Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Quranic discourse methodology in light of the Almighty saying (Say to people well): Quranic discourse
...Show More Authors

 

There are no words in the universe that are collected, communicated, raised, and greater than the words of God, Lord of the worlds, and there is no guidance except with Him, nor guidance except with His guidance, and no knowledge except with Him, and how is he guided by the lost without guidance from God Almighty !?

In this research, I tried to address what collects hearts, composes souls, and spreads love among members of society as part of the social twinning and good coexistence between people. Harmony, love, and the roots of fragmentation, fighting and feuding.

This verse is blessed and I chose {Taking  the Charter of the  of Israel do

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Brazilian Dental Journal
In Vitro Homeostasis of Rat Oral Epithelial Cell Cultures Following Withdrawal of Periodontal Pathogens
...Show More Authors

Abstract Inflammation of periodontal tissues is the consequence of interaction between periodontal pathogens and immune system. This is associated with increased expression of inflammatory cytokines, which may exert destructive effect to the periodontal tissues when released over long period. The aim of this study was to chronologically track the homeostasis of oral keratinocytes following removal of periodontal pathogens. This was done by investigating expression of selected inflammatory markers and integrity of epithelial monolayers in vitro. Rat oral keratinocytes were stimulated with heat-killed Fusobacterium nucleatum and Porphyromonas gingivalis over 7-days then bacteria were washed away and epithelial cells re-cultured for 3-

... Show More
View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
The Effect of Anesthesia on Thyroid Hormones and Cortisol Levels Following Major Urological Surgery
...Show More Authors

This study was designed to evaluate the effect of anesthesia on thyroid hormones (T3, T4, rT3), thyrotropin(TSH), and cortisol levels in patients undergoing major urological surgery. The study included fifty patients scheduled for elective major urological surgery where 70% of the patients underwent general anesthesia, while30% underwent regional anesthesia. All patients were in stable control general conditions. The study showed that the thyroid hormones, thyrotropin and cortisol levels were affected with general anesthesia more than regional. The levels of these hormones responded to anesthetics and surgical stresses. This response was thought to be mainly mediated by afferent neurogenic impulses from the area of injury. Therefore, ab

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
A study of the safety and security conditions followed in the X-ray clinics in the Al-Amiriya-Baghdad
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Designing an electronic program for the Assessment of project management in accordance with the methodology (PMBOK)
...Show More Authors

The research aims to design an electronic program that allows users to assess the possibility of different practices for projects management professional according to the PMBOK methodology)) and using the requirements Data mentioned in the "knowledge and experience in project management Evaluation guide" issued by the professional Institute of project management According to the results of this program will be electronic The possible classification of project management in terms of both (proficiency_ perform tasks) as less than the desired level or within or above average in terms of best practices, and finally a number of recommendations to overcome the possible shortcomings. The most important is the need to enrich the service

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref