The International Arab Journal of Information Technology (IAJIT)

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

A Quality-Aware Context Information Selection Based Fuzzy Logic in IoT Environment

Things (IoT). An important issue in such systems is faced by context data distribution with a sufficient level of quality i.e.,

Using the MQTT Protocol in Real Time for

Electrical and Computer Engineering Department, University of Michigan, Dearborn

Service Process Modelling and Performance Analysis for Composite Context Provisioning in IoT

our life. Some devices are being used by us such as the smart phones while others are most of the time invisible to us such as

Exploitation of ICMP Time Exceeded Packets for A Large-Scale Router Delay Analysis

Ali Gezer1 and Gary Warner2 1Electronic and Telecommunication Technology, Kayseri University, Turkey 2Computer Science, University of Alabama at Birmingham, US

Enhanced Performance and Faster Response using New IoT LiteTechnique

Kassem Ahmad1,2, Omar Mohammad1, Mirna Atieh3, and Hussein Ramadan4 1Department of Computer Science and IT, Lebanese International University, Lebanon 2Department of Computer Engineering, Islamic University of Lebanon, Lebanon 3Department of Economic Sciences and Administration, Lebanese University, Lebanon 4Olayan School of Business, American University of Beirut, Lebanon

Improving Classification Performance Using Genetic Programming to Evolve String Kernels

Ruba Sultan1, Hashem Tamimi1,2, and Yaqoub Ashhab2 1College of IT and Computer Engineering, Palestine Polytechnic University, Palestine 2Palestine-Korea Biotechnology Center, Palestine Polytechnic University, Palestine

DoS and DDoS Attack Detection Using Deep Learning and IDS

Mohammad Shurman1, Rami Khrais2, and Abdulrahman Yateem1 1Jordan University of Science and Technology, Network Engineering and Security Department, Jordan 2Jordan University of Science and Technology, Computer Engineering Department, Jordan

Identity Identification and Management in the Internet of Things

Zina Houhamdi1 and Belkacem Athamena2 1Software Engineering Department, College of Engineering, Al Ain University, UAE 2Business Administration Department, College of Business, Al Ain University, UAE

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair1, Simon Büchsenstein2, and Ala’ Khalifeh1 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2Embedded Systems Engineering, University of Freiburg, Germany

Privacy Preserving Authenticated Key Agreement based on Bilinear Pairing for uHealthcare

Sunghyun Cho1 and Hyunsung Kim2 1College of Computing, Sungkyunkwan University, Korea 2School of Computer Science, Kyungil University, Korea

LoRaWAN Energy Optimization with Security Consideration

Ala Khalifeh1, Khaled Aldahdouh1 and Sahel Alouneh1,2 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2College of Engineering, Al Ain University, UAE