The International Arab Journal of Information Technology (IAJIT)

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

Immunity inspired Cooperative Agent based

Department of Computer Science and Engineering, Technocrats Institute of Technology, India

Mitigating Insider Threats on the Edge: A Knowledgebase Approach

Qutaibah Althebyan1,2 1College of Engineering, Al Ain University, UAE 2Software Engineering Department, Jordan University of Science and Technology, Jordan

Design and Implementation of Inter-operable and Secure Agent Migration Protocol

Shakir-Ullah Shah1, Jamil Ahmad2, and Najeeb-ur-Rehman3 1Department of Computing and Technology, Iqra University Islamabad, Pakistan 2Department of Computer Science, University of Science and Technology (KUST), Pakistan 3Department of Computer Science, University of Gujrat, Pakistan

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair1, Simon Büchsenstein2, and Ala’ Khalifeh1 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2Embedded Systems Engineering, University of Freiburg, Germany