Murtadha A. Alazzawi

ORCID: 0000-0001-6718-8878
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Authentication Protocols Security
  • Autonomous Vehicle Technology and Safety
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Cryptographic Implementations and Security
  • Internet of Things and AI
  • Wireless Communication Networks Research
  • Security in Wireless Sensor Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Experimental Learning in Engineering
  • Healthcare Technology and Patient Monitoring
  • Generative Adversarial Networks and Image Synthesis
  • Digital Media Forensic Detection
  • Peer-to-Peer Network Technologies
  • Blockchain Technology Applications and Security
  • Wireless Body Area Networks
  • ECG Monitoring and Analysis
  • Advanced MIMO Systems Optimization
  • Traffic control and management

Alsalam University College
2019-2024

Imam Alkadhim University College
2023-2024

Huazhong University of Science and Technology
2019

Vehicles in a vehicular ad-hoc network (VANET) broadcast beacons giving safety-related and traffic information. In an open-access environment, this means that the VANET is susceptible to security privacy issues. paper, we propose new pseudo-identity-based scheme for conditional anonymity with integrity authentication VANET. The proposed uses pseudonym joining process road-side unit (RSU) protect real identity even from RSU, case it compromised. All previous identity-based schemes have been...

10.1109/access.2019.2919973 article EN cc-by-nc-nd IEEE Access 2019-01-01

Vehicle Ad-hoc Networks (VANETs) have recently become an active research area. This is because of its important applications in the transportation field which vehicles severe position during activities daily living persons. In this paper, basic background VANET from Intelligent Transportation System (ITS), Mobile (MANETs), standard and characteristics are discussed. Second, architecture components communications system presented. Then, critical challenges future perspectives comprehensively...

10.1109/aca52198.2021.9626779 article EN 2021-07-25

Recently, Vehicle Ad Hoc Networks (VANETs) have been increasingly developed in Intelligent Transportation Systems (ITSs). However, VANETs are vulnerable to security issues because of the open-medium nature Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communication. many studies proposed schemes address these issues. massive computational overheads, especially process batch verification method, which verifies multiple messages simultaneously. In this article, a Lightweight...

10.1109/access.2020.3024587 article EN cc-by IEEE Access 2020-01-01

Abstract: The Fifth Generation (5G) networks have enabled the development of smart cities in which massive amounts data are collected, stored and disseminated. ultimate objective these is to cut costs improve security performance. In this environment, Internet Vehicles (IoV) helps connect vehicles, pedestrians, control rooms, some roadside infrastructure. Owing insecure nature communication channel utilized IoV exchange information, it important develop practical techniques preserve...

10.5455/jjcit.71-1728742777 article EN cc-by Jordanian Journal of Computers and Information Technology 2025-01-01

Recently, vehicular ad hoc networks (VANETs) have been garnering significant inter-est from the people involved in transportation field. Nowadays automotive manufactur-ers already supplying vehicles with multitude of road sensors that provides many useful characteristics. VANET communication not only offers drivers and passen-gers various safety related services but also a wide range valuable applications. However, inherent openness wireless medium used by VANETs exposes to security privacy...

10.11591/ijeecs.v21.i1.pp479-488 article EN Indonesian Journal of Electrical Engineering and Computer Science 2021-01-01

In the last few years, increasing development of various tools to make fake videos from real has been raised. Thus, several models/approaches have constructed detect and reveals video. Consequently, this research is conducted propose a new model based on combining Convolutional Neural Networks (CNN), Recurrent (RNN), image preprocessing techniques classify find video To implement evaluate proposed model, MATLAB simulator used. The deepFake Images dataset used for evaluations. This contains...

10.1109/aiccit57614.2023.10217956 article EN 2023-07-04

Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well computation communication overheads.In this paper, we a robust conditional privacypreserving scheme based on pseudonym root with cuckoo filter to meet requirements reduce our scheme, used new idea generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named "pseudonym root," generates all the same...

10.3837/tiis.2019.12.018 article EN KSII Transactions on Internet and Information Systems 2019-12-31

Recently, a huge effort has been pushed to the wireless broadcasting nature in open area. However, vehicular ad hoc network (VANET) is disposed various kinds of attacks. Hence, keeping security VANET most critical issue because related human life. Thus, we propose robust and lightweight key agreement-based identity protocol LSKA-ID for communication. Our utilizes elliptic curve cryptography, Chinese reminder theorem, (ID)-based cryptosystem resolve issues found previously proposed schemes,...

10.12928/telkomnika.v21i4.24388 article EN cc-by-sa TELKOMNIKA (Telecommunication Computing Electronics and Control) 2023-06-12

Intrusion detection in network systems is a critical challenge due to the ever-increasing volume and complexity of cyber-attacks. Traditional methods often struggle with high-dimensional data need for real-time detection. This paper proposes comprehensive intrusion method utilizing novel wrapped feature selection approach combined long short-term memory classifier optimized whale optimization algorithm address these challenges effectively. The proposed introduces technique using multi-layer...

10.3390/jsan13060073 article EN cc-by Journal of Sensor and Actuator Networks 2024-11-02

In addition to the security and privacy challenges in vehicular ad hoc network (VANET), computational communicational costs are huge challenges, since they increase latency, thus casing reduce network's communication efficiency, providing attacker with an opportunity penetrate network. this paper, we propose a new scheme eliminate mentioned VANET systems. first part of scheme, initialize register On-Board Units (OBUs) Road Side (RSUs). second part, exchange between RSU OBU mutual...

10.1109/hpcc/smartcity/dss.2019.00212 article EN 2019-08-01

Opinion mining and emotion detection are two important techniques in natural language processing that have gained significant attention recent years. is the process of identifying extracting subjective information from text, such as opinions, attitudes, emotions, while emotions text. These a wide range applications various domains, including social media analysis, customer feedback product reviews. This paper provides an overview opinion processing. We discuss approaches methods used...

10.61710/akjs.v1i2.51 article EN AlKadhum Journal of Science 2023-12-14

Cybercrimes are becoming a bigger menace to both people and corporations. It poses serious challenge the modern digital world. According Cybersecurity Ventures, global cost of cybercrime will reach ${\$}$10.5 trillion annually by 2025, which is significantly more than annual damage caused all-natural disasters profitable trade in all major illegal narcotics put together. Botnets most common have significant negative impact on any civilization among malware programs. As result, this study...

10.1109/iccitm56309.2022.10031860 article EN 2022-08-31

Here, we depict the ongoing 3GPP Delivery 16 particularly for situating in 5G organizations, which is currently being developed. To address issues of an extensive variety administrative, business, and modern use cases, detail indicates signals, estimations, methods, framework engineering. Accordingly, when contrasted with what was beforehand conceivable LTE, essentially advances capacities. Utilizing reenactment situations that have been settled upon, demonstrative execution assessed, it...

10.1109/aiccit57614.2023.10218277 article EN 2023-07-04

This article investigates the cloud computing models and their advantages disadvantages, discussing association between them web-apps of healthcare monitoring systems. Also, we present major integration mechanism some already developed medical MATLAB modules such as an innovative ECG diagnosis algorithm within a system that has been using C# language Visual studio environment. A comparative performance analysis based on call function durations security aspects also introduced for both...

10.1109/ecai54874.2022.9847491 article EN 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2022-06-30

After business hours and at night, the majority of office buildings educational facilities often feature a small selection food, unless consumer buys takeout. Only unhealthily marketed drinks snacks are typically available on-site vending machines. Freshly prepared food is scarce while restaurants closed. The idea for vending-based system that provides wholesome, freshly in recognizable style presented. This paper proposes intelligent software machine systems by using cloud IoT. proposal...

10.1109/csctit56299.2022.10145687 article EN 2022-11-15

An Intrusion detection system IDS is a key component of the security management infrastructure. The goal to monitor processes prevailing in network and analyze them for signs any possible deviations. Because large volume data, gets expansion with false alarm rate intrusion, accuracy decreased. It one main problems unknown attacks on experiences. basic aim was develop also reduce (FAR). We will design an Adaptive Neuro-Fuzzy based identify intrusion activities within effectively. Honey Badger...

10.1109/aiccit57614.2023.10217857 article EN 2023-07-04

E-learning involves numerous virtual courses offered by primary universities or schools. Traditional prepared in a brick-and-mortar school facility are compared with online learning programs delivered through the internet. Existing works on whiteboard-based software have shown some limitations terms of response time and high complexity. Therefore, this paper, we proposed an interactive flexible widget-based whiteboard platform to improve performance E-learning. Technically, employed advanced...

10.1109/aca57612.2023.10346906 article EN 2023-02-27
Coming Soon ...