To see the other types of publications on this topic, follow the link: Ad fraud detection.

Journal articles on the topic 'Ad fraud detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 36 journal articles for your research on the topic 'Ad fraud detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Akash Vir and Dr. Shivam Upadhyay. "Smart Guard: A Comprehensive Approach to Ad Click Fraud Detection." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2018–24. https://doi.org/10.32628/cseit2410612403.

Full text
Abstract:
Digital advertising is plagued by ad click fraud, which can result in large financial losses and skewed statistics. Current research on ad click fraud detection is summarized in this systematic review, which also assesses different methods and approaches. The review addresses difficulties, outlines the efficacy of various approaches, and makes recommendations for future lines of inquiry. Ad click fraud is the practice of creating phony clicks on internet ads, which can be done by malevolent humans, click farms, or automated bots. Click metrics are inflated by this fake activity, resulting in f
APA, Harvard, Vancouver, ISO, and other styles
2

Almeida, Paulo S., and João J. C. Gondim. "Click Fraud Detection and Prevention System for Ad Networks." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (2019): 27. http://dx.doi.org/10.17648/jisc.v5i1.71.

Full text
Abstract:
Click fraud detection consists of identifying the intention behind received clicks, given only technical data and context information. Reviewing concepts involved in click fraud practices and related work, a system that detects and prevents this type of fraud is proposed and implemented. The system is based and implemented on an ad network, one of the 3 main agents in the online ad environment, and for its validation, 3 servers were used, representing the publisher, the ad network with the system implemented and the announcer, and a bot that attempts to commit a click fraud.
APA, Harvard, Vancouver, ISO, and other styles
3

Neeraja, Anupam, Sriram, Subhani Shaik, and V. Kakulapati. "Fraud Detection of AD Clicks Using Machine Learning Techniques." Journal of Scientific Research and Reports 29, no. 7 (2023): 84–89. http://dx.doi.org/10.9734/jsrr/2023/v29i71762.

Full text
Abstract:
Although all businesses face the possibility of fraud, those that rely on internet advertising face an especially high risk of click fraud, which may lead to inaccurate click statistics and unnecessary expenditures. The cost per click for advertising channels might skyrocket if enough people click on the ads. Internet advertising is becoming a significant revenue source for many websites. Under this model, advertisers pay the publisher a flat rate for each click-through from the ad to the advertiser's site. Since spending much on Internet advertising requires significant resources, the term "c
APA, Harvard, Vancouver, ISO, and other styles
4

Bathula, Mahesh, Rama Chaithanya Tanguturi, and Srinivasa Rao Madala. "Click Fraud Detection Approaches to analyze the Ad Clicks Performed by Malicious Code." Journal of Physics: Conference Series 2089, no. 1 (2021): 012077. http://dx.doi.org/10.1088/1742-6596/2089/1/012077.

Full text
Abstract:
Abstract Mobile PR is an important component of the mobile app ecosystem. A major threat to this ecosystem’s long-term health is click fraud, which involves clicking on ads while infected with malware or using an automated bot to do it for you. The methods used to identify click fraud now focus on looking at server requests. Although these methods have the potential to produce huge numbers of false negatives, they may easily be avoided if clicks are hidden behind proxies or distributed globally. AdSherlock is a customer-side (inside the app) efficient and deployable click fraud detection syste
APA, Harvard, Vancouver, ISO, and other styles
5

Alzahrani, Reem A., and Malak Aljabri. "AI-based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions." Journal of Sensor and Actuator Networks 12, no. 1 (2022): 4. http://dx.doi.org/10.3390/jsan12010004.

Full text
Abstract:
Online advertising is a marketing approach that uses numerous online channels to target potential customers for businesses, brands, and organizations. One of the most serious threats in today’s marketing industry is the widespread attack known as click fraud. Traffic statistics for online advertisements are artificially inflated in click fraud. Typical pay-per-click advertisements charge a fee for each click, assuming that a potential customer was drawn to the ad. Click fraud attackers create the illusion that a significant number of possible customers have clicked on an advertiser’s link by a
APA, Harvard, Vancouver, ISO, and other styles
6

Sadeghpour, Shadi, and Natalija Vlajic. "Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 804–32. http://dx.doi.org/10.3390/jcp1040039.

Full text
Abstract:
Over the last two decades, we have witnessed a fundamental transformation of the advertising industry, which has been steadily moving away from the traditional advertising mediums, such as television or direct marketing, towards digital-centric and internet-based platforms. Unfortunately, due to its large-scale adoption and significant revenue potential, digital advertising has become a very attractive and frequent target for numerous cybercriminal groups. The goal of this study is to provide a consolidated view of different categories of threats in the online advertising ecosystems. We begin
APA, Harvard, Vancouver, ISO, and other styles
7

Gabryel, Marcin, Magdalena M. Scherer, Łukasz Sułkowski, and Robertas Damaševičius. "Decision Making Support System for Managing Advertisers By Ad Fraud Detection." Journal of Artificial Intelligence and Soft Computing Research 11, no. 4 (2021): 331–39. http://dx.doi.org/10.2478/jaiscr-2021-0020.

Full text
Abstract:
Abstract Efficient lead management allows substantially enhancing online channel marketing programs. In the paper, we classify website traffic into human- and bot-origin ones. We use feedforward neural networks with embedding layers. Moreover, we use one-hot encoding for categorical data. The data of mouse clicks come from seven large retail stores and the data of lead classification from three financial institutions. The data are collected by a JavaScript code embedded into HTML pages. The three proposed models achieved relatively high accuracy in detecting artificially generated traffic.
APA, Harvard, Vancouver, ISO, and other styles
8

Sadeghpour, Shadi, and Natalija Vlajic. "Click Fraud in Digital Advertising: A Comprehensive Survey." Computers 10, no. 12 (2021): 164. http://dx.doi.org/10.3390/computers10120164.

Full text
Abstract:
Recent research has revealed an alarming prevalence of click fraud in online advertising systems. In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising. Specifically, we first provide an in-depth investigation of different known categories of Web-bots along with their malicious activities and associated threats. We then ask a series of questions to distinguish between the important behavioral characteristics of bots versus humans in conducting click fraud within modern-day ad platforms. Subsequently, we p
APA, Harvard, Vancouver, ISO, and other styles
9

Lyu, Qiuyun, Hao Li, Renjie Zhou, Jilin Zhang, Nailiang Zhao, and Yan Liu. "BCFDPS: A Blockchain-Based Click Fraud Detection and Prevention Scheme for Online Advertising." Security and Communication Networks 2022 (April 29, 2022): 1–20. http://dx.doi.org/10.1155/2022/3043489.

Full text
Abstract:
Online advertising, which depends on consumers’ click, creates revenue for media sites, publishers, and advertisers. However, click fraud by criminals, i.e., the ad is clicked either by malicious machines or hiring people, threatens this advertising system. To solve the problem, many schemes are proposed which are mainly based on machine learning or statistical analysis. Although these schemes mitigate the problem of click fraud, several problems still exist. For example, some fraudulent clicks are still in the wild since their schemes only discover the fraudulent clicks with a probability app
APA, Harvard, Vancouver, ISO, and other styles
10

Wuarmanuk, Marieta, and Iis Solihat. "FINANCIAL STATEMENT FRAUD DETECTION AND EFFORTS HANDLING IT AT THE PEOPLE'S ECONOMIC BANK." Proceeding of International Students Conference of Economics and Business Excellence 1, no. 1 (2024): 105–8. https://doi.org/10.33830/iscebe.v1i1.4539.

Full text
Abstract:
With this study, it is possible to find out the fraud of financial statements in the People's Economic Bank company, this research is based on a qualitative method. This study aims to provide a summary to identify new financial statement fraud and can be used when formulating laws to reduce fraud in the People's Economic Bank. Regarding actions that can be taken to reduce fraud, this study can be the basis for identifying or reviewing internal audit principles, especially those related to financial information. As in the distribution of credit from the People's Economic Bank depending on the t
APA, Harvard, Vancouver, ISO, and other styles
11

Keserwani, Pankaj Kumar, Mahesh Chandra Govil, and Emmanuel Shubhakar Pilli. "The web ad-click fraud detection approach for supporting to the online advertising system." International Journal of Swarm Intelligence 7, no. 1 (2022): 3. http://dx.doi.org/10.1504/ijsi.2022.121091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Keserwani, Pankaj Kumar, Mahesh Chandra Govil, and Emmanuel Shubhakar Pilli. "The web ad-click fraud detection approach for supporting to the online advertising system." International Journal of Swarm Intelligence 7, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijsi.2022.10039450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Iroshan, Aberathne, and Walgampaya Chamila. "Real Time Mobile Ad Investigator: An Effective and Novel Approach for Mobile Click Fraud Detection." Computing and Informatics 40, no. 3 (2021): 606–27. http://dx.doi.org/10.31577/cai_2021_3_606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Researcher. "THE AI REVOLUTION IN AD MEASUREMENT IMPLICATIONS FOR BIG TECH AND ADVERTISERS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 1017–25. https://doi.org/10.5281/zenodo.14066629.

Full text
Abstract:
This article explores the transformative impact of artificial intelligence (AI) on ad measurement in the digital advertising landscape. It examines the shift towards AI-powered solutions driven by the need for greater efficiency and personalization in campaign optimization and analysis. The paper delves into the advanced capabilities of AI algorithms in processing massive datasets, enhancing ad targeting, optimizing bidding strategies, and improving performance tracking. Key benefits of AI-powered ad measurement are discussed, including real-time campaign adjustments, advanced fraud detection,
APA, Harvard, Vancouver, ISO, and other styles
15

Raghuwanshi, Ashish. "Ensuring Brand Safety and Reputation in Digital Marketing with Advanced Cybersecurity Protocols." Financial Technology and Innovation 3, no. 1 (2023): 08–17. http://dx.doi.org/10.54216/fintech-i.030101.

Full text
Abstract:
The ever-changing world of digital marketing makes it more important than ever to protect the integrity of brands. This study presents a novel method called "Enhanced Brand Safety Assurance through Cybersecurity Protocols" that combines three important algorithms: Ad Fraud Detection and Prevention, Real-time Behavioral Analysis, and Threat Intelligence Integration. The security of digital advertising, privacy of sensitive information, and customer confidence may all be assured with this framework's proactive threat detection and mitigation capabilities. A strong protection system against ever-
APA, Harvard, Vancouver, ISO, and other styles
16

Das, Shubhomoy, Md Rakibul Islam, Nitthilan Kannappan Jayakodi, and Janardhan Rao Doppa. "Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active Learning." Journal of Artificial Intelligence Research 80 (May 23, 2024): 127–70. http://dx.doi.org/10.1613/jair.1.14741.

Full text
Abstract:
Anomaly detection (AD) task corresponds to identifying the true anomalies among a given set of data instances. AD algorithms score the data instances and produce a ranked list of candidate anomalies. The ranked list of anomalies is then analyzed by a human to discover the true anomalies. Ensemble of tree-based anomaly detectors trained in an unsupervised manner and scoring based on uniform weights for ensembles are shown to work well in practice. However, the manual process of analysis can be laborious for the human analyst when the number of false-positives is very high. Therefore, in many re
APA, Harvard, Vancouver, ISO, and other styles
17

Zhu, Tong, Zhen Huang, Lu Zhou, Guoxing Chen, Yan Meng, and Haojin Zhu. "Collaborative Ad Fraud Detection in Ad Networks." IEEE Transactions on Networking, 2025, 1–16. https://doi.org/10.1109/ton.2025.3547977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

"Detection of Fraud in Mobile Advertising using Machine Learning." International Journal of Innovative Technology and Exploring Engineering 9, no. 6 (2020): 855–58. http://dx.doi.org/10.35940/ijitee.f4002.049620.

Full text
Abstract:
With ongoing advancements in the field of technology, mobile advertising has emerged as a platform for publishers to earn profit from their free applications. An online attack commonly known as click fraud or ad fraud has added up to the issue of concerns surfacing mobile advertising. Click fraud is the act of generating illegitimate clicks or data events in order to earn illegal income. Generally, click frauds are generated by infusing the genuine code with some illegitimate bot, which clicks on the ad acting as a potential customer. These click frauds are usually planted by the advertisers o
APA, Harvard, Vancouver, ISO, and other styles
19

Kesavan, Dhanvanth. "Advertisement Click Fraud Detection." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, May 20, 2021, 364–69. http://dx.doi.org/10.32628/cseit217375.

Full text
Abstract:
Mobile ads are tormented with deceitful clicks that may be an important test for the advertising network. Albeit documented promotion systems utilize various methods to acknowledge click fraud, they don’t shield the client from conceivable intrigue among distributors and advertisement systems. What’s additional, promotion systems can’t screen the client’s action for click fraud location once they're entertained to the advertising web content following clicking the ad, i.e., in a web site there will be focuses or some specific spots after we click on the actual spot it'll be entertained to the
APA, Harvard, Vancouver, ISO, and other styles
20

Makkineni, Neeraja, Anupam Ciripuram, Sriram N, Shaik Subhani, and V. Kakulapati. "Fraud Detection of AD Clicks Using Machine Learning Techniques." SSRN Electronic Journal, 2023. http://dx.doi.org/10.2139/ssrn.4486834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ma, Dandan, and Feng Wan. "Research on Intelligent Recognition of Ad Click Fraud Based on Deep FM Heterogeneous Integration Model." International Journal of High Speed Electronics and Systems, July 15, 2025. https://doi.org/10.1142/s0129156425407260.

Full text
Abstract:
Ad click fraud leads to millions of dollars in losses every year and erodes advertisers’ confidence. Identification of click fraud, especially when dealing with complex and multivariate data, is still a difficult problem. In order to combat these challenges, this study suggests the DeepFM heterogeneous integration model, which incorporates Factorization Machines for feature interactions and deep neural networks for feature learning. The methodology incorporates categorical, numerical, and temporal data processing with embedding layers and normalization techniques to increase the model’s flexib
APA, Harvard, Vancouver, ISO, and other styles
22

Alzahrani, Reem A., Malak Aljabri, and Rami Mustafa A. Mohammad. "Ad Click Fraud Detection Using Machine Learning and Deep Learning Algorithms." IEEE Access, 2025, 1. https://doi.org/10.1109/access.2025.3532200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Subburayan, Baranidharan, David Winster, K. Dhanalakshmi, and R. Rajkumar. "Combating Evolving Threats: A Systematic Review of Online Ad Fraud Detection." SSRN Electronic Journal, 2025. https://doi.org/10.2139/ssrn.5263103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kumari, Shalini, Chander Prabha, Asif Karim, Md Mehedi Hassan, and Sami Azam. "A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023." IET Information Security 2024, no. 1 (2024). http://dx.doi.org/10.1049/2024/8821891.

Full text
Abstract:
Almost 85% of companies polled said they were looking into anomaly detection (AD) technologies for their industrial image anomalies. The present problem concerns detecting anomalies often occupied by redundant data. It can be either in images or in videos. Finding a correct pattern is a challenging task. AD is crucial for various applications, including network security, fraud detection, predictive maintenance, fault diagnosis, and industrial and healthcare monitoring. Many researchers have proposed numerous methods and worked in the area of AD. Multiple anomalies and considerable intraclass v
APA, Harvard, Vancouver, ISO, and other styles
25

Halim, Fransiscus Ati. "Distribusi Pengiriman File Multimedia Secara RealTime dengan Jaringan WAN Frame Relay." Jurnal ULTIMA Computing 9, no. 1 (2017). http://dx.doi.org/10.31937/sk.v9i1.567.

Full text
Abstract:
Today's communications networks are built using high-speed digital trunks that inherently provide high throughput, minimal relay, and a very low error rate. Such transmission networks supply highly reliable service without the overhead of error control functions. Frame relay is a packet-mode transmission network service that exploits these network characteristics by minimizing the amount of error detection and recovery performed inside the network [1]. In addition, real time network based systems can also minimize the possibility of employees committing fraud resulting in losses for the compan
APA, Harvard, Vancouver, ISO, and other styles
26

Aravind Raghu. "Enhancing Financial Transaction Security Using OAuth2, MFA, and Azure AD Authentication: A Java-Based Integrated Approach." International Journal of Computational and Experimental Science and Engineering 11, no. 2 (2025). https://doi.org/10.22399/ijcesen.2068.

Full text
Abstract:
In recent years, financial transactions have been increasingly targeted by cyberattacks, fraud transactions and identity theft. Traditional authentication mechanisms such as basic auth have proven to be insufficient. This paper proposes a multi-layered security framework which integrates three components- Oauth2 token-based authentication, multi-factor authentication (MFA) and Azure Active Directory (AAD) to secure real-time financial transactions. This approach aims to maintain seamless transaction processing along with reducing token compromise rates and prevent unauthorized access. This res
APA, Harvard, Vancouver, ISO, and other styles
27

IJNSA. "International Journal of Network Security & Its Applications (IJNSA)." July 23, 2018. https://doi.org/10.5281/zenodo.1319465.

Full text
Abstract:
<strong>International Journal of Network Security &amp; Its Applications (IJNSA)</strong> <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; --- UGC Listed, ERA Indexed----</strong> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; http://airccse.org/journal/ijnsa.html &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&
APA, Harvard, Vancouver, ISO, and other styles
28

O'Keefe, Patrick P., Suzanne B. Hendrix, Jeffery Zhang, Kent Hendrix, Lixia Wang, and Samuel P. Dickson. "Navigating the Complexities of Alzheimer’s Clinical Trials: The Perils of Small Molecule Studies and the Risk of Fraudulent Practices." Alzheimer's & Dementia 20, S6 (2024). https://doi.org/10.1002/alz.093551.

Full text
Abstract:
AbstractBackgroundAlzheimer’s disease (AD) presents unique challenges in clinical trials involving small molecules. Multifaceted issues plague such trials, emphasizing susceptibility to fraud from clinical sites and “professional patients”. The relative ease of simulating Alzheimer’s diagnosis, coupled with inadequate oversight by Contract Research Organizations (CROs), creates fertile ground for deceptive practices. Poor rater quality and the simplicity of falsifying data exacerbate concerns.A core difficulty is the diagnostic ambiguity of AD, where symptomatic overlap with other cognitive di
APA, Harvard, Vancouver, ISO, and other styles
29

Hendrix, Suzanne B., Patrick P. O'Keefe, Jeffery Zhang, Kent Hendrix, Lixia Wang, and Samuel P. Dickson. "Improving the Chance of Success for Alzheimer’s Clinical Trials by Identifying and Mitigating the Risk of Fraudulent Practices." Alzheimer's & Dementia 20, S8 (2024). https://doi.org/10.1002/alz.095776.

Full text
Abstract:
AbstractBackgroundCompanies recently identified clinical study sites engaging in fraudulent practices, reducing success in Alzheimer’s disease (AD) clinical trials. Successful trials are reliable despite possible victimization by these practices because these sites introduce a negative bias. Ease of simulating Alzheimer’s diagnosis documentation (based on clinical or blood markers) and clinical outcome data, coupled with inadequate oversight by Contract Research Organizations (CROs), facilitates deceptive practices.Fraudulent practices at sites and with patients (“professional patients”) often
APA, Harvard, Vancouver, ISO, and other styles
30

IJNSA. "International Journal of Network Security & Its Applications (IJNSA) - Current Issue - May 2019, Volume 11, Number 3." May 31, 2019. https://doi.org/10.5121/ijnsa.2019.11300.

Full text
Abstract:
International Journal of Network Security &amp; Its Applications (IJNSA) ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) http://airccse.org/journal/ijnsa.html Current Issue - May 2019, Volume 11, Number 3 Enhancing the Wordpress System: from Role to Attribute-Based Access Control Lifeng Cao, Jia Ying Ou and Amirhossein Chinaei, York University, Canada http://aircconline.com/ijnsa/V11N3/11319ijnsa01.pdf Classification Procedures for Intrusion Detection Based on KDD CUP 99 Data Set Shaker El-Sappagh, Ahmed Saad Mohammed and Tarek Ahmed AlSheshtawy, Benha University, Egypt http://aircconline.com/i
APA, Harvard, Vancouver, ISO, and other styles
31

Network, Security. "International Journal of Network Security & Its Applications (IJNSA)." May 14, 2018. https://doi.org/10.5281/zenodo.1246369.

Full text
Abstract:
The International Journal of Network Security &amp; Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security &amp; its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas
APA, Harvard, Vancouver, ISO, and other styles
32

IJNSA. "The International Journal of Network Security & Its Applications (IJNSA) - ERA, UGC Listed Journal." November 30, 2018. https://doi.org/10.5121/ijnsa.2018.10601.

Full text
Abstract:
A Multi-Layer Hybrid Text Steganography for Secret Communication Using Word Tagging and RGB Color Coding Ali F. Al-Azzawi1, Philadelphia University, Jordan http://aircconline.com/ijnsa/V10N6/10618ijnsa01.pdf Secure Third Party Auditor(TPA) for Ensuring Data Integrity in Fog Computing KashifMunir and Lawan A. Mohammed, University of Hafr Al Batin, KSA http://aircconline.com/ijnsa/V10N6/10618ijnsa02.pdf IOT and Security-Privacy Concerns: A Systematic Mapping Study Moussa WITTI and Dimitri KONSTANTAS, Information Science Institute University of Geneva, Switzerland http://aircconline.com/ijnsa/V10
APA, Harvard, Vancouver, ISO, and other styles
33

IJNSA. "International Journal of Network Security & Its Applications (IJNSA)." September 30, 2018. https://doi.org/10.5281/zenodo.1403993.

Full text
Abstract:
The International Journal of Network Security &amp; Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security &amp; its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Michal, Kedziora, Gawin Paulina, Szczepanik Michal, et al. "Current Issue : The International Journal of Network Security & Its Applications (IJNSA)." January 31, 2019. https://doi.org/10.5121/ijnsa.2019.11100.

Full text
Abstract:
The International Journal of Network Security &amp; Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security &amp; its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
APA, Harvard, Vancouver, ISO, and other styles
35

AIRCC. "International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI, H index - Profile." International Journal of Network Security & Its Applications (IJNSA), January 27, 2022, 01–09. https://doi.org/10.5281/zenodo.5910297.

Full text
Abstract:
The International Journal of Network Security &amp; Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security &amp; its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
APA, Harvard, Vancouver, ISO, and other styles
36

Ali, F. Al-Azzawi. "The International Journal of Network Security & Its Applications (IJNSA) -- November 2018 Issue." November 30, 2018. https://doi.org/10.5121/ijnsa.2018.10600.

Full text
Abstract:
The International Journal of Network Security &amp; Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security &amp; its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!