ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: security
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security
Ramya Chinnasamy,Malliga Subramanian,Nandita Sengupta
#Artificial neural network
#deep learning
#honey badger optimization
#intrusion detection system
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography
Mandeep Sandhu,Mohammad Ahmed,Mohammad Hussain,Surender Head,Imran Khan
#Image encryption
#logistic chaotic map
#steganography
#optimization
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles
Laid Kenioua,Brahim Lejdel,Mohamed Abdelhamid Nedioui
#Autonomous vehicles
#positioning security
#secure communication
#semi-decentralized collaboration architecture
#edge computing
#data collection
#consensus
Hybridized Clustering Algorithm and Ensemble Learning for Monitoring Paddy Crop Growth Analysis
Sathiya Priya.R,Rahamathunnisa.U
#Crop monitoring
#satellite images
#vegetation index
#eigenvector
#eigenvalue
#hybridized clustering algorithm
#ensemble learning
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
Fouzia Elazzaby,Nabil Elakkad,Khalid Sabour
#Image encryption
#multiplicative group
#map 2D-SLMM
#security
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
1
2
3
4
5
6
7
8
9
ยป
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint