ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Security
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Application of Fuzzy Decision Intelligent Recommendation System in Personalized Health Management of Hospitals
Yaping Ge,Kun Hu*,Yi Liu,Chen Zhang
#Intelligent system
#healthcare recommendation system
#decision support system
#fuzzy neural network
#multi-criteria decision making
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques
Jamal Hussain Shah,Muhammad Sharif,Mudassar Raza,Aisha Azeem
#Linear
#non/linear
#PCA
#2DPCA
#2DKPCA
#facial feat ures extraction
#face recognition
#survey
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases
Ayman Mousa,Osama Faragallah,Elsayed Rabaie,Elsayed Nigm
#Database security
#cryptographic algorithms
#datab ase encryption
#Elsayed Rabaie
#Elsayed Nigm
An Improved Version of the Visual Digital Signature Scheme
Abdullah Jaafar,Azman Samsudin
#Digital signature
#non&expansion visual cryptograph y
#boolean operation
#visual share
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
1
2
3
4
5
6
7
8
9
10
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint