Researcher Image
سراب مجيد حميد محمود - Sarab M. Hammed
PhD - professor
College of Science , Department of Computer
[email protected]
Summary

Sarab M. Hameed received her BSc degree in Computer Science from the University of Baghdad in 1993, followed by a Master's degree in Computer Science from the University of Baghdad in 1999, and a PhD from the University of Technology in 2005. Currently, she is a professor at the Department of Computer Science, University of Baghdad. She has contributed as author and co-author of more than 50 publications in international journals and conference proceedings. Her research interests include computer and network security, AI for cybersecurity, and cryptography.

Qualifications

PhD (2005), University of Technology.

MSc (1999), University of Baghdad.

BSc (1992), University of Baghdad.

Research Interests

computer and network security

AI for Cybersecurity

Cryptography

Information Hiding

Teaching

Discrete Structures, Undergraduate study (First Class)

Computation Theory, Undergraduate study (Second Class)

Data Structures, Undergraduate study (Second Class)

Cryptography, Undergraduate study (Third Class)

Programming in Java, Undergraduate study (Third Class)

Computer Security, Undergraduate study (fourth class)

Object Oriented Programming, Postgraduate study (Higher Diploma)

Networks Security, Postgraduate study (Higher Diploma)

Advanced Cryptography, Postgraduate study (Higher Diploma)

Object Oriented Programming, Postgraduate study (Master)

Advanced Topics in Networks Security, Postgraduate study (Master)

Publication Date
Thu Oct 18 2018
Journal Name
Proceedings Of The Future Technologies Conference (ftc) 2018
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 28 2018
User Authentication via Mouse Dynamics

Nowadays, the development of internet communication and the significant increase of using computer lead in turn to increasing unauthorized access. The behavioral biometric namely mouse dynamics is one means of achieving biometric authentication to safeguard against unauthorized access. In this paper, user authentication models via mouse dynamics to distinguish users into genuine and imposter are proposed.  The performance of the proposed models is evaluated using a public dataset consists of 48 users as an evaluation data, where the Accuracy (ACC), False Reject Rate (FRR), and False Accept Rate (FAR) as an evaluation metrics. The results of the proposed models outperform related model considered in the literature.

View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
2013 Fourth International Conference On E-learning "best Practices In Management, Design And Development Of E-courses: Standards Of Excellence And Creativity"
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu May 01 2008
Journal Name
2008 International Conference On Computer And Communication Engineering
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 29 2018
A new Color image Encryption based on multi Chaotic Maps

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Image Encryption Using DNA Encoding and RC4 Algorithm

Nowadays, the rapid development of multi-media technology and digital images transmission by the Internet leads the digital images to be exposed to several attacks in the transmission process. Therefore, protection of digital images become increasingly important.

 To this end, an image encryption method that adopts Rivest Cipher (RC4) and Deoxyribonucleic Acid (DNA) encoding to increase the secrecy and randomness of the image without affecting its quality is proposed. The Means Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Coefficient Correlation (CC) and histogram analysis are used as an evaluation metrics to evaluate the performance of the proposed method. The results indicate that the proposed method is secure ag

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
2018 Ieee/acs 15th International Conference On Computer Systems And Applications (aiccsa)
Scopus (9)
Crossref (7)
Scopus Crossref
View Publication
Publication Date
Wed Aug 30 2023
Review of Smishing Detection Via Machine Learning

     Smishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
A Decision Tree-Aware Genetic Algorithm for Botnet Detection

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Review of Challenges and Solutions for Genomic Data Privacy-Preserving

     The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Credit Card Fraud Detection Challenges and Solutions: A Review

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concep

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 29 2024
Preserving Genotype Privacy Using AES and Partially Homomorphic Encryption

     Increasingly, the availability of personal genomic data in cloud servers hosted by hospitals and research centers has incentivized researchers to turn to research that deals with analyzing genomic data. This is due to its importance in detecting diseases caused by genetic mutations, detecting genes that carry genetic diseases, and attempting to treat them in future generations.  Secure query execution on encrypted data is considered an active research area in which encryption is used to ensure the confidentiality of genomic data while restricting the ability to process such data without first decrypting it. To provide a secure framework and future insight into the potential contributions of homomorphic encryption to the field o

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
A Modified Key Scheduling Algorithm for RC4

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Fri Dec 30 2022
Automatic Number Extraction from Fixed Imaging Distance

     Developed countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.

This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then

... Show More
Scopus Crossref
View Publication
Publication Date
Sun Oct 30 2022
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Chaos-based Color Image Steganography Method Using 3 D Cat Map

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Scopus (6)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue Sep 29 2020
A New Beta Chaotic Map with DNA Encoding for Color Image Encryption

Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA i

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
No Events Found