Sample issue


You can read all of these full-text articles free of charge - click Free access


International Journal of Internet Technology and Secured Transactions (IJITST)

Title Author(s) Vol. and Issue nos. Page nos. Full-text article
A software approach for stack memory protection based on duplication and randomisationSahel Alouneh; Mazen Kharbutli; Rana AlQuremVol.6 No.4324-348Free access
A four-phase methodology for protecting web applications using an effective real-time techniqueNabeel Salih AliVol.6 No.4303-323Free access
Geo-based content naming and forwarding mechanism for vehicular networking over CCNSimiao Wang; Zhiwei Yan; Guanggang Geng; Yuedong ZhangVol.6 No.4291-302Free access
A quantum-inspired evolutionary clustering algorithm for the lifetime problem of wireless sensor networkChun-Wei Tsai; Chun-Ting Kang; Kai-Cheng Hu; Ming-Chao ChiangVol.6 No.4259-290Free access