International Journal on Information Technologies and Security最新文献

筛选
英文 中文
The power of intention in detecting social engineering attacks 意图在检测社会工程攻击中的作用
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/gevc3785
I. Alseadoon
{"title":"The power of intention in detecting social engineering attacks","authors":"I. Alseadoon","doi":"10.59035/gevc3785","DOIUrl":"https://doi.org/10.59035/gevc3785","url":null,"abstract":"Social engineering attacks are increasing over the years along with the growth in Internet users. Our study aims to find ways to improve users’ protection against these attacks. Finding a suitable way to enhance users’ detection will have the impact of reducing the number of victims. Our study uses quantitative methods including experiment (role play) and a questionnaire to collect data. The findings suggest that raising users’ intention to validate the authenticity of received messages will increase their ability to make a robust decision about deceptive messages. The detection rate significantly increased when users have been alerted about social engineering attacks.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77586828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to the design of formal and informal education services for the system architecture: The lens of organization, competence, pedagogy, and technology 为系统架构设计正式和非正式教育服务的方法:组织、能力、教学法和技术的视角
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/eyeh2143
M. Gawlik-Kobylińska
{"title":"An approach to the design of formal and informal education services for the system architecture: The lens of organization, competence, pedagogy, and technology","authors":"M. Gawlik-Kobylińska","doi":"10.59035/eyeh2143","DOIUrl":"https://doi.org/10.59035/eyeh2143","url":null,"abstract":"The paper presents an approach to a design of formal and informal education services for the system architecture developed within the European Union Erasmus+ eMediator project. An ‘Education as a services’ approach requires a specific design of elements that rely on four components: organization, competence, pedagogy, and technology. Artificial intelligence will serve as a tool that enables performance of all functions from each component. This study concentrates on a specific design of educational services that would correspond to the four components. It relies on use case method that allows for identification, clarification, and organization of elements crucial for the system requirements. In the future, the designs of educational services can be used in other systems that are developed for educational purposes.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88447298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality assessment in a multi-level control system with discrete response functions 具有离散响应函数的多级控制系统的质量评价
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/acwn8481
O. Kravets, V. Bolnokin, P. Rahman, I. Atlasov, I. Aksenov, Yu. R. Redkin, A. Zaslavskiy
{"title":"Quality assessment in a multi-level control system with discrete response functions","authors":"O. Kravets, V. Bolnokin, P. Rahman, I. Atlasov, I. Aksenov, Yu. R. Redkin, A. Zaslavskiy","doi":"10.59035/acwn8481","DOIUrl":"https://doi.org/10.59035/acwn8481","url":null,"abstract":"The article extends the authors' previous research to the case of discrete response functions. A process consisting of sequential operations is considered. For each operation, you can determine the currently available probability of its error-free (high-quality) execution. By the qualitative performance of the operation, we will understand the achievement of a given level of quality in quantitative proportion to the overall level. The purpose of the article is to build a quality management strategy in which a set of probabilities of quality levels not less than a certain threshold value is achieved, with minimal costs for carrying out appropriate measures. The corresponding optimization problem is presented and a heuristic multistep algorithm for its solution is given.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74268862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of references and footnotes in mathematical and other texts by creating macros in the LaTeX programming language 通过在LaTeX编程语言中创建宏,改进数学和其他文本中的参考文献和脚注
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/fbcy3490
Halina Hubal
{"title":"Improvement of references and footnotes in mathematical and other texts by creating macros in the LaTeX programming language","authors":"Halina Hubal","doi":"10.59035/fbcy3490","DOIUrl":"https://doi.org/10.59035/fbcy3490","url":null,"abstract":"The LaTeX programming language considered in this article is used to represent mathematical and other texts in scientific research. Many LaTeX packages provide advanced code-formatting features. Expanding the LaTeX programming language with macros automates the performance of a large number of tasks. In this research, the author programs in the LaTeX system when creating new macros. New macros created by the author improve adding references to everything that can be numbered and improve adding different types of footnotes in texts. Source codes of these new macros are given in this article. These macros can be embodied in a LaTeX style file, and they expand the capabilities of LaTeX.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86876558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature selection using bio-inspired optimization for IoT intrusion detection and prevention system 基于生物启发优化的物联网入侵检测与防御系统特征选择
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/oexi6498
Richa Singh, R. Ujjwal
{"title":"Feature selection using bio-inspired optimization for IoT intrusion detection and prevention system","authors":"Richa Singh, R. Ujjwal","doi":"10.59035/oexi6498","DOIUrl":"https://doi.org/10.59035/oexi6498","url":null,"abstract":"Nowadays smart Internet of Things (IoT) devices are used briskly, and these devices communicate with each other via wireless medium. However, this increase in IoT devices has resulted in a rise of security issues associated with the IoT system. Therefore, an intrusion detection and prevention system (IDPS) is used to locate and report any malicious activity. The IDPS's feature selection (FS) task is necessary to improve the data quality and decrease the data used for classifying intrusive traffic. Therefore, this paper proposes a novel FS method that hybridizes improved salp swarm algorithm and harris hawk optimization algorithm. The XGBoost classifier is used for classifying reduced network traffic. Proposed system demonstrates high accuracy and low computation time, surpassing other related approaches used for the IDPS feature selection task.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80663554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing energy efficiency in a smart home through window-based support vector regression for energy consumption prediction 基于窗口的支持向量回归预测能耗,提高智能家居的能效
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/enqo9045
B. Zoraida, J. Jasmine, Christina Magdalene
{"title":"Enhancing energy efficiency in a smart home through window-based support vector regression for energy consumption prediction","authors":"B. Zoraida, J. Jasmine, Christina Magdalene","doi":"10.59035/enqo9045","DOIUrl":"https://doi.org/10.59035/enqo9045","url":null,"abstract":"Efficient energy management is greatly facilitated by accurately predicting energy consumption in a smart home, benefiting both consumers and utilities alike. The conventional forecasting techniques rely on pre-trained statistical models built upon extensive historical data, which may experience performance degradation due to the dynamic nature of power load demands. To address this limitation, this study proposes a novel approach employing Window-based Support Vector Regression (WSVR) to accurately estimate energy requirements from a smart grid within a smart home. The dataset utilized for this research is sourced from Pecan Street in Texas, USA. To assess the efficacy of the proposed model, it is compared to several other time series data prediction models, including ARIMA, Holt Winter's, Linear Regression, Support Vector Machine, and Support Vector Regression. The performance of each model is evaluated, and the results are thoroughly examined and discussed.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85858415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Short-Term Load Forecasting using Artificial Neural Networks techniques: A case study for Republic of North Macedonia 利用人工神经网络技术进行短期负荷预测:以北马其顿共和国为例
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/mysq1937
A. Kotevska, N. Rogleva
{"title":"Short-Term Load Forecasting using Artificial Neural Networks techniques: A case study for Republic of North Macedonia","authors":"A. Kotevska, N. Rogleva","doi":"10.59035/mysq1937","DOIUrl":"https://doi.org/10.59035/mysq1937","url":null,"abstract":"Modernization and liberalization of power system in North Macedonia offers an opportunity to supervise and regulate the power consumption and power grid. This paper proposes models for short-term load forecasting using artificial neural network in order to balance the demand and load requirements and to determine electricity price. Neural network approach has the advantage of learning directly from the historical data. This method uses multiple data points. Results from the research show that the quality of the short-term prediction depends on the size of the data set and the data transformation.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77237440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of digital transformations and simulation modelling in aerospace engineering and security 数字转换和仿真建模在航空航天工程和安全中的应用
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/ygps9527
Yoana A. Ivanova
{"title":"Applications of digital transformations and simulation modelling in aerospace engineering and security","authors":"Yoana A. Ivanova","doi":"10.59035/ygps9527","DOIUrl":"https://doi.org/10.59035/ygps9527","url":null,"abstract":"The aim of this experimental research is to present the advantages of advanced methods for digital transformation of objects in order to create accurate engineering models of aerospace objects and radio engineering devices. One of the scientifically applied contributions is expressed in the proposed algorithm for engineering design of a pyramidal horn antenna based on simulation data, realized by 3D modelling techniques for digitalization. The generated results illustrate the correct selection of software products due to their compatibility and capabilities.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79989545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of software defined networking with traditional networking using NS2 simulator 采用NS2模拟器的软件定义网络与传统网络的比较
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/tbww1651
B. Zoraida, G. Indumathi
{"title":"Comparison of software defined networking with traditional networking using NS2 simulator","authors":"B. Zoraida, G. Indumathi","doi":"10.59035/tbww1651","DOIUrl":"https://doi.org/10.59035/tbww1651","url":null,"abstract":"The Software Defined Network (SDN) is an emerging concept in network engineering that entails the decoupling of the control plane and data plane. The data plane is executed on discrete nodes, while a centralised control plane is accountable for overseeing network-wide functionalities. In conventional networks, the integrated planes are incorporated into the network suite, and the transmission is determined by the route. In this work, the traditional way of routing using a communication plane is compared with routing using an SDN controller. The present study employs the NS2 simulator to evaluate the quality of service performance under high background traffic conditions. In the event of network congestion, it is imperative to utilize the available bandwidth to its fullest extent in order to increase the rate of bit transmission per second. The results of the traditional network and SDN network based on various parameters like Ambiguous collision, Delay, Jitter, Availability and Latency are compared in this paper. The results show that the SDN network's performance is better with concerning time.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78943540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software implementation of PSPISE-based models in the Python programming language 用Python编程语言实现基于pspise模型的软件实现
IF 0.9
International Journal on Information Technologies and Security Pub Date : 2023-09-01 DOI: 10.59035/lywq6789
Stoyan Popov, N. Hinov
{"title":"Software implementation of PSPISE-based models in the Python programming language","authors":"Stoyan Popov, N. Hinov","doi":"10.59035/lywq6789","DOIUrl":"https://doi.org/10.59035/lywq6789","url":null,"abstract":"The manuscript presents the software implementation of Pspise-based models in the Python programming language. To demonstrate the model transformation process, examples of electrical circuits that present current and voltage resonance are considered. The implementation experiments were conducted based on models implemented in LTspice. Simulation results using Python are obtained that are similar to those from other software environments specialized for modelling electrical and electronic circuits.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76153146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信