Preferred Language
Articles
/
0hinJ5gBVTCNdQwCQrkX
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific threat data recovered from the publicly available data sets CICIDS2017 and IoT-23. Classification of network anomalies and feature extraction are carried out with the help of deep learning models such as CNN and LSTM. This paper’s proposed system complies with IEEE standards like IEEE 802.15.4 for secure IoT transmission and IEEE P2413 for architecture. A testbed is developed in order to use the model and assess its effectiveness in terms of overall accuracy, detection ratio, and time to detect an event. The findings of the study prove that threat intelligence systems built with deep learning provide explicit security to IoT networks when they are designed as per the IEEE guidelines. The proposed model retains a high detection rate, is scalable, and is useful in protecting against new forms of attacks. This research develops an approach to provide standard-compliant cybersecurity solutions to enable trust and reliability in the IoT applications across the industrial sectors. More future research can be devoted to the implementation of this system within the context of the newest advancements in technologies, such as edge computing.

Crossref
View Publication
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Control of Calcium Scale and Corrosion of Medical City Cooling Water System using Sulfuric Acid
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jun 20 2025
Journal Name
Baghdad Science Journal
The Role of Fear and Predator Dependent Refuge on a Stage Structure Prey-Predator System
...Show More Authors

The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Separation Science And Technology
Green synthesis of graphene-coated sand (GCS) using low-grade dates for evaluation and modeling of the pH-dependent permeable barrier for remediation of groundwater contaminated with copper
...Show More Authors

Scopus (23)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Mar 03 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Administrative performance and its relationship with the cognitive style (rigidity - flexibility) for management body members of the sport clubs
...Show More Authors

Publication Date
Tue Mar 08 2022
Journal Name
Multimedia Tools And Applications
Comparison study on the performance of the multi classifiers with hybrid optimal features selection method for medical data diagnosis
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis, characterization and bioactivity study of mixed-lig and complexes with some metal ions for new dithiocarbamate,3-aminophenol
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study Using the Passive Solar Chimney for Evaporative Cooling With PCM and CFM as a Thermal Energy Storage
...Show More Authors

 

      In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3  in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled  in the bottom of TESB of vertical SC. The TESB was

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Comparative Reliability Analysis between Horizontal-Vertical-Diagonal Code and Code with Crosstalk Avoidance and Error Correction for NoC Interconnects
...Show More Authors

Ensuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages.  So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 05 2020
Journal Name
Open Access Macedonian Journal Of Medical Sciences
The use of Cinnamon (Cinnamomum Bark) for Patients with Chronic Prostatitis/Chronic Pelvic Pain Syndrome: A Randomized Controlled Trial
...Show More Authors

BACKGROUND: Chronic prostatitis/chronic pelvic pain syndrome (CP/CPPS) is common, yet no curative treatment identified. Cinnamon is a herbal substance, which has many applications in medicine. AIM: The aim of the study was to study the effect of cinnamon on patients with chronic pelvic pain syndrome. METHODS: Sixty patients with documented CP/CPPS randomized into two groups during 2018 and 2019 in Baghdad. The first group received 60 capsules each contained 1 g of cinnamon. The other group received 60 capsules each contained 1 g of sugar powder (placebo). All the patients instructed to take one capsule twice daily for 1 month. National Institutes of Health-Chronic Prostatitis Symptom Index (NIH-CPSI) was reported for bot

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 12 2023
Journal Name
Egyptian Journal Of Chemistry
Studying the Molecular Interactions for Potash Alum with Distilled Water and Aqueous Solution of Ethylene Glycol at Different Temperatures.
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref