ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: integrity
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions
Nura Shifa Musa,Nada Masood Mirza,Adnan Ali
#Digital forensic
#internet of things
#internet of things forensics
#forensic investigation process
#challenges
#emerging solutions
A Region Adaptive Robust Watermarking Scheme
Motilal Nehru National Institute of Technology, Ind ia
#
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Enforcing User-Defined Constraints During the Run-Time in OODB
, Ali Mamat 2
#Object-oriented databases
# integrity constraints
# constraints violation
VI-SDB: A Convivial Approach for Description and Manipulation of
Faculty of Sciences of Tunis, Tunisia University, T unisia
# Deductive database
# stratified database
# EPN formal ism
# GUI
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
A Physical Topology Discovery Method Based on AFTs of Down Constraint
topology discovery based on Address Forwarding Table (AFT) is a hot topic on current study. This paper defines three
#Physical topology discovery
# address forwarding table
# network management
Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve
University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan
#IoT
# CoAP
# ECC
#energy saving
# security
# IoT
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
#Software protection
# function hiding
# software obfuscation
# ASP
Abdalla Al-Ameen and Samani Talab
# E-voting
# EML
# threats
# security
# authentications s chemes
# integrity
Change Management Framework to Support UML Diagrams Changes
Bassam Rajabi and Sai Peck Lee
#Change impact
# change management
# traceability analysis
# unified modeling language
# coloured petri nets
Digital Signature Protocol for Visual Authentication Anirban Goswami1, Ritesh Mukherjee2, Soumit Chowdhury3, and Nabin Ghoshal4 1Department of Information Technology, Techno India, India 2Department of Advanced Signal Processing, Centre for Development of Advanced Computing, India 3Department of Computer Science and Engineering, Government College of Engineering and Ceramic
Technology, India 4Department of Engineering and Technological Studies, University of Kalyani, India
#Share
# DCT and IDCT
# image compression
# data hiding
# SSIM
# collusion attack
1
2
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint