Forthcoming articles

 


International Journal of Web Science

 

These articles have been peer-reviewed and accepted for publication in IJWS, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJWS are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Web Science (3 papers in press)

 

Regular Issues

 

  • Creating Web Signature for Each Individual User and Its Various Applications   Order a copy of this article
    by Rozita Jamili Oskouei 
    Abstract: In this paper we describe our experiments and their results to generate unique Web signature for students with exploring proxy servers access log files for varying periods from 15 to 90 continuous days and study its relationships with their time spent on Internet , academic performance and participating in curricular activities . Further, we demonstrate the usage of this Web signature to identify outliers in student community based on their different behavioral dimensions. k-means and DBSCAN clustering methods are used to identify outliers in student community on the basis of time spent, CPI, and Signature length. Our results contradicts widely held perception that access and usage of Internet have adverse effects on academic performance. It seems to contribute positively in academic performance. The major applications of Web-signature are:rn Help to administrators for predicting the more overload timing per day and plan for that. rn Grouping users based on their similarity of contents of Web-Signatures and establishing social network between those users based on their similar behaviors. There are several benefits for creating this social network, such as: rno Help to fresher students for connecting to professional and expert people who are working in similar domains and discuss about problems or difficulties especially in educational environments. In fast one of the main usage of the Web Signature would be creating a social network between different students in all around the world based on their similarity of interests or behaviors in Internet for exchanging knowledge with together.
    Keywords: Web Signature; Access log files; Academic performance; outliers detection; Behavior mining.

  • Mitigation of SQL Injection Vulnerability during Development of Web Applications   Order a copy of this article
    by Navdeep Kaur, Parminder Kaur 
    Abstract: SQL Injection (SQLI) attack is consistently proliferating across the globe. According to Open Web Application Security Project (OWASP) Top Ten Cheat Sheet-2014, SQLI is at top in the list of online attacks. The cause of spread of SQLI is thought to be Unsecure Software Engineering. The Software Development process itself appears to look at security as an add-on to be checked and deployed towards the end of the software development lifecycle (SDLC) which leads to vulnerabilities in web applications. This paper is an attempt to integrate security during development of web application. The paper introduces a grounds-up approach for developing SQLI free web application. The process of occurrence of SQLI attack is discussed with the help of suitable example. Various security activities desired to mitigate SQLI during Software Development Life Cycle are discussed.
    Keywords: SQL Injection,SQLI; Software Security; Software Development Lifecycle; Threat Modeling; Security Requirements.

  • A Systematic Literature Review in Fault Analysis for IoT   Order a copy of this article
    by Guru Prasad Bhandari, Ratneshwer Gupta 
    Abstract: Internet of Things (IoT) is a system where devices, sensors, and equipment are connected to a network and can communicate data for tracking, analysis, and action. Even IoT has drawn increasing attention and became a promising technology in all types of areas within half a decade, it has some serious challenges to handle fault in IoT system too. Our goal is to gain insight into the current status in fault analysis of IoT as published to date. The objective of this Systematic Literature Review(SLR) is to summarize the current state of the art of fault analysis in the Internet of Things (IoT). Predefined systematic literature review method has been used and five reputed digital libraries; SpringerLink, IEEE Explore, ACM Digital Library, ScienceDirect, and Scopus have been taken to search research papers about fault associated with IoTs. After applying inclusion and exclusion selection criteria, this systematic literature review includes 68 papers published between January 2012 and September 2017, 15 papers addressed different aspects of IoT fault, 37 addressed recovery methods for IoT-fault, and 28 research papers including 3 review-based papers addressed IoT-issues and challenges in fault handling. The findings of this systematic review further provide empirical evidence for establishing future IoT related fault research agendas.
    Keywords: IoT; Faults; Security; Internet of Things; Distributed Systems; Systematic Literature Review;.