
-
PhD (E-Governanace and Cyber Security Management System for Public Sector).
-
Master (Information System Management and Security for Public Sector).
-
BSC.
-
عدد من كتب الشكر والتقدير من دوائر ومؤسسات الدولة العراقية
-
عدد كبير من كتب الشكر والتقدير الجامعية (عمداء كليات ورؤساء جامعات)
- CyberSecurity and Networking.
- E-Governance of IT Strategic Planning and Digital Transformation in Public Sector.
- Business-IT Alignment.
- Management Information System (MIS).
- Adoption of IS by organizations and Failure Analysis.
- Information Technology Service Delivery and Benefits Realization.
- Enterprise Architecture (EA) and IT Control Framework and practices.
- E- Governance.
- Cyber Security.
- Information Security & Cryptography.
- Computer Networking & Network Protocol.
- Network Security
- Management Information System.
- Programming Concept (C++ / Python).
- System Concept and Thinking.
- Business Process Management & Workflow Automation.
- Project and Chanage Management (PMP).
- Computer Organization.
Undergraduate
- 2023-2024, Enhancing Cyber Security of Networking using Firewall.
- 2021-2022, Design Security of Hospital Network by using Packet Tracer.
- 2021-2022, Building Weather Station using IoT in Greenhouses.
- 2020-2021, IoT Based Smart Home Automation System using Node MCU.
- 2020-2021, Implementing IP phone using VOIP (Voice over IP).
- 2020-2021, Automated Vehicle Detection System Using IOT.
- 2019-2020, DataBase Management System for graduation project using MySQL and Java.
- 2019-2020, Free Space Optics.
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreBackground: The rapid evolution of Artificial Intelligence (AI) has significantly influenced Education, demonstrating substantial potential to transform traditional teaching and learning methods. AI reshapes teacher-student interactions and the relationship with knowledge. Objective: To analyze the potential benefits, ethical challenges, and limitations of AI in Education based on recent scientific literature, emphasizing the balance between technology and human interaction. Methods: A documentary research approach with a descriptive focus was employed, following the PRISMA protocol for systematic reviews. The search strategy involved analyzing evidence from 18 scientific articles published within the last six years. Results:AI o
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show More