Preferred Language
Articles
/
alkej-137
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system - A review article
...Show More Authors

Publication Date
Sun Dec 02 2018
Journal Name
Arab Science Heritage Journal
التحالف التحالف الصليبي المغولي ضد العالم الإسلامي
...Show More Authors

The Crusade-Mongol alliance against the Islamic World represents one of the most serious issues ever experienced by the Islamic World and the challenges ever faced by the Muslims during the Middle Ages. Having failed to win victory over Muslims when the Crusaders were about to withdraw and declare defeat, there appeared a force

View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
العنف ضد المرأةدراسة ميدانية في مدينة بغداد
...Show More Authors

      لطالما تحاشينا الخوض في الحديث عن المرأة , وكل ما يتعلق بها من موضوعات , خصوصا في سياق ما يطرح حولها من أمور كأنها لاتخص غيرها مثل : " الحرية "   "والمساواة "  " والحقوق " ... وغيرها من المواضيع التي تعج بها الكتب والشاشات والبرامج والمؤتمرات والندوات , التي غالبا ما ترفع فيها الشعارات المؤدلجة وتوضع اخرى , في أتون محموم , إن دل على شيئ فانه يدل بالدرجة الاولى عن مدى الفوضى الفكرية التي نعي

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internet of Things (IOT) Technology and its Role in Reducing air ticket Costs
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of reducing the cost of a flight ticket by using information technology and the Internet, in the process of purchasing tickets for electronic flights, and to shift from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchase process, as well as saving the cost Time, effort and money for the customer, and the researcher used the deductive approach in linking the variables (Internet of Things technology and reducing the costs of air tickets) wi

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Computational And Theoretical Nanoscience
Feasibility of Internet of Things Application for Real-Time Healthcare for Malaysian Pilgrims
...Show More Authors

Internet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT

... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives

... Show More
View Publication Preview PDF
Crossref