Preferred Language
Articles
/
QkI1xZkBMeyNPGM3n7jF
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Pharmaceutical Sciences And Research
Protective Effects of Quercetin on Lipopolysaccharide -Induced Inflammation and Lipid Peroxidation in BALB/c Male Mice
...Show More Authors

In the resent years, there is a robust scientific interest in discovery of new anti-septic and anti-oxidant naturally products with no/or limited side effects. The current study aimed to investigate the protective role of the quercetin on inflammations induced by lipopolysaccharide (LPS) in male mice A number of criteria included i.e. liver and spleen index and IL-6 and IL1-β cytokines level in spleen homogenate were considered. Sixty male mice (8-9 week age) was divided into six groups and treated for 5 days as the following: the first group represented control, the second and third group were injected with 5, 10 mg/kg b.w doses of quercetin respectively. While the fourth and fifth groups were co-treatment with (5, 10 mg/kg b.w.) intraper

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Protective effect of red cabbage and garlic extracts against Fumonisin B1 induced hepatotoxicity in male mice
...Show More Authors
Abstract<p>Red cabbage and garlic extracts have protective effect against liver damage induced by fumonisin B1 (FB1) in male mice was studied. Randomly sixty mice have been divided in to six groups. Group one are the healthy mice, Group two are mice received oral dose of only FB-1 (100 μg/kg.b.w) once on daily for 1 month, Group three: mice received with red cabbage extract (500 mg/kg.bw) plus FB1, Group four: mice receiving just red cabbage extracts, Group five: mice receiving garlic extract (500mg/kg.bw) plus FB1, group 6: mice received only garlic extract. After finished the experiment, samples of blood were used for biochemical examination. The results indicated that group (2) mice treated </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Interactive Role of Organizational Elegance between Organizational Anomaly and Planned Human Resource Behavior A survey of a sample of workers in the Ministry of Construction and Housing
...Show More Authors

This study attempts to test the interactive role played by organizational agility in enhancing the effect of organizational anomie on the behavior of planned human resources. The study of organizational anomie has increased because of the moral and legal pressures facing the organization by the external environment within its framework. To adapt to all external developments faced by these organizations, the behavior of human resources planned reflects the ability of individuals to control their behavior in different situations and situations that face them in the work.

The problem of the research indicates that there is a clear lack of understanding of what is meant by the variables studied in the sample

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (13)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Nov 17 2022
Journal Name
مجلة الدراسات الدولية
Iraq's strategic performance in achieving sustainable development after 2005: challenges and coping strategies
...Show More Authors

The research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.

View Publication
Publication Date
Mon Dec 24 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF THE MARINE FISHES IN IRAQ
...Show More Authors

    A survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.

 

     The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.

View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Thu Mar 10 2016
Journal Name
International Journal Of Current Microbiology And Applied Sciences
Survey of Coleopteran Insects on Alfalfa Plant
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref