International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
Implementing security in IoT systems via blockchain 通过区块链实现物联网系统的安全性
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10049251
S. Sharma, R. Sathyaraj, Sagar Gupta, Reema Agarwal, Aditya Bist, Anurag Parcha, Sanjana Mishra
{"title":"Implementing security in IoT systems via blockchain","authors":"S. Sharma, R. Sathyaraj, Sagar Gupta, Reema Agarwal, Aditya Bist, Anurag Parcha, Sanjana Mishra","doi":"10.1504/ijitst.2022.10049251","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10049251","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network intrusion detection using meta-heuristic feature selection and cost-sensitive learning 基于元启发式特征选择和代价敏感学习的网络入侵检测
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10050202
Ritinder Kaur, N. Gupta
{"title":"Network intrusion detection using meta-heuristic feature selection and cost-sensitive learning","authors":"Ritinder Kaur, N. Gupta","doi":"10.1504/ijitst.2022.10050202","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10050202","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT technologies, applications and challenges, blockchain and its role in IoT: a survey 物联网技术,应用和挑战,区块链及其在物联网中的作用:调查
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10045181
R. Chitra, S. Muthulakshmi
{"title":"IoT technologies, applications and challenges, blockchain and its role in IoT: a survey","authors":"R. Chitra, S. Muthulakshmi","doi":"10.1504/ijitst.2022.10045181","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10045181","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An eagle's eye view of software defined network function virtualisation 软件定义的网络功能虚拟化的鸟瞰图
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.121421
Karamjeet Kaur, V. Mangat, Krishan Kumar
{"title":"An eagle's eye view of software defined network function virtualisation","authors":"Karamjeet Kaur, V. Mangat, Krishan Kumar","doi":"10.1504/ijitst.2022.121421","DOIUrl":"https://doi.org/10.1504/ijitst.2022.121421","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fibre analysis to prevent cloning of credit cards 纤维分析,防止克隆信用卡
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.122107
Saurabh Singh, K. V. Arya
{"title":"Fibre analysis to prevent cloning of credit cards","authors":"Saurabh Singh, K. V. Arya","doi":"10.1504/ijitst.2022.122107","DOIUrl":"https://doi.org/10.1504/ijitst.2022.122107","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big picture: analysis of DDoS attacks map - systems and network, cloud computing, SCADA systems, and IoT 大图:分析DDoS攻击地图-系统和网络,云计算,SCADA系统和物联网
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10047199
Saeed Salah, Bilal M. Amro
{"title":"Big picture: analysis of DDoS attacks map - systems and network, cloud computing, SCADA systems, and IoT","authors":"Saeed Salah, Bilal M. Amro","doi":"10.1504/ijitst.2022.10047199","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047199","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Authentication model and trust management for secured internet of things enabled smart grid using blockchain framework 基于区块链框架的安全物联网智能电网认证模型与信任管理
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10048604
R. Chitra, A. Bamini, E. G. Julie, S. Muthulakshmi
{"title":"Authentication model and trust management for secured internet of things enabled smart grid using blockchain framework","authors":"R. Chitra, A. Bamini, E. G. Julie, S. Muthulakshmi","doi":"10.1504/ijitst.2022.10048604","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10048604","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning techniques for automated policy violation reporting 用于自动策略违规报告的机器学习技术
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.125788
A. Awajan, M. Alazab, Salah Alhyari, Issa Qiqieh, Mohammad O. Wedyan
{"title":"Machine learning techniques for automated policy violation reporting","authors":"A. Awajan, M. Alazab, Salah Alhyari, Issa Qiqieh, Mohammad O. Wedyan","doi":"10.1504/ijitst.2022.125788","DOIUrl":"https://doi.org/10.1504/ijitst.2022.125788","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental based comparative study on open-source network intrusion detection system 基于实验的开源网络入侵检测系统对比研究
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10045469
Akshay Mudgal, Shaveta Bhatia
{"title":"Experimental based comparative study on open-source network intrusion detection system","authors":"Akshay Mudgal, Shaveta Bhatia","doi":"10.1504/ijitst.2022.10045469","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10045469","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid model to detect phishing-websites 一种检测钓鱼网站的混合模型
International Journal of Internet Technology and Secured Transactions Pub Date : 2022-01-01 DOI: 10.1504/ijitst.2022.10047338
Lamia Mahnane, Mohamed Hafidi
{"title":"A hybrid model to detect phishing-websites","authors":"Lamia Mahnane, Mohamed Hafidi","doi":"10.1504/ijitst.2022.10047338","DOIUrl":"https://doi.org/10.1504/ijitst.2022.10047338","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信