International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
A forward and backward secure conjunctive keywords dynamic searchable encryption scheme 一种前向和后向安全连接关键字动态可搜索加密方案
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10038867
S. Ramachandram, K. Khan, Md. Asrar Ahmed
{"title":"A forward and backward secure conjunctive keywords dynamic searchable encryption scheme","authors":"S. Ramachandram, K. Khan, Md. Asrar Ahmed","doi":"10.1504/ijitst.2021.10038867","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10038867","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An upgraded model of query expansion using inverse-term frequency with pertinent response for internet of things 面向物联网的基于反项频率的查询扩展升级模型
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10037087
Surbhi Sharma, Abhishek Kumar, Rashmi Agrawal
{"title":"An upgraded model of query expansion using inverse-term frequency with pertinent response for internet of things","authors":"Surbhi Sharma, Abhishek Kumar, Rashmi Agrawal","doi":"10.1504/IJITST.2021.10037087","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037087","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67216901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved security approach for attack detection and mitigation over IoT networks using HACABO and Merkle signatures 使用HACABO和Merkle签名的物联网网络攻击检测和缓解改进的安全方法
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10037187
E. Krishna, T. Arunkumar
{"title":"An improved security approach for attack detection and mitigation over IoT networks using HACABO and Merkle signatures","authors":"E. Krishna, T. Arunkumar","doi":"10.1504/IJITST.2021.10037187","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037187","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering social bots on Twitter: a thematic review 发现Twitter上的社交机器人:一篇专题评论
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10037769
Govindasamy Vaiyapuri, Rosario Gilmary, Akila Venkatesan
{"title":"Discovering social bots on Twitter: a thematic review","authors":"Govindasamy Vaiyapuri, Rosario Gilmary, Akila Venkatesan","doi":"10.1504/IJITST.2021.10037769","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037769","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An eagles eye view of software defined network function virtualisation 软件定义的网络功能虚拟化的鹰眼视图
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10038753
Krishan Kumar, V. Mangat, K. Kaur
{"title":"An eagles eye view of software defined network function virtualisation","authors":"Krishan Kumar, V. Mangat, K. Kaur","doi":"10.1504/IJITST.2021.10038753","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10038753","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using technology acceptance model for acceptance of FinTech in Bangladesh 使用技术接受模型对孟加拉国的FinTech进行接受
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10042636
Nida Hussain, N. Chowdhury
{"title":"Using technology acceptance model for acceptance of FinTech in Bangladesh","authors":"Nida Hussain, N. Chowdhury","doi":"10.1504/ijitst.2021.10042636","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10042636","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy-efficient load-balanced RPL routing protocol for internet of things networks 面向物联网网络的节能负载均衡RPL路由协议
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.114930
A. Idrees, Athraa J. H. Witwit
{"title":"Energy-efficient load-balanced RPL routing protocol for internet of things networks","authors":"A. Idrees, Athraa J. H. Witwit","doi":"10.1504/ijitst.2021.114930","DOIUrl":"https://doi.org/10.1504/ijitst.2021.114930","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A cost-effective strategy for splitting and allocating alerts' workloads during forensic investigations of very large IDS logs 在对非常大的IDS日志进行取证调查期间,分割和分配警报工作负载的一种经济有效的策略
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/IJITST.2021.10035681
J. Nehinbe
{"title":"A cost-effective strategy for splitting and allocating alerts' workloads during forensic investigations of very large IDS logs","authors":"J. Nehinbe","doi":"10.1504/IJITST.2021.10035681","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035681","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient way in sharing of IoT data and uses of blockchain in auditing the storage data 高效的物联网数据共享方式和区块链在审计存储数据中的使用
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10040131
K. A. Kumar, A. J. Lyimo
{"title":"Efficient way in sharing of IoT data and uses of blockchain in auditing the storage data","authors":"K. A. Kumar, A. J. Lyimo","doi":"10.1504/ijitst.2021.10040131","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040131","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting botnet using traffic behaviour analysis and extraction of effective flow features 利用流量行为分析检测僵尸网络,提取有效的流量特征
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10040765
S. Feizi, H. Ghaffari
{"title":"Detecting botnet using traffic behaviour analysis and extraction of effective flow features","authors":"S. Feizi, H. Ghaffari","doi":"10.1504/ijitst.2021.10040765","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040765","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信