RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Accuracy of Phishing Websites Detection Algorithms by Using Three Ranking Techniques

        Mohammed, Badiea Abdulkarem,Al-Mekhlafi, Zeyad Ghaleb International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.2

        Between 2014 and 2019, the US lost more than 2.1 billion USD to phishing attacks, according to the FBI's Internet Crime Complaint Center, and COVID-19 scam complaints totaled more than 1,200. Phishing attacks reflect these awful effects. Phishing websites (PWs) detection appear in the literature. Previous methods included maintaining a centralized blacklist that is manually updated, but newly created pseudonyms cannot be detected. Several recent studies utilized supervised machine learning (SML) algorithms and schemes to manipulate the PWs detection problem. URL extraction-based algorithms and schemes. These studies demonstrate that some classification algorithms are more effective on different data sets. However, for the phishing site detection problem, no widely known classifier has been developed. This study is aimed at identifying the features and schemes of SML that work best in the face of PWs across all publicly available phishing data sets. The Scikit Learn library has eight widely used classification algorithms configured for assessment on the public phishing datasets. Eight was tested. Later, classification algorithms were used to measure accuracy on three different datasets for statistically significant differences, along with the Welch t-test. Assemblies and neural networks outclass classical algorithms in this study. On three publicly accessible phishing datasets, eight traditional SML algorithms were evaluated, and the results were calculated in terms of classification accuracy and classifier ranking as shown in tables 4 and 8. Eventually, on severely unbalanced datasets, classifiers that obtained higher than 99.0 percent classification accuracy. Finally, the results show that this could also be adapted and outperforms conventional techniques with good precision.

      • Review on Software-Defined Vehicular Networks (SDVN)

        Mohammed, Badiea Abdulkarem International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.9

        The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

      • KCI등재

        Effect of fluid velocity and temperature on the corrosion mechanism of low carbon steel in industrial water in the absence and presence of 2-hydrazino benzothiazole

        Aswaidy Mohammed Badiea,Kikkeri Narasimhasetty Mohana 한국화학공학회 2008 Korean Journal of Chemical Engineering Vol.25 No.6

        This work was carried out to study the inhibition mechanism of volatile corrosion inhibitors (VCIs) such as 2-hydrazinobenzothiazole (2-HBTA) on the corrosion of low carbon steel in industrial water by using polarization and mass loss measurement. It was found that 2-HBTA revealed good performance as inhibitor for low carbon steel corrosion in industrial water. After some time, the performance decreased due to the volatility of these kinds of inhibitors away from the open system unlike the closed system. The experimental data indicated that the inhibitive performance of 2-HBTA for low carbon steel was improved with increasing of concentration up to the critical concentration (4.24×10−3M). The adsorption behavior of 2-HBTA was found to obey Langmuir’s adsorption isotherm. The thermodynamic parameters of adsorption process and activation energy were obtained from polarization technique. Scanning electron microscopy (SEM) was performed to characterize the film formed on the surface. Box-Wilson statistical method was employed to correlate the results obtained, and the optimization of fluid velocity, temperature and concentration of inhibitor by using Box-Wilson statistical method was evaluated.

      • A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

        Al-Mekhlafi, Zeyad Ghaleb,Mohammed, Badiea Abdulkarem International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.11

        Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.

      • SCOPUSKCI등재

        Inhibition of Mild Steel Corrosion in 0.25 M Sulphuric Acid Solution by Imatinib Mesylate

        Mohana, K.N.,Shivakumar, S.S.,Badiea, A.M. Korean Chemical Society 2011 대한화학회지 Vol.55 No.3

        The corrosion inhibition of imatinib mesylate (IMT) on mild steel in 0.25 M sulphuric acid has been studied using gravimetric and potentiodynamic polarization techniques at various concentrations of inhibitor, temperature and fluid velocities. The results obtained showed that, inhibition efficiency (% IE) increases with increasing concentration of the inhibitor. The adsorption process on mild steel surface follows Langmuir adsorption isotherm. The values of Gibbs free energies of adsorption obtained suggest that, the adsorption process of IMT on mild steel is chemisorption. Thermodynamic parameters were evaluated and discussed. The electron orbital density distribution of HOMO and LUMO of IMT was used to discuss the inhibition mechanism. FT-IR spectroscopy and SEM images were used to analyze the surface adsorbed film. 다양한 억제제의 농도, 온도, 유속에서 중량 분석과 변전위 분극법을 이용하여 0.25 M 황산 용액상에 있는 연강철에 대한 imatinib mesylate (IMT)의 부식 억제를 연구하였다. 억제제의 농도가 증가함에 따라 억제 효과가 증가한다는 결과를 얻었다. 연강철 표면 위의 흡착 과정은 Langmuir 흡착 등온선을 따른다. 얻어진 흡착 깁스 자유 에너지의 값은 연강철 위의 IMT의 흡착 과정이 화학흡착이라는 것을 보여준다. 열역학 변수들이 계산되고, 논의되었다. IMT의 HOMO와 LUMO의 전자궤도 밀도 분포는 억제 메커니즘을 논의하는데 이용되었다. FT-IR 분광학과 SEM 이미지는 필름에 흡착된 표면을 분석하기 위해 사용되었다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼