Preferred Language
Articles
/
nBifXJYBVTCNdQwCiYPn
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.  

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Impact beyond the knowledge when students of the Faculty of education in teaching methods
...Show More Authors

Research aims to know the impact beyond the defined in the collection. The research community is the second school students at Baghdad University and a research sample (63) students, the number of experimental group (27) students and a control group (30) students.  The researcher was rewarded in variable lifetime for students and educational attainment and educational level of the parents and the educational level of mothers. The researcher has developed a test took the number of paragraphs (20).  A test was true after it has been submitted to the Group of arbitrators. The test was consistent with test method used and the reliability coefficient (0, 88). Either the statistical methods used by the researcher are: Pearson correla

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of empowerment strategies on the characteristics of work enrichment An exploratory research to the views of a sample of the leaders of the Ministry of Oil in Iraq
...Show More Authors

The study aimed to investigate the relationship between empowerment strategies and their impact on the success of enrichment work, it included the dimensions of empowerment strategies (power, knowledge, information, rewards), The dimensions of Job enrichment are (Skill variety, Task identity, Task significance, Autonomy, Feedback). The study was conducted at the headquarters of the Iraqi Oil Ministry in Baghdad and was based on a sample of the leadership of the ministry of managers consisting of 215 people. The data were collected using the questionnaire method based on scientific standards adopted in previous st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
((The impact of strategic Orientation in the performance of banks private sector Iraqi / compared to the entrance.))
...Show More Authors

             bjective researcher through this research to Put a theoretical framework to strategic orientation the center on the market in the business and the diagnosis and interpretation of the nature of the link between relationships and influencing strategic orientation dimensions Almtmthelh organizations (Entrepreneurial Orientation, market Orientation, Interaction Orientation) and  the performance of the Iraqi Private Banks The research community and the  level of dimensional and through the use of scale (Balanced Scorecard) Bmnzawradtha the four, the test of this research in the Iraqi banking sector (Gulf Commercial Bank

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 27 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The Impact of Chronic Periodontitis on Mother-Infant Bonding Status in Relation to Salivary Tumor Necrosis Factor Alpha and Interleukin-6
...Show More Authors

Background: Chronic periodontitis is a bacterial infection that result in bone destruction associated with the increasing level of salivary tumor necrosis alpha and interleukin6 that affect Mother-infant bonding status. The aim of the present study was to assess the relationship between the Mother-infant bonding status in mothers with chronic periodontitis in relation to Salivary Tumor necrosis factor alpha and Salivary Interleukin6. Materials and Methods: The selected sample consisted of mothers with chronic periodontitis compared with mothers with healthy periodontium in postpartum period, their age ranged between 30-40 years. Both groups were subjected to postpartum Bonding Questionnaire (PBQ). Periodontal health status was assessed f

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 04 2022
Journal Name
Cureus
The Impact of Angiotensin Converting Enzyme-2 (ACE-2) on Bone Remodeling Marker Osteoprotegerin (OPG) in Post-COVID-19 Iraqi Patients
...Show More Authors

View Publication Preview PDF
Crossref (6)
Clarivate Crossref
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic tax planning and its impact on reducing tax evasion
...Show More Authors

Taxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,

... Show More
View Publication Preview PDF
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More