International Journal of Internet Technology and Secured Transactions
ISSN:1748-569X

International Journal of Internet Technology and Secured Transactions

学科领域:-
是否预警:不在预警名单内
是否OA:
录用周期:-
新锐分区:-
年发文量:-
影响因子:0
JCR分区:Q0(未被收录)

基本信息

-
1748-569XScopus收录
0
0
-
WOS期刊SCI分区  2024-2025最新升级版
暂无按学科分区信息
暂无h-index数据
-
----Computer Science-Computer Networks and Communications
0%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
0.00%--
CiteScore:2.30
SJR:0.178
SNIP:0.277
学科类别分区排名百分位
大类:Computer Science
小类:Computer Networks and Communications
Q3
276 / 507
大类:Computer Science
小类:Computer Science Applications
Q3
581 / 947

期刊高被引文献

Enhancing network lifetime through power-aware routing in MANET
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019554
TAACS-FL: trust aware access control system using fuzzy logic for internet of things
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10016266
Efficient parking control algorithms for self-driving cars
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023434
Performance analysis of cloud computing using series of queues with Erlang service
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019559
Risk-based availability modelling and reputation management on fault tolerant cloud computing systems
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019550
Outlier detection techniques for big data streams: focus on cyber security
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024067
A scalable fine-grained analytic model for container cloud data centres
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024062
Privacy preserving computation of scalar product and sign of scalar product
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10013024
Event detection in sports video based on audio-visual and support vector machine. Case-study: football
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019549
Dynamic Software Management practices using Genetically Augmented Neural Networks
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10016700
An efficient spectrum handoff decision making scheme for cognitive radio networks
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019552
An integrated approach for network traffic analysis using unsupervised clustering and supervised classification
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024065
Deadline-credit aware heuristic for dynamic resource provisioning in virtualised cloud environment
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024063
Storage and query over encrypted sensitive association rules in database
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10012622
Efficient authentication and key management scheme for wireless mesh networks
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019568
A multi-controller placement strategy in software defined networks using affinity propagation
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10015442
A novel dyadic multiresolution wavelet image steganography using N-ary
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019547
Financial default payment predictions using a hybrid of simulated annealing heuristics and extreme gradient boosting machines
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024064
Cost-based constrained task scheduling in cloud environment
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019551
Dynamic high bandwidth nodes for routing in MANETs
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019546
Comparison of security-related methods in Open Interconnect Consortium and one machine-to-machine for security interoperability
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023427
Secure communication process in IoT using media gate network transmit protocol with reliable data transport protocol
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019556
Response time-based resource allocation according to service level agreements in cloud computing
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019526
Agile polymorphic software-defined fog computing platform for mobile wireless controllers and sensors
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024066
A novel data aware task clustering mechanism for scientific workflow applications in cloud
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023426
Improving cloud computing services indexing based on B Cloud -tree with users preferences
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024068
Spatial data storage and retrieval in cloud computing environments using attribute based encryption algorithm
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019567
REVIEW OF CYBER ATTACKS CLASSIFICATIONS AND THREATS ANALYSIS IN CYBER-PHYSICAL SYSTEMS
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10015387
A public key-based encryption and signature verification model for secured image transmission in network
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023424

相关文章