The International Arab Journal of Information Technology (IAJIT)

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless

Abstract: Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

Immunity inspired Cooperative Agent based

Department of Computer Science and Engineering, Technocrats Institute of Technology, India

UDP based IP Traceback for Flooding DDoS Attack

Abstract: Distributed denial of service attack has become a challenging threat in today’s Internet. The adversaries often use