Issue 1, March 2016

PagesTitleAuthor(s)Papers
444 - 450Computational and Behavioral Trust Assurance by Utilizing Profile-based Risk Assessments: The CATM Methodology

DOI: 10.20533/jitst.2046.3723.2016.0056
Khalil Abuosba Download Paper
451 - 459Securing e-Loyalty Currencie

DOI: 10.20533/jitst.2046.3723.2016.0057
Aspen Olmsted Download Paper
460 - 463Cost to Serve of Large Scale Online Systems

DOI: 10.20533/jitst.2046.3723.2016.0058
Andrés Paz Sampedro, Shantanu Srivastava Download Paper

Issue 2, June 2016

PagesTitleAuthor(s)Papers
464 - 473Calculating Trust Level of X.509 Certificates

DOI: 10.20533/jitst.2046.3723.2016.0059
Zakia El uahhabi, Hanan El bakkali Download Paper
474 - 485The Impact of Different Botnet Flow Feature Subsets on Prediction Accuracy Using Supervised and Unsupervised Learning Methods

DOI: 10.20533/jitst.2046.3723.2016.0060
Sean Miller, Curtis Busby-Earle Download Paper
486 - 494Investigating the Security Factors in Cloud Computing Adoption: Towards Developing an Integrated Framework

DOI: 10.20533/jitst.2046.3723.2016.0061
Madini O. Alassafi, Abdulrahman Alharthi, Ahmed Alenezi, Robert J. Walters, Gary B. Wills Download Paper

Issues 3/4, September/December 2016

PagesTitleAuthor(s)Papers
495 - 504MORI: An Innovative Mobile Applications Data Risk Assessment Model

DOI: 10.20533/jitst.2046.3723.2016.0062
Saud Alotaibi, Steven Furnell, Nathan Clarke Download Paper
505 - 514A Novel Model for Monitoring Security Policy Compliance

DOI: 10.20533/jitst.2046.3723.2016.0063
Mutlaq Alotaibi, Steven Furnell, Nathan Clarke Download Paper
515 - 525Review of Side Channel Attacks and Countermeasures on ECC, RSA, and AES Cryptosystems

DOI: 10.20533/jitst.2046.3723.2016.0064
Lo’ai A. Tawalbeh, Hilal Houssain, Turki F. Al-Somani Download Paper