Volume 5 (2016)
Issue 1, March 2016
Pages | Title | Author(s) | Papers |
444 - 450 | Computational and Behavioral Trust Assurance by Utilizing Profile-based Risk Assessments: The CATM Methodology DOI: 10.20533/jitst.2046.3723.2016.0056 |
Khalil Abuosba | |
451 - 459 | Securing e-Loyalty Currencie DOI: 10.20533/jitst.2046.3723.2016.0057 |
Aspen Olmsted | |
460 - 463 | Cost to Serve of Large Scale Online Systems DOI: 10.20533/jitst.2046.3723.2016.0058 |
Andrés Paz Sampedro, Shantanu Srivastava |
Issue 2, June 2016
Pages | Title | Author(s) | Papers |
464 - 473 | Calculating Trust Level of X.509 Certificates DOI: 10.20533/jitst.2046.3723.2016.0059 |
Zakia El uahhabi, Hanan El bakkali | |
474 - 485 | The Impact of Different Botnet Flow Feature Subsets on Prediction Accuracy Using Supervised and Unsupervised Learning Methods DOI: 10.20533/jitst.2046.3723.2016.0060 |
Sean Miller, Curtis Busby-Earle | |
486 - 494 | Investigating the Security Factors in Cloud Computing Adoption: Towards Developing an Integrated Framework DOI: 10.20533/jitst.2046.3723.2016.0061 |
Madini O. Alassafi, Abdulrahman Alharthi, Ahmed Alenezi, Robert J. Walters, Gary B. Wills |
Issues 3/4, September/December 2016
Pages | Title | Author(s) | Papers |
495 - 504 | MORI: An Innovative Mobile Applications Data Risk Assessment Model DOI: 10.20533/jitst.2046.3723.2016.0062 |
Saud Alotaibi, Steven Furnell, Nathan Clarke | |
505 - 514 | A Novel Model for Monitoring Security Policy Compliance DOI: 10.20533/jitst.2046.3723.2016.0063 |
Mutlaq Alotaibi, Steven Furnell, Nathan Clarke | |
515 - 525 | Review of Side Channel Attacks and Countermeasures on ECC, RSA, and AES Cryptosystems DOI: 10.20533/jitst.2046.3723.2016.0064 |
Lo’ai A. Tawalbeh, Hilal Houssain, Turki F. Al-Somani |