Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypted HTTP subset traffic of DARPA 1999 data set, from 55.234% in the PAYL system alone to 99.94% in the proposed system; due to the existence of the neural network self-organizing map (SOM). In addition SOM decreases the ratio of false positive from 44.676% in the PAYL system alone to 5.176% in the proposed system. The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.
The current research aims to identify the level of effective leadership practices dimensions (clear vision and specific goals, good planning and effective influence, and monitoring well as evaluation) among the senior leaders in the Office of the Iraqi Interior Ministry., The researchers adopted the descriptive analytical approach to collect data through the questionnaire as a main tool, developed by relying on international standards after making adjustments to its items consisting of (25) items that included the research variable, the questionnaire was distributed to all the research community (comprehensive inventory) by 120 forms from emplo
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Abstract Sweden is today one of the most active European countries in the regional and international environment despite the adoption of neutrality as a guiding principle in its foreign policy. For more than two centuries, the length of time for Swedish neutrality has made it a global standard, an agreed foreign policy at home and a political culture rooted in institutions and society. Swedish. Although discussions are still underway on Swedish security and foreign policies after the end of the Cold War, especially cooperation with NATO through the Partnership for Peaceprogram, EU accession and its impact on the principle of neutrality in foreign policy. Sweden, however, insists that it still maintains neutrality, but more adequately, in
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show MoreThis study examined the relationship between the reporting lag (the timeliness of corporate financial reporting) and several independent variables: (1) Audit reporting lag,(2)Company Size,(3) Profitability of the company,(4)Company Age,(5) Sector Type.(6)Audit’s Opinion,(7) Market Type,(8) Gearing,(9) Concentration of ownership,(10) Audit Firm Size(11)Profit or Loss Company(12) Companies Listed lag on the PEX. In order to achieve the objectives of the study and testing its hypotheses, the data Obtained through actual data of a financial reports, and based on me
... Show MoreNegotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.
Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.
To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.
A Number of conclusions were
... Show MoreThe research aims to identify decent work and its impact in enhancing job immersion. The questionnaire was adopted as a tool to analyze the sample responses of (81) workers to represent an estimated response rate of (88 per cent) out of the total population of (92) individuals. The research adopted descriptive-analytical approach, and reliability calculation, arithmetic means standard deviations, relative importance, and regression analysis adopted on SPSS v.25. The conclusion shows that there is a medium correlation between decent work and job immersion, and there is a low impact of decent work with its dimensions in job immersion; extract the most important acceptable components for job from the sample point of view about the o
... Show MoreThis research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended
... Show More