Preferred Language
Articles
/
OhdOPo8BVTCNdQwCHmXk
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynamically and periodically by evaluating the set of attackers of the current node with its neighbors. We use dataset named CICDDoS2019 that contains on binary classes benign and DDoS. Performance has evaluated by applying data mining algorithms as well as applying the best features to discover potential attack classes.</span>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Room Temperature Photodetector Based on ANISOTYPE (n-p) Ge-Si Heterojunction
...Show More Authors

In this work we present a detailed study on anisotype nGe-pSi heterojunction (HJ) used as photodetector in the wavelength range (500-1100 nm). I-V characteristics in the dark and under illumination, C-V characteristics, minority carriers lifetime (MCLT), spectral responsivity, field of view, and linearity were investigated at 300K. The results showed that the detector has maximum spectral responsivity at λ=950 nm. The photo-induced open circuit voltage decay results revealed that the MCLT of HJ was around 14.4 μs

View Publication Preview PDF
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Australian Journal Of Basic And Applied Sciences
Programming Exam Questions Classification Based On Bloom’s Taxonomy Using Grammatical Rule
...Show More Authors

Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Upscale Gray Image using Mixing Transform Generation based on Tensor Product
...Show More Authors

The increased size of grayscale images or upscale plays a central role in various fields such as medicine, satellite imagery, and photography. This paper presents a technique for improving upscaling gray images using a new mixing wavelet generation by tensor product. The proposed technique employs a multi-resolution analysis provided by a new mixing wavelet transform algorithm to decompose the input image into different frequency components. After processing, the low-resolution input image is effectively transformed into a higher-resolution representation by adding a zeroes matrix. Discrete wavelets transform (Daubechies wavelet Haar) as a 2D matrix is used but is mixed using tensor product with another wavelet matrix’s size. MATLAB R2021

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Sat Apr 01 2023
Journal Name
The Ocular Surface
Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors

View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Oct 03 2009
Journal Name
Proceeding Of 3rd Scientific Conference Of The College Of Science
Research Address: New Multispectral Image Classification Methods Based on Scatterplot Technique
...Show More Authors