Preferred Language
Articles
/
SRepUJEBVTCNdQwC6pT_
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
A New Efficient Hybrid Approach for Machine Learning-Based Firefly Optimization
...Show More Authors

     Optimization is the task of minimizing or maximizing an objective function f(x) parameterized by x. A series of effective numerical optimization methods have become popular for improving the performance and efficiency of other methods characterized by high-quality solutions and high convergence speed. In recent years, there are a lot of interest in hybrid metaheuristics, where more than one method is ideally combined into one new method that has the ability to solve many problems rapidly and efficiently. The basic concept of the proposed method is based on the addition of the acceleration part of the Gravity Search Algorithm (GSA) model in the Firefly Algorithm (FA) model and creating new individuals. Some stan

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jul 24 2022
Journal Name
Healthcare
Incidence of Gingival Black Triangles following Treatment with Fixed Orthodontic Appliance: A Systematic Review
...Show More Authors

This systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage
...Show More Authors

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 04 2024
Journal Name
Chemchemtech
ANALYTICAL TECHNIQUES IN PHARMACEUTICAL POLLUTION OF THE WORLD’S RIVERS; A REVIEW
...Show More Authors

Recent reports of new pollution issues brought on by the presence of medications in the aquatic environment have sparked a great deal of interest in studies aiming at analyzing and mitigating the associated environmental risks, as well as the extent of this contamination. The main sources of pharmaceutical contaminants in natural lakes and rivers include clinic sewage, pharmaceutical production wastewater, and sewage from residences that have been contaminated by drug users' excretions. In evaluating the health of rivers, pharmaceutical pollutants have been identified as one of the emerging pollutants. The previous studies showed that the contaminants in pharmaceuticals that are widely used are non-steroidal anti-inflammatory drugs, ant

... Show More
Scopus (3)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref