ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Information Security
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Instructions to Reviewers
Review Paper
Statistics
Security Strategy (NIACSS) of Jordan
# Strategy implementation framework
# security manage ment
# cyber security
# information assurance
# and strategic controls
# Enterprise information security
# enterprise modelli ng
# risk assessment
# risk assessment method
# resour ce based view
# attack trees
# risk management
A Trusted Virtual Network Construction Method Based on Data Sources Dependence
Xiaorong Cheng1 and Tianqi LI2 1Department Computer Science, North China Electric Power University, China 2C-Epri Electric Power Engineering CO, LTD, China
#Data source
# credibility
# trusted virtual network
# dynamics
# modeling and simulation
Digital Signature Protocol for Visual Authentication Anirban Goswami1, Ritesh Mukherjee2, Soumit Chowdhury3, and Nabin Ghoshal4 1Department of Information Technology, Techno India, India 2Department of Advanced Signal Processing, Centre for Development of Advanced Computing, India 3Department of Computer Science and Engineering, Government College of Engineering and Ceramic
Technology, India 4Department of Engineering and Technological Studies, University of Kalyani, India
#Share
# DCT and IDCT
# image compression
# data hiding
# SSIM
# collusion attack
Collaborative Detection of Cyber Security Threats in Big Data
Jiange Zhang, Yuanbo Guo, and Yue Chen
#Big data
# cyber security
# threat
# collaborative detection
Enhanced Android Malware Detection and Family Classification, using Conversation-level Network
Traffic Features
#Information Security
# Android Malware
# Network Traffic Analysis
# Conversation-level Features
# and Machine Learning
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint