0.4(top 50%)
impact factor
100(top 100%)
papers
115(top 100%)
citations
6(top 50%)
h-index
0.4(top 100%)
extended IF
112
all documents
122
doc citations
8(top 50%)
g-index

Top Articles

#TitleJournalYearCitations
1A Comparative Study of Hidden Markov Model and Support Vector Machine in Anomaly Intrusion DetectionJournal of Internet Technology and Secured Transaction20139
2Mobile Spatial Mapping and Augmented Reality Applications for Environmental GeoscienceJournal of Internet Technology and Secured Transaction20138
3Analysis of Cloud-Based E-government Services Acceptance in Jordan: Challenges and BarriersJournal of Internet Technology and Secured Transaction20188
4Mobile Visualization of Biomedical Volume DatasetsJournal of Internet Technology and Secured Transaction20127
5Building Information Science Ontology (OIS) with Methontology and ProtégéJournal of Internet Technology and Secured Transaction20127
6Security Factors Influencing End Users’ Adoption of E-GovernmentJournal of Internet Technology and Secured Transaction20147
7The Impact of Different Botnet Flow Feature Subsets on Prediction Accuracy Using Supervised and Unsupervised Learning MethodsJournal of Internet Technology and Secured Transaction20164
8Cognitive Topology Mapping based on HumanComputer InteractionJournal of Internet Technology and Secured Transaction20134
9Post-Quantum Crystography based Security Framework for Cloud ComputingJournal of Internet Technology and Secured Transaction20154
10The Way Forward in Addressing Cybercrime Regulation on a Global LevelJournal of Internet Technology and Secured Transaction20123
11Information Privacy Concerns in a Participatory Crowdsourcing Smart City ProjectJournal of Internet Technology and Secured Transaction20143
12Buddy System: Available, Consistent, Durable Web Service TransactionsJournal of Internet Technology and Secured Transaction20133
13Facilitating a Secured Status Data Acquisition from Industrial Equipment via NFCJournal of Internet Technology and Secured Transaction20143
14Post-Quantum Crystography based Security Framework for Cloud ComputingJournal of Internet Technology and Secured Transaction20143
15Securing e-Loyalty CurrenciesJournal of Internet Technology and Secured Transaction20153
16Evaluating the Readiness of Cyber Resilient BangladeshJournal of Internet Technology and Secured Transaction20153
17MORI: An Innovative Mobile Applications Data Risk Assessment ModelJournal of Internet Technology and Secured Transaction20163
18Defining a Baseline Complexity Model for ERP Systems over SaaSJournal of Internet Technology and Secured Transaction20122
19Using PTES and open-source tools as a way to conduct external footprinting security assessments for intelligence gatheringJournal of Internet Technology and Secured Transaction20142
20Recovering Private User Storages in Online Social NetworksJournal of Internet Technology and Secured Transaction20202
21Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network SystemsJournal of Internet Technology and Secured Transaction20142
22Investigating the Security Factors in Cloud Computing Adoption: Towards Developing an Integrated FrameworkJournal of Internet Technology and Secured Transaction20162
23A Novel Model for Monitoring Security Policy ComplianceJournal of Internet Technology and Secured Transaction20162
24A Comparative Study of Traffic Generators: Applicability for Malware Detection TestbedsJournal of Internet Technology and Secured Transaction20202
25Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing EconomiesJournal of Internet Technology and Secured Transaction20222
26Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 PandemicJournal of Internet Technology and Secured Transaction20211
27The Need for an Adoption and Acceptance Framework for Mobile Digital Library ServicesJournal of Internet Technology and Secured Transaction20121
28A Collaborative Framework for QoC-driven Context Information ProvisionJournal of Internet Technology and Secured Transaction20141
29Nudging Bank Account Holders Towards More Secure PIN ManagementJournal of Internet Technology and Secured Transaction20151
30Aggregating Vulnerability Information for Proactive Cloud Vulnerability AssessmentJournal of Internet Technology and Secured Transaction20151
31Informational Privacy Preservation through Universal Service ObligationsJournal of Internet Technology and Secured Transaction20121
32Integrated Database Security System Architectures based on WCF ServicesJournal of Internet Technology and Secured Transaction20121
33Identifying and Finding Forensic Evidence From Windows ApplicationJournal of Internet Technology and Secured Transaction20121
34Building an Ontology Based on Folksonomy: An attempt to Represent Knowledge Embedded in Filmed MaterialsJournal of Internet Technology and Secured Transaction20121
35Cloud-based NFC Mobile PaymentsJournal of Internet Technology and Secured Transaction20131
36A Study on the Impact of ICT on Collaborative Learning Processes in Libyan Higher EducationJournal of Internet Technology and Secured Transaction20141
37Assisted Learning Virtual Support (ALVS) for Personal Learning EnvironmentsJournal of Internet Technology and Secured Transaction20141
38Attack Graph-Based Risk Assessment and Optimisation ApproachJournal of Internet Technology and Secured Transaction20141
39A Data Partition Based Model to Enforce Security in Cloud DatabaseJournal of Internet Technology and Secured Transaction20141
40Improving Deception Capability in Honeynet through Data ManipulationJournal of Internet Technology and Secured Transaction20151
41Assessing Usable Security of Multifactor AuthenticationJournal of Internet Technology and Secured Transaction20151
42Switching to Electronic Government through Transformational Leadership: Implications of Multichannel and Digital DivideJournal of Internet Technology and Secured Transaction20181
43A Gamified System for Task Monitoring and Performance Evaluation Using the Learning Vectors (LV) ModelJournal of Internet Technology and Secured Transaction20181
44Agile Approach for IT Forensics ManagementJournal of Internet Technology and Secured Transaction20191
45Data Controllability for Risk Management in Smart and Intelligent SystemsJournal of Internet Technology and Secured Transaction20201
46Intelligent Model for Network Attack IdentificationJournal of Internet Technology and Secured Transaction20201
47Oversampling Techniques in Machine Learning Detection of Credit Card FraudJournal of Internet Technology and Secured Transaction20211
48Friendship and Privacy in Online Social NetworksJournal of Internet Technology and Secured Transaction20120
49On Assurance of Information Security using Elliptic Curves CryptosystemsJournal of Internet Technology and Secured Transaction20120
50Cryptanalysis of Password Authentication Scheme Using Smart CardsJournal of Internet Technology and Secured Transaction20120