The International Arab Journal of Information Technology (IAJIT)

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

Immunity inspired Cooperative Agent based

Department of Computer Science and Engineering, Technocrats Institute of Technology, India

Mitigating Insider Threats on the Edge: A Knowledgebase Approach

Qutaibah Althebyan1,2 1College of Engineering, Al Ain University, UAE 2Software Engineering Department, Jordan University of Science and Technology, Jordan