ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: trust
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Trust Enabled Secure Routing in Vehicular Adhoc Networks
M Venkata Krishna Reddy,G Kiran Kumar,Panduranga Vital Terlapu,D. Jayaram,Shirina Samreen
#Mobility
#reliability
#secure routing
#trust
#VANET
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning
Xiaowen Li
#DenseNet
#singular value decomposition
#KNN algorithm
#AM-softmax function
#pedestrian target recognition
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Lightweight Anti-Censorship Online Network for
Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea
#
Design and Construction of Secure Digital Will System
#Will system
# key escrow
# testamentary trust
Hierarchical Based Group Key Transfer for Secure
1Department of Information Science and Technology, A nna University, India
#
Designing a Fuzzy-Logic Based Trust and Reputation Model for Secure Resource
Department of Electronics and Communication Enginee ring, Bannari Amman
#
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
A Survey: Face Recognition Techniques under Partial Occlusion
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
# FR
# part based methods
# feature based methods
# frac tal-based methods
# partial occlusion
# recognition rates
Proficient Decision Making on Virtual Machine Creation in IaaS Cloud Environment
Abstract: Cloud computing is a most fascinated technology that is being utilized by IT companies to reduce their
#IaaS
# VMs
# jordon neural network
# genetic algorithm
# service level agreements
# FLBVC
A Network Performance Aware QoS Based Workflow Scheduling for Grid Services
Abstract: Grids enable sharing, selection and aggregation of geographically distributed resources among various
#Grid scheduling
# QoS
# DAG
# execution time
# deadline
# trust rate
Bilateral Multi-Issue Negotiation Model for a Kind
1College of Computer Science and Electronic Engineering, Hunan University, China 2The Second Hospital, University of South China, China 3Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China
#Multi-issue negotiation; jaussian process regression; dynamic risk strategy; concession strategy
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
integrity for flexible and traditional remote syste ms. SIMS is not only targeted for Linux, but it can also be used for different
# Data integrity
# tampering
# remote systems
# trustwor thiness
# survivability
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint