International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
A contemporary anti-phishing framework based on visual cryptography and steganography 基于视觉密码和隐写术的当代反网络钓鱼框架
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10054301
Shishir K. Shandilya, V. Sihag, Gaurav Choudhary, Alkesh Gupta
{"title":"A contemporary anti-phishing framework based on visual cryptography and steganography","authors":"Shishir K. Shandilya, V. Sihag, Gaurav Choudhary, Alkesh Gupta","doi":"10.1504/ijitst.2023.10054301","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054301","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Supervised Machine Learning Algorithm for Detecting Malware 一种用于检测恶意软件的监督机器学习算法
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-06-30 DOI: 10.20533/jitst.2046.3723.2022.0094
O. Ayeni
{"title":"A Supervised Machine Learning Algorithm for Detecting Malware","authors":"O. Ayeni","doi":"10.20533/jitst.2046.3723.2022.0094","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2022.0094","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85136641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Management Framework for Telecommunications in Africa 非洲电信安全管理框架
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-06-30 DOI: 10.20533/jitst.2046.3723.2022.0093
E. Okike, Ernest Boikobo Seboko
{"title":"A Security Management Framework for Telecommunications in Africa","authors":"E. Okike, Ernest Boikobo Seboko","doi":"10.20533/jitst.2046.3723.2022.0093","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2022.0093","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91159513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing System Logs in Financial Institutions using Hybrid AES-ECC Cryptography 利用AES-ECC混合密码保护金融机构系统日志
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-03-31 DOI: 10.20533/jitst.2046.3723.2022.0096
A. J. Gabriel
{"title":"Securing System Logs in Financial Institutions using Hybrid AES-ECC Cryptography","authors":"A. J. Gabriel","doi":"10.20533/jitst.2046.3723.2022.0096","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2022.0096","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77932486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies 发展中经济体残疾用户物联网医疗应用中的安全和隐私问题
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-03-31 DOI: 10.20533/jitst.2046.3723.2022.0095
Kwame Assa-Agyei, F. Olajide, Ahmad Lotfi
{"title":"Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies","authors":"Kwame Assa-Agyei, F. Olajide, Ahmad Lotfi","doi":"10.20533/jitst.2046.3723.2022.0095","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2022.0095","url":null,"abstract":"In this paper, we explore the security and privacy issues of Internet of Things (IoT) healthcare applications for special needs users. IoT enables health-related organizations to lift important data from diverse sources in real-time and this helps in precise decision-making. The transformation of the health sector, required enhancement and efficiency of protective systems, thereby reducing data vulnerability and hence, providing opportunities for secure patient data, particularly, for special needs patients. A quantitative method for purposive sampling technique was adopted and eighty-eight respondents provided the process of how the IoT technology was utilised. Data findings indicated that IoT monitoring devices have the detective ability for a person with special needs living alone with problems related to vital signs of diseases or disabilities. Personal patient health records are integrated into the e-health Centre via IoT technologies. For data privacy, security, and confidentiality, patients' records are kept on Personal Health Record Systems (PHRS). The research revealed suspected breaches of information due to cyber-attacks on the probability of false data errors in the PHRS, leading to special needs personal data leakage.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89593664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Target Groups in German SMEs for Information Security Training: The Use and Limits of Job Profiles in Designing Training Units 德国中小企业信息安全培训的目标群体:职位简介在培训单元设计中的使用与限制
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-03-31 DOI: 10.20533/jitst.2046.3723.2022.0097
Hubertus von Tippelskirch, M. Scholl
{"title":"Target Groups in German SMEs for Information Security Training: The Use and Limits of Job Profiles in Designing Training Units","authors":"Hubertus von Tippelskirch, M. Scholl","doi":"10.20533/jitst.2046.3723.2022.0097","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2022.0097","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80018691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive blockchain technology survey: architecture, applications and challenges 全面的区块链技术调查:架构、应用和挑战
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10048331
G. Praveen, P. Ranjan, P. Singh
{"title":"A comprehensive blockchain technology survey: architecture, applications and challenges","authors":"G. Praveen, P. Ranjan, P. Singh","doi":"10.1504/ijitst.2022.10048331","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10048331","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
K-mean and mean-shift algorithms in machine learning model for efficient malware categorisation 机器学习模型中的K-mean和mean-shift算法用于有效的恶意软件分类
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10048602
Rahul Trivedi, Dharmik Patel, K. A. Kumar, K. Srinivas
{"title":"K-mean and mean-shift algorithms in machine learning model for efficient malware categorisation","authors":"Rahul Trivedi, Dharmik Patel, K. A. Kumar, K. Srinivas","doi":"10.1504/ijitst.2022.10048602","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10048602","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Bixby oriented electric vehicle charging station searching service 实现面向Bixby的电动汽车充电站搜索服务
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10049722
Eugene Rhee, Jihoon Lee
{"title":"Implementation of Bixby oriented electric vehicle charging station searching service","authors":"Eugene Rhee, Jihoon Lee","doi":"10.1504/ijitst.2022.10049722","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10049722","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of IoT, image processing and machine learning techniques in weed detection: a review 物联网、图像处理和机器学习技术在杂草检测中的作用综述
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.122141
Syamasudha Veeragandham, H. Santhi
{"title":"Role of IoT, image processing and machine learning techniques in weed detection: a review","authors":"Syamasudha Veeragandham, H. Santhi","doi":"10.1504/ijitst.2022.122141","DOIUrl":"https://doi.org/10.1504/ijitst.2022.122141","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信