
Dr.Ann Zeki Ablahd Magdacy Jarges
Research InterestsCyber Security
Web Application
Gender | MALE |
---|---|
Place of Work | Technical Engineering College/ Kirkuk |
Position | تدريسية |
Qualification | Ph.d |
Speciality | Computer Science |
drann@ntu.edu.iq | |
Phone | |
Address | , , Mosul, Iraq |
Skills
Machine Learning & AI in Security (95%)
Research & Technical Writing (80%)
Cybersecurity & Threat Detection (90%)
Programming & Scripting (95%)
Networking & Systems (90%)
Supervision
Chya Omer Qader
Year: 2024Academic Degree: Master
Supervisor Type: Supervisor
Supervisor State: Graduated
Computer Science Department-Kirkuk University
Ameen Ali ,Khalid Abdulkareem , Hussam Majid
Year: 2025Academic Degree: Bachelor
Supervisor Type: Supervisor
Supervisor State: Ungraduated
Design and Implementation Facial Recognition
Academic Qualification
Ph.D. in Computer Science [Mosul University 2013 ]
Sep 1, 2009 - Aug 30, 2013Starting of Phd in 2009 ,in Mosul University- College of Computer Science and statistic and Math
Master in Mosul University
Sep 1, 1999 - Sep 1, 2001Starting in 1999 ending in 2001- College of Computer Science and Statistic and Math
BSC in Computer Science in Mosul University
Oct 1, 1985 - Jul 1, 1988Starting in 1-10-1985 to 1-7-1988 in College of Science in Mosul University
Working Experience
Northern Technical University [lecturer]
Sep 1, 1988 - Jul 1, 1992Teaching student of Mosul Institute
Northern Technical University [lecturer]
Jul 1, 1992 - Sep 1, 2001Teaching in Kirkuk Institute
Northern Technical University [lecturer]
Sep 1, 2001 - PresentTeaching student of Kirkuk Technical College in Computer Engineering Department
Publications
Using Python to Detect Web application vulnerability By
Jan 1, 2023Journal RES MILITARES
DOI 10.1016/j.measen.2023.100746
Issue 2023
Volume 13
The number of web application grows sharply because of a web application is a common way of delivering all services via the Internet. The developing such application with a fewer experience and without testing caused a huge vulnerability in it. The web application vulnerability is a weak point resulted through web application designing. There are many attackers exploit this vulnerability for gaining access to all unauthorized internal objects to compromise the application, modify data and steal the most important information. The aim of this proposed system is to detect the web application vulnerabilities before exploited by an attacker. A special scanner was built using python 3.7 built-in tools like AST, CFG, Flask, and Django to detect these vulnerabilities. There are different risks infect a web application caused by this vulnerability two types of them were solved in this proposed system. The proposed scanner detects the injection flaws command execution and Cross-Site Scripting (XSS) injection. The fixed-point algorithm is used for finding web application vulnerabilities after analysis and extracts its features. The proposed scanner called SCANSCX. SCANSCX has been created with flexible tools. In order to test and evaluate the ability of SCANSCX, a number of vulnerable applications were designed. All designed examples are identified as being vulnerable. The SCANSCX is a realistic application because it runs on windows and linx operating systems. SCANSCX is a big project that spends very long time on analysis, designed an application and was therefore terminated.
DETECT MALICIOUS EMAILS USING DART LANGUAGE
Mar 1, 2023Journal International Journal on“Technical and Physical Problems of Engineering”
publisher Published by International Organization of IOTPE
Issue 54
Volume 15
Abstract- The communication of emails, nowadays become an official and important. The email was a vector of conducting attack in cyber-crimes such as phishing, spoofing and any malicious email. Such attack used as a malicious transferring mode into the victim’s device. The wide growing of malicious Email leads to online criminal activities. By such activity the confidential and secure information will stalled. To avoid such criminal activity, an On-line application (classifier) where prepared for inspecting each suspicious Email address. This classifier acts as interface in receiving Email address and early detects malicious, phishing and spoofing emails to avoid user from being victim in such attack. The proposed system built by using Dart-SDK language Windows supported with flutter-windows-3.0.1 platform. With this classifier the address of each email has been analyzed used one of machine learning algorithms called “Naive Bayesian algorithm” to distinguish between benign and malicious Email address. This system provides real time detection for any Email malicious crimes. Accuracy rate of this classifier is about 99.2%, 8000 Email address where tested, 4700 are malicious, 3300 are benign.The communication of emails, nowadays become an official and important.
Detection of tamper forgery image in security digital mage
Jun 1, 2023Journal Measurement: Sensors,
publisher Published by International Organization of IOTPE
DOI 10.1016/j.measen.2023.100746
Issue id.100746
Volume 27
Every industry that uses digital photos is concerned about image security. Forensics and public safety have long relied on suspect photos, crime scene photos, biometric photos, and other images. As digital imaging has advanced, the use of digital images in this field has grown significantly. While digital image processing has helped to develop many new approaches in forensic research, it has also simplified image manipulation. The public availability of various snipping image manipulation software has made digital image validity a problem. As a result, image tampering detection software is becoming increasingly important. Digital photographs have grown in popularity in recent years for a variety of applications. Print media, the website, and scholarly publications will be used to disseminate the information. . It's used as strong evidence in a variety of crimes, as well as documentation for a variety of reasons. The advancement of photo processing and editing software has simplified and made it more accessible to create and modify photographs. The most common types of picture forgery are copy-move forgery and splicing images. To conceal or display an error scenario, a portion of a photograph is duplicated and pasted further in the photograph, and splicing an image means two images in one image. This research looks at different types of digital image forgeries as well as forgery detection software. A review of existing approaches for detecting faked images was conducted. Keywords: Image, Tampering, Active approach, Passive approach, copy-move, splicing
Detect Malicious Web Pages Using Naive Bayesian Algorithm to Detect Cyber Threats
Aug 1, 2023Journal Wireless Personal Communications
publisher WOS: Journal on Modern Research Methodologies ISSN: 2835-3072
DOI https://doi.org/10.1007/s11277-023-10713-9
The increased number of cyber threats and the growing of websites pages lead to targeting them, that why is very necessary for developing an effective techniques in detecting and mitigating malicious website pages. To detect such threats, it propose an on-line system by using Python 3.7 and utilization of the Naive Bayesian algorithm as a powerful tool for identifying and categorizing potentially harmful web pages. This algorithm leverages a combination of statistical analysis and machine learning principles to analyze various features and attributes of web content, thereby determining their likelihood of being malicious. To achieve such system, at first it construct a comprehensive dataset comprising both malicious and legitimate website pages. The second step is extracting the relevant features like URL information from these pages (spelling mistakes, unusual characters and the strange domain names). These features are used in Training Naive Bayesian classifier that learns the patterns and characteristics of malicious web pages. Through the classification stage, the proposed model examines the features of unseen website pages and analyzes the URL carefully for distinguishing benign or malicious website pages. To evaluate the effectiveness of the proposed system, it conducted experiment of 7000 real website pages samples. The results demonstrate the capability of Naive Bayesian algorithm. 3800 website pages are detected as malicious pages, while 3200 are classified as benign pages. Additionally, the accuracy of the proposed system is compared with an existing method.
Survey on Computer Cyber Security
Sep 14, 2023Journal WOS: Journal on Modern Research Methodologies ISSN: 2835-3072
publisher WOS: Journal on Modern Research Methodologies ISSN: 2835-3072
DOI DOI 10.12694/scpe.v25i5.3046
Issue Issue 9, Year 2023
Volume 2
The growing reliance on computer systems and the increasing interconnectedness of the digital world have amplified the significance of computer cyber security. This survey aims to provide an overview of the current state of computer cyber security by examining key areas of concern, emerging threats, and the measures taken to mitigate risks. This survey begins by exploring the fundamental concepts of computer cyber security, including the importance of confidentiality, integrity, and availability of data. It delves into the various types of cyber threats faced by computer systems, such as malware, phishing attacks, data breaches, and social engineering techniques. Next, the survey investigates the common vulnerabilities and weaknesses that cyber attackers exploit to compromise computer security. This includes software vulnerabilities, weak authentication mechanisms, inadequate network security, and the challenges posed by emerging technologies like the Internet of Things (IoT) and cloud computing. The survey then discusses the countermeasures and best practices employed to safeguard computer systems against cyber threats. It covers the implementation of firewalls, antivirus software, intrusion detection systems, encryption protocols, and regular security updates. Additionally, it highlights the significance of user awareness training and policies to promote a culture of security within organizations .
Driver Drowsiness Detection
Aug 1, 2024Journal Scalable Computing: Practice and Experience
publisher ISSN 1895-1767, http://www.scpe.org
DOI DOI 10.12694/scpe.v25i5.3046
Issue Issues 5, pp. 4301–4311
Volume 25
The state of the driver of being extremely tired or sleepy through the operation of the vehicle is called driver drowsiness. Different factors caused this state such as alcohol, lack of sleep, and the side effect of some medication. The drowsiness of drivers is a serious safety lead to accidents or fatalities on external and internal roads. The increased number of road accidents resulted from drowsy driving. A special smart, reliable, and accurate system, Using Python language 3.6 for Windows, was designed to build an alert system for drivers in detecting drowsiness driver. This system is crucial in reducing accidents road by the ability to concentrate, react quickly, and produce sound decisions through driving. This system implements a real-time detector that can monitor the states of drivers through driving. Smart cameras with 16-megapixel were used to ensure that capturing photos have a high quality. These cameras were used in gathering the driver’s dataset in different alertness states, including both alert states and drowsy. The collected dataset is processed by extracting all relevant features such as head movement, yawning, and eye closure, which were used in identifying the driver’s drowsiness. Python’s libraries such as TensorFlow, OpenCV, Keras, and Pygame are used for extracting all the above features. Viola-Jones algorithm is used in face eye region detecting and extracting from the image of the face in the proposed system. A Support Vector Machine (SVM) algorithm was used in classifying between drowsy and non-drowsy drivers. The system is tested and evaluated in the real world, to ensure that the
Using Flask for SQLIA Detection and Protection
May 1, 2025Journal Tikrit Journal of Engineering Science
publisher TJES, College of Engineering, Tikrit University
Issue 27
Volume 2
Using Flask for SQLIA Detection and Protection ABSTRACT At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.