S. Sharma, R. Sathyaraj, Sagar Gupta, Reema Agarwal, Aditya Bist, Anurag Parcha, Sanjana Mishra
{"title":"Implementing security in IoT systems via blockchain","authors":"S. Sharma, R. Sathyaraj, Sagar Gupta, Reema Agarwal, Aditya Bist, Anurag Parcha, Sanjana Mishra","doi":"10.1504/ijitst.2022.10049251","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10049251","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network intrusion detection using meta-heuristic feature selection and cost-sensitive learning","authors":"Ritinder Kaur, N. Gupta","doi":"10.1504/ijitst.2022.10050202","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10050202","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT technologies, applications and challenges, blockchain and its role in IoT: a survey","authors":"R. Chitra, S. Muthulakshmi","doi":"10.1504/ijitst.2022.10045181","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10045181","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An eagle's eye view of software defined network function virtualisation","authors":"Karamjeet Kaur, V. Mangat, Krishan Kumar","doi":"10.1504/ijitst.2022.121421","DOIUrl":"https://doi.org/10.1504/ijitst.2022.121421","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fibre analysis to prevent cloning of credit cards","authors":"Saurabh Singh, K. V. Arya","doi":"10.1504/ijitst.2022.122107","DOIUrl":"https://doi.org/10.1504/ijitst.2022.122107","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big picture: analysis of DDoS attacks map - systems and network, cloud computing, SCADA systems, and IoT","authors":"Saeed Salah, Bilal M. Amro","doi":"10.1504/ijitst.2022.10047199","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047199","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Chitra, A. Bamini, E. G. Julie, S. Muthulakshmi
{"title":"Authentication model and trust management for secured internet of things enabled smart grid using blockchain framework","authors":"R. Chitra, A. Bamini, E. G. Julie, S. Muthulakshmi","doi":"10.1504/ijitst.2022.10048604","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10048604","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Awajan, M. Alazab, Salah Alhyari, Issa Qiqieh, Mohammad O. Wedyan
{"title":"Machine learning techniques for automated policy violation reporting","authors":"A. Awajan, M. Alazab, Salah Alhyari, Issa Qiqieh, Mohammad O. Wedyan","doi":"10.1504/ijitst.2022.125788","DOIUrl":"https://doi.org/10.1504/ijitst.2022.125788","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental based comparative study on open-source network intrusion detection system","authors":"Akshay Mudgal, Shaveta Bhatia","doi":"10.1504/ijitst.2022.10045469","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10045469","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid model to detect phishing-websites","authors":"Lamia Mahnane, Mohamed Hafidi","doi":"10.1504/ijitst.2022.10047338","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047338","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}