Information Security and Risk Assessment

6 Items

All Items

  • Modified Vigenere Cryptosystem Using Matrix Manipulation and Base94 Encoding Scheme

    Jason P. Sermeno, Kenrick Agustin S. Secugal, Nelly E. Mistio
    DOI: https://doi.org/10.69478/JITC2020v2n2a08
  • Design of a Secured Multimedia Transmission Scheme over Heterogeneous Wireless Systems

    Md. Rakibul Islam, Preeti Bharti, Ronnie D. Caytiles
    DOI: https://doi.org/10.69478/JITC2020v2n2a10
  • Cross-Crypto Algorithm: Leveraging the Features of the ROT13 and Vigenere Ciphers

    Ryan Ercel O. Paderes
    DOI: https://doi.org/10.69478/JITC2021v3n1a04
  • Analysis of a Honeypot Intrusion Detection System for Medical and Healthcare Services

    Aastha Yadav, Sarthak Raisurana, N.Ch. Sriman Narayana Iyengar
    DOI: https://doi.org/10.69478/JITC2022v4n1a02
  • A Study of the Concepts and Design of Library Cloud with Security Features

    Zhenning Yang, Kai Wang, Liuyang Zhang, N.Ch. Sriman Narayana Iyengar
    DOI: https://doi.org/10.69478/JITC2021v3n1a03
  • A Comparative Analysis of Various Clustering Techniques for Sales Fraud Detection

    B. Kharthik Kumar Reddy, N.Ch. Sriman Narayana Iyengar
    DOI: https://doi.org/10.69478/JITC2020v2n2a09