Issue 1

Pages Title Author(s) Papers
906 - 909 Using ML Models to Detect Malicious Traffic: Testing ML Models

DOI: 10.20533/ijisr.2042.4639.2020.0104
Paulo Pereira Download Paper
910 - 923 A Stacked Ensemble Intrusion Detection Approach for the Protection of Information System

DOI: 10.20533/ijisr.2042.4639.2020.0105
Olayemi O. Olasehinde Download Paper
924 - 931 Photoanthropometric Auricular Morphology for Identification in Southeast Nigerians

DOI: 10.20533/ijisr.2042.4639.2020.0106
Onyinye Mary Ozioko, O.A. Egwu, Uche Sebastine Ozioko Download Paper
932 - 943 Using DPI and Statistical Analysis in Encrypted Network Traffic Monitoring

DOI: 10.20533/ijisr.2042.4639.2020.0107
Luca Deri, Daniele Sartiano Download Paper
944 - 956 The Design and Implementation of RTiK+ to Support a Real-time Processing on Tablet PC Platforms

DOI: 10.20533/ijisr.2042.4639.2020.0108
Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee Download Paper
957 - 961 A Critique of Active Defense or ‘Hack Back’

DOI: 10.20533/ijisr.2042.4639.2020.0109
Anthony Caldwell, Kevin Curran Download Paper
0