Issue 1

Pages Title Author(s) Papers
756 - 763 A Security Management Framework for Telecommunications in Africa

DOI: 10.20533/jitst.2046.3723.2022.0093
Ezekiel Uzor Okike, Ernest Boikobo Seboko Download Paper
764 - 769 A Supervised Machine Learning Algorithm for Detecting Malware

DOI: 10.20533/jitst.2046.3723.2022.0094
Olaniyi Abiodun Ayeni Download Paper
770 - 779 Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies

DOI: 10.20533/jitst.2046.3723.2022.0095
Kwame Assa-Agyei, Funminiyi Olajide, Ahmad Lotfi Download Paper
780 - 786 Securing System Logs in Financial Institutions using Hybrid AES-ECC Cryptography

DOI: 10.20533/jitst.2046.3723.2022.0096
Arome Junior Gabriel Download Paper
787 - 795 Target Groups in German SMEs for Information Security Training: The Use and Limits of Job Profiles in Designing Training Units

DOI: 10.20533/jitst.2046.3723.2022.0097
Hubertus von Tippelskirch, Margit Scholl Download Paper
0