ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: threat
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Hybrid Transformer Framework for Domain Generated Algorithms Detection: A Fusion of Textual and Numeric Features
Suhad Malayshi,Ahmad Hasasneh*
#Domain generated algorithms
#cybersecurity
#hybrid deep learning
#text transformers
#multimodality
#feature importance
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Implementation and Comparative Analysis of the Fault Attacks on AES
Saleem Raza,Malik Najmus Saqib,Azfar Shakeel,Majid Iqbal Khan
#Fault attack
#AES
#cryptanalysis
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars
Ruzhi Xu,Min Li,Xin Yang,Dexin Liu,Dawei Chen
#Driverless cars
#object detection
#adversarial examples
#parametric noise injection
#adversarial training
A Statistical Framework for Identification of
#
1
# Active authentication
# data originator
# verifier
# E CC
# e&passport
# ES
# passive authentication
A Survey: Face Recognition Techniques under Partial Occlusion
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
# FR
# part based methods
# feature based methods
# frac tal-based methods
# partial occlusion
# recognition rates
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share
#Phishing
# two-factor authentication
# web security
# google cloud messaging
# mobile authentication
1
2
3
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint