Contents IJITS, No. 1 (Vol. 11), 2019

IJITS is a scientific journal included in Emerging Sources Citation Index (ESCI) of Web of Science (Clarivate Analytics). Recommendation for article citation:

Author’s name(s). Title of the paper. International Journal on Information Technologies and Security,
ISSN 1313-8251, vol. 11, No x, 2019, pp. xx-xx.
2019-N1-01
Ivan Nedyalkov, Alexey Stefanov, Georgi Georgiev
Studying and Characterization of the Data Flows in an IP-Based Network. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 3-12
2019-N1-02
Mikhail V. Saramud, Igor V. Kovalev, Vasiliy V. Losev, Anna A. Voroshilova
A Tool for Developing and Verifying Components of Cross-Platform On-Board Software. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 13-20
2019-N1-03
Shakhnaz Akhmedova, Vladimir Stanovov, Danil Erokhin, Eugene Semenkin
Position Adaptation of Candidate Solutions Based on Their Success History in Nature-Inspired Algorithms. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 21-32
2019-N1-04
Ayesha Shahid, Khurram Zeeshan Haider, Muhammad Awais, Burhan Mohy-ud-din, Naila Kousar, Ismat Nawaz
Age and Gender Recognition Using Ear Features. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 33-40
2019-N1-05
Dimitar Kolev
Neuromarketing and Application of swLORETA qEEG During Decision Making Process. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 41-50
2019-N1-06
E. V. Bolnokina, S. A. Oleinikova, O. Ja. Kravets
Determination of Optimal Composition of Team of Executors for Multistage Service System. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 51-58
2019-N1-07
Ahmed Redha Mahlous
The Effectiveness of Mobile Ad Hoc Routing Protocols Under a Gray Hole Attack. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 59-72
2019-N1-08
İlker Kara, Murat Aydos
The Ghost in the System: Technical Analysis of Remote Access Trojan. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 73-84
2019-N1-09
Yoana Ivanova
Assessing the Vulnerability of a Transport Management System to Cyber Attacks for Application in the Method of the Three Factors. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 85-94
2019-N1-10
Radi Romansky
A Survey of Informatization and Privacy in the Digital Age and Basic Principles of the New Regulation. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 95-106
2019-N1-11
Ching-Sheng Hsu, Shu-Fen Tu
Digital Watermarking Scheme for Copyright Protection and Tampering Detection. International Journal on Information Technologies and Security, No. 1 (vol. 11), 2019, pp. 107-119