Contents IJITS, No. 1 (Vol. 12), 2020

IJITS is a scientific journal included in Emerging Sources Citation Index (ESCI) of Web of Science (Clarivate Analytics). Recommendation for article citation:

Author’s name(s). Title of the paper. International Journal on Information Technologies and Security,
ISSN 1313-8251, vol. 12, No x, 2020, pp. xx-xx.
2020-N1-01
Ekaterina Gribanova, Alexandr Savitsky.
Algorithm for Estimating the Time of Posting Messages on Vkontakte Online Social Network, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 3-14
2020-N1-02
Abdullah A. H. Alzahrani.
Analyzing the Factors Impacting the Choice of the Fact-Finding Technique for Requirements Elicitation, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 15-36
2020-N1-03
Siraj Munir, Syed Imran Jami, Shaukat Wasi.
Knowledge Graph based Semantic Modeling for Profiling in Industry 4.0, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 37-50
2020-N1-04
Janki M. Patel, Dippal Israni, Chintan Bhatt.
An Adaptive Approach to Eliminate Atmospheric Scintillation In Long Range Visible Sequence, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 51-60
2020-N1-05
Rikin J. Nayak, Jitendra P. Chaudhari.
Object Tracking Using Dominant Sub Bands in Steerable Pyramid Domain, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 61-74
2020-N1-06
Nuhi Besimi, Betim Çiço, Visar Shehu, Adrian Besimi.
Evaluation of Machine Learning Techniques for Research Articles Recommendation, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 75-86
2020-N1-07
V.V.Goryachko, O,N.Choporov, A.P.Preobrazhenskiy, O.Ja.Kravets.
The use of intellectualization management decision-making in the interaction of territorially connected systems, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 87-98
2020-N1-08
Tomasz Krokosz, Jarogniew Rykowski.
New Approach to IoT Authorization based on Single-Point Login and Location-Specific-Rights, International Journal on Information Technologies and Security, (vol. 12), 2020, pp. 99-114