ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: threat
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
A Statistical Framework for Identification of
#
1
# Active authentication
# data originator
# verifier
# E CC
# e&passport
# ES
# passive authentication
A Survey: Face Recognition Techniques under Partial Occlusion
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
# FR
# part based methods
# feature based methods
# frac tal-based methods
# partial occlusion
# recognition rates
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share
#Phishing
# two-factor authentication
# web security
# google cloud messaging
# mobile authentication
Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless
Abstract: Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They
#Secure multicast routing
# sybil attack
# random key predistribution
Phishing Detection using RDF and Random Forests Vamsee Muppavarapu, Archanaa Rajendran, and Shriram Vasudevan
cloned and victims are lured to the fake website to provide their personal as well as confidential information, sometimes it
#Phishing
# ensemble learning
# RDF models
# phishing target
# metadata
# vocabulary
# random forests
STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach
Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The
#DDoS attack
# IP traceback
# probabilistic packet marking
# dynamic marking
# sparsely tagged marking
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
Immunity inspired Cooperative Agent based
Department of Computer Science and Engineering, Technocrats Institute of Technology, India
#Anomaly
# human immune system
# artificial immune system
# agent
UDP based IP Traceback for Flooding DDoS Attack
Abstract: Distributed denial of service attack has become a challenging threat in today’s Internet. The adversaries often use
#DDoS
# Mitigaton
# IP Traceback
# Packet Marking
# Packet logging
# Forensics
Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical
Zibouda Aliouat
#Group membership protocol
# formal verification
# fau lt)tolerant distributed algorithm
# node reintegration
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint