Preferred Language
Articles
/
lBZirIoBVTCNdQwC8qJ0
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet attacks using CICIDS2017 dataset. The proposed model designed based on two types of filters to the botnet features; Correlation Attribute Eval and Principal Component deployed to reduce the dataset dimensions and to decrease the time complexity of the botnet detection process. The detection enhancement achieved by reducing the features of the dataset from 85 to 9. The training stage of classifiers is developed and compared based on six classifiers called (Random Forest, IBK, JRip, Multilayer Perceptron, Naive Bayes and OneR) evaluated to accomplish an optimized detection model. The performance and results of the proposed framework are validated using well-known metrics such as Accuracy (ACC), Precision (Pr), Recall (Rc) and F-Measure (F1). The consequence is that the combination of Correlation Attribute Eval (filter) with JRip (classifier) together can satisfy significant improvement in the Botnet detection process using CICIDS2017 dataset.</p>
Scopus Crossref
View Publication
Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Nov 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of some mechanical properties of Imprelon® and Duran® thermoplastic Biostar machine sheets in comparison with some types of acrylic resins
...Show More Authors

Background: Imprelon® Biostar foils are new alternative tray material that has become increasingly popular because oftheir several advantages. Also, (Duran®) is another type of Biostar foils which is used in splint therapy. This study assessed some mechanical properties of these two types Biostar sheets in comparison with some types of acrylic resins used for construction of trays and splints. Materials and Methods: A total of 150 specimens were prepared, 30 specimens for each test, 10 for each group material in order to assess some mechanical properties of the Imprelon® Biostar foil (dimension stability, surface roughness and shear bond strength of Imprelon® materialto zinc oxide impression material) and compare them to that of the oth

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 17 2022
Journal Name
Teikyo Medical Journal
Study the Effect of different doses of Rapamycin on the liver development in the Swiss Albino Mice Embryos
...Show More Authors

The current study, which extended from February 2020 to June 2021 at the University of Thi- Qar\ College of Education for Pure Sciences, aimed to follow the changes in external morphological features at different Embryonic Developmental stages in pregnant mice treated with different doses of Rapamycin (Rapa). Use In this study, 32 pregnant mice were divided randomly into four groups, each of which had eight pregnant mice. Each group received different dose of Rapa via intraperitoneally injection at different gestation days until the end of the specified periods, whereas the control group received a DMSO. Mice were administered under the same circumstances and dosages were determined based on body weight, as specified in pharmaceutical const

... Show More
Publication Date
Fri Sep 27 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The effects of thumb sucking habit on the development of malocclusions in preschool age children in Hilla city
...Show More Authors

Background: habit is any purposeless action repeated unconsciously. It is a sign of lack of harmony between the subject and the surrounding environment. Deleterious oral habits such as finger sucking could be one of the etiological factors for altered oro-facial growth development. This study conducted to explore the association between finger sucking habit and malocclusion in deciduous dentition. Materials and method: Totally 40 chronic thumb sucker and 40 controls matching in age and gender were enrolled in the study. A study conducted by verifying different occlusal trait through the intra-oral examination. Thumb sucking habit diagnosed using data gathered from parents. Results: The statistical analysis showed a highly significant dif

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Thu Nov 13 2025
Journal Name
Journal Of Physical Education
The effect of the Perkins-Blyth model on learning some compound skills in soccer for second intermediate students
...Show More Authors

View Publication
Publication Date
Wed Apr 01 2020
Journal Name
Biochemical And Cellular Archives
POSSIBLE ROLE OF HCMV INFECTION ON THE DEVELOPMENT OF HPV POSITIVE CERVICAL CARCINOMA IN A GROUP OF IRAQI WOMEN
...Show More Authors

The cervical cancer considered as the fourth female prevalent disease worldwide, it was once the most extensively recognized female cancer two in many low-income countries. Human Cytomegalovirus (HCMV) exhibits broader tropism and can cause infection in most of the human body organs. Although, human cytomegalovirus HCMV is not yet considered an oncogenic virus, there is increased evidences of HCMV infection implication in malignant diseases of different cancer types. The present study aims to evaluate the effect of CMV infection on the development of HPV16 positive cervical cancinoma. The current retrospective study enrolled a number of paraffinized cervical cancer tissues .included 30 cervical carcinomatous tissues and 10 biopsies from an

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Fri Aug 13 2021
Journal Name
Journal Européen Des Systèmes Automatisés
Proxy-based sliding mode vibration control with an adaptive approximation compensator for euler-bernoulli smart beams
...Show More Authors

Proxy-based sliding mode control PSMC is an improved version of PID control that combines the features of PID and sliding mode control SMC with continuously dynamic behaviour. However, the stability of the control architecture maybe not well addressed. Consequently, this work is focused on modification of the original version of the proxy-based sliding mode control PSMC by adding an adaptive approximation compensator AAC term for vibration control of an Euler-Bernoulli beam. The role of the AAC term is to compensate for unmodelled dynamics and make the stability proof more easily. The stability of the proposed control algorithm is systematically proved using Lyapunov theory. Multi-modal equation of motion is derived using the Galerkin metho

... Show More
Crossref (2)
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control &amp; Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref