The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe Corrosion protection effectiveness of Alimina(Al2O3,50nm)and Zinc oxide (ZnO,30nm) nanoparticales were studied on carbon steel and 316 stainless steel alloys in saline water (3.5%NaCl)at four temperatures: (20,30,40,50 OC)using three electrodes potentiostat. An average corrosion protection efficiencies of 65 %and 80% was achieved using Al2O3 NP's on carbon steel and stainless steel samples respectively, and it seems that no effect of rising temperature on the performances of the coated layers. While ZnO NP'S showed protection efficiency around 65% for the two alloys and little effected by temperature rising on the performanes of the coated layers. The morphology of the coated spesiemses was examined by Atomic force microscope.
Density functional theory (DFT) with B3LYP level and 6-311G[Formula: see text] basis sets for light atoms like N and O and SDD basis sets for heavy atoms like Sn is used to examine the interaction of tin dioxide nanocrystals with nitrogen dioxide as a function of temperature from 273[Formula: see text]K to 373[Formula: see text]K through a Gaussian 09W software program. Gibbs free energy, enthalpy, and entropy of activation and reaction are calculated. The situation of transition of SnO2 clusters toward nitrogen dioxide is investigated. According to the findings, the activation energy of SnO2 clusters with nitrogen dioxide increases as the temperature rises (in negative value). Gauss view 0
... Show MoreAbstract:
Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.