The International Arab Journal of Information Technology (IAJIT)

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Preventing Collusion Attack in Android

day  activities.  Therefore,  the  security  of  smartpho nes  turns  to  a  great  concern.  Recently,  Android  as  the  most  popular 
#

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

253

Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University