International Journal of Internet Technology and Secured Transactions
Published by Inderscience Publishers (Journal Finder)
ISSN : 1748-569X eISSN : 1748-5703
Abbreviation : Int. J. Internet Technol. Secur. Trans.
Aims & Scope
IJITST is an international refereed journal dedicated to the advancement of the theory and practical implementation of secured internet transactions and to fostering discussions on information technology evolution.
IJITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Topics covered include: -Networked system architecture and protocols- Networked system services and applications- Networked system security, privacy and trust- Digital crypto-currencies in networked systems- Incentives in networked systems- Malware and ransomware targeting networked systems- Rootkit and bootkit targeting networked systems- Security vulnerabilities in networked systems- Offensive security for networked systems- Reverse engineering
View Aims & ScopeMetrics & Ranking
Journal Rank
| Year | Value |
|---|---|
| 2024 | 22631 |
Journal Citation Indicator
| Year | Value |
|---|---|
| 2024 | 60 |
SJR (SCImago Journal Rank)
| Year | Value |
|---|---|
| 2024 | 0.178 |
Quartile
| Year | Value |
|---|---|
| 2024 | Q4 |
h-index
| Year | Value |
|---|---|
| 2024 | 15 |
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Blockchain and bitcoin as a way to lift a country out of poverty - tourism 2.0 and e-governance in the Republic of Moldova
Citation: 45
Authors: Marc, Rodica, Lee Gibson
-
Energy-efficient adaptive distributed data collection method for periodic sensor networks
Citation: 25
Authors: Ali Kadhum M. Al, Ali Kadhum
-
Energy-efficient load-balanced RPL routing protocol for internet of things networks
Citation: 23
Authors: Ali Kadhum, Athraa J.H.
-
Design and efficient implementation of a chaos-based stream cipher
Citation: 21
Authors: Mohammed Abu, Safwan El, Audrey, Olivier
-
Security and detection mechanism in IoT-based cloud computing using hybrid approach
Citation: 20
Authors: Megha, Pradeep, Dharmendra Singh, Somula Ramasubba, M. Praveen Kumar, G. Thippa, Harshita
-
Genetic substitution-based audio steganography for high capacity applications
Citation: 17
Authors: Mazdak, Azizah Bt Abdul, Hossein Rouhani, Saman Shojae
-
Wireless camera network with enhanced SIFT algorithm for human tracking mechanism
Citation: 17
Authors: G. Usha, M.K., C.