Preferred Language
Articles
/
SRepUJEBVTCNdQwC6pT_
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
A Comparative Study for Estimate Fractional Parameter of ARFIMA Model
...Show More Authors

      Long memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (34)
Crossref (21)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
A THEORETICAL VISION OF THE METHODOLOGY OF MATCHING AND CONGRUENCE
...Show More Authors

Perhaps the issue of media and the press, especially one of the most common topics that people deliberate and deal with permanently and continuously. An issue of such significance has pushed researchers to put the following question, “Is it possible to live without media?”, “Can people ignore the newspaper, radio, TV, or the other communication means?”

The answer is very simple. It is difficult for civilized society to overtake information, or dispense with circulation, at the individual or collective level. Yet, the question of how to make the media and how it determines its content still requires extensive media experience; and knowledge of the social structure and its relations; and ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
Comparative biosimilar quality studies between a rituximab product and MabThera
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Anonymous Identity of Forced Migrants: A Post-Colonial Study
...Show More Authors

Colonialism invades the Third World countries, physically and psychologically. This article exposes but sample of the physical and psychological consequences of colonialism. The Beekeeper of Aleppo (2019) by the British novelist, Christy Lefteri is a typical novel to diagnose the harsh circumstances of individuals within and after the disaster. Since it depicts characters from Asian countries, it would be a best representative for all Asian people who suffer colonialism. Migration toward anonymity is the mere option for the colonized people. Aftermath, they experience displacement, trauma, and the loss of identity.

View Publication
Crossref
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Simulation of a Self-Balancing Platform on the Mobile Car
...Show More Authors

        In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-derivative (PID) co

... Show More
Preview PDF
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La femme fugitive dans ‘’A une passante’’ de Charles Baudelaire
...Show More Authors

The main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady.  Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.

 

This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk

... Show More
View Publication Preview PDF