ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: threats
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Neural Networks and Sentiment Features for Extremist Content Detection in Arabic Social Media
Hanen Himdi,Fatimah Alhayan,Khaled Shaalan
#BERT
#sentiment analysis
#deep learning
#transformer-based models
Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics
Mohammad Al-Mousa,Waleed Amer,Mosleh Abualhaj,Sultan Albilasi,Ola Nasir,Ghassan Samara
#Cybercrime evidence
#digital forensics
#proactive analysis
#agile strategy
#LLMs
Efficient Image Encryption via 2D Logistic Chaos Mapping: Strengthening Security with Pixel-Level Dynamics
Yuebo Wu,Shiwei Chu,Huifang Bao,Duansong Wang,Jian Zhou
#Image encryption algorithm
#chaotic systems
#pixel shifting
#pixel scrambling
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering
Mustafa Al-Fayoumi,Qasem Abu Al-Haija,Rakan Armoush,Christine Amareen
#Machine learning
#malicious PDF detection
#feature engineering
#explainable artificial intelligence
#shapley additive explanations
LWE Based Quantum-Resistant Pseudo-Random Number Generator
Atul Kumar,Arun Mishra
#Learning with errors
#homomorphic function
#pseudo-random number generator
#homomorphic function
#linear feedback shift register
#NIST statistical test suite
1
# Active authentication
# data originator
# verifier
# E CC
# e&passport
# ES
# passive authentication
A Survey: Face Recognition Techniques under Partial Occlusion
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
# FR
# part based methods
# feature based methods
# frac tal-based methods
# partial occlusion
# recognition rates
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share
#Phishing
# two-factor authentication
# web security
# google cloud messaging
# mobile authentication
Phishing Detection using RDF and Random Forests Vamsee Muppavarapu, Archanaa Rajendran, and Shriram Vasudevan
cloned and victims are lured to the fake website to provide their personal as well as confidential information, sometimes it
#Phishing
# ensemble learning
# RDF models
# phishing target
# metadata
# vocabulary
# random forests
STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach
Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The
#DDoS attack
# IP traceback
# probabilistic packet marking
# dynamic marking
# sparsely tagged marking
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
Immunity inspired Cooperative Agent based
Department of Computer Science and Engineering, Technocrats Institute of Technology, India
#Anomaly
# human immune system
# artificial immune system
# agent
Abdalla Al-Ameen and Samani Talab
# E-voting
# EML
# threats
# security
# authentications s chemes
# integrity
Collaborative Detection of Cyber Security Threats in Big Data
Jiange Zhang, Yuanbo Guo, and Yue Chen
#Big data
# cyber security
# threat
# collaborative detection
Shamir s Key Based Confidentiality on Cloud Data Storage
Kamalraj Durai
#Confidentiality
# privacy
# cloud computing
# SKDC
# privacy preserving and polynomial interpolation
Advanced Analysis of the Integrity of Access Control Policies: the Specific Case of Databases
Faouzi Jaidi, Faten Ayachi, and Adel Bouhoula
#Access Control
# Databases Security
# Formal Validation
# Integrity Analysis
# Conformity Verification
Mitigating Insider Threats on the Edge: A Knowledgebase Approach
Qutaibah Althebyan1,2 1College of Engineering, Al Ain University, UAE 2Software Engineering Department, Jordan University of Science and Technology, Jordan
#Insider Threats
# Fog
# Mobile Edge
# Cloud
# Knowledge Graph
# Dependency Graph
# Database
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint