The International Arab Journal of Information Technology (IAJIT)

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Preventing Collusion Attack in Android

day  activities.  Therefore,  the  security  of  smartpho nes  turns  to  a  great  concern.  Recently,  Android  as  the  most  popular 
#

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

253

Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University 

Efficient Modified Elliptic Curve Diffie-Hellman

Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years. 
#

A Region Adaptive Robust Watermarking Scheme

Motilal Nehru National Institute of Technology, Ind ia 
#

Securing RSA Algorithm against Timing Attack

Department of Information Technology, Alpha College  of Engineering and Technology, India 
#