Accesso libero

A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)

INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Neshenko, N., E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. – IEEE Communications Surveys & Tutorials, Vol. 21, Third Quarter 2019, No 3, pp. 2702-2733.10.1109/COMST.2019.2910750 Search in Google Scholar

2. Shin, D., K. Yun, J. Kim, P. V. Astillo, J. Kim, I. You. A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks. – IEEE Access, Vol. 7, 2019, pp. 142531-142550.10.1109/ACCESS.2019.2943929 Search in Google Scholar

3. Meneghello, F., M. Calore, D. Zucchetto, M. Polese, A. Zanella. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. – IEEE Internet of Things Journal, Vol. 6, October 2019, No 5, pp. 8182-8201.10.1109/JIOT.2019.2935189 Search in Google Scholar

4. Hassija, V., V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. – IEEE Access, Vol. 7, 2019, pp. 82721-82743.10.1109/ACCESS.2019.2924045 Search in Google Scholar

5. Choi, C., J. Choi. Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service. – IEEE Access, Vol. 7, 2019, pp. 110510-110517.10.1109/ACCESS.2019.2933859 Search in Google Scholar

6. Samaila, M. G., J. B. F. Sequeiros, T. Simões, M. M. Freire, P. R. M. Inácio. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space. – IEEE Access, Vol. 8, 2020, pp. 16462-16494.10.1109/ACCESS.2020.2965925 Search in Google Scholar

7. Frustaci, M., P. Pace, G. Aloi, G. Fortino. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. – IEEE Internet of Things Journal, Vol. 5, August 2018, No 4, pp. 2483-2495.10.1109/JIOT.2017.2767291 Search in Google Scholar

8. Ingham, M., J. Marchang, D. Bhowmik. IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. – IET Information Security, Vol. 14, 2020, No 4, pp. 368-379.10.1049/iet-ifs.2019.0447 Search in Google Scholar

9. Wang, D., B. Bai, K. Lei, W. Zhao, Y. Yang, Z. Han. Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City. – IEEE Access, Vol. 7, 2019, pp. 54508-54521.10.1109/ACCESS.2019.2913438 Search in Google Scholar

10. Lounis, K., M. Zulkernine. Attacks and Defenses in Short-Range Wireless Technologies for IoT. – IEEE Access, Vol. 8, 2020, pp. 88892-88932.10.1109/ACCESS.2020.2993553 Search in Google Scholar

11. Malani, S., J. Srinivas, A. K. Das, K. Srinathan, M. Jo. Certificate-Based Anonymous Device Access Control Scheme for IoT Environment. – IEEE Internet of Things Journal, Vol. 6, December 2019, No 6, pp. 9762-9773.10.1109/JIOT.2019.2931372 Search in Google Scholar

12. Li, X., Q. Wang, X. Lan, X. Chen, N. Zhang, D. Chen. Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service: An Integration of Security and Reputation Approach. – IEEE Access, Vol. 7, 2019, pp. 9368-9383.10.1109/ACCESS.2018.2890432 Search in Google Scholar

13. Asplund, M., S. Nadjm-Tehrani. Attitudes and Perceptions of IoT Security in Critical Societal Services. – IEEE Access, Vol. 4, 2016, pp. 2130-2138.10.1109/ACCESS.2016.2560919 Search in Google Scholar

14. Wazid, M., A. K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. – IEEE Internet of Things Journal, Vol. 5, February 2018, No 1, pp. 269-282.10.1109/JIOT.2017.2780232 Search in Google Scholar

15. Farris, T. T., Y. Khettab, J. Song. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems. – IEEE Communications Surveys & Tutorials, Vol. 21, First Quarter 2019, No 1, pp. 812-837.10.1109/COMST.2018.2862350 Search in Google Scholar

16. Zarca, M., J. B. Bernabe, A. Skarmeta, J. M. Alcaraz Calero. Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks. – IEEE Journal on Selected Areas in Communications, Vol. 38, June 2020, No 6, pp. 1262-1277.10.1109/JSAC.2020.2986621 Search in Google Scholar

17. Yi, M., X. Xu, L. Xu. An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT Technology. – IEEE Access, Vol. 7, 2019, pp. 164803-164814.10.1109/ACCESS.2019.2953075 Search in Google Scholar

18. Zhou, W., Y. Jia, A. Peng, Y. Zhang, P. Liu. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. – IEEE Internet of Things Journal, Vol. 6, April 2019, No 2, pp. 1606-1616.10.1109/JIOT.2018.2847733 Search in Google Scholar

19. Shin, D., V. Sharma, J. Kim, S. Kwon, I. You. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks. – IEEE Access, Vol. 5, 2017, pp. 11100-11117.10.1109/ACCESS.2017.2710379 Search in Google Scholar

20. Sathyadevan, S., K. Achuthan, R. Doss, L. Pan. Protean Authentication Scheme – A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments. – IEEE Access, Vol. 7, 2019, pp. 92419-92435.10.1109/ACCESS.2019.2927818 Search in Google Scholar

21. Mukherjee. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. – Proceedings of the IEEE, Vol. 103, October 2015, No 10, pp. 1747-1761.10.1109/JPROC.2015.2466548 Search in Google Scholar

22. Amato, F., V. Casola, G. Cozzolino, A. De Benedictis, F. Moscato. Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services. – IEEE Internet of Things Journal, Vol. 7, May 2020, No 5, pp. 4655-4665.10.1109/JIOT.2019.2960316 Search in Google Scholar

23. Oh, M., S. Lee, Y. Kang, D. Choi. Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security. – IEEE Transactions on Consumer Electronics, Vol. 66, February 2020, No 1, pp. 11-21.10.1109/TCE.2019.2959593 Search in Google Scholar

24. Mandal, S., B. Bera, A. K. Sutrala, A. K. Das, K. R. Choo, Y. Park. Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. – IEEE Internet of Things Journal, Vol. 7, April 2020, No 4, pp. 3184-3197.10.1109/JIOT.2020.2966242 Search in Google Scholar

25. Tedeschi, P., S. Sciancalepore, A. Eliyan, R. Di Pietro. LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications. – IEEE Internet of Things Journal, Vol. 7, January 2020, No 1, pp. 621-638.10.1109/JIOT.2019.2953549 Search in Google Scholar

26. Ahanger, T. A., A. Aljumah. Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms. – IEEE Access, Vol. 7, 2019, pp. 11020-11028.10.1109/ACCESS.2018.2876939 Search in Google Scholar

27. Li, C., Z. Qin, E. Novak, Q. Li. Securing SDN Infrastructure of IoT-Fog Networks from MitM Attacks. – IEEE Internet of Things Journal, Vol. 4, October 2017, No 5, pp. 1156-1164.10.1109/JIOT.2017.2685596 Search in Google Scholar

28. Thangavelu, V., D. M. Divakaran, R. Sairam, S. S. Bhunia, M. Gurusamy. DEFT: A Distributed IoT Fingerprinting Technique. – IEEE Internet of Things Journal, Vol. 6, February 2019, No 1, pp. 940-952.10.1109/JIOT.2018.2865604 Search in Google Scholar

29. Zhao, B., P. Zhao, P. Fan. ePUF: A Lightweight Double Identity Verification in IoT. – Tsinghua Science and Technology, Vol. 25, October 2020, No 5, pp. 625-635.10.26599/TST.2019.9010072 Search in Google Scholar

30. Verma, L. P., M. Kumar. An IoT Based Congestion Control Algorithm. – Internet of Things, Vol. 9, 2020, No 1, pp. 100-157.10.1016/j.iot.2019.100157 Search in Google Scholar

31. Alshahrani, M., I. Traore, I. Woungang. Anonymous Mutual IoT Interdevice Authentication and Key Agreement Scheme Based on the ZigBee Technique. – Internet of Things, Vol. 7, 2019, No 2, 100061.10.1016/j.iot.2019.100061 Search in Google Scholar

32. Fakroon, M., M. Alshahrani, F. Gebali, I. Traore. Secure Remote Anonymous User Authentication Scheme for Smart Home Environment. – Internet of Things, Vol. 9, 2020, No 1, 100158.10.1016/j.iot.2020.100158 Search in Google Scholar

33. Rizvi, S., R. Orr, A. Cox, P. Ashokkumar, M. R. Rizvi. Identifying the Attack Surface for IoT Network. – Internet of Things, Vol. 9, 2020, No 1, 100162.10.1016/j.iot.2020.100162 Search in Google Scholar

34. Enokido, T., M. Takizawa. The Redundant Energy Consumption Laxity Based Algorithm to Perform Computation Processes for IoT Services. – Internet of Things, Vol. 9, 2020, No 1, 100165.10.1016/j.iot.2020.100165 Search in Google Scholar

35. Ghosh, A., A. Raha, A. Mukherjee. Energy-Efficient IoT-Health Monitoring System Using Approximate Computing. – Internet of Things, Vol. 9, 2020, No 2, 100166.10.1016/j.iot.2020.100166 Search in Google Scholar

36. Fallis, E., P. Spachos, S. Gregori. A Power-Efficient Audio Acquisition System for Smart City Applications. – Internet of Things, Vol. 9, 2020, No 1, 100155.10.1016/j.iot.2019.100155 Search in Google Scholar

37. Karanja, E. M., S. Masupe, M. G. Jeffrey. Analysis of Internet of Things Malware Using Image Texture Features and Machine Learning Techniques. – Internet of Things, Vol. 9, 2020, No 2, 100153.10.1016/j.iot.2019.100153 Search in Google Scholar

38. Shukla, R. M., S. Sengupta. COP: An Integrated Communication, Optimization, and Prediction Unit for Smart Plug-in Electric Vehicle Charging. – Internet of Things, Vol. 9, 2020, 100148.10.1016/j.iot.2019.100148 Search in Google Scholar

39. Aftab, N., S. A. Zaidi, D. McLernon. Scalability Analysis of Multiple Lora Gateways Using Stochastic Geometry. – Internet of Things, Vol. 9, 2020, No 1, 100132.10.1016/j.iot.2019.100132 Search in Google Scholar

40. Nizzi, F., T. Pecorella, F. Esposito, L. Pierucci, R. Fantacci. IoT Security via Address Shuffling: The Easy Way. – IEEE Internet of Things Journal, Vol. 6, April 2019, No 2, pp. 3764-3774.10.1109/JIOT.2019.2892003 Search in Google Scholar

41. Liu, Y., Y. Kuang, Y. Xiao, G. Xu. SDN-Based Data Transfer Security for Internet of Things. – IEEE Internet of Things Journal, Vol. 5, February 2018, No 1, pp. 257-268.10.1109/JIOT.2017.2779180 Search in Google Scholar

42. Das, K., M. Wazid, A. R. Yannam, J. J. P. C. Rodrigues, Y. Park. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment. – IEEE Access, Vol. 7, 2019, pp. 55382-55397.10.1109/ACCESS.2019.2912998 Search in Google Scholar

43. Hao, P., X. Wang, W. Shen. A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication. – IEEE Access, Vol. 6, 2018, pp. 42279-42293.10.1109/ACCESS.2018.2859781 Search in Google Scholar

44. Badii, C., P. Bellini, A. Difino, P. Nesi. Smart City IoT Platform Respecting GDPR Privacy and Security Aspects. – IEEE Access, Vol. 8, 2020, pp. 23601-23623.10.1109/ACCESS.2020.2968741 Search in Google Scholar

45. Chaabouni, N., M. Mosbah, A. Zemmari, C. Sauvignac, P. Faruki. Network Intrusion Detection for IoT Security Based on Learning Techniques. – IEEE Communications Surveys & Tutorials, Vol. 21, Third Quarter 2019, No 3, pp. 2671-2701.10.1109/COMST.2019.2896380 Search in Google Scholar

46. Hwang, J., A. Aziz, N. Sung, A. Ahmad, F. Le Gall, J. Song. AUTOCON-IoT: Automated and Scalable Online Conformance Testing for IoT Applications. – IEEE Access, Vol. 8, 2020, pp. 43111-43121.10.1109/ACCESS.2020.2976718 Search in Google Scholar

47. Hafeez, M. Antikainen, A. Y. Ding, S. Tarkoma. IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge. – IEEE Transactions on Network and Service Management, Vol. 17, March 2020, No 1, pp. 45-59.10.1109/TNSM.2020.2966951 Search in Google Scholar

48. Xu, Q., P. Ren, H. Song, Q. Du. Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations. – IEEE Access, Vol. 4, 2016, pp. 2840-2853.10.1109/ACCESS.2016.2575863 Search in Google Scholar

49. De Hoz Diego, J. D., J. Saldana, J. Fernández-Navajas, J. Ruiz-Mas. IoTsafe, Decoupling Security from Applications for a Safer IoT. – IEEE Access, Vol. 7, 2019, pp. 29942-29962.10.1109/ACCESS.2019.2900939 Search in Google Scholar

50. Mohsenian-Rad, A. Leon-Garcia. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids. – IEEE Transactions on Smart Grid, Vol. 2, December 2011, No 4, pp. 667-674.10.1109/TSG.2011.2160297 Search in Google Scholar

51. Samarah, S., M. G. Al Zamil, A. F. Aleroud, M. Rawashdeh, M. F. Alhamid, A. Alamri. An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing. – IEEE Access, Vol. 5, 2017, pp. 3848-3859.10.1109/ACCESS.2017.2685531 Search in Google Scholar

52. Mosenia, S. Sur-Kolay, A. Raghunathan, N. K. Jha. DISASTER: Dedicated Intelligent Security Attacks on Sensor-Triggered Emergency Responses. – IEEE Transactions on Multi-Scale Computing Systems, Vol. 3, 1 October-December 2017, No 4, pp. 255-268.10.1109/TMSCS.2017.2720660 Search in Google Scholar

53. Saxena, N., B. J. Choi, R. Lu. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. – IEEE Transactions on Information Forensics and Security, Vol. 11, May 2016, No 5, pp. 907-921.10.1109/TIFS.2015.2512525 Search in Google Scholar

54. Gupta, M., M. Abdelsalam, S. Khorsandroo, S. Mittal. Security and Privacy in Smart Farming: Challenges and Opportunities. – IEEE Access, Vol. 8, 2020, pp. 34564-34584.10.1109/ACCESS.2020.2975142 Search in Google Scholar

55. Koroniotis, N., N. Moustafa, E. Sitnikova. Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions. – IEEE Access, Vol. 7, 2019, pp. 61764-61785.10.1109/ACCESS.2019.2916717 Search in Google Scholar

56. Kong, H., L. Lu, J. Yu, Y. Chen, F. Tang. Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi. – IEEE Transactions on Mobile Computing. DOI: 10.1109/TMC.2020.2994955.10.1109/TMC.2020.2994955 Search in Google Scholar

57. Hossain, M., R. Hasan. P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things. – IEEE Internet of Things Journal. DOI: 10.1109/JIOT.2020.3009024.10.1109/JIOT.2020.3009024 Search in Google Scholar

58. Bin, Q., C. Ziwen, X. Yong, H. Liang, S. Sheng. Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering. – IEEE Access. DOI: 10.1109/ACCESS.2019.2934222.10.1109/ACCESS.2019.2934222 Search in Google Scholar

59. Zhou, Y., Y. Liu, S. Hu. Smart Home Cyberattack Detection Framework for Sponsor Incentive Attacks. – IEEE Transactions on Smart Grid, Vol. 10, March 2019, No 2, pp. 1916-1927.10.1109/TSG.2017.2781695 Search in Google Scholar

60. Kumar, A. Braeken, A. Gurtov, J. Iinatti, P. H. Ha. Anonymous Secure Framework in Connected Smart Home Environments. – IEEE Transactions on Information Forensics and Security, Vol. 12, April 2017, No 4, pp. 968-979.10.1109/TIFS.2016.2647225 Search in Google Scholar

61. Ivanova-Rohling, V. N., N. Rohling. Evaluating Machine Learning Approaches for Discovering Optimal Sets of Projection Operators for Quantum State Tomography of Qubit Systems. – Cybernetics and Information Technologies, Vol. 20, 2020, No 6, pp. 61-73.10.2478/cait-2020-0061 Search in Google Scholar

62. Mocrii, D., Y. Chen, P. Musilek. IoT-Based Smart Homes: A Review of System Architecture, Software, Communications, Privacy and Security. – Internet of Things, Vol. 1-2, 2018, No 2, pp. 81-98.10.1016/j.iot.2018.08.009 Search in Google Scholar

63. Vaidya, B., J. H. Park, S. Yeo, J. J. Rodrigues. Robust One-Time Password Authentication Scheme Using Smart Card for Home Network Environment. – Computer Communications, Vol. 34, 2011, No 3, pp. 326-336.10.1016/j.comcom.2010.03.013 Search in Google Scholar

64. Prabadevi, N. Jeyanthi. TSCBA-A Mitigation System for ARP Cache Poisoning Attacks. –Cybernetics and Information Technologies, Vol. 18, 2018, No 4, pp. 75-93.10.2478/cait-2018-0049 Search in Google Scholar

65. Jeong, J., M. Y. Chung, H. Choo. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. – In: Proc. of 41st Annual Hawaii International Conference on System Sciences (HICSS’08), Waikoloa, HI, 2008, pp. 294-294.10.1109/HICSS.2008.208 Search in Google Scholar

66. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp.111-123.10.1515/cait-2015-0058 Search in Google Scholar

67. Wazid, M., A. K. Das, V. Odelu, N. Kumar, W. Susilo. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. – IEEE Transactions on Dependable and Secure Computing, Vol. 17, 1 March-April 2020, No 2, pp. 391-406.10.1109/TDSC.2017.2764083 Search in Google Scholar

68. Santoso, F. K., N. C. H. Vun. Securing IoT for Smart Home System. – In: Proc. of International Symposium on Consumer Electronics (ISCE’15), Madrid, 2015, pp. 1-2.10.1109/ISCE.2015.7177843 Search in Google Scholar

69. Srivastava, M., J. Siddiqui, M. A. Ali. A Review of Hashing Based Image Copy Detection Techniques. – Cybernetics and Information Technologies, Vol. 19, 2019, No 2, pp. 1-27.10.2478/cait-2019-0012 Search in Google Scholar

70. Shuai, M., N. Yu, H. Wang, L. Xiong. Anonymous Authentication Scheme for Smart Home Environment with Provable Security. – Computers & Security, Vol. 86, 2019, No 3, pp. 132-146.10.1016/j.cose.2019.06.002 Search in Google Scholar

71. Prabadevi, B., N. Jeyanthi. Security Solution for ARP Cache Poisoning Attacks in Large Data Center Networks. – Cybernetics and Information Technologies, Vol. 17, 2017, No 4, pp. 69-86.10.1515/cait-2017-0042 Search in Google Scholar

72. Shayan, M., M. Naser, G. Hossein. IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes. – In: Proc. of 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC’19), Mashhad, Iran, 2019, pp. 114-121.10.1109/ISCISC48546.2019.8985159 Search in Google Scholar

73. Gaikwad, P. P., J. P. Gabhane, S. S. Golait. 3-Level Secure Kerberos Authentication for Smart Home Systems Using IoT. – In: Proc. of 1st International Conference on Next Generation Computing Technologies (NGCT’15), Dehradun, 2015, pp. 262-268.10.1109/NGCT.2015.7375123 Search in Google Scholar

74. Usha, S., S. Kuppuswami, M. Karthik. A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol. – Cybernetics and Information Technologies, Vol. 18, 2018, No 4, pp. 61-74.10.2478/cait-2018-0048 Search in Google Scholar

75. Ashibani, Y., Q. H. Mahmoud. An Efficient and Secure Scheme for Smart Home Communication Using Identity-Based Signcryption. – In: Proc. of IEEE 36th International Performance Computing and Communications Conference (IPCCC’17), San Diego, CA, 2017, pp. 1-7.10.1109/PCCC.2017.8280497 Search in Google Scholar

76. Gumusbas, D., T. Yildirim. Offline Signature Identification and Verification Based on Capsule Representations. Cybernetics and Information Technologies, Vol. 20, 2020, No 5, pp. 60-67.10.2478/cait-2020-0040 Search in Google Scholar

77. Pencheva, E. N., I. I. Atanasov, V. G. Vladislavov. Mission Critical Messaging Using Multi-Access Edge Computing. – Cybernetics and Information Technologies, Vol. 19, 2019, No 4, pp. 73-89.10.2478/cait-2019-0037 Search in Google Scholar

78. Naoui, S., M. H. Elhdhili, L. A. Saidane. Novel Smart Home Authentication Protocol LRP-SHAP. – In: Proc. of IEEE Wireless Communications and Networking Conference (WCNC’19), Marrakesh, Morocco, 2019, pp. 1-6.10.1109/WCNC.2019.8885493 Search in Google Scholar

79. Fakroon, M., M. Alshahrani, F. Gebali, I. Traore. Secure Remote Anonymous User Authentication Scheme for Smart Home Environment. – Internet of Things, Vol. 9, 2020, No 3, 100158.10.1016/j.iot.2020.100158 Search in Google Scholar

80. Gayathiri, P., B. Poorna. Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database. – Cybernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 92-108.10.1515/cait-2017-0032 Search in Google Scholar

81. Patil, D. R., J. B. Patil. Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique. – Cybernetics and Information Technologies, Vol. 18, 2018, No 1, pp. 11-29.10.2478/cait-2018-0002 Search in Google Scholar

eISSN:
1314-4081
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology