits across diverse colour channels, including RGB, HSV, and YCbCr.The proposed framework marks a notable stride in the realm of computer vision research, particularly given the prevalent employment of digital media, which has eased the generation and distribution of misleading or deceitful content. Developing dependable systems for identifying counterfeit faces holds immense potential in curtailing the proliferation of false information and upholding the integrity of digital media platforms.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41793563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Internet Architecture and Protocol (HIAP): A Self-Evolving and Transformative Framework for Enabling Seamless Real-Time Applications and Secure Peer-to-Peer File Sharing in the Internet of Everything (IoE) 混合互联网架构和协议(HIAP):在万物互联(IoE)中实现无缝实时应用和安全点对点文件共享的自我演进和变革框架
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.005
Walter Antonio Campos Ugaz, Maria del Rocío Hende Santolaya, Handry Martín Rodas Purizaga, Wesley Amado Salazar Bravo, Jorge Dávila, José Yudberto Vilca Ccolque, Doris Fúster Guillén
{"title":"Hybrid Internet Architecture and Protocol (HIAP): A Self-Evolving and Transformative Framework for Enabling Seamless Real-Time Applications and Secure Peer-to-Peer File Sharing in the Internet of Everything (IoE)","authors":"Walter Antonio Campos Ugaz, Maria del Rocío Hende Santolaya, Handry Martín Rodas Purizaga, Wesley Amado Salazar Bravo, Jorge Dávila, José Yudberto Vilca Ccolque, Doris Fúster Guillén","doi":"10.58346/jisis.2023.i3.005","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.005","url":null,"abstract":"The Internet of Everything (IoE) is rapidly growing and utilized in various applications. However, the growing mobile traffic and services pose significant challenges in flexibility, movement, accessibility, and safety. The existing internet architecture and protocol must be improved to address the challenges. The article examines the attributes and prerequisites of forthcoming networking applications while emphasizing the constraints of conventional network architecture and protocols in fulfilling these needs. The research presents a new Hybrid Internet Architecture and Protocol (HIAP), the Self-Evolving and Transformative (SET) architecture. This architecture is designed to provide diverse control works and smart configuration options for different applications and networking conditions. This HIAP framework's primary emphasis lies in transport protocols and mechanisms for peer-to-peer file sharing. This study proposes implementing a deadline-aware multipath transport protocol within the framework of the Internet architecture with seamless support of real-time applications requiring strict adherence to latency demands. The HIAP framework incorporates evolvability, adaptable routing, and in-network cache mechanisms to enhance contentdelivery. To conduct a more comprehensive examination and conceptualize the peer-to-peer file-sharing system, the research created a pragmatic blueprint for setting the file transfer protocol on the HIAP. The study presented the groundwork for an Internet architecture better suited to the changing demands of the IoE and its various applications. This HIAP architecture aims to be more adaptable, efficient, and transformative. The present study involves a comparative analysis between the proposed research and current architecture. The findings provide evidence of the progress made by the suggested research in addressing the challenges related to multipath and safety in future architectural designs.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47100246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of SAS Software on the Learning of Statistics at the University Level SAS软件对大学统计学学习的影响
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.011
Lolo José Caballero Cifuentes, Luis Alberto Núñez Lira, Yrene Cecilia Uribe Hernández, C. Luy-Montejo, Yaneth Carol Larico Apaza, Jessica Elizabeth Acevedo Flores, Jacinto Joaquín Vértiz Osores
{"title":"Influence of SAS Software on the Learning of Statistics at the University Level","authors":"Lolo José Caballero Cifuentes, Luis Alberto Núñez Lira, Yrene Cecilia Uribe Hernández, C. Luy-Montejo, Yaneth Carol Larico Apaza, Jessica Elizabeth Acevedo Flores, Jacinto Joaquín Vértiz Osores","doi":"10.58346/jisis.2023.i3.011","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.011","url":null,"abstract":"This article examines the use of the SAS tool in the learning of statistics. the type of research was applied with a quasi-experimental design and quantitative approach, the sample was determined by a non-probabilistic method comprising 28 students for both groups; for the collection of information, a pre-test and a post-test were applied, validated with expert judgment and V. Aiken, its reliability with the Spearman Brown coefficient. After the experiment, the results showed higher averages in favor of the experimental group to whom the SAS software was applied in its statistical learning dimensions at a descriptive and inferential level. In order to know the distribution of the data, the Shapiro Wilk numerical method was used, the result of the test gave the certainty to choose the T-Student test for two independent samples at 95% with a level of confidence and 0.05 significance. It is concluded that the SAS software improves the levels of learning of statistics, increases their creativity, they feel more motivated, and there is an interaction favoring more active learning.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49135897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining the Widespread Dissemination of Fake News on Facebook: Political Instability and Health Panic 审视假新闻在脸书上的广泛传播:政治不稳定与健康恐慌
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.001
Eliana Maritza Barturen Mondragón, María del Pilar Quezada Castro, María del Pilar Castro Arellano, C. Aguila, Guillermo Alexander Quezada Castro
{"title":"Examining the Widespread Dissemination of Fake News on Facebook: Political Instability and Health Panic","authors":"Eliana Maritza Barturen Mondragón, María del Pilar Quezada Castro, María del Pilar Castro Arellano, C. Aguila, Guillermo Alexander Quezada Castro","doi":"10.58346/jisis.2023.i3.001","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.001","url":null,"abstract":"The spread of fake news on Facebook is a reality. This behavior is aimed at affecting reputation and generating distrust towards a certain person or on a specific topic. A bibliometric study of the scientific production in Scopus on Fake News on Facebook in the period 2013-2023 was carried out. The results showed that fake news is promoted in political issues to generate instability and in health issues to generate confusion and panic in the population. It was concluded that citizens must develop critical thinking to question the validity of news sources. Similarly, anonymity and misinformation are a natural part of society.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48757495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer 基于行为生物识别区块链增强认证层的互联网架构和协议中的安全问题
Journal of Internet Services and Information Security Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.008
Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios
{"title":"Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer","authors":"Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios","doi":"10.58346/jisis.2023.i3.008","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.008","url":null,"abstract":"Internet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47216240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信