Journal cover image

Browse issues


Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Internet Technology and Secured Transactions

2011 Vol. 3 No. 3

 

PagesTitle and authors
223-239Oversight of telecommunications regulatory agencies
Daphne Rixon, Mary Furey
DOI: 10.1504/IJITST.2011.041293

240-252Traffic classification and packet detections to facilitate networks security
George S. Oreku, Fredrick J. Mtenzi, Charles A. Shoniregun
DOI: 10.1504/IJITST.2011.041294

253-278Creating and enforcing access control policies using description logic techniques
Brian Shields, Owen Molloy
DOI: 10.1504/IJITST.2011.041295

279-292An intelligent anti-phishing solution: password-transaction secure window
Dharmendra Choukse, Umesh Kumar Singh, Dimitris Kanellopoulos
DOI: 10.1504/IJITST.2011.041296

293-309Understanding the decision rules for partitioning logs of intrusion detection systems (IDS)
Joshua Ojo Nehinbe
DOI: 10.1504/IJITST.2011.041297

310-319An improved knapsack public key cryptography system
Sattar J. Aboud
DOI: 10.1504/IJITST.2011.041298

320-330Exploring visualisation in web information retrieval
Anwar Alhenshiri, James Blustein
DOI: 10.1504/IJITST.2011.041299