Journal Contents: International Journal of Smart Security Technologies (IJSST)

View the International Journal of Smart Security Technologies (IJSST) home page for complete details.
Volume 8 (2021)
Issue 1
Article 1
NT-ODP Theoretical Model Extension: Toward an Efficiency-Based New Technologies Use of the Organization Digital Patrimony (pages 1-15)
Mustapha El Hamzaoui (ISTM Laboratory, Faculty of Sciences, University of Chouaib Doukkali, Morocco), Faycal Bensalah (STIC Laboratory, Department of Physics, Faculty of Sciences, University of Chouaib Doukkali, Morocco)
Article 2
A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems (pages 16-34)
Bil Hallaq (University of Warwick, UK), Andrew Nicholson (University of Warwick, UK), Richard Smith (De Montfort University, UK), Leandros Maglaras (De Montfort University, UK), Allan Cook (De Montfort University, UK), Helge Janicke (Cyber Security Cooperative Research Centre, Australia & Edith Cowan University, Australia), Kevin Jones (Airbus Group, UK)
Article 3
Mobile Ad Hoc Network Routing Protocols for Intelligent Transportation Systems (pages 35-48)
Hamza Zemrane (Mohammadia School of Engineering, Mohammed V University, Morocco), Youssef Baddi (Higher School of Technology Sidi Bennour, University of Chouaib Doukkali, Morocco), Abderrahim Hasbi (Mohammadia School of Engineering, Mohammed V University, Morocco)
Article 4
Network Intrusion Detection in Internet of Things (IoT): A Systematic Review (pages 49-65)
Winfred Yaokumah (University of Ghana, Ghana), Richard Nunoo Clottey (University of Ghana, Ghana), Justice Kwame Appati (University of Ghana, Ghana)
Issue 2
Volume 7 (2020)
Issue 1
Article 1
An End to End Cloud Computing Privacy Framework Using Blind Processing (pages 1-20)
Youssef Gahi (Ibn Tofail University, Kenitra, Morocco), Imane El Alaoui (Ibn Tofail University, Kenitra, Morocco), Mouhcine Guennoun (Cisco Systems, Toronto, Canada)
Article 2
Technical Interoperability to Solve Cross-Domain Issues Among Federation Systems (pages 21-40)
Hasnae L'Amrani (National School of Computer Science and Systems Analysis Rabat, Mohamed V University, Morocco), Younès El Bouzekri El Idrissi (National School of Applied Science Kenitra, Ibn Tofail University, Morocco), Rachida Ajhoun (National School of Computer Science and Systems Analysis Rabat**, Mohamed V University, Morocco)
Article 3
Computer Architecture: A New Weapon to Secure Web Services From Bots (pages 41-48)
Amit Kumar Singh (Poornima University, Vidhani, India), Geeta Chhabra Gandhi (Poornima University, Vidhani, India)
Article 4
Prevention of Terrorism Attacks by Identifying Terrorist Activities (pages 49-57)
Sapto Priyanto (University of Indonesia, Depok, Indonesia), Mohammad Dermawan (University of Indonesia, Depok, Indonesia), Arthur Runturambi (University of Indonesia, Depok, Indonesia)
Article 5
Multi-Criteria Decision Making Semantic for Mental Healthcare (pages 58-71)
Chaymae Benfares (System Engineering Laboratory, Ibn Tofail University, Morocco), Ouidad Akhrif (System Engineerin Laboratory, Ibn Tofail University, Morocco), Younès El Bouzekri El Idrissi (System Engineering Laboratory, Ibn Tofail University, Morocco), Karim Hamid (Center for Oncology and Hematology, Morocco)
Issue 2
Article 1
A MACH Filter-Based Reconstruction-Free Target Detector and Tracker for Compressive Sensing Cameras (pages 1-21)
Henry Braun (University of Minnesota, USA), Sameeksha Katoch (Arizona State University, USA), Pavan Turaga (Arizona State University, USA), Andreas Spanias (Arizona State University, USA), Cihan Tepedelenlioglu (Arizona State University, USA)
Article 2
An Enhanced Computational Fusion Technique for Security of Authentication of Electronic Voting System (pages 22-37)
Adewale Olumide Sunday (Federal University of Technology, Nigeria), Boyinbode Olutayo (Federal University of Technology, Nigeria), Salako E. Adekunle (Federal University of Technology, Nigeria)
Article 3
Distributed Quantiles Estimation of Sensor Network Measurements (pages 38-61)
Jongmin Lee (Arizona State University, USA), Cihan Tepedelenlioglu (Arizona State University, USA), Andreas Spanias (Arizona State University, USA), Gowtham Muniraju (Arizona State University, USA)
Article 4
Review on Multi-Factor Authentication (MFA) Sources and Operation Challenges (pages 62-76)
Rahul Neware (GHRCE, India), Urmila Shrawankar (RTM Nagpur University, India), Pranay Mangulkar (GHRCE, India), Sushil Khune (GHRCE, India)
Volume 6 (2019)
Issue 1
Editorial Preface
Yassine Maleh (National School of Applied Sciences, Khouribga, Morocco)
Article 1
Scene-Based Priors for Bayesian Semantic Image Segmentation (pages 1-14)
Christopher Menart (Ohio State University, USA), James W. Davis (Ohio State University, USA), Muhammad N. Akbar (Ohio State University, USA), Roman Ilin (Air Force Research Laboratory, USA)
Article 2
A Survey of Authentication Schemes in the Internet of Things (pages 15-30)
Yasmine Labiod (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria), Abdelaziz Amara Korba (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria), Nacira Ghoualmi-Zine (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria)
Article 3
Protecting Civilians from Cyber Warfare with Cyber Buffer Zones (pages 31-48)
Michael Robinson (Airbus, Newport, UK), Leandros Maglaras (De Montfort University, Leicester, UK), Kevin Jones (Airbus, Cardiff, UK), Helge Janicke (Cyber Security CRC/Edith Cowan University, Joondalup, Australia)
Article 4
A Deep Convolutional Neural Network for Image Malware Classification (pages 49-60)
Mustapha Belaissaoui (University Hassan 1er, Settat, Morocco), József Jurassec (University of Sopron, Sopron, Hungary)
Issue 2
Article 1
Constraint-Based Privacy Preserving-Path Computation Element (pages 1-32)
Hamid Hajaje (Mohammed V University, Rabat, Morocco), Mouhcine Guennoun (Cisco Systems, Ontario, Canada), Zine El Abidine Guennoun (Mohammed V University, Rabat, Morocco)
Article 2
Fully Homomorphic Encryption Without Noise (pages 33-51)
Yacine Ichibane (Ecole Mohammadia d'Ingénieurs, Mohammed V University of Rabat, Rabat, Morocco), Youssef Gahi (Ibn Tofail University, Kenitra, Morocco), Mouhcine Guennoun (Cisco Systems, Ontario, Canada), Zouhair Guennoun (Ecole Mohammadia d'Ingénieurs, Mohammed V University of Rabat, Rabat, Morocco)
Article 3
Smart Collaborative Learning: A Recommended Building Team Approach (pages 52-66)
Ouidad Akhrif (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco), Chaymae Benfares (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco), Younès El Bouzekri El Idrissi (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco), Nabil Hmina (Laboratory Systems Engineering (LGS) ENSA, Ibn Tofail University, Kenitra, Morocco)