scispace - formally typeset
Search or ask a question
JournalISSN: 2277-8616

International Journal of Scientific & Technology Research 

IJSTR
About: International Journal of Scientific & Technology Research is an academic journal. The journal publishes majorly in the area(s): Cloud computing & Quality (business). It has an ISSN identifier of 2277-8616. Over the lifetime, 7195 publications have been published receiving 19956 citations.

Papers published on a yearly basis

Papers
More filters
Journal Article
TL;DR: The proposed framework intends to develop a machine learning-based malware detection system on Android to detect malware applications and to enhance security and privacy of smartphone users.
Abstract: Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and they may contain malware applications that can steal privacy information for users. In this paper, a framework that can detect android malware applications is propos ed to help organizing Android Market. The proposed framework intends to develop a machine learning-based malware detection system on Android to detect malware applications and to enhance security and privacy of smartphone users. This system monitors various permissionbased features and events obtained from the android applications, and analyses these features by using machine learning classifiers to classify whether the application is goodware or malware.

247 citations

Journal Article
TL;DR: The writers will discuss the Effect of Using Authentic Materials in teaching, because a number of studies point out that the use of authentic materials is regarded a useful means to motivate learners, arouse their interest and expose them to the real language they will face in the real world.
Abstract: Authentic materials are among the most important tools a teacher can and must use in class in order to make his/her teaching go smoothly and be effective in transmitting the necessary knowledge to all students. In this paper, the writers will discuss the Effect of Using Authentic Materials in teaching, because a number of studies point out that the use of authentic materials is regarded a useful means to motivate learners, arouse their interest and expose them to the real language they will face in the real world.

131 citations

Journal Article
TL;DR: This paper aims to make a detailed study report of different types of data mining applications in the healthcare sector and to reduce the complexity of the study of the healthcare data transactions.
Abstract: In this paper, we have focused to compare a variety of techniques, approaches and different tools and its impact on the healthcare sector. The goal of data mining application is to turn that data are facts, numbers, or text which can be processed by a computer into knowledge or information. The main purpose of data mining application in healthcare systems is to develop an automated tool for identifying and disseminating relevant healthcare information. This paper aims to make a detailed study report of different types of data mining applications in the healthcare sector and to reduce the complexity of the study of the healthcare data transactions. Also presents a comparative study of different data mining applications, techniques and different methodologies applied for extracting knowledge from database generated in the healthcare industry. Finally, the existing data mining techniques with data mining algorithms and its application tools which are more valuable for healthcare services are discussed in detail.

98 citations

Journal Article
TL;DR: This work proposes a new multi-threaded distributed cloud IDS model that handles large flow of data packets, analyze them and generate reports efficiently by integrating knowledge and behavior analysis to detect intrusions.
Abstract: Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. Distributed model of cloud makes it vulnerable and prone to sophisticated distributed intrusion attacks like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). To handle large scale network access traffic and administrative control of data and application in cloud, a new multi-threaded distributed cloud IDS model has been proposed. Our proposed cloud IDS handles large flow of data packets, analyze them and generate reports efficiently by integrating knowledge and behavior analysis to detect intrusions. ————————————————————

86 citations

Network Information
Related Journals (5)
International journal of engineering research and technology
22.3K papers, 32.6K citations
81% related
International Journal of Computer Applications
26.6K papers, 157.4K citations
80% related
Data in Brief
9K papers, 45.2K citations
78% related
Heliyon
17.6K papers, 125.6K citations
78% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2021287
20201,831
20191,639
2018332
2017514
2016509