


default search action
Journal of Internet Services and Information Security, Volume 14
Volume 14, Number 1, 2024
- V. Jyothi, Tammineni Sreelatha
, T. M. Thiyagu, R. Sowndharya, N. Arvinth
:
A Data Management System for Smart Cities Leveraging Artificial Intelligence Modeling Techniques to Enhance Privacy and Security. 37-51 - Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, Agung Budi Prasetio, Tubagus Asep Nurdin:
Identifying Large Young Hacker Concentration in Indonesia. 52-63 - Adán F. Guzmán-Castillo, Gabriela Suntaxi
, Bryan Norberto Flores-Sarango, Denys A. Flores:
Towards Designing a Privacy-Oriented Architecture for Managing Personal Identifiable Information. 64-84 - Wasin Alkishri, Setyawan Widyarto, Jabar H. Yousif:
Evaluating the Effectiveness of a Gan Fingerprint Removal Approach in Fooling Deepfake Face Detection. 85-103 - Seiba Alhassan, Gaddafi Abdul-Salaam
, Asante Micheal, Yaw Marfo Missah, Ernest Domanaanmwi Ganaa, Alimatu Sadia Shirazu
:
CFS-AE: Correlation-based Feature Selection and Autoencoder for Improved Intrusion Detection System Performance. 104-120 - G. Parimala
, R. Kayalvizhi:
Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things. 121-137 - Abduljaleel Al-Hasnawi, Laith A. Abdul-Rahaim
, Hassan Muwafaq Gheni
, Zahraa Emad Fadel:
IoT Structure based Supervisor and Enquired the Greenhouse Parameters. 138-152 - Fernando Escobedo
, Henry Bernardo Garay Canales
, Eddy Miguel Aguirre Reyes
, Carlos Alberto Lamadrid Vela, Oscar Napoleón Montoya Perez
, Grover Enrique Caballero Jimenez:
Deep Attentional Implanted Graph Clustering Algorithm for the Visualization and Analysis of Social Networks. 153-164 - P. Lavanya, I. V. Subba Reddy, V. Selvakumar, Shreesh V. Deshpande:
An Intelligent Health Surveillance System: Predictive Modeling of Cardiovascular Parameters through Machine Learning Algorithms Using LoRa Communication and Internet of Medical Things (IoMT). 165-179 - Van Hoa Le:
An Optimal Model for Allocation Readers with Grid Cell Size and Arbitrary Workspace Shapes in RFID Network Planning. 180-194 - Walaa Saber Ismail
:
Threat Detection and Response Using AI and NLP in Cybersecurity. 195-205 - Rosa Clavijo-López, Wayky Alfredo Luy Navarrete, Jesús Merino Velásquez, Carlos Miguel Aguilar Saldaña
, Alcides Muñoz Ocas, César Augusto Flores-Tananta
:
Integrating Novel Machine Learning for Big Data Analytics and IoT Technology in Intelligent Database Management Systems. 206-218 - Saravanan Parthasarathy, Arun Raj Lakshminarayanan
, A. Abdul Azeez Khan
, K. Javubar Sathick:
CSA-Forecaster: Stacked Model for Forecasting Child Sexual Abuse. 219-241 - Samer Atawneh, Ziad Alshammari, Mousa T. Al-Akhras
, Bayan Abu Shawar
:
A Security Framework for Addressing Privacy Issues in the Zoom Conference System. 242-265 - Myeongjoo Kang:
A Study on the Effect of Information and Communication Technology (ICT) on Trade in Services in the United States. 266-281 - Osamah J. Al-Qadhi
, Laith A. Abdul-Rahaim
:
A Nonredundant SVD-based Precoding Matrix for Blind Channel Estimation in CP-OFDM Systems Over Channels with Memory. 282-305
Volume 14, Number 2, 2024
- Mohamed Halim, Abdelmajid Tahiri, Yassir El Ghzizal, Nouha Adadi, Driss Chenouni:
Web Service-Oriented E-learning: Proposition of Semantic Approach to Discover Web Services Related to the E-learning System. 1-17 - Matthew Marcellino, Arya Wicaksana
, Moeljono Widjaja:
Zero-knowledge Identity Authentication for E-voting System. 18-31 - Mohamed Shakir, U. Kumaran, N. Rakesh:
An Approach towards Forecasting Time Series Air Pollution Data Using LSTM-based Auto-Encoders. 32-46 - Mohammad Al-Omari
, Qasem Abu Al-Haija:
Towards Robust IDSs: An Integrated Approach of Hybrid Feature Selection and Machine Learning. 47-67 - Bandr Fakiha
:
Unlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis. 68-84 - Mehak Saini, Himanshi, Sanju Saini:
Privacy-enhancing Blockchain Solutions for the Healthcare Sector: Efficient Message Sharing and Robust Big Data Protection. 85-97 - Diego Esteban Díaz Vivas, William Yecid Gutierrez Pena, Sandra Patricia Cristancho Botero
, Alix E. Rojas
:
A Controlled Phishing Attack in a University Community: A Case Study. 98-110 - Selvaprabu Jeganathan
, Arun Raj Lakshminarayanan
, Saravanan Parthasarathy, A. Abdul Azeez Khan
, K. Javubar Sathick:
OptCatB: Optuna Hyperparameter Optimization Model to Forecast the Educational Proficiency of Immigrant Students based on CatBoost Regression. 111-132 - Noor Raheem Abd Al-Nabi, Laith Awda Kadhim Mayyahi, Ammar Sabri Majeed, Ahmed Raheem Abdulnabi
, Laith A. Abdul-Rahaim
:
Design and Implementation of a Low-cost IoT Smart Weather Station Framework. 133-144 - Mohammad Atwah Al-Maaitah:
The Drivers of Big Data Analytics Adoption and its Impact on Corporate Entrepreneurship. 145-168 - K. Malathi:
Improved Dynamic Regression Framework for Effective Data Management in Wireless Networks on Cloud-assisted Internet of Everything Platform. 169-188 - Sumiati ti, Penny Hendriyati, Agung Triayudi, Afrasim Yusta, Achmad Syaefudin:
Classification of Heart Disorders Using an Artificial Neural Network Approach. 189-201 - Khlood Shinan, Fatmah Alanazi, Hanan E. Alhazmi, Fiza Riaz, Noor Fatima, Ayesha Abid, Mohammed Nawaf Altouri, Shagufta Anwar, M. Usman Ashraf:
EUAC: An Advanced Privacy Protection for Location-based Service System. 202-225 - Sivayazi Kappagantula, Giriraj Mannayee:
Dynamic Path Planning Algorithm for Mobile Robots: Leveraging Reinforcement Learning for Efficient Navigation. 226-236 - Wafa' Za'al Alma'aitah, Fatima N. Al-Aswadi, Rami S. Alkhawaldeh:
Improving Terminologies Synonym Expansion Model for Cultural Heritage Contents. 237-246 - Sahar J. Mohammed Mohammed, Mohammed Sami Mohammed
, Nihad Mahmoud Nasir:
IoT-Traffic Networks Effective Features Based on NSGA-II Technique. 247-267 - Vicknesh Kumar Yogamadhavan
, Giriraj Mannayee:
An Evaluation of Various Deep Convolutional Networks for the Development of a Vision System for the Classification of Domestic Solid Street Waste. 268-283 - Bshayer S. Alsafar, Dhay M. Alzaher, Raghad W. Alshwukh, Afnan M. Darwish, Thowiba E. Ahmed, Eyman A. Alyahyan, Dabiah Ahmed Alboaneen, Enas E. El-Sharawy:
Smart Parking Management System Using IoT. 284-297 - Samyuktha Sasi Sekaran
, M. Subaji:
Variational Autoencoder Diffusion Model (VAEDM) and Divergence Asynchronous Reinforcement Learning (DARL) for Rail Surface Defect Detection. 298-317
Volume 14, Number 3, 2024
- Rami Shehab, Abrar s. alismail, Mohammed Amin Almaiah, Tayseer Alkhdour, Belal Mahmoud Al-Wadi
, Mahmaod Alrawad
:
Assessment of Cybersecurity Risks and threats on Banking and Financial Services. 167-190 - Anas Abduladheem Kamil
, Alaa J. Mousa, Anwer S. Aljuboury, Laith A. Abdul-Rahaim
:
Control System Design for Failure Starting of Diesel Power Block for Cell on Wheels Communication Tower based on Cloud Service System. 275-292 - B. Sreevidya, M. Supriya:
Malicious Nodes Detection and Avoidance Using Trust-based Routing in Critical Data Handling Wireless Sensor Network Applications. 226-244 - Segundo Juan Sánchez Tarrillo, Rosa Guadalupe Neciosup Rosas, Evert José Fernández Vásquez, Eddy Miguel Aguirre Reyes, Henry Bernardo Garay Canales, Augusto Oswaldo Benavides Medina, Ruber Dennys Olaya Luna, Jorge Luis Lopez Bulnes:
The Impact of Internet Security Awareness among Undergraduates in Learning Management System. 256-264 - Muawia A. Elsadig
:
A New Approach to Detect DoS Attacks in Internet of Things (IoT). 1-17 - As ha, S. J. Namitha, Prameetha Pai
, Priya Kamath, Rajeshwari Madli, R. Vijaya Arjunan:
An Improved EEG Signal Feature Selection Paradigm for Migraine Detection. 143-156 - L. K. Dhanya, Kannan Balakrishnan:
Integrating Hybrid Neural Networks and Domain-Specific Embeddings for Detecting Hate Content in Code Mixed Social Media Comments. 316-329 - Arasu Raman
, Rajani Balakrishnan, Anantha Raj Arokiasamy, Manu Pant, Chitra Batumalai, Mudiarasan Kuppusamy:
Design and Developing a Security and Threat Model for Sustainable Manufacturing. 245-255 - Arasu Raman
, Anantha Raj Arokiasamy, Chitra Batumalai, Mudiarasan Kuppusamy, Raja D. Balakrishnan, Stephen Antoni Louis:
A Trust-based Security and Privacy Protection for Data Collection in Smart City. 18-28 - Segundo Moises Toapanta Toapanta, Rodrigo Humberto Del Pozo Durango, Richard Romero Izurieta
, Joseph A. Guamán, Jose Antonio Orizaga Trejo
, María del Roció Maciel Arellano, María Mercedes Baño Hifóng:
Blockchain-based Security Model to Mitigate the Risks of a Database for a Public Organization. 78-98 - Arasu Raman
, Chitra Batumalai, Anantha Raj Arokiasamy, Rajani Balakrishnan, Stephen Antoni Louis, Priya Sukirthanandan:
An E-learning Tools Acceptance System for Higher Education Institutions in Developing Countries. 371-379 - Arasu Raman
, Rajani Balakrishnan, Anantha Raj Arokiasamy, Manu Pant, Priya Sukirthanandan:
Design of Quality of Experience-based Green Internet Architecture for Smart City. 157-166 - Cina Mathew
, P. Asha:
FedProx: FedSplit Algorithm based Federated Learning for Statistical and System Heterogeneity in Medical Data Communication. 353-370 - Carlos Ignacio Gallo Aguila, María Del Pilar Castro Arellano, María Del Pilar Quezada Castro, Eliana Maritza Barturen Mondragón, Guillermo Alexander Quezada Castro:
Examining Artificial Intelligence and Law as a Tool for Legal Service, Decision-making, Job Transformation, and Ethical Performance. 99-115 - Mihály Héder
, Domonkos Baczó, Tibor Kovács, Erno Rigó
:
A Comprehensive Study on the Dimensions of IaaS Security. 116-142 - Vicknesh Kumar Yogamadhavan, Giriraj Mannayee:
Evaluation of Performance of Different Optimizers of Convolutional Neural Network in the Classification of Images of Urban Domestic Solid Waste. 42-77 - Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi:
Effectiveness of MAC Systems based on LSM and their Security Policy Configuration for Protecting IoT Devices. 293-315 - Laith A. Abdul-Rahaim
, Dawood Salman Hasan, Ameer H. Ali:
Smart Cars Parking Systems of Big Cities based on the Internet of Things. 380-392 - Eko Yon Handri
, Dana Indra Sensuse, Sofian Lusa:
Examining Cybersecurity Culture: Trends and Success Factors. 330-352 - Abeer A. Kadhim, Samir J. Mohammed, Qais Al-Gayem:
DVB-T2 Energy and Spectral Efficiency Trade-off Optimization based on Genetic Algorithm. 213-225 - M. Naga Raju, P. Balamurugan, G. S. Nijaguna, K. Swarnalatha, P. Lakshmiramana, Edupuganti Mounika:
Integrated Internet Architecture and Protocol Framework for Peer-to-peer File Sharing in the Internet of Everything (IoE). 265-274 - D. S. John Deva Prasanna
, K. Punitha, M. Naga Raju, F. Rahman, Kamlesh Kumar Yadav:
An Artificial Intelligence-based, Big Data-aware, Long-lasting Security Solution for the Internet of Things. 393-402 - Zahraa Talib
, Laith A. Abdul-Rahaim
:
Smart Traffic System Using Infrared Sensors-based IoT. 29-41 - Nobutaka Kawaguchi, Charles Hart, Hiroki Uchiyama:
Understanding the Effectiveness of SBOM Generation Tools for Manually Installed Packages in Docker Containers. 191-212
Volume 14, Number 4, 2024
- Shenyu Zhang:
Consumer Attitudes towards AI-based Financial Advice: Insights for Decision Support Systems (DSS) and Technology Integration. 1-20 - Naijiao Li, Fei Huang:
Evaluating the Financial Returns on Investment in Sustainable Enterprise Digitalization Initiatives Using AI Information System. 21-44 - Yong Wu, Yuhanis Yusof:
Emerging Trends in Real-time Recommendation Systems: A Deep Dive into Multi-behavior Streaming Processing and Recommendation for E-commerce Platforms. 45-66 - Xilun Yang
, Harry Entebang:
Unveiling the Dynamics of Entrepreneurial Leadership and Radical Innovation Performance of China Internet SMEs: Resource-based View. 67-85 - Jianglin Jiang, Rossazana Ab-Rahim, Rosita Hamdan:
Efficiency Performance of China Brand Automobiles: The Role of Innovation Systems. 86-103 - Yongquan Zhang:
Digital Transformation in Talent Acquisition: An Investigation into the Integration of Big Data Analytics and Management Information Systems for Optimal Hiring Strategies. 104-120 - Qing Gao:
Decision Support Systems for Lifelong Learning: Leveraging Information Systems to Enhance Learning Quality in Higher Education. 121-143 - Ning Sun:
Investigating the Mediating Role of Team Communication in the Relationship between Leadership Style and Team Performance in AI-based Interaction Systems Development. 144-162 - Li Huang:
Quantifying Taxation Policy Effectiveness: The Mediating Role of Big Data and the Moderating Influence of Digitalization. 163-180 - Chengyonghui Duan, Wei Ni Soh, Tze San Ong, Norhuda Abdul Rahim:
Strategies for Safeguarding Financial Stability: Integrating Government Intervention, Financial Freedom, and Information Management Systems for Resilient Economies. 181-194 - Xiaoheng Zou, Khairul Anuar Mohd Ali:
Regional Differences and Digital Transformation of Manufacturing Companies in China: A Systematic Literature Review. 195-208 - Chongchong Yang, Soon Singh Bikar Singh:
User Experience in Information System Platforms: A Study on Learning Styles and Academic Challenges. 209-223 - Yan Nie, Fengguo Liu:
Visual Inheritance in the Digital Age: Image Reconstruction of Shanghai Time-Honored Cosmetics Brands Under the Influence of Internet of Things. 224-233 - Yadong Zhang:
Application of the Internet of Things Technology in the Production and Dissemination of Intangible Cultural Heritage Micro-documentaries. 234-248 - Xin Xu, Wen Lu:
Digital Preservation and Network Security Protection: A Case Study of Landscape Painting in Ming Dynasty. 249-262 - Sakthivelu U., C. N. S. Vinoth Kumar:
Defence Mechanism against Advanced Persistent Threat Attack Using Significant Features based Deep Learning Model. 263-277 - Zaid Saad Bilal:
Advancements in Arabic Sign Language Recognition: A Method based on Deep Learning to Improve Communication Access. 278-291 - Pradeepkumar C. Dhage, Rajesh A. Thakker, Krishna K. Warhade:
Security Mechanism in MAMATA Healthcare System Using Rule based Algorithm for Maternal Hospitals and Pathology Laboratories. 292-311 - Emad Sherif, Iryna Yevseyeva, Vitor Basto-Fernandes, Allan Cook:
The Smart Approach to Selecting Good Cyber Security Metrics. 312-330 - G. Aravindh, K. P. Sridhar:
Resilient and Adaptive Secure Routing Protocol for Wireless Sensor Networks Using a Grey Wolf Optimizer and Lightning Search Algorithm. 331-346 - Yaareb M. Mathboob, Laith Ali Abdul Rahaim
, Ameer H. Ali:
Healthcare Monitoring-based Internet of Things (IOT). 347-359 - María Del Pilar Castro Arellano, María Del Pilar Quezada Castro, Eliana Maritza Barturen Mondragón, Martha Olga Marruffo Valdivieso, José Rolando Cárdenas Gonzáles, Guillermo Alexander Quezada Castro:
Examining Face Recognition Technologies and Privacy: Ethical and Legal Choices. 360-376 - S. Poornimadarshini, S. Sindhu, Saravanakumar Veerappan, N. Arvinth:
A Bibliometric Review of Journal of Internet Services and Information Security: An Analysis of Research Published between 2019 and 2024. 377-388 - Sanobar Shadmanova, Nodir Karimov, Mukaddaskhon Taylanova, Mamurakhon Asrorkhujaeva, Umida Mavlyanova, Shukriya Nazirova, Yulia Isaeva, Zulfiya Pardaeva:
Ensuring the Security of an Internet-based E-learning System through the Use of Integrated Encryption Methods. 389-400 - Zainab Ibrahim Abood Al-Rifaee, Tarik Z. Ismaeel, Samir Ibrahim Abood:
Cryptography based on Fingerprint Bio Metrics. 401-417 - P. Suseendhar, K. P. Sridhar:
A Niche Quantum Ant Colony Multifaceted Routing Algorithm for WSN-based IoT Networks in the Emerging Quantum Industry. 418-435 - Hayder Najm
, Mohammed Salih Mahdi, Wijdan Rashid Abdulhussien
:
Lightweight Image Encryption Using Chacha20 and Serpent Algorithm. 436-449 - Saodat Ubaydullaeva, Guzal Umurova, Shakhlo Botirova, Ashur Yakhshiev, Umida Mavlyanova, Shukriya Nazirova, Maftuna Khalova, Oleg Kim:
Modular Web-based Learning Model to Address Underdeveloped ICT Infrastructure for Smart E-learning Education System. 450-461 - P. Archana Menon, R. Gunasundari:
Deep Feature Extraction and Classification of Alzheimer's Disease: A Novel Fusion of Vision Transformer-DenseNet Approach with Visualization. 462-483 - Yurii Dziurakh, Ihor Kulyniak, Hanna Sarkisian, Ivan Zhygalo, Bohdan Chepil, Khrystyna Vaskovych:
Intrusion Detection Systems for Smart Tourism Platforms: Safeguarding Food Safety and User Privacy. 484-498 - S. Bamal, L. Singh:
Detecting Conjunctival Hyperemia Using an Effective Machine Learning based Method. 499-510 - Christy Jacqueline, Dr. K. Ranjith Singh:
Enriched Deep Neural Network Improved by Chaotic Harris Hawk Optimizer for Prediction of Behavioural Traits of Individuals. 511-523 - Adekunle Micheal Adeshina, S. O. Anjorin, Siti Fatimah Abdul Razak
:
Safety in Connected Health Network: Predicting and Detecting Hidden Information in Data Using Multilayer Perception Deep Learning Model. 524-541 - Sourav Sinha, Revathi Sathiya Narayanan
, Indrajit Mukherjee:
Next Basket Recommendation Paradigm Multi-Layer Stacked Sequence to Sequence Bidirectional GRU Model with Multiplicative Attention. 542-553 - Rashida Kharipova, Izzatilla Khaydarov, Shakhnoza Akramova, Durdona Lutfullaeva, Shavkat Saidov, Aftondil Erkinov, Sarvinoz Azizkhonova, Nigora Erkinova:
The Role of Artificial Intelligence Technologies in Evaluating the Veracity of Scientific Research. 554-568 - Su Jin Shin, Youngho Park, Sang Uk Shin:
Decentralized Fair Data Trading Scheme based on mCL-ME Primitive. 569-589 - Noha Mostafa Mohamed Said, Sabna Machinchery Ali
, Naseema Shaik, Khan Mohamed Jarina Begum
, Anwaar Ahmed Abd ellatif Shaban, Betty Elezebeth Samuel
:
Analysis of Internet of Things to Enhance Security Using Artificial Intelligence based Algorithm. 590-604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.