Contents IJITS, No.4 (Vol.10), 2018

IJITS is a scientific journal included in Emerging Sources Citation Index (ESCI) of Web of Science (Thomson Reuters). Recommendation for article citation:

Author’s name(s). Title of the paper. International Journal on Information Technologies and Security,
ISSN 1313-8251, vol. 10, No x, 2018, pp. xx-xx.
2018-N4-01
Vyacheslav Kharchenko.
Big Data and Internet of Things for Safety Critical Applications: Challenges, Methodology and Industry Cases. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 3-16
2018-N4-02
Vangel Fustik.
Education and Practical Knowledge for Project and Risk Management in ICT Area. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 17-24
2018-N4-03
Leon Rothkrantz.
Graphic Storytelling, Storyboarding and Video Recordings of Surveillance Cameras. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 25-36
2018-N4-04
Gulista Khan, Rakesh Kumar Dwivedi.
LRCLE – Location Finding Algorithm to Reduce Communication Cost and Localization Error for Acoustic Sensor Nodes in UWSN. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 37-44
2018-N4-05
Oleg Ja. Kravets, Andrew P. Preobrazhenskiy, Alexey V. Kochegarov, Oleg N. Choporov, Vitaly E. Bolnokin.
Development of Algorithms for Complex Numerical Optimization of Objects with Modular Structure. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 45-56
2018-N4-06
Arslan G. Mustafaev.
Application of Artificial Neural Networks in the Intrusion Detection System. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 57-66
2018-N4-07
Anatoly V. Tsaregorodtsev, Oleg Ja. Kravets, Oleg N. Choporov, Anna N. Zelenina.
Information Security Risk Estimation for Cloud Infrastructure. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 66-76
2018-N4-08
Massoud Sokouti, Babak Sokouti.
O-GGH: The GGH Public Key Cryptosystem via Octonion Algebra and Polynomial Rings. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 77-86
2018-N4-09
Ahmed Redha Mahlous.
SSR: A Framework for a Secure Software Reuse. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 87-97
2018-N4-10
Yoana A. Ivanova.
Assessment of the Probability of Cyberattacks on Transport Management Systems. International Journal on Information Technologies and Security, No. 4 (vol. 10), 2018, pp. 99-106