Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure

Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure

Zaydon L. Ali Wassan Saad Abduljabbar Hayale Israa Ibraheem Al_Barazanchi Ravi Sekhar* Pritesh Shah Sushma Parihar

College of Political Science, Mustansiriyah University, Baghdad 10001, Iraq

Electrical Engineering Department, Engineering College, Aliraqia University, Baghdad 10001, Iraq

Computer Technology Engineering Department, College of Information Technology, Imam Ja'afar Al-Sadiq University, Baghdad 10001, Iraq

Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune 412115, Maharashtra, India

Corresponding Author Email: 
ravi.sekhar@sitpune.edu.in
Page: 
515-521
|
DOI: 
https://doi.org/10.18280/isi.290212
Received: 
24 November 2023
|
Revised: 
27 February 2024
|
Accepted: 
28 March 2024
|
Available online: 
25 April 2024
| Citation

© 2024 The authors. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).

OPEN ACCESS

Abstract: 

With current advancement in hybermedia knowledges, the privacy of digital information has developed a critical problem. To overawed the susceptibilities of present security protocols, scholars tend to focus mainly on efforts on alternation of current protocols. Over past decade, various proposed encoding models have been shown insecurity, leading to main threats against significant data. Utilizing the suitable encryption model is very vital means of guard against various such, but algorithm is selected based on the dependency of data which need to be secured. Moreover, testing potentiality of the security assessment one by one to identify the best choice can take a vital time for processing. For faster and precisive identification of assessment algorithm, we suggest a security phase exposure model for cipher encryption technique by invoking Support Vector Machine (SVM). In this work, we form a dataset using usual security components like contrast, homogeneity. To overcome the uncertainty in analysing the security and lack of ability of processing data to a risk assessment mechanism. To overcome with such complications, this paper proposes an assessment model for security issues using fuzzy evidential reasoning (ER) approaches. Significantly, the model can be utilised to process and assemble risk assessment data on various aspects in systematic ways. To estimate the performance of our framework, we have various analyses like, recall, F1 score and accuracy.

Keywords: 

histogram equalization, discrete cosine transform, cybersecurity, process innovation, resilient infrastructure, virtual learning background, human reactions, and recognition fuzzy-based convolutional neural network

1. Introduction

The mix of machine learning and big data is becoming increasingly common as artificial intelligence advances. It has several uses in e-commerce, banking, shipping, medical and health care, and other fields. Machine learning will be used everywhere as a result of the widespread promotion of big data technologies and its integration with the Internet of Things. However, enormous amounts of data will undoubtedly generate privacy issues during the storage, conversation, and application processes. Machine learning facility providers, for example, have gained access to data provided by users throughout the education and prediction phases and may readily get private information, leading in privacy breaches. As a classic machine learning approach, SVM is used to tackle numerous categorization issues and was initially utilised by Bell Laboratories to identify handwritten digital libraries [1]. SVM has drawn the attention of researchers in different domains and has been extensively advocated as a result of its amazing effect. SVM now has various uses in computer vision [2, 3], medical diagnostics [4, 5], and other fields. SVM plays a vital part in the progress of artificial intelligence because of its capacity to address multidimensional information and complex feature issues and integrate categorization of internal maximization with a kernel approach created on theory of statistical learning. In comparison to other predictive procedures, SVM overcomes the "overlearning" issues in a narrow sample size and corrects the local peak fault. Now, secure multiparty addition (MPC) and homomorphic encryption (HE) are the key research skills for privacy-preserving SVM employing encryption techniques. MPC contains a considerable quantity of data conversation, which cannot match the real efficiency criteria in SVM. At HE schemes, completely HE systems have poor effectiveness and remain at the theoretical experiment stage in SVM. Schemes that utilise incomplete HE is the mainstays for meeting practical needs. However, these partly homomorphic methods all have three flaws. The first drawback is that ciphertext computation is inefficient. Some HE systems must alter the required SVM formulae in order to realize sophisticated ciphertext computation, which not only enhances the quantity of ciphertext analysis but also enhances the quantity of data communication among operators and servers. Another drawback is the inability to scale. SVM is classified into two types: linear SVM and quadratic SVM. Furthermore, various kernel functions are accessible for nonlinear SVM. The majority of extant partial HE techniques are tailored to a particular kind of SVM. The schemes must be modified when the kind of SVM changes. As a result, the capacity of these solutions is weak. The third drawback is that users spend a lot of time online. Because certain methods need cooperative computing between users and servers, users must remain connected. Our technique enables efficient HE calculations and equivalent prediction accuracy with an unencrypted scenario while imposing a low computational cost on a regulator.

The training phase is the process of building supervised ML classifiers (e.g., SVM), which trains a given classifier from a collection of considered data. It has been demonstrated that the accuracy of ML classifiers improves with increasing direction of the quantity of training information. Because a single entity's training dataset (e.g., a hospital or a group of providers) is typically constrained in relationships of data quantity and diversity, there has long been a demand for an effective technique to train ML classifiers utilising a mix of datasets acquired from many entities.

2. Literature Survey

Because the creation of ML models typically involves many parties, privacy aim is to train the perfect with data from everyone involved while preventing the information of a particular gathering from being learnt by other revelries. This study fits under this group, which has had a plethora of solutions presented over the previous decade [6].

2.1 Privacy

Differential privacy is a popular strategy for protecting data privacy during the publishing process. DP maintains security of released data by introducing precisely designed perturbations into the original information. The study in literature [7] introduced a deep learning strategy based on DP that allows several participants to cooperatively construct a neural network while safeguarding confidential data in their datasets. Because all designs are conducted over plaintext statistics, DP-based systems can attain significant computational competence. However, because the perturbations always diminish the quality of the input data, the resultant ML models may be erroneous. Furthermore, agitations may not completely guarantee data confidentiality because only a small quantity of private knowledge about each unique exercise data is disclosed. In DP, for example, a privacy budget parameter is used to balance data privacy with efficiency of the model: A greater budget protects privacy of the data while decreasing accuracy of the methodology. In directive to improve security of information in ML exercise, HC is used to train machine learning representations on converted data. The fundamental properties of HC enable calculations on ciphertext while retaining its accuracy. Several secure HC-based algorithms, including as SVM [8], logistic analysis [9], decision trees [10], and Naive Bayes [11], have been developed for training various ML models. González-Serrano et al. [12] built a private trained SVM algorithm and procedures for safe multiplication and division based on Paillier. Because Paillier does not support some computations, they utilize the server authorization, an important third group, for compute subcontracting. In comparison to DP-based explanations, HC-based solutions provide improved privacy of data at the expense of low competence. There are two explanations for this.

  1. Though fully homomorphic encryption (FHE) allows for complex calculations (e.g., with arbitrary improvements) on ciphertexts, present FHE applications are prohibitively expensive in view of encryption and processing, providing them with impractical in real world scenario.
  2. Although partly homomorphic encryption (PHE) is more applied than FHE, it only enables one kind of operation (addition or multiplication). As a result, present solutions often rely on an established external (e.g., the authorization site) to enable complicated computations or lead to erroneous models by approximating complicated formulas with a single kind of computation.

2.2 ML classification for privacy preservation

A sample information for categorization and the ML perfect are often owned by two distinct gatherings in a classification-as-a-service situation. The data owner is eager to learn the classification outcome but is hesitant to provide a sample with sample information to an untrustworthy perfect owner in order to acquire classification service. Meanwhile, the model operator may be hesitant to divulge the categorization model's information because it is an extremely important resource to the service provider. Efforts have been made to build effective ways to preserve both parties' privacy. The study in literature [13] suggested a multilayer learning-based technique for categorising encrypted pictures. They rely on the notion that the copy information should be kept private. The study in literature [14] suggested an online medical pre diagnosis confidentiality nonlinear SVM classification technique. Both the confidential data in everyone’s medical history and the SVM model are safeguarded by their enterprise.

Yu et al. [15] proposed a robust privacy SVM data classification model applicable to multiclass evaluations. This model ensures that the server does not gain any knowledge about the input information from the clients, and it also conceals the server-side classifier from the users throughout the classification process. There are many studies that have utilized HC methodologies to establish a range of classification processes. These processes make use of typical ML classifiers such as decision trees, selection of hyperplanes, and Naive Bayes, all operating on encrypted data.

Xie et al. [16] introduced the inaugural method of classifying data while preserving privacy, utilizing SVM on horizontally split data. This involved breaking down the core function issue of horizontally divided data into individual function issues for each data section. The advantage of this is that it can safeguard local data and hide the classification model by generating the local Gramme medium separately for each party and then compiling the global prototype through MPC. However, a significant drawback is that it requires at least three participants to conduct a closed-loop operational sequence, which is both complex and inefficient. In 2008, Vaidya and colleagues put forward a method for preserving privacy in SVMs that divide data. They managed to secure the global kernel vector using HE without revealing the original data. While this method has improved security, it has unfortunately led to a decrease in efficiency.

Khalaf et al. [13] suggested a novel approach that enhances on Vaidya's technique. The arbitrary matrix is introduced as the disturbance amount in the scheme, and the local information is provided to a genuine third party to compute the worldwide SVM method, which prevents the possibility of data leaking produced by the revelation of the local Gramme matrix and has superior security. Though, when there are many players, the computational complexity increases dramatically, as does the communication cost. Shibghatullah et al. [14] introduced a privacy-conserving SVM built around the function of the Gaussian kernel in 2014, which was the first time the Paillier encryption technique was used to SVM. However, Rahulamathavan's system necessitates several data linkages and is inefficient. Then, several individuals enhanced on Rahulamathavan's plan.

Yu et al. [15] introduced a nonlinear SVM-based privacy-securing model for diagnostic system. Although Zhu's system has been improved in terms of efficiency, it is not mountable enough. Xie et al. [16] enhanced the safety and other features of Rahulamathavan's plan, but the core structure of the organization was not modified, and its competence was not increased. Al-Barazanchi et al. [17] suggested a privacy online diagnostic approach leveraging subcontracted SVM, as well as safe procedures and associated data technique based on the Paillier cryptosystem. Their approach not only secures user-supplied data and diagnosis findings, but it also prevents the evaluation model from being accessible by cloud servers and users [18-25].

3. Support Vector Machine

SVMs are a form of supervised learning algorithms employed for both regression and classification tasks [26-28]. They are counted among the broad family of generalized linear classification. The unique attributes of SVMs are their capacity to reduce empirical error in classification and the geometric boundary [29-33]. Due to these features, SVMs are often referred to as Maximum margin classifiers.

The foundation of SVMs lies in the principle of Structural Risk Minimization (SRM). This principle enables SVMs to transform the original vector into a multidimensional space where a large separating hyperplane gets constructed. On either side of this separating hyperplane that partitions the data, two parallel hyperplanes are established. The separation hyperplane is characterized by its superior distance from the two parallel areas [34].

The methodology which employs the maximum distance or margin between various hyperplanes results in a stronger classifier’s generalization error. This means that the greater the distance between these hyperplanes, the lower the likelihood of making errors during the generalization process. Thus, SVMs provide a robust and efficient tool for machine learning tasks.

We include data points of the for

$\left\{\left(a_1, b_1\right),\left(a_2, b_2\right),\left(a_3, b_3\right) \ldots\left(a_m, b_m\right)\right\}$            (1)

where, $b_m=1 /-1$, a continuous denoting parameter to which the information belongs. M depicts the total samples. Every $a_m$ is the real parameter [35]. The scaling is significant to protect against larger variables. We could view this data in the training data, by providing the hyperplane which takes

v. $a+x=0$                (2)

where, x represents the scalar and v is the vector which is in various dimension. The vector v is perpendicular to the dividing hyperplane. Additionally, the parameter offset x provides to enhance the margin. In the absence of x, the hyperplane is enhanced to pass over the origin avoiding the solution to the problem, we are illustrating the utilization of SVM parallel hyperplane [36].

v. $a+x=1$                (3)

v. $a+x=-1$                (4)

If the simulated data is linearly distinct, we can choose these hyperplanes with no points in between and then strive to maximise their distance.

A splitting hyperplane with the greatest specified margin by N=2/|V| that is significantly support the vectors data points to it.

$b_i\left[V^T \cdot a_i+y\right]=1$                (5)

The Optimal Canonical Hyperplane (OCH) is a canonical Hyperplane with the greatest margin. OCH should meet the following conditions for all data.

$b_i\left[V^T \cdot a_i+y\right] \geq 1$                (6)

where, l is the total amount of training data points. To select the best separating hyperplane with the greatest margin, a learning model should lower the constraint of inequality.

3.1 SVM kernel selection

Training parameter $a_i$ are plotted into maximum dimensional space by the utilization of component $\alpha$. Then SVM identifies a linear dividing hyperplane with higher margin in this maximum space of dimensionality. $\mathrm{B}>0$ is the penalty component of the error function.

Moreover, $\mathrm{F}\left(a_i, a_j\right)=\alpha\left(a_i\right)^T \alpha\left(a_i\right)$ is the known function. Because SVM has numerous kernel functions, how to choose a decent kernel feature is also a study topic. However, there are certain common kernel functions for general use:

  • Kernel function: F$\left(a_i, a_j\right)=\alpha\left(a_i\right)^T$
  • Kernel polynomial function: F$\left(a_i, a_j\right)=\left(\pi \alpha\left(a_i\right)^T+r\right)^d, \pi>0$
  • RBF function: F$\left(a_i, a_j\right)=\exp \left(\pi \alpha\left(a_i\right)^T+r\right)^d, \pi>0$
  • Sigmoid function: F$\left(a_i, a_j\right)=\tanh \left(\pi \alpha\left(a_i\right)^T+r\right)^d$

where, $\alpha, \pi$ and d are the kernel components. In these functions used in the SVM, RBF is the significant function used due to following reasons:

  1. Samples are mapped using the RBF kernel functions.
  2. The RBF function has lower hyperparameters than the kernel function.
  3. Numerical difficulties are lower in the kernel functions used.

Algorithm 1

Input: Kernel matrix, class parameter $b \in\{-1,1\}^m$ and the margin component D

Output: weighted vector π $\in X_{+}^m$.

Function of kernel (G, b, D)

Step 1: $\pi \leftarrow 0$

Step 2: repeat

Step 3:     for j=1,……, m do

Step 4:            $\pi_j \leftarrow \pi_j+\mathrm{b}_j \cdot\left(1-\mathrm{b}_j \cdot \sum_{i=1}^m g, \pi, \mathrm{b}_j\right)$

Step 5:     if  $\pi_j>D$  then $\pi_j \leftarrow D$

Step 6:               if $\pi_j<0$  then $\pi_j \leftarrow 0$

Step 7:      end for

Step 8: until conjunction

End of function

4. Fuzzy Reasoning Methodology

The normal credibility mass score of the estimation index $f_i$ is

$n_i\left\{P_m\right\}=\alpha \beta_m$             (7)

$n_i\{H\}=1-\sum_{m=1}^M n_i\left\{P_m\right\}$             (8)

Then $n_i\left\{P_m\right\}$ is the normal reliability function of the estimation index $f_i$ at the estimation level of $P_m ; n_i\left\{P_m\right\}$ is the reliability which is not assigned, classifying the degree to which the proof that has not been allocated being created. Let

$\bar{n}_{\imath}\{P\}=1-\alpha_i$             (9)

The N estimation indexes consists in the estimation object are associated with proof. The certain methodology is as follows

$\begin{aligned} n_i-N\left\{P_m\right\} & =j\left\{\prod_{i=1}^N\left[n_i\left\{P_m\right\}+n_i\left\{P_m\right\}\right]\right.  \left.-\prod_{i=1}^N n_i\{H\}\right\}, n=1,2, \ldots, M\end{aligned}$             (10)

$n_i-N\left\{P_m\right\}=j\left\{\prod_{i=1}^N\left\{n_i\{P\}\right\}\right.$             (11)

$\bar{n}_{1-N}\{P\}=j\left\{\prod_{i=1}^N\left\{n_i\{P\}\right\}\right.$             (12)

The overall risk assessment mass score $n_i-N\left\{P_m\right\}$ of the object evaluated which is obtained giving to fusion operations, $n_i-N\left\{P_{m+1}\right\}$ is the mass score at the association $P_{m, m+1}$ of the fuzzy estimation phase.

5. Result and Discussion

By examining the graph, you can easily see how the framework performs at each epoch. The blue and red lines depict training and validation accuracy, respectively. The model's accuracy and loss are then shown. Typically, validation and training efficiency improves over time. The accuracy of the model after fitting it is 0.6954, and it has not yet been exposed to training. Essentially, when testing passes validation, you should stop training since the model is starting to recall specific items rather than learning patterns. In this example, validation accuracy continues to improve even after the sixth epoch. The loss is minimised using the RNN method via back propagation with auto differentiation. The model's performance demonstrates that the loss decreases with each epoch, from 0.22 to 0.0314 for the first and sixth epochs, respectively. Figure 1 illustrates the training and validation loss and Figure 2 depicts the accuracy obtained during training and validation.

Figure 1. Loss during training and validation

Figure 2. Accuracy during training and validation

The model created using deep learning was then contrasted with the SVM model to determine which model was better suited for the classification of binary data. Other researchers' previous studies have validated SVM as the best match for SMS categorization. We trained, tested, and evaluated the SVM model in order to compare them. We utilised a same dataset, sample amount, random state, and all other parameters remained unchanged. The validation precision and loss of SVM model classifier utilising the same dataset parameters. According to the figure, SVM has a slightly better accuracy in validation and training of 0.96 compared with navies 0.92, while SVM has a significantly lower false positive rate.

Figure 3 illustrates the computational overhead of fuzzy evidential reasoning approaches where the number of iterations for estimating the computational overhead is shown for Heart Disease Data Set (HDDS). Proposed ER model outperformed the existing naïve model as the number of iterations keeps on increasing. During the 100th iteration the overhead is 890 when compared to the proposed model which is 650. Figure 4 illustrates the computation overhead for Breast Cancer Data Set (BCDS), where the computational overhead of the proposed model is 78% of computational overhead whereas the existing method overhead is about 89%.

Figure 3. Computational overhead of ER and Naïve method for HDDS

Figure 4. Computational overhead of ER and Naïve method for BCDS

Table 1. Classification performance

 

Model

Training Set

Testing Set

Recall

Precision

HDDS

Proposed (SVM-ER)

230

62

83.70%

85.45%

Navie method

230

62

81.80%

82.30%

BCDS

Proposed (SVM-ER)

455

114

94.20%

92.15%

Navie method

455

114

91.10%

89.20%

IDS

Proposed (SVM-ER)

263

80

76.40%

91.40%

Navie method

263

80

74.76%

89.20%

Figure 5. Computational overhead of ER and naïve method for IDS

Table 1 illustrates the overall computational performance on various dataset which is utilised. Aside from privacy protection, some prior work has explored model prediction verification. That is, after getting the forecasts from the model forecasting service provider, the user confirms their accuracy. The verification technique must verify that the user cannot get the model's key parameters stored by the service provider. Figure 5 illustrates the computational overhead of the Ionosphere Data Set (IDS) obtained from Proposed ER and the existing Naïve method. To use these strategies in our system, we must convert a significant number of variables in the model used for SVM development to integers, which may result in truncation errors. To assess the influence of these mistakes on our scheme's classification performance, an appropriate comparison is the classic SVM technique without regard for privacy protection.

6. Conclusion

In this paper, the overcome the susceptibilities of the existing security protocols, for faster and precisive identification of assessment algorithm, we suggest a security phase detection model for cipher encryption technique by invoking Support Vector Machine. this paper proposes an assessment model for security issues using fuzzy evidential reasoning (ER) approach. We utilised a same dataset, sample amount, random state, and all other parameters remained unchanged. SVM has a slightly better accuracy in validation and training of 0.96 compared with navies 0.92, while SVM has a significantly lower false positive rate. The validation precision and loss of SVM model classifier utilising the same dataset parameters. The model's performance demonstrates that the loss decreases with each epoch, from 0.22 to 0.0314 for the first and sixth epochs. The computational overhead of the proposed model is 78% of computational overhead whereas the existing method overhead is about 89%.

  References

[1] Habib, M., Wang, Z., Qiu, S., Zhao, H., Murthy, A.S. (2022). Machine learning based healthcare system for investigating the association between depression and quality of life. IEEE Journal of Biomedical and Health Informatics, 26(5): 2008-2019. https://doi.org/10.1109/JBHI.2022.3140433

[2] Xun, Y., Liu, J., Kato, N., Fang, Y., Zhang, Y. (2019). Automobile driver fingerprinting: A new machine learning based authentication scheme. IEEE Transactions on Industrial Informatics, 16(2): 1417-1426. https://doi.org/10.1109/TII.2019.2946626

[3] Mana, S.C., Sasipraba, T. (2021). A machine learning based implementation of product and service recommendation models. In 2021 7th International Conference on Electrical Energy Systems (ICEES), Chennai, India, pp. 543-547. https://doi.org/10.1109/ICEES51510.2021.9383732

[4] Fredrikson, M., Jha, S., Ristenpart, T. (2015). Model inversion attacks that exploit confidence information and basic countermeasures. InCCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado, USA, pp. 1322-1333. https://doi.org/10.1145/2810103.2813677

[5] Yuan, J., Yu, S. (2013). Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Transactions on Parallel and Distributed Systems, 25(1): 212-221. https://doi.org/10.1109/TPDS.2013.18

[6] Boneh, D., Goh, E.J., Nissim, K. (2005). Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, pp. 325-341. https://doi.org/10.1007/978-3-540-30576-7_18

[7] Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., Talwar, K., Zhang, L. (2016). Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 308-318. https://doi.org/10.1145/2976749.2978318

[8] Wang, Q., Hu, S., Du, M., Wang, J., Ren, K. (2017). Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. In IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, Atlanta, GA, USA, pp. 1-9. https://doi.org/10.1109/INFOCOM.2017.8056955

[9] Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M. (2013). Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Transactions on Dependable and Secure Computing, 11(5): 467-479. https://doi.org/10.1109/TDSC.2013.51

[10] Li, H., Zhu, L., Shen, M., Gao, F., Tao, X., Liu, S. (2018). Blockchain-based data preservation system for medical data. Journal of Medical Systems, 42: 141. https://doi.org/10.1007/s10916-018-0997-3

[11] Detrano, R., Janosi, A., Steinbrunn, W., et al. (1989). International application of a new probability algorithm for the diagnosis of coronary artery disease. The American Journal of Cardiology, 64(5): 304-310. https://doi.org/10.1016/0002-9149(89)90524-9

[12] González-Serrano, F.J., Navia-Vázquez, Á., Amor-Martín, A. (2017). Training support vector machines with privacy-protected data. Pattern Recognition, 72: 93-107. https://doi.org/10.1016/j.patcog.2017.06.016

[13] Khalaf, A.L., Abdulrahman, M.M., Al_Barazanchi, I.I., Tawfeq, J.F., JosephNg, P.S., Radhi, A. D. (2024). Real time pedestrian and objects detection using enhanced YOLO integrated with learning complexity-aware cascades. TELKOMNIKA (Telecommunication Computing Electronics and Control), 22(2): 362-371. http://doi.org/10.12928/telkomnika.v22i2.24854

[14] Shibghatullah, A.S., Al Barazanchi, I. (2014). An Analysis of Requirements for Efficient Protocols in WBAN. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 6(2): 19-22.

[15] Yu, H., Vaidya, J., Jiang, X. (2006). Privacy-preserving svm classification on vertically partitioned data. In Advances in Knowledge Discovery and Data Mining: 10th Pacific-Asia Conference, PAKDD 2006, Singapore, pp. 647-656. https://doi.org/10.1007/11731139_74

[16] Xie, B., Xiang, T., Liao, X., Wu, J. (2021). Achieving privacy-preserving online diagnosis with outsourced SVM in internet of medical things environment. IEEE Transactions on Dependable and Secure Computing, 19(6): 4113-4126. https://doi.org/10.1109/TDSC.2021.3119897

[17] Al-Barazanchi, I., Jaaz, Z.A., Abbas, H.H., Abdulshaheed, H.R. (2020). Practical application of IOT and its implications on the existing software. In 2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI), Yogyakarta, Indonesia, pp. 10-14. https://doi.org/10.23919/EECSI50503.2020.9251302

[18] Hamad, A.H., Dawod, A.Y., Abdulqader, M.F., Al_Barazanchi, I., Gheni, H. M. (2023). A secure sharing control framework supporting elastic mobile cloud computing. International Journal of Electrical and Computer Engineering, 13(2): 2270-2277. https://doi.org/10.11591/ijece.v13i2.pp2270-2277

[19] Shawkat, S.A., Tuama, B. A., Al_Barazanchi, I. (2022). Proposed system for data security in distributed computing in using‎ triple data encryption standard and‎ Rivest Shamir‎ Adlemen. International Journal of Electrical and Computer Engineering, 12(6): 6496-6505. 10.11591/ijece.v12i6.pp6496-6505

[20] Niu, Y., Nazeri, S., Hashim, W., Alkahtani, A.A.A., Abdulshaheed, H.R. (2021). A survey on short-range WBAN communication; technical overview of several standard wireless technologies. Periodicals of Engineering and Natural Sciences, 9(4): 877-885. http://doi.org/10.21533/pen.v9i4.2444

[21] Shawkat, S.A., Al-badri, K.S.L., Al_Barazanchi, I. (2020). Three band absorber design and optimization by neural network algorithm. Journal of Physics: Conference Series, 1530(1): 012129. http://doi.org/10.1088/1742-6596/1530/1/012129

[22] Ali, M.H., Ibrahim, A., Wahbah, H., Al_Barazanchi, I. (2021). Survey on encode biometric data for transmission in wireless communication networks. Periodicals of Engineering and Natural Sciences, 9(4): 1038-1055. http://doi.org/10.21533/pen.v9i4.2570

[23] Niu, Y., Al Sayed, I.A., Alya'a, R.A., Al_Barazanchi, I., JosephNg, P.S., Jaaz, Z.A., Gheni, H.M. (2023). Research on fault adaptive fault tolerant control of distributed wind solar hybrid generator. Bulletin of Electrical Engineering and Informatics, 12(2): 1029-1040. http://doi.org/10.11591/eei.v12i2.4242

[24] Al Barazanchi, I., Abdulshaheed, H.R. (2019). Adaptive illumination normalization framework based on decrease light effect for face recognition. Journal of Dynamical and Control Systems, 11(1): 1741-1747.

[25] Abdulshaheed, H.R., Al Barazanchi, I., Jaya, H.T., Tunggal, D. (2019). Smart solutions based-on cloud computing and wireless sensing. International Journal of Advanced Science and Technology, 28(8): 526-542.

[26] Al-Amri, R., Murugesan, R.K., Alshari, E.M., Alhadawi, H.S. (2022). Toward a full exploitation of IoT in smart cities: A review of IoT anomaly detection techniques. In Proceedings of International Conference on Emerging Technologies and Intelligent Systems, pp. 193-214. https://doi.org/10.1007/978-3-030-85990-9_17

[27] Salih, S.Q., Sharafati, A., Ebtehaj, I., et al. (2020). Integrative stochastic model standardization with genetic algorithm for rainfall pattern forecasting in tropical and semi-arid environments. Hydrological Sciences Journal, 65(7): 1145-1157. https://doi.org/10.1080/02626667.2020.1734813

[28] Yaseen, Z.M., Zigale, T.T., Tiyasha, Salih, S.Q., et al. (2019). Laundry wastewater treatment using a combination of sand filter, bio-char and teff straw media. Scientific Reports, 9(1): 18709. https://doi.org/10.1038/s41598-019-54888-3

[29] AL-Jumaili, A.H.A., Muniyandi, R.C., Hasan, M.K., Singh, M.J., Paw, J.K.S. (2022). Analytical survey on the security framework of cyber-physical systems for smart power system networks. In 2022 International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, pp. 1-8. https://doi.org/10.1109/ICCR56254.2022.9995780

[30] Ali, A.H., Mohammad, O.K.J. (2019). Impacting of the E-Platforms on the 4.0 th Industrial Educational Revolution. In Proceedings of the 9th International Conference on Information Systems and Technologies, Cairo, Egypt, pp. 1-7. https://doi.org/10.1145/3361570.3361608

[31] Al-Jumaili, A.H.A., Muniyandi, R.C., Hasan, M.K., Paw, J.K.S., Singh, M.J. (2023). Big data analytics using cloud computing based frameworks for power management systems: Status, constraints, and future recommendations. Sensors, 23(6): 2952. https://doi.org/10.3390/s23062952

[32] AL-Jumaili, A.H.A., Mashhadany, Y.I.A., Sulaiman, R., Alyasseri, Z.A.A. (2021). A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges. Applied Sciences, 11(21): 9820. https://doi.org/10.3390/app11219820 

[33] Shaker, A.S., Ahmed, S.R. (2022). Information retrieval for cancer cell detection based on advanced machine learning techniques. Al-Mustansiriyah Journal of Science, 33(3): 20-26. http://doi.org/10.23851/mjs.v33i3.1069

[34] Mehdi, S.A., Ali, Z.L. (2020). Image encryption algorithm based on a novel six-dimensional hyper-chaotic system. Al-Mustansiriyah Journal of Science, 31(1): 54-63. http://doi.org/10.23851/mjs.v31i1.739

[35] Hussein, M.A., Abbas, A.H. (2019). Plant leaf disease detection using support vector machine. Al-Mustansiriyah Journal of Science, 30(1): 105-110. http://doi.org/10.23851/mjs.v30i1.487

[36] Mahdi, M.S., Ali, Z.L. (2021). A lightweight algorithm to protect the web of things in IOT. In International Conference on Emerging Technology Trends in Internet of Things and Computing, Erbil, Iraq, pp. 46-60. https://doi.org/10.1007/978-3-030-97255-4_4