Volume 8 (2020)
Issue 1
Pages | Title | Author(s) | Papers |
656 - 666 | Data Controllability for Risk Management in Smart and Intelligent Systems DOI: 10.20533/jitst.2046.3723.2020.0080 |
Manuel Munier, Vincent Lalanne | |
667 - 675 | Prototype for Testing Context-Aware Authentication for Cloud Environments DOI: 10.20533/jitst.2046.3723.2020.0081 |
Claudio Augusto N. Ferraz, Edgard Costa Oliveira, Ari M. Mariano, Altino J. M. Moraes | |
676 - 686 | Obsolete Ransomware: A Comprehensive Study of the Continued Threat to Users DOI: 10.20533/jitst.2046.3723.2020.0082 |
Arsh Arora, Ragib Hasan, Gary Warner | |
687 - 698 | Recovering Private User Storages in Online Social Networks DOI: 10.20533/jitst.2046.3723.2020.0083 |
Fabian Schillinger, Christian Schindelhauer | |
699 - 704 | Intelligent Model for Network Attack Identification DOI: 10.20533/jitst.2046.3723.2020.0084 |
Richa Sharma, Priyanka Sharma | |
705 - 713 | A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds DOI: 10.20533/jitst.2046.3723.2020.0085 |
Matthew Swann, Joseph Rose, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage |