The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.
The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreThe study aimed to build a suggested conception for employing gamification in teaching the general education curricula. Using the analytical method of the previous analytical studies in Teaching, which agreed with the determinants of the analysis of 20 studies from 2014 to 2019, they come on order: points, badges, leaderboards, and then levels. The four most commonly used theories are the theory of self-determination, flow theory, the theory of planned behavior and social theory. In addition, the researcher identified the most commonly used models in gamification, respectively: the ARCS model and the user-based design model. Based on the results of the analysis and using the descriptive approach, the researcher presented a practical perc
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Allah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m
This research deals with the most famous existing definitions of public relations, in an attempt to achieve a definition that will be added to the other existing and widespread definitions, especially that big developments have taken place in the concept of public relations and their idiomatic use.
In addition, many definitions of public relations have been restricted to some limited descriptions, therefore many of the descriptions given to the public relations are basically definitions as well as characteristics of the public relations.
This research aims at setting and formulating the definitions of public relations, it also deals with its credibility in achieving its significance in order to reach a new definition that
... Show MoreThis research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe
Lifestyle Medicine is the application of evidence-based lifestyle approaches for the prevention, treatment, and even the reversal of lifestyle-related chronic diseases such as diabetes, hypertension, heart disease, obesity, polycystic ovarian diseases, dementia, arthritis, and cancers
