The International Arab Journal of Information Technology (IAJIT)

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

253

Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University 

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this 

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this 

Shaukat Ali, Azhar Rauf, and Huma Javed 

Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier

Balakrishnan Senthilnayaki1, Krishnan Venkatalakshmi2, and Arpputharaj Kannan1 1Department of Information Science and Technology, College of Engineering, Anna University, Chennai 2Departemnt of Electronics and Communication Engineering, University College of Engineering

DoS and DDoS Attack Detection Using Deep Learning and IDS

Mohammad Shurman1, Rami Khrais2, and Abdulrahman Yateem1 1Jordan University of Science and Technology, Network Engineering and Security Department, Jordan 2Jordan University of Science and Technology, Computer Engineering Department, Jordan

Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration

Hai Liu1, Zhenqiang Wu1, Changgen Peng2, Feng Tian1, and Laifeng Lu3 1School of Computer Science, Shaanxi Normal University, China 2Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, China 3School of Mathematics and Information Science, Shaanxi Normal University, China

A Smart Card Oriented Secure Electronic Voting Machine Built on NTRU

Safdar Shaheen1, Muhammad Yousaf1, and Mudassar Jalil2 1Riphah Institute of Systems Engineering, Riphah International University, Pakistan 2Department of Mathematics, COMSAT Institute of Information Technology, Pakistan

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair1, Simon Büchsenstein2, and Ala’ Khalifeh1 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2Embedded Systems Engineering, University of Freiburg, Germany