About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Journal of Internet Technology and Secured Transaction
›
top-articles
Journal of Internet Technology and Secured Transaction
0.4
(top 50%)
impact factor
100
(top 100%)
papers
115
(top 100%)
citations
6
(top 50%)
h
-index
0.4
(top 100%)
extended IF
112
all documents
122
doc citations
8
(top 50%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
A Comparative Study of Hidden Markov Model and Support Vector Machine in Anomaly Intrusion Detection
Journal of Internet Technology and Secured Transaction
2013
9
2
Mobile Spatial Mapping and Augmented Reality Applications for Environmental Geoscience
Journal of Internet Technology and Secured Transaction
2013
8
3
Analysis of Cloud-Based E-government Services Acceptance in Jordan: Challenges and Barriers
Journal of Internet Technology and Secured Transaction
2018
8
4
Mobile Visualization of Biomedical Volume Datasets
Journal of Internet Technology and Secured Transaction
2012
7
5
Building Information Science Ontology (OIS) with Methontology and Protégé
Journal of Internet Technology and Secured Transaction
2012
7
6
Security Factors Influencing End Users’ Adoption of E-Government
Journal of Internet Technology and Secured Transaction
2014
7
7
The Impact of Different Botnet Flow Feature Subsets on Prediction Accuracy Using Supervised and Unsupervised Learning Methods
Journal of Internet Technology and Secured Transaction
2016
4
8
Cognitive Topology Mapping based on HumanComputer Interaction
Journal of Internet Technology and Secured Transaction
2013
4
9
Post-Quantum Crystography based Security Framework for Cloud Computing
Journal of Internet Technology and Secured Transaction
2015
4
10
The Way Forward in Addressing Cybercrime Regulation on a Global Level
Journal of Internet Technology and Secured Transaction
2012
3
11
Information Privacy Concerns in a Participatory Crowdsourcing Smart City Project
Journal of Internet Technology and Secured Transaction
2014
3
12
Buddy System: Available, Consistent, Durable Web Service Transactions
Journal of Internet Technology and Secured Transaction
2013
3
13
Facilitating a Secured Status Data Acquisition from Industrial Equipment via NFC
Journal of Internet Technology and Secured Transaction
2014
3
14
Post-Quantum Crystography based Security Framework for Cloud Computing
Journal of Internet Technology and Secured Transaction
2014
3
15
Securing e-Loyalty Currencies
Journal of Internet Technology and Secured Transaction
2015
3
16
Evaluating the Readiness of Cyber Resilient Bangladesh
Journal of Internet Technology and Secured Transaction
2015
3
17
MORI: An Innovative Mobile Applications Data Risk Assessment Model
Journal of Internet Technology and Secured Transaction
2016
3
18
Defining a Baseline Complexity Model for ERP Systems over SaaS
Journal of Internet Technology and Secured Transaction
2012
2
19
Using PTES and open-source tools as a way to conduct external footprinting security assessments for intelligence gathering
Journal of Internet Technology and Secured Transaction
2014
2
20
Recovering Private User Storages in Online Social Networks
Journal of Internet Technology and Secured Transaction
2020
2
21
Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems
Journal of Internet Technology and Secured Transaction
2014
2
22
Investigating the Security Factors in Cloud Computing Adoption: Towards Developing an Integrated Framework
Journal of Internet Technology and Secured Transaction
2016
2
23
A Novel Model for Monitoring Security Policy Compliance
Journal of Internet Technology and Secured Transaction
2016
2
24
A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds
Journal of Internet Technology and Secured Transaction
2020
2
25
Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies
Journal of Internet Technology and Secured Transaction
2022
2
26
Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 Pandemic
Journal of Internet Technology and Secured Transaction
2021
1
27
The Need for an Adoption and Acceptance Framework for Mobile Digital Library Services
Journal of Internet Technology and Secured Transaction
2012
1
28
A Collaborative Framework for QoC-driven Context Information Provision
Journal of Internet Technology and Secured Transaction
2014
1
29
Nudging Bank Account Holders Towards More Secure PIN Management
Journal of Internet Technology and Secured Transaction
2015
1
30
Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment
Journal of Internet Technology and Secured Transaction
2015
1
31
Informational Privacy Preservation through Universal Service Obligations
Journal of Internet Technology and Secured Transaction
2012
1
32
Integrated Database Security System Architectures based on WCF Services
Journal of Internet Technology and Secured Transaction
2012
1
33
Identifying and Finding Forensic Evidence From Windows Application
Journal of Internet Technology and Secured Transaction
2012
1
34
Building an Ontology Based on Folksonomy: An attempt to Represent Knowledge Embedded in Filmed Materials
Journal of Internet Technology and Secured Transaction
2012
1
35
Cloud-based NFC Mobile Payments
Journal of Internet Technology and Secured Transaction
2013
1
36
A Study on the Impact of ICT on Collaborative Learning Processes in Libyan Higher Education
Journal of Internet Technology and Secured Transaction
2014
1
37
Assisted Learning Virtual Support (ALVS) for Personal Learning Environments
Journal of Internet Technology and Secured Transaction
2014
1
38
Attack Graph-Based Risk Assessment and Optimisation Approach
Journal of Internet Technology and Secured Transaction
2014
1
39
A Data Partition Based Model to Enforce Security in Cloud Database
Journal of Internet Technology and Secured Transaction
2014
1
40
Improving Deception Capability in Honeynet through Data Manipulation
Journal of Internet Technology and Secured Transaction
2015
1
41
Assessing Usable Security of Multifactor Authentication
Journal of Internet Technology and Secured Transaction
2015
1
42
Switching to Electronic Government through Transformational Leadership: Implications of Multichannel and Digital Divide
Journal of Internet Technology and Secured Transaction
2018
1
43
A Gamified System for Task Monitoring and Performance Evaluation Using the Learning Vectors (LV) Model
Journal of Internet Technology and Secured Transaction
2018
1
44
Agile Approach for IT Forensics Management
Journal of Internet Technology and Secured Transaction
2019
1
45
Data Controllability for Risk Management in Smart and Intelligent Systems
Journal of Internet Technology and Secured Transaction
2020
1
46
Intelligent Model for Network Attack Identification
Journal of Internet Technology and Secured Transaction
2020
1
47
Oversampling Techniques in Machine Learning Detection of Credit Card Fraud
Journal of Internet Technology and Secured Transaction
2021
1
48
Friendship and Privacy in Online Social Networks
Journal of Internet Technology and Secured Transaction
2012
0
49
On Assurance of Information Security using Elliptic Curves Cryptosystems
Journal of Internet Technology and Secured Transaction
2012
0
50
Cryptanalysis of Password Authentication Scheme Using Smart Cards
Journal of Internet Technology and Secured Transaction
2012
0
site/software ©
exaly
; All materials licenced under
CC by-SA
.