International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
OVM-OSN: an optimal validation model applied to detection of fake accounts on online social networks OVM-OSN:一种用于在线社交网络虚假账户检测的最优验证模型
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-02-16 DOI: 10.1504/IJITST.2021.10035678
P. Rao, J. Gyani, G. Narsimha
{"title":"OVM-OSN: an optimal validation model applied to detection of fake accounts on online social networks","authors":"P. Rao, J. Gyani, G. Narsimha","doi":"10.1504/IJITST.2021.10035678","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035678","url":null,"abstract":"Social network sites have millions of users, all sharing personal information in an unwilling manner with friends and contacts. The recent reports point out these networks are spread-through with millions of fake accounts, which affects the users' security and privacy. To overcome such issues, online social networks (OSNs) utilise the fake detection methods to preserve the user privacy and system reliability. Since, the fake account detection is very predominant and a crucial process in OSNs, in this paper, we propose an optimal validation model (OVM), which detects the fake accounts on OSNs, named as OVM-OSN. It is a simple yet efficient computational process for community detection. In OVM-OSN, we employ a novel community detection method utilising the multi-swarm fruit fly optimisation. Then, we use fuzzy-based decision model to differentiate the fake from normal accounts, which maximise the trustworthiness of online identities. Hence, this proposed OVM-OSN method is reliable even under link, node failure strategies and it is tested with Facebook and Google+ networks. Simulation results show the effectiveness of OVM-OSN method in terms of detection rate compared to the cooperative and adaptive decentralised identity validation model.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45025213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cluster-based optimal sink repositioning technique for WSNs using an improved glowworm swarm optimisation and S* position search algorithm 基于改进的萤火虫群优化和S*位置搜索算法的聚类WSNs最优sink重定位技术
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-26 DOI: 10.1504/IJITST.2021.10035183
B. K. Shreyamsha Kumar, P. Rao
{"title":"Cluster-based optimal sink repositioning technique for WSNs using an improved glowworm swarm optimisation and S* position search algorithm","authors":"B. K. Shreyamsha Kumar, P. Rao","doi":"10.1504/IJITST.2021.10035183","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035183","url":null,"abstract":"Wireless sensor network is a group of organised sensor nodes that are limited to their resources such as limited bandwidth, energy etc. The data gathered from sensor nodes will be forwarded to the sink node to take proper actions. In order to avoid the failures, the sink nodes should be positioned in the better place for the resource optimisation. In this paper, first we will apply clustering for grouping the nodes that are adjacent to sink node. Clustering is done by an improved glowworm swarm optimisation (IGSO) algorithm. The node which has the shortest path is selected for position. Hence, this approach is used to find the optimal position for all the sinks in order to optimise the lifetime of the network and move according with intelligent sink positioning.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46201779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An evaluation of identity and access management systems 身份和访问管理系统的评估
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-26 DOI: 10.1504/IJITST.2021.10035182
Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi
{"title":"An evaluation of identity and access management systems","authors":"Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi","doi":"10.1504/IJITST.2021.10035182","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035182","url":null,"abstract":"One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46865272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust transcoding-resilient H.264 watermarking 鲁棒抗转码的H.264水印
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-26 DOI: 10.1504/IJITST.2021.10035184
G. C. Ting, B. Goi, S. Lee
{"title":"Robust transcoding-resilient H.264 watermarking","authors":"G. C. Ting, B. Goi, S. Lee","doi":"10.1504/IJITST.2021.10035184","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035184","url":null,"abstract":"The H.264 standard is widely deployed for high-quality consumer video recording, storage and sharing applications such as Blu-ray DVD and streaming HD video on the internet including YouTube. In current times, since videos are easily shared live on social media and messaging mobile apps, users need the ability to determine the ownership of these videos against being illegally distributed without proper acknowledgements to the owners, and to take actions against those who spread false videos that trigger viral fake news. Robust watermarking schemes are popularly applied techniques to solve these problems. These types of schemes are required to achieve robustness against modification attacks on the embedded watermark. In this paper, we present the design of a new robust watermarking scheme for these purposes, namely that achieves robustness against common modification attacks aiming to change the watermarks embedded by the owner, and it is furthermore resilient to transcoding. The latter property ensures that the embedded watermark remains detectable despite having undergone the common video processing operation of transcoding.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47506733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced countermeasures against IoT hacking by DDoS 针对物联网DDoS攻击的先进对策
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10039865
Eugene Rhee
{"title":"Advanced countermeasures against IoT hacking by DDoS","authors":"Eugene Rhee","doi":"10.1504/ijitst.2021.10039865","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10039865","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-based seamless end-to-end shipping with android application 基于区块链的无缝端到端运输与android应用程序
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10043083
S. Anbuudayasankar, K. Vimalkumar, S. K. Vasudevan, M. S. Narassima
{"title":"Blockchain-based seamless end-to-end shipping with android application","authors":"S. Anbuudayasankar, K. Vimalkumar, S. K. Vasudevan, M. S. Narassima","doi":"10.1504/ijitst.2021.10043083","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10043083","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent intrusion detection system using log cluster decision tree detection mitigation in complex event processing 智能入侵检测系统在复杂事件处理中采用日志聚类决策树检测缓解
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.116746
S. Sandosh, V. Govindasamy, G. Akila
{"title":"Intelligent intrusion detection system using log cluster decision tree detection mitigation in complex event processing","authors":"S. Sandosh, V. Govindasamy, G. Akila","doi":"10.1504/ijitst.2021.116746","DOIUrl":"https://doi.org/10.1504/ijitst.2021.116746","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expanded test frequency band and improved field uniformity in a reverberation chamber for networked system by dual-band quadratic residue diffusers 利用双频二次残留扩散器扩展了网络系统混响室内的测试频带,改善了混响室内的场均匀性
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10037611
E. Rhee
{"title":"Expanded test frequency band and improved field uniformity in a reverberation chamber for networked system by dual-band quadratic residue diffusers","authors":"E. Rhee","doi":"10.1504/IJITST.2021.10037611","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037611","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Centralised and distributed authentication scheme in internet of things: review and outlook 物联网中的集中与分布式认证方案:回顾与展望
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10038453
Upendra Verma, Diwakar Bhardwaj
{"title":"Centralised and distributed authentication scheme in internet of things: review and outlook","authors":"Upendra Verma, Diwakar Bhardwaj","doi":"10.1504/IJITST.2021.10038453","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10038453","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust-based duopoly secure game models for cooperative relay networks 基于信任的合作中继网络双寡头安全博弈模型
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10038758
M. Alam, Akanksha Sondhi, Khyati Chopra
{"title":"Trust-based duopoly secure game models for cooperative relay networks","authors":"M. Alam, Akanksha Sondhi, Khyati Chopra","doi":"10.1504/IJITST.2021.10038758","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10038758","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信