ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Attacks
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Enhanced IIoT Security: A Hybrid Intrusion Detection Framework Using Signature-Based and Deep Learning Approaches
Komal Bansal,Anita Singhrova
#Deep learning
#machine learning
#information security
#anomaly detection
#IIDS
#IIoT
#GRU
#GHA
#SOA
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Vijayanand Radhakrishnan,Ulaganathan Meenakshisundaram,Ganeshkumar Pugalendhi,John Basha
#Packet based attack detection
#Bi-LSTM
#multi-head attention
#NAN communication security
#NS3 simulation
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
Malware Detection Through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Liwen Xu
#Network security
#situation awareness
#analytic hierarchy process
#nadam algorithm
#long and short-term memory network
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
Software Protection via Hiding Function using Software Obfuscation
Venus Samawi,Adeeb Sulaiman
#Software protection
#function hiding
#software obfu scation
#ASP
Implementation and Comparative Analysis of the Fault Attacks on AES
Saleem Raza,Malik Najmus Saqib,Azfar Shakeel,Majid Iqbal Khan
#Fault attack
#AES
#cryptanalysis
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
Image Encryption Using Modified Perturbed Logistic Map
Subhashini Kumaran,Amutha Ramachandran
#Improved zig zag transformation
#image encryption
#decoding
#DNA operations
#modified perturbed logistic map
#quaternary DNA encoding
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
1
2
3
4
5
6
»
All Rights reserved to IAJIT 2026
Powered by:
TurnPoint