Preferred Language
Articles
/
nBifXJYBVTCNdQwCiYPn
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.  

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Materials And Environmental Science
Study the effect of some chemicals used locally in agricultural processes in Iraq on the DNAof some non-targeted organisms
...Show More Authors

Scopus
Publication Date
Tue Mar 28 2023
Journal Name
International Journal Of Dentistry
The Effect of Different Obturation Techniques in Primary Teeth on the Apical Microleakage using Endoflas: A Comparative In Vitro Study
...Show More Authors

Objectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Jun 26 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 05 2022
Journal Name
International Journal Of Early Childhood Special Education
The effect of single superset exercises on the maximum strength of the limb muscles in bodybuilding for players (Classic Physique).
...Show More Authors

HR Ghanim, GA Abdulhassan, International Journal of Early Childhood Special Education, 2022

View Publication
Publication Date
Fri Aug 25 2023
Journal Name
Enterprenuership Journal For Finance And Bussiness
Argumentative Accounting conservatism and the performance of institutions listed on the Iraq Stock Exchange in light of the Coronavirus pandemic
...Show More Authors

This study aims to test whether the institutions listed on the Iraq Stock Exchange have a significant correlation between the level of conservative accounting practice with the level of market share returns during the Coronavirus pandemic period as one of the policies to confront the economic repercussions of the Coronavirus pandemic. Furthermore, the sample included institutions listed on the Iraq Stock Exchange during the 2019 and 2020 years, i.e., the period before the Coronavirus pandemic and during the Coronavirus pandemic for the purpose of comparison. The market value to book value model was used, and the study found that conservative institutions had achieved the highest level of market share prices compared to non-conservat

... Show More
View Publication
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
The revival of the historic Islamic geometric pattern on the gate of The Al-Sharabeya School in Wasit City using the Grasshopper program
...Show More Authors

Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
The revival of the historic Islamic geometric pattern on the gate of The Al-Sharabeya School in Wasit City using the Grasshopper program
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
The Journal Of Legal And Social Sciences
The Limitations on the Judge’s Authority in Judicial Interpretation – France as a Model
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u

... Show More
View Publication