{"title":"A forward and backward secure conjunctive keywords dynamic searchable encryption scheme","authors":"S. Ramachandram, K. Khan, Md. Asrar Ahmed","doi":"10.1504/ijitst.2021.10038867","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10038867","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An upgraded model of query expansion using inverse-term frequency with pertinent response for internet of things","authors":"Surbhi Sharma, Abhishek Kumar, Rashmi Agrawal","doi":"10.1504/IJITST.2021.10037087","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037087","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67216901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved security approach for attack detection and mitigation over IoT networks using HACABO and Merkle signatures","authors":"E. Krishna, T. Arunkumar","doi":"10.1504/IJITST.2021.10037187","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037187","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering social bots on Twitter: a thematic review","authors":"Govindasamy Vaiyapuri, Rosario Gilmary, Akila Venkatesan","doi":"10.1504/IJITST.2021.10037769","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037769","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An eagles eye view of software defined network function virtualisation","authors":"Krishan Kumar, V. Mangat, K. Kaur","doi":"10.1504/IJITST.2021.10038753","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10038753","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using technology acceptance model for acceptance of FinTech in Bangladesh","authors":"Nida Hussain, N. Chowdhury","doi":"10.1504/ijitst.2021.10042636","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10042636","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient load-balanced RPL routing protocol for internet of things networks","authors":"A. Idrees, Athraa J. H. Witwit","doi":"10.1504/ijitst.2021.114930","DOIUrl":"https://doi.org/10.1504/ijitst.2021.114930","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cost-effective strategy for splitting and allocating alerts' workloads during forensic investigations of very large IDS logs","authors":"J. Nehinbe","doi":"10.1504/IJITST.2021.10035681","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035681","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient way in sharing of IoT data and uses of blockchain in auditing the storage data","authors":"K. A. Kumar, A. J. Lyimo","doi":"10.1504/ijitst.2021.10040131","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040131","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting botnet using traffic behaviour analysis and extraction of effective flow features","authors":"S. Feizi, H. Ghaffari","doi":"10.1504/ijitst.2021.10040765","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040765","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}