Given the world's current situation with the COVID-19 pandemic, several businesses have rece... more Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current cloud computing systems. Finally, we present a variety of securi...
With the onset of the 2019 coronavirus disease outbreak (COVID19), the shift from traditional in-... more With the onset of the 2019 coronavirus disease outbreak (COVID19), the shift from traditional in-person care to mostly virtual or remote care has been accelerated. Choosing the appropriate telemedicine communication services and interaction modes is critical to the success of remote disease management infrastructures for a better future healthcare system. This paper aims to investigate the possibility of the adoption of telemedicine in Duhok province that becomes an urgent need due to Covid-19. However, it begins with a systematic review of telemedicine applications development merits and demerits in different countries to the best fit. A questionnaire with private and public hospitals to gauge public acceptance of telemedicine in Duhok province in the Kurdistan Region has been designed and implemented. The results show that 58.8% were looking forward to this platform, whereas 34.5% were neutral, and 6.7% were negative. The survey results also show the most important services required from the point of view of patients, the public, and health care staff to be adopted and implemented in Duhok province.
Given the world's current situation with the COVID-19 pandemic, several businesses have recently ... more Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current cloud computing systems. Finally, we present a variety of security threats targeting and addressing cloud storage services. In particular, we raise awareness on security issues that cloud organizations including cloud service providers, data owners and cloud users face and address them.
Asian Journal of Research in Computer Science, 2021
Smart phones are becoming essential in our lives, and Android is one of the most popular operatin... more Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.
Asian Journal of Research in Computer Science, 2021
Smart phones are becoming essential in our lives, and Android is one of the most popular operatin... more Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.
Given the world's current situation with the COVID-19 pandemic, several businesses have rece... more Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current cloud computing systems. Finally, we present a variety of securi...
With the onset of the 2019 coronavirus disease outbreak (COVID19), the shift from traditional in-... more With the onset of the 2019 coronavirus disease outbreak (COVID19), the shift from traditional in-person care to mostly virtual or remote care has been accelerated. Choosing the appropriate telemedicine communication services and interaction modes is critical to the success of remote disease management infrastructures for a better future healthcare system. This paper aims to investigate the possibility of the adoption of telemedicine in Duhok province that becomes an urgent need due to Covid-19. However, it begins with a systematic review of telemedicine applications development merits and demerits in different countries to the best fit. A questionnaire with private and public hospitals to gauge public acceptance of telemedicine in Duhok province in the Kurdistan Region has been designed and implemented. The results show that 58.8% were looking forward to this platform, whereas 34.5% were neutral, and 6.7% were negative. The survey results also show the most important services required from the point of view of patients, the public, and health care staff to be adopted and implemented in Duhok province.
Given the world's current situation with the COVID-19 pandemic, several businesses have recently ... more Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current cloud computing systems. Finally, we present a variety of security threats targeting and addressing cloud storage services. In particular, we raise awareness on security issues that cloud organizations including cloud service providers, data owners and cloud users face and address them.
Asian Journal of Research in Computer Science, 2021
Smart phones are becoming essential in our lives, and Android is one of the most popular operatin... more Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.
Asian Journal of Research in Computer Science, 2021
Smart phones are becoming essential in our lives, and Android is one of the most popular operatin... more Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.
Uploads
Papers by Maria A. Omer