Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (63)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 01 2025
Journal Name
Microbes And Infectious Diseases
Molecular detection and the frequency of a pore-forming toxin in Enterococcus faecalis isolated from urinary tract infections
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Study the Ability of Pseudomonas Aeruginosa Isolated from Different Clinical Cases to Biofilm Formation and Detection of Algd Gene.
...Show More Authors

98 samples were collected from various clinical sources included (Burns, wounds, urines, sputums, blood) From the city of Baghdad, After performing the biochemical and microscopic examination, 52 isolates were obtained for Pseudomonas aeruginosa, 17 (32.7%) isolates from burn infection, 12 (23%) isolates from Wound infection 11 (21.2%) isolates from urine infection, 7 (13.5%) isolates of sputum and 5 (9.6%) isolates from blood. Bacteria susceptibility to form biofilm has been detectedby microtiter plate method, The results showed that 80% of the bacterial isolates were produced the biofilm with different proportions, alg D gene (alginate production) has been detected by polymerase chain reaction (PCR) Which plays an essential role in the fo

... Show More
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The servant leadership and its impact in organizational trust An analytical study in oil products distribution company / Baghdad
...Show More Authors

Abstract

The research aims at the relationship between Servant leadership dimensions test as an independent variable and an organizational trust as a variable dependent. Thus it was necessary to answer the following question: Is there a correlation relationship and impact between Servant leadership dimensions and organizational trust? To investigate the contents of the answer, the researcher selected a group of employees in Oil Products Distribution Company / Baghdad. The researcher adopted the analytical descriptive approach in completing his research which dealt with a random sample of (190) individuals representing the research society out of the total number of (376) person from the middle and high Leaders. Depending

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of College Of Education
An Investigative Study on the Electron Energy Distribution Function and Electron Transport Coefficients in SF6 -- Ne Gas Mixtures
...Show More Authors

Preview PDF