International Journal of Internet Technology and Secured Transactions
- Editor in Chief
- Dr. Jong-Hyouk Lee
- ISSN online
- ISSN print
- 6 issues per year
- CiteScore 1.2 (2021)
IJITST is an international refereed journal dedicated to the advancement of the theory and practical implementation of secured internet transactions and to fostering discussions on information technology evolution. IJITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Topics covered include
- Networked system architecture and protocols
- Networked system services and applications
- Networked system security, privacy and trust
- Digital crypto-currencies in networked systems
- Incentives in networked systems
- Malware and ransomware targeting networked systems
- Rootkit and bootkit targeting networked systems
- Security vulnerabilities in networked systems
- Offensive security for networked systems
- Reverse engineering
The objectives of IJITST are to bridge the knowledge gap between academia and industry and promote the exchange of ideas in secured internet transactions and the importance of information technology evolution to secured transactions. IJITST invites and welcomes research papers that encompass conceptual analysis, design implementation and performance evaluation.
IJITST endeavours to create awareness of technological advancement that provides professionals, policy makers, internet security consultants, academics, researchers and information technology managers with an understanding of current and future developments in internet security and information technology evolution.
IJITST publishes original papers, case studies and technical reports, and provides an international forum which is an authoritative source of information in the field. All papers undergo a rigorous peer review process. Special Issues devoted to important topics in secured internet transactions and information technology evolution will also be published.
IJITST is indexed in:
- Scopus (Elsevier)
- Academic OneFile (Gale)
- ACM Digital Library
- cnpLINKer (CNPIEC)
- Computer Database (Gale)
- Google Scholar
- Info Trac (Gale)
- Inspec (Institution of Engineering and Technology)
- ProQuest Advanced Technologies Database with Aerospace
IJITST is listed in:More journal lists/directories...
Editor in Chief
- Lee, Jong-Hyouk, Sejong University, South Korea
- Barnett, George A., University of California – Davis, USA
- Chan, H. Anthony, Huawei Technologies, USA
- Chrysanthis, Panos K., University of Pittsburgh, USA
- Guo, Yike, Imperial College London, UK
- Schell, Bernadette, Laurentian University, Canada
- Scoglio, Caterina, Kansas State University, USA
Far East Editor
- Shih, Timothy K., National Central University, Taiwan, Province of China
Editorial Board Members
- Anis, Muhammad Moiz, Usman Institute of Technology, Pakistan
- Chang, Alan Chin-Chen, Feng-Chia University, Taiwan, Province of China
- Choi, Chang, Gachon University, South Korea
- Choi, Young B., Regent University, USA
- Das, Ashok Kumar, International Institute of Information Technology, India
- Dillon, Tharam, La Trobe University, Australia
- Ferrag, Mohamed Amine, Guelma University, Algeria
- Fux, Vladimir, Technische Universität München, Germany
- Gaur, Sudhanshu, Hitachi, USA
- Gritzalis, Stefanos, University of the Aegean, Greece
- He, Debiao, Wuhan University, China
- Jiang, Qi, Xidian University, China
- Kehal, Mounir, Higher Colleges of Technology, United Arab Emirates
- Lee, Cheng-Chi, Fu Jen Catholic University, Taiwan, Province of China
- Lee, Jihoon, Sangmyung University, South Korea
- Lee, Kyungroul, Daegu Catholic University, South Korea
- Li, Xiong, Hunan University of Science and Technology, China
- Maglaras, Leandros, Ministry of Digital Policy, Telecommunications and Media, Greece
- Moudi, Mehrnaz, University of Torbat Heydarieh, Iran
- Munir, Kashif, National University of Computer and Emerging Sciences, Pakistan
- Park, Hyunhee, Myongji University, South Korea
- Rawat, Priyanka, University of Avignon, France
- Ryoo, Jungwoo, Penn State Altoona, USA
- Singh, Kamal Deep, University of Saint Etienne, France
- Tsai, Chun-Wei, National Chung-Hsing University, Taiwan, Province of China
- Tsukada, Manabu, University of Tokyo, Japan
- Yan, Zhiwei, China Internet Network Information Center, China
A few essentials for publishing in this journal
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been completely re-written (more details available here) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
- Briefs and research notes are not published in this journal.
- All our articles go through a double-blind review process.
- All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.
- There are no charges for publishing with Inderscience, unless you require your article to be Open Access (OA). You can find more information on OA here.
- All articles for this journal must be submitted using our online submissions system.
- View Author guidelines.
30 September, 2022
Most intrusions on our devices and computers through malware, third-party attacks, and other infractions tend to go unreported unless one is particularly tuned into the information security world and knows the procedures needed to get the message to the right people. Research published in the International Journal of Internet Technology and Secured Transactions, looks at how machine learning might be used to automate the process of reporting policy violations on a system. Albara Awajan, Moutaz Alazab, Issa Qiqieh, and Mohammad Wedyan of Al-Balqa Applied University in Al-Salt, and Salah Alhyari of JEPCO in Amman, Jordan, point out that computer and mobile devices users frequently face security incidents and violations of their systems and data. They point out that a unified approach to reporting such malicious activity could, to some degree, address this growing problem. They have now proposed an automated client-server citizen reporting system framework based on machine learning techniques that could help [...]More details...