Preferred Language
Articles
/
nBifXJYBVTCNdQwCiYPn
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.  

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
The role and importance of amino acids within plants: A review
...Show More Authors

Scopus (56)
Scopus
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
The importance of social acceptability of the universal design: عبد الكريم علي حسين
...Show More Authors

The industrial development and raise the level of income that has emerged clearly in the middle of the last century in many rich and medium rich countries has great influence on the risen of the health care level. Which led to a significant increase in the reconstruction of people over 65 years and this in turn has produced markets for products and services through modifications to the existing products to meet their physical needs. The importance of research also has the universal design of a comprehensive actually so that it covers as much as possible from human physical & cultural activities. The importance of research locally is to concentrate on this subject who has not been taken into consideration so far to accommodate the eld

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Appropriateness Of The Iraqi Environment For Establishment Of Hedge Funds In Iraq
...Show More Authors

المستخلص

يهدف البحث إلى وضع إطار معرفي ومفاهيمي شامل لموضوع البحث, واغناء القارئ والمستفيد بالمعلومات الوافية عنه وتقليص الفجوات المعرفية للمهتمين به وقياس مدى ما هو متوفر وغير متوفر من المتطلبات الأساسية والضرورية لإنشاء صناديق التحوط في البيئة العراقية, وتمثلت صناديق التحوط بالمتغير الرئيس للبحث اما المتغيرات الفرعية فشملت (المتطلبات المالية, المتطلبات البشرية, البيئة التشريعية, الب

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of voluntary corporate disclosure on tax planning: The impact of voluntary corporate disclosure on tax planning
...Show More Authors

The attention of civil society organizations, governments and international non-governmental organizations in recent years has focused on the acute practices adopted by companies with the aim of reducing the tax burden, and the results of these practices have a negative impact on the tax revenues that the state uses to finance public needsThe aim of the research is to measure the impact of the voluntary disclosure of companies on tax planning for the period from 2011 to 2015 and the research community is in the General Tax Authority. The research sample is 6 companies within the private sector in the financial, banking, insurance and industrial fields. The research was based on a special model to measure the optional disclosure,

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (118)
Crossref (111)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Break in the bond And its impact on the difference of scholars
...Show More Authors

Break in the bond and its impact on the difference of scholars

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Woman Under Virtual Reality Environment
...Show More Authors

Virtual reality technology is the science of the embodiment of things and move spontaneously among non-real from one place to another with the full sense of the form, touch, sound, enables the user tried out and deal with it, like a real natural world and open up new worlds for human ambitious to let him overlooks the supposed world. Internet has become part of our daily lives, especially with the presence of mobile devices; that revolutionized the world of social networking. Access to information and build relationships change in the era of digital technology. The woman is not in isolation from this era; she found to herself a wide area for the production of ideas.
When we talk about woman in the modern means of communication, this a

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Saudi Pharmaceutical Journal
Pharmacist role to enhance the prescribing of hospital discharge medications for patients after heart attack
...Show More Authors

View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref