Journal Contents: International Journal of Smart Security Technologies (IJSST)

View the International Journal of Smart Security Technologies (IJSST) home page for complete details.
Volume 10 (2024)
Issue 1
Article 52
A Comparative Study of BFV and CKKs Schemes to Secure IoT Data Using TenSeal and Pyfhel Homomorphic Encryption Libraries (pages 1-17)
Yancho B. Wiryen (University of Douala, Cameroon), Noumsi Woguia Auguste Vigny (University of Douala, Cameroon), Mvogo Ngono Joseph (University of Douala, Cameroon), Fono Louis Aimé (University of Douala, Cameroon)
Volume 9 (2022)
Issue 1
Article 3
Blockchain Application for Cybersecurity in Cyber-Physical Systems (pages 1-20)
Soufyane Mounir (ENSA, University of Sultan Moulay Slimane, Morocco), Imade Fahd Eddine Fatani (Sciences and Techniques for the Engineer Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University, Beni Mellal, Morocco)
Article 4
Improving System Reliability of Secondary Distribution Networks Through Smart Monitoring (pages 1-11)
Aderonke Oluseun Akinwumi (Afe Babalola University, Nigeria)
Article 24
Characteristics of Human Elements Focused on Data, Threats, Risk, and Privacy Management for Smart Cities (pages 1-11)
Yakubu Ajiji Makeri (Kampala International University, Uganda)
Article 38
CAPTCHA Robustness: AI Approach for Web Security (pages 1-14)
Abhishek Sharma (MyConcierge Pte. Ltd., India), Shilpi Sharma (Amity University, Noida, India), Saksham Gulati (Illinois Institute of Technology, USA)
Article 71
Exploring Software-Defined Network (SDN) for Seamless Handovers in Future Vehicular Networks: Mobility Management Approach (pages 1-16)
Amina Gharsallah (NTS'Com Research Unit, ENET'COM, University of Sfax, Tunisia), Faouzi Zarai (NTS'Com Research Unit, ENET'COM, University of Sfax, Tunisia), Mahmoud Neji (MIRACL, University of Sfax, Tunisia)
Article 71
Anti-Raider ATM System Using Mobilenetv2 (pages 1-9)
Gnana Guru Ganesan (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India), Arun C. A. (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India)
Article 72
Flow-Based Anomaly Detection Using BNN for Attack Mitigation on SDN (pages 1-17)
Nang May Phu Lwin (University of Computer Studies, Mandalay, Myanmar), Su Thawda Win (University of Computer Studies, Mandalay, Myanmar)
Issue 2
Volume 8 (2021)
Issue 1
Article 1
NT-ODP Theoretical Model Extension: Toward an Efficiency-Based New Technologies Use of the Organization Digital Patrimony (pages 1-15)
Mustapha El Hamzaoui (ISTM Laboratory, Faculty of Sciences, University of Chouaib Doukkali, Morocco), Faycal Bensalah (STIC Laboratory, Department of Physics, Faculty of Sciences, University of Chouaib Doukkali, Morocco)
Article 2
A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (pages 16-34)
Bil Hallaq (University of Warwick, UK), Andrew Nicholson (University of Warwick, UK), Richard Smith (De Montfort University, UK), Leandros Maglaras (De Montfort University, UK), Allan Cook (De Montfort University, UK), Helge Janicke (Cyber Security Cooperative Research Centre, Australia & Edith Cowan University, Australia), Kevin Jones (Airbus Group, UK)
Article 3
Mobile Ad Hoc Network Routing Protocols for Intelligent Transportation Systems (pages 35-48)
Hamza Zemrane (Mohammadia School of Engineering, Mohammed V University, Morocco), Youssef Baddi (Higher School of Technology Sidi Bennour, University of Chouaib Doukkali, Morocco), Abderrahim Hasbi (Mohammadia School of Engineering, Mohammed V University, Morocco)
Article 4
Network Intrusion Detection in Internet of Things (IoT): A Systematic Review (pages 49-65)
Winfred Yaokumah (University of Ghana, Ghana), Richard Nunoo Clottey (University of Ghana, Ghana), Justice Kwame Appati (University of Ghana, Ghana)
Issue 2
Article 1
Bullying, Cyberbullying, and Parental Responsibility (pages 1-20)
Raphael Cohen-Almagor (University of Hull, UK)
Article 2
Geo-Fence Technique for Prevention of Human Kidnapping (pages 21-41)
Gabriel Babatunde Iwasokun (Department of Software Engineering, Federal University of Technology, Akure, Nigeria), Olayinka Oluwaseun Ogunfeitimi (Federal University of Technology, Akure, Nigeria), Oluyomi Kolawole Akinyokun (Federal University of Technology, Akure, Nigeria), Samuel Oluwatayo Ogunlana (Adekunle Ajasin University, Akungba-Akoko, Nigeria)
Article 3
Intelligent Network Layer for Cyber-Physical Systems Security (pages 42-58)
Rajasekhar Chaganti (University of Texas at San Antonio, USA), Deepti Gupta (University of Texas at San Antonio, USA), Naga Vemprala (University of Portland, USA)
Volume 7 (2020)
Issue 1
Article 1
An End to End Cloud Computing Privacy Framework Using Blind Processing (pages 1-20)
Youssef Gahi (Ibn Tofail University, Kenitra, Morocco), Imane El Alaoui (Ibn Tofail University, Kenitra, Morocco), Mouhcine Guennoun (Cisco Systems, Toronto, Canada)
Article 2
Technical Interoperability to Solve Cross-Domain Issues Among Federation Systems (pages 21-40)
Hasnae L'Amrani (National School of Computer Science and Systems Analysis Rabat, Mohamed V University, Morocco), Younès El Bouzekri El Idrissi (National School of Applied Science Kenitra, Ibn Tofail University, Morocco), Rachida Ajhoun (National School of Computer Science and Systems Analysis Rabat**, Mohamed V University, Morocco)
Article 3
Computer Architecture: A New Weapon to Secure Web Services From Bots (pages 41-48)
Amit Kumar Singh (Poornima University, Vidhani, India), Geeta Chhabra Gandhi (Poornima University, Vidhani, India)
Article 4
Prevention of Terrorism Attacks by Identifying Terrorist Activities (pages 49-57)
Sapto Priyanto (University of Indonesia, Depok, Indonesia), Mohammad Dermawan (University of Indonesia, Depok, Indonesia), Arthur Runturambi (University of Indonesia, Depok, Indonesia)
Article 5
Multi-Criteria Decision Making Semantic for Mental Healthcare (pages 58-71)
Chaymae Benfares (System Engineering Laboratory, Ibn Tofail University, Morocco), Ouidad Akhrif (System Engineerin Laboratory, Ibn Tofail University, Morocco), Younès El Bouzekri El Idrissi (System Engineering Laboratory, Ibn Tofail University, Morocco), Karim Hamid (Center for Oncology and Hematology, Morocco)
Issue 2
Article 1
A MACH Filter-Based Reconstruction-Free Target Detector and Tracker for Compressive Sensing Cameras (pages 1-21)
Henry Braun (University of Minnesota, USA), Sameeksha Katoch (Arizona State University, USA), Pavan Turaga (Arizona State University, USA), Andreas Spanias (Arizona State University, USA), Cihan Tepedelenlioglu (Arizona State University, USA)
Article 2
An Enhanced Computational Fusion Technique for Security of Authentication of Electronic Voting System (pages 22-37)
Adewale Olumide Sunday (Federal University of Technology, Nigeria), Boyinbode Olutayo (Federal University of Technology, Nigeria), Salako E. Adekunle (Federal University of Technology, Nigeria)
Article 3
Distributed Quantiles Estimation of Sensor Network Measurements (pages 38-61)
Jongmin Lee (Arizona State University, USA), Cihan Tepedelenlioglu (Arizona State University, USA), Andreas Spanias (Arizona State University, USA), Gowtham Muniraju (Arizona State University, USA)
Article 4
Review on Multi-Factor Authentication (MFA) Sources and Operation Challenges (pages 62-76)
Rahul Neware (GHRCE, India), Urmila Shrawankar (RTM Nagpur University, India), Pranay Mangulkar (GHRCE, India), Sushil Khune (GHRCE, India)
Volume 6 (2019)
Issue 1
Editorial Preface
Yassine Maleh (National School of Applied Sciences, Khouribga, Morocco)
Article 1
Scene-Based Priors for Bayesian Semantic Image Segmentation (pages 1-14)
Christopher Menart (Ohio State University, USA), James W. Davis (Ohio State University, USA), Muhammad N. Akbar (Ohio State University, USA), Roman Ilin (Air Force Research Laboratory, USA)
Article 2
A Survey of Authentication Schemes in the Internet of Things (pages 15-30)
Yasmine Labiod (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria), Abdelaziz Amara Korba (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria), Nacira Ghoualmi-Zine (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria)
Article 3
Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (pages 31-48)
Michael Robinson (Airbus, Newport, UK), Leandros Maglaras (De Montfort University, Leicester, UK), Kevin Jones (Airbus, Cardiff, UK), Helge Janicke (Cyber Security CRC/Edith Cowan University, Joondalup, Australia)
Article 4
A Deep Convolutional Neural Network for Image Malware Classification (pages 49-60)
Mustapha Belaissaoui (University Hassan 1er, Settat, Morocco), József Jurassec (University of Sopron, Sopron, Hungary)
Issue 2
Article 1
Constraint-Based Privacy Preserving-Path Computation Element (pages 1-32)
Hamid Hajaje (Mohammed V University, Rabat, Morocco), Mouhcine Guennoun (Cisco Systems, Ontario, Canada), Zine El Abidine Guennoun (Mohammed V University, Rabat, Morocco)
Article 2
Fully Homomorphic Encryption Without Noise (pages 33-51)
Yacine Ichibane (Ecole Mohammadia d'Ingénieurs, Mohammed V University of Rabat, Rabat, Morocco), Youssef Gahi (Ibn Tofail University, Kenitra, Morocco), Mouhcine Guennoun (Cisco Systems, Ontario, Canada), Zouhair Guennoun (Ecole Mohammadia d'Ingénieurs, Mohammed V University of Rabat, Rabat, Morocco)
Article 3
Smart Collaborative Learning: A Recommended Building Team Approach (pages 52-66)
Ouidad Akhrif (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco), Chaymae Benfares (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco), Younès El Bouzekri El Idrissi (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco), Nabil Hmina (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco)