The International Arab Journal of Information Technology (IAJIT)

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless

Abstract: Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

Immunity inspired Cooperative Agent based

Department of Computer Science and Engineering, Technocrats Institute of Technology, India

UDP based IP Traceback for Flooding DDoS Attack

Abstract: Distributed denial of service attack has become a challenging threat in today’s Internet. The adversaries often use

Simulating Email Worm Propagation Based on Social Network and User Behavior

Kexin Yin1, Wanlong Li1, Ming Hu3, and Jianqi Zhu2 1School of Computer Science and Engineering, Changchun University of Technology, China 2School of Computer Science and Technology, Jilin University, China 3School of Computer Technology and Engineering, Changchun Institute of Technology, China