International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
An evolutionary-based technique to characterise an anomaly in internet of things networks 一种基于进化的技术,用于描述物联网网络中的异常现象
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-08-31 DOI: 10.1504/ijitst.2021.10040780
A. Shukla, S. Pippal, Deepak Singh, Somula Rama Subba Reddy
{"title":"An evolutionary-based technique to characterise an anomaly in internet of things networks","authors":"A. Shukla, S. Pippal, Deepak Singh, Somula Rama Subba Reddy","doi":"10.1504/ijitst.2021.10040780","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040780","url":null,"abstract":"Internet of things (IoT) can connect devices embedded in various systems to the internet. Distributed denial-of-service, commonly referred as DDoS is an attack to disrupt normal traffic of a victim in IoT system, facility, or network by crushing the target or its surrounding infrastructure with overflow of internet traffic. Unfortunately, modern DDoS attack detection strategies have been failed to rationalise the early detection of DDoS attacks. Therefore, in this study, teaching learning-based optimisation (TLBO) with the learning algorithm is integrated to mitigate denial of service attacks. Furthermore, TLBOIDS selects the most relevant features from the original IDS dataset which can help to distinguish typical low-rate DDoS attacks with the use of four classification algorithms. KDD Cup 99 dataset is used in the experimental study. From the simulation results, it is obvious that TLBOIDS with C4.5 achieves high detection and accuracy with a false positive rate.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42457845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced adaptive trust management system for socially related IoT 增强面向社会物联网的自适应信任管理体系
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-08-31 DOI: 10.1504/ijitst.2021.10040791
Geetha Venkatesan, Avadhesh Kumar
{"title":"Enhanced adaptive trust management system for socially related IoT","authors":"Geetha Venkatesan, Avadhesh Kumar","doi":"10.1504/ijitst.2021.10040791","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040791","url":null,"abstract":"The social IoT (SIoT) is a network involving heterogeneous entities like humans, and devices referred to as 'things' are connected with social relationship. Every individual thing has its own ID, functional property, limited storage and capacity. Each one expects to establish trusted communication with other reliable entities in the IoT network, which paves the essential of trust management system (TMS). We propose an adaptive trust management design that performs trust assessment considering both QoS and social parameter for deciding the trustiness of a node in the IoT network. The design uses direct assessment and indirect recommendation, which are aggregated using a dynamic weighted method. The decay factor for the past experiences and dynamic updating of the trust profiles enhances the system performances. The work is compared with static, distributed, social and single trust type of system in terms of resiliency and performance. The proposed work shows very efficient trust assessment and maximum performance.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42306029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital application of analogue-like time perception mechanism based on analogue on digital theory 基于数字理论模拟的类模拟时间感知机制的数字化应用
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-08-31 DOI: 10.1504/ijitst.2021.10040784
Ziran Fan, T. Fujimoto
{"title":"Digital application of analogue-like time perception mechanism based on analogue on digital theory","authors":"Ziran Fan, T. Fujimoto","doi":"10.1504/ijitst.2021.10040784","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040784","url":null,"abstract":"This paper analyses the human time perception mechanism regarding the use of analogue clocks based on the design theory of analogue on digital (AoD theory). With the examination, the authors would propose the method to apply the design elements of analogue clock into the digital devices such as smart watches and smartphones to the schedule management. The proposed application, targets smartwatches as media and represents the reality of time passing that is originally provided by analogue clocks. The interface design adopts the time representation of analogue clocks into the schedule display so that it can intuitively indicate the lapse of time passing for each activity scheduled in a day. Moreover, we design the user's operational experience close to that of analogue tools by realising 'the real feel of using clocks' through the representation of the spring-driven system on digital style.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49278953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Appropriation of Fear as a Context by Cybersecurity 网络安全情境下恐惧的挪用
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0089
A. Caldwell
{"title":"The Appropriation of Fear as a Context by Cybersecurity","authors":"A. Caldwell","doi":"10.20533/jitst.2046.3723.2021.0089","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0089","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81725681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs ORVIs信息安全缓解方法的成本效益分析
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0092
J. Street, F. Olajide
{"title":"A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs","authors":"J. Street, F. Olajide","doi":"10.20533/jitst.2046.3723.2021.0092","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0092","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"03 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85962595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 Pandemic 企业在covid - 19大流行期间保持良好网络卫生的最佳实践
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0086
T. Ncubukezi, L. Mwansa
{"title":"Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 Pandemic","authors":"T. Ncubukezi, L. Mwansa","doi":"10.20533/jitst.2046.3723.2021.0086","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0086","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77694028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monte Carlo Simulation Approach to Network Access Control 网络访问控制的蒙特卡罗仿真方法
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0088
Patricia Yetunde Omole-Matthew, G. Arome, A. Thompson, B. Alese
{"title":"Monte Carlo Simulation Approach to Network Access Control","authors":"Patricia Yetunde Omole-Matthew, G. Arome, A. Thompson, B. Alese","doi":"10.20533/jitst.2046.3723.2021.0088","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0088","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79735394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Behavioral Factors That Influence Employees to Comply With Information Security Policies 影响员工遵守信息安全政策的行为因素
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0087
Golan Carmi, D. Bouhnik
{"title":"Behavioral Factors That Influence Employees to Comply With Information Security Policies","authors":"Golan Carmi, D. Bouhnik","doi":"10.20533/jitst.2046.3723.2021.0087","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0087","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79411083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography 使用aes加密和音频隐写技术在卫生机构中安全存储和共享COVID-19数据
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0090
G. Arome
{"title":"Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography","authors":"G. Arome","doi":"10.20533/jitst.2046.3723.2021.0090","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0090","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75589358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Oversampling Techniques in Machine Learning Detection of Credit Card Fraud 信用卡诈骗机器学习检测中的过采样技术
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-06-30 DOI: 10.20533/jitst.2046.3723.2021.0091
C. Obimbo, Davleen Mand, Simarjeet Singh
{"title":"Oversampling Techniques in Machine Learning Detection of Credit Card Fraud","authors":"C. Obimbo, Davleen Mand, Simarjeet Singh","doi":"10.20533/jitst.2046.3723.2021.0091","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0091","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83525139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信