Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet detection for information security. For effectual recognition of botnets, the proposed model involves data pre-processing at the initial stage. Besides, the model is utilized for the identification and classification of botnets that exist in the network. In order to optimally adjust the SVM parameters, the DFA is utilized and consequently resulting in enhanced outcomes. The presented model has the ability in accomplishing improved botnet detection performance. A wide-ranging experimental analysis is performed and the results are inspected under several aspects. The experimental results indicated the efficiency of our model over existing methods.
The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreThe current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show MoreThe current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev
... Show MoreThe work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show MoreActive Learning And Creative Thinking
Objective: To generate a model that conceptualizes the phenomenon of health promotion and its related factors.
Methodology: A grounded theory methodology is used as qualitative method to explore the health promotion as
phenomenon of interest and its other related factors from the perspectives of specialists in this field. The study is
carried out from January 2002 through September 2004. A sample of (20) specialists in health sciences are
selected and interviewed as experts in the area of health promotion. The investigators conducted intensive and
structured interviews with the specialists to collect the data. These interviews were transcribed verbatim,
analyzed and interpreted.
Results: Findings of the study indicat