[PDF][PDF] Comprehensive survey for cloud computing based nature-inspired algorithms optimization scheduling

HS Yahia, SR Zeebaree, MA Sadeeq… - Asian Journal of …, 2021 - researchgate.net
Many applications in the real world include optimizing specific targets, such as cost
minimization, energy conservation, climate, and maximizing production, efficiency, and …

Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

Scalable machine learning-based intrusion detection system for IoT-enabled smart cities

MA Rahman, AT Asyhari, LS Leong, GB Satrya… - Sustainable Cities and …, 2020 - Elsevier
Given a scale expansion of Internet of Things for sustainable resource management in smart
cities, proper design of an intrusion detection system (IDS) is critical to safeguard the future …

[PDF][PDF] Evolution of mobile wireless communication to 5G revolution

AA Salih, SR Zeebaree, AS Abdulraheem… - … Reports of Kansai …, 2020 - researchgate.net
Over recent years, the evolution of mobile wireless communication in the world has become
more important after arrival 5G technology. This evolution journey consists of several …

A survey of data mining implementation in smart city applications

ZS Ageed, SRM Zeebaree… - Qubahan Academic …, 2021 - journal.qubahan.com
Many policymakers envisage using a community model and Big Data technology to achieve
the sustainability demanded by intelligent city components and raise living standards. Smart …

Study for food recognition system using deep learning

NOM Salim, SRM Zeebaree… - Journal of Physics …, 2021 - iopscience.iop.org
Accurate dietary appraisal has been found by literature to be very significant in the
evaluation of weight loss treatments. Most current methods of dietary evaluation, however …

A detailed analysis of benchmark datasets for network intrusion detection system

M Ghurab, G Gaphari, F Alshami… - Asian Journal of …, 2021 - papers.ssrn.com
The enormous increase in the use of the Internet in daily life has provided an opportunity for
the intruder attempt to compromise the security principles of availability, confidentiality, and …

[PDF][PDF] An investigation for mobile malware behavioral and detection techniques based on android platform

AB Sallow, M Sadeeq, RR Zebari… - IOSR Journal of …, 2020 - researchgate.net
Nowadays, with portable computation equipment becoming extra commonly depended
besides incorporated through extra sensitive structures such as infrastructure besides armed …

[PDF][PDF] Home automation system based on IoT

AS Abdulraheem, AA Salih, AI Abdulla… - … Reports of Kansai …, 2020 - researchgate.net
The internet of things (IoT) has been very important when it comes to the automation of smart
homes and buildings. In the smart homes and buildings automation, IoT is combined with …

Combining best features selection using three classifiers in intrusion detection system

AA Salih, MB Abdulrazaq - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Nowadays, with the development of internet technologies service in the world, the intruders
has been increased rapidly. Therefore, the advent of Intrusion Detection System (IDS) in the …