Volume 10 (2022)
Issue 1
Pages | Title | Author(s) | Papers |
756 - 763 | A Security Management Framework for Telecommunications in Africa DOI: 10.20533/jitst.2046.3723.2022.0093 |
Ezekiel Uzor Okike, Ernest Boikobo Seboko | |
764 - 769 | A Supervised Machine Learning Algorithm for Detecting Malware DOI: 10.20533/jitst.2046.3723.2022.0094 |
Olaniyi Abiodun Ayeni | |
770 - 779 | Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies DOI: 10.20533/jitst.2046.3723.2022.0095 |
Kwame Assa-Agyei, Funminiyi Olajide, Ahmad Lotfi | |
780 - 786 | Securing System Logs in Financial Institutions using Hybrid AES-ECC Cryptography DOI: 10.20533/jitst.2046.3723.2022.0096 |
Arome Junior Gabriel | |
787 - 795 | Target Groups in German SMEs for Information Security Training: The Use and Limits of Job Profiles in Designing Training Units DOI: 10.20533/jitst.2046.3723.2022.0097 |
Hubertus von Tippelskirch, Margit Scholl |