International Journal of Internet Technology and Secured Transactions (IJITST)

International Journal of Internet Technology and Secured Transactions

2018 Vol.8 No.4

Special Issue on: Intelligent Machine Learning Algorithms for High Performance Computing

Guest Editors: Dr. L. Jegatha Deborah, Dr. P. Vijayakumar, Dr. B. Balamurugan, Dr. Vassil T. Vassilev and Dr. Victor Chang

Editorial

Pages Title and author(s)
494-515Design and analysis of smart card-based authentication scheme for secure transactions
Akshat Pradhan; Marimuthu Karuppiah; R. Niranchana; M. Asha Jerlin; S. Rajkumar
DOI: 10.1504/IJITST.2018.095925
516-527Secure geospatial data storage using SpatialHadoop framework in cloud environment
S. Karthi; S. Prabu
DOI: 10.1504/IJITST.2018.095926
528-542Secured data storage and auditing of data integrity over dynamic data in cloud
P. Santhosh Kumar; Latha Parthiban; V. Jegatheeswari
DOI: 10.1504/IJITST.2018.095927
543-552Propels in compiler construction for versatile figuring
E. Ezilarasan; M. Dinakaran; P. Boominathan; S. Rajkumar; R. Kannadasan; N. Prabakaran; A. Krishnamoorthy; K. Naresh
DOI: 10.1504/IJITST.2018.095928
553-572Automatic segmentation of pathological region (tumour and oedema) in high grade glioma multi-sequence MR images through voted prediction from pixel level feature sets
R. Geetha Ramani; K. Sivaselvi
DOI: 10.1504/IJITST.2018.095929
573-582Improving performance an artificial bee colony optimisation on CloudSim
S. Saravanan; P. Gokulraj
DOI: 10.1504/IJITST.2018.095935
583-600Enhanced efficient SYN spoofing detection and mitigation scheme for DDoS attacks
L. Kavisankar; C. Chellappan; S. Venkatesan; P. Sivasankar
DOI: 10.1504/IJITST.2018.095936
601-618An efficient probabilistic authentication scheme for converging VANET
V. Hemamalini; G. Zayaraz; V. Susmitha; V. Saranya
DOI: 10.1504/IJITST.2018.095938

Additional Papers

619-634Anti-continuous collisions user-based unpredictable iterative password salted hash encryption
Munqath H. Alattar; Ali Al Farawn; Nabeel Salih Ali
DOI: 10.1504/IJITST.2018.095944
635-652Intrusion detection model using feature extraction and LPBoost technique
I. Sumaiya Thaseen; Ch. Aswani Kumar
DOI: 10.1504/IJITST.2018.095945
653-663Threat analysis for an in-vehicle telematics control unit
Sungbum Lee; Jong-Hyouk Lee; Byoungsoo Koh
DOI: 10.1504/IJITST.2018.095978