The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.
Let R be a commutative ring with identity and E be a unitary left R – module .We introduce and study the concept Weak Pseudo – 2 – Absorbing submodules as generalization of weakle – 2 – Absorbing submodules , where a proper submodule A of an R – module E is called Weak Pseudo – 2 – Absorbing if 0 ≠rsx A for r, s R , x E , implies that rx A + soc ( E ) or sx A + soc (E) or rs [ A + soc ( E ) E ]. Many basic properties, char
... Show Moreتهدف هذه الدراسة للتعرف على السياسات اإلاسرائيلية المتبعة على الارض والمتمثلة في االاستيطان
الاستعماري والطرق التفافية، ومصادرة الاراضي وجدار الضم والتوسع العنصري، بالاضافة إلى التصنيف
الاداري للمناطق في الضفة الغربية حسب ما جاء في اتفاقية أوسلو، والتي من شأنها التأثير على تلك
المناطق، وال سيما قطاع اإلسكان الذي يعد من أهم القطاعات التي تتر كب وبالتحديد في منطقة الدراسة،
وسوف تحاول هذه الدراسة تس
In this study, different methods were used for estimating location parameter and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment estimation (ME),and approximation estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile as estimation for distribution f
... Show MoreВ статье рассматривается вопрос о связи флективных изменений с мыслительными процессами на материале русского и арабского языков, анализируются семантические, фонетические, морфологические и синтаксические основы фонограмматической когниции. Цель статьи выявление прямой связи между количественным звуковым изменением согласного состава слова и мыслительными процессами, с помощью которых человеческ
... Show MoreDie vorliegende Forschung handelt es um die Satzfelder, besonders das Mittelfeld des Satzes im deutschen und Arabischen. Diese Forschung wurde mit der Satzdefinition, Satzglieder begonnen, damit wir diese klar werden und dann werden die Felder des Satzes gut gekannt. Der erste Abschnitt schlieβt auch den Mittelfeld des Satzes und, wie man das Feld erkennen und bestimmen kann. Die Forschung untersucht auch. Ob es in der arabischen Sprache den selben Struktur wie im Deutschen gibt, z.B Bildung des Satzes sowie Satzfelder bezügllich das Mittelfeld.
Der zweite Abschnitt handelt sich um den arabischen Teil und behandelt die Wortarten im Arabischen sowie den Satz als auch Satzarten (Nominal- Verbal- Halbsatz).
Danach befinden
... Show MoreAbstract
Objective of this research focused on testing the impact of internal corporate governance instruments in the management of working capital and the reflection of each of them on the Firm performance. For this purpose, four main hypotheses was formulated, the first, pointed out its results to a significant effect for each of corporate major shareholders ownership and Board of Directors size on the net working capital and their association with a positive relation. The second, explained a significant effect of net working capital on the economic value added, and their link inverse relationship, while the third, explored a significant effect for each of the corporate major shareholders ownershi
... Show MoreIn this paper, estimation of system reliability of the multi-components in stress-strength model R(s,k) is considered, when the stress and strength are independent random variables and follows the Exponentiated Weibull Distribution (EWD) with known first shape parameter θ and, the second shape parameter α is unknown using different estimation methods. Comparisons among the proposed estimators through Monte Carlo simulation technique were made depend on mean squared error (MSE) criteria