The International Arab Journal of Information Technology (IAJIT)

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#

Privacy-Preserving Data Mining in Homogeneous

Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#

Adaptive Semantic Indexing of Documents for Locating Relevant Information in P2P Networks

Abstract: Locating relevant information in Peer#to#Peer (P2P) system is a challenging problem. Conventional approaches use
#

Unconstraint Assignment Problem: A Molecular Computing Approach Ibrahim Zuwairie1&2, Tsuboi Yusei2, Ono Osamu2, and Khalid Marzuki3

Abstract:Deoxyribonucleic Acid or DNA-based computing is an emerging field that bridging the gap between chemistry,

Jean De Dieu Nkapkop1,2, Joseph Effa1, Monica Borda2, Laurent Bitjoka3, and Alidou Mohamadou4

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

A Quality-Aware Context Information Selection Based Fuzzy Logic in IoT Environment

Things (IoT). An important issue in such systems is faced by context data distribution with a sufficient level of quality i.e.,

Vision-Based Human Activity Recognition Using LDCRFs

flow is proposed. The first phase of this approach is to employ the modelling background that uses an adaptive Gaussian