Preferred Language
Articles
/
0hinJ5gBVTCNdQwCQrkX
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.

Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (41)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
Assessment of Serum Metalloendopeptidase level in Patients with Double Diabetes
...Show More Authors

Background: Double diabetes is the term used to describe situations in which a patient exhibits characteristics that are a combination of type 1 and type 2 Diabetes Mellitus. Metalloendopeptidase or Neprilysin is membrane-bound metallopeptidase. It has a wide range of physiological function and a variety of substrates. It has a significant impact on the proteolytic functions of the kidney, cardiovascular health, immunological response, cell proliferation, and fetal development. It also has a preventative effect on the onset of type 2 diabetes, obesity, and cancer.

Objective: The study aims to assess the level of MEP in patients wi

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sat Nov 29 2025
Journal Name
Iraqi Journal Of Science
EXTRACELLULAR SUPEROXIDE DISMUTASE CHANGES IN PATIENTS WITH DIFFERENT BRAIN TUMORS
...Show More Authors

The Specific activity of extracellular superoxide dismutase (EC-SOD) was measured in healthy persons and in patients with benign and malignant brain tumors. The results show decrease of the EC-SOD specific activity in sera of patients with benign and malignant brain tumors in comparison to that of control group.This study concentrated on studying the changes that occur in sera EC-SOD activity of patients with benign and malignant brain tumors, in comparison to that of normal individuals. The result also revealed that this isoenzyme is present in many different molecular weights forms (as judged by polyacrylamide gel electrophoresis), some of these with no enzymatic activity. Conversion among these forms occurs in the malignant sera

View Publication Preview PDF
Publication Date
Fri Oct 23 2020
Journal Name
Medico-legal Update
Levels of Some Cytokines in Iraqi Patients with Multiple Myeloma
...Show More Authors

View Publication
Crossref
Publication Date
Sat Nov 27 2021
Journal Name
International Conference On Fibre-reinforced Polymer (frp) Composites In Civil Engineering
Hybrid Anchors in Reinforced Concrete Slabs Strengthened with FRP Sheets
...Show More Authors

Reinforced concrete (RC) slabs strengthened with carbon fibre reinforced polymer (CFRP) and subjected to flexural actions may experience many types of failure, including FRP debonding, FRP rupture and concrete crushing. Of these different types of failure modes, FRP debonding stands out as the most predominant type of failure because of its dependence on the relatively weak bond interface between the soffit of the RC member and the FRP sheet attached to it. Many anchorage systems have been developed to enhance the performance of strengthened systems, one of which is the hybrid anchor, which combines the effects of patch anchors and spike anchors. Hybrid anchors have shown significant enhancement when used with RC members subjected to shear

... Show More
View Publication
Crossref
Publication Date
Sun Dec 31 2000
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Heat Transfer in Bubble Column Contactors with immersed Coiled Heater
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Nov 14 2017
Journal Name
Indian Journal Of Clinical Biochemistry
Visfatin, PON-1 Levels in Iraqi Hyperthyroidism Patient’s with Dyslipidemia
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 30 2025
Journal Name
Methodsx
New Modifications of ADM with Applications in Kind of PDEs
...Show More Authors

This paper presents seven modified Adomian Decomposition Method (ADM) techniques for efficiently solving initial value problems, especially those involving non-homogeneous and nonlinear differential equations. While the classical ADM is effective for linear homogeneous cases, it has difficulties solving more complex problems. The proposed modifications—from MADM1 to MLADM—include Maclaurin and Taylor expansions, Laplace transforms, and single-step iterations.• These modifications enhance convergence, reduce complexity, and improve accuracy.• Each method offers specific advantages, such as accelerating convergence (MADM2, RADM4), simplifying computation (TSADM5), and achieving higher accuracy (MLADM).• Numerical examples confirm th

... Show More
View Publication Preview PDF
Scopus Crossref