{"id":28761,"date":"2025-03-06T17:39:31","date_gmt":"2025-03-06T14:39:31","guid":{"rendered":"https:\/\/uoitc.edu.iq\/2025\/masters-thesis-at-institute-of-informatics-on-predicting-cyber-attacks-using-machine-learning-techniques\/"},"modified":"2025-03-06T17:39:31","modified_gmt":"2025-03-06T14:39:31","slug":"masters-thesis-at-institute-of-informatics-on-predicting-cyber-attacks-using-machine-learning-techniques","status":"publish","type":"post","link":"https:\/\/uoitc.edu.iq\/ar\/2025\/masters-thesis-at-institute-of-informatics-on-predicting-cyber-attacks-using-machine-learning-techniques\/","title":{"rendered":"\u0631\u0633\u0627\u0644\u0629 \u0645\u0627\u062c\u0633\u062a\u064a\u0631 \u0641\u064a \u0645\u0639\u0647\u062f \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u064a\u0629 \u062d\u0648\u0644 \u062a\u0648\u0642\u0639 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0642\u0646\u064a\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u0645 \u0627\u0644\u0627\u0644\u064a"},"content":{"rendered":"<p>\u062c\u0631\u062a \u0641\u064a \u0645\u0639\u0647\u062f \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u064a\u0629 \u0644\u0644\u062f\u0631\u0627\u0633\u0627\u062a \u0627\u0644\u0639\u0644\u064a\u0627 \u0628\u062c\u0627\u0645\u0639\u0629 \u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0645\u0646\u0627\u0642\u0634\u0629 \u0631\u0633\u0627\u0644\u0629 \u0645\u0627\u062c\u0633\u062a\u064a\u0631 \u0644\u0644\u0637\u0627\u0644\u0628 (\u062d\u0633\u064a\u0646 \u0633\u0644\u0627\u0645 \u0639\u0644\u064a).<br \/>\n\u0648\u062c\u0627\u0621\u062a \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0641\u064a \u062a\u062e\u0635\u0635 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0628\u0627\u062a \u0648\u0627\u0644\u0645\u0648\u0633\u0648\u0645\u0629 \u0628\u0640:<br \/>&#8221; \u062a\u0648\u0642\u0639 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0642\u0646\u064a\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u0645 \u0627\u0644\u0627\u0644\u064a &#8220;<br \/>\u201c Prediction of Cyber Attacks Using Machine Learning Techniques \u201c<\/p>\n<p>\u0648\u0628\u062d\u062b\u062a \u0631\u0633\u0627\u0644\u0629 \u0627\u0644\u0645\u0627\u062c\u0633\u062a\u064a\u0631 \u0623\u0647\u0645\u064a\u0629 \u0627\u0644\u0645\u0631\u0627\u062d\u0644 \u0627\u0644\u0623\u0648\u0644\u064a\u0629 \u0644\u0645\u0639\u0627\u0644\u062c\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0648\u0627\u062e\u062a\u064a\u0627\u0631 \u0627\u0644\u0645\u064a\u0632\u0627\u062a \u0641\u064a \u0645\u0646\u0638\u0648\u0645\u0629 \u0623\u0646\u0638\u0645\u0629 \u0643\u0634\u0641 \u0627\u0644\u062a\u0633\u0644\u0644\u060c \u0644\u0628\u0646\u0627\u0621 \u0623\u0646\u0638\u0645\u0629 \u0642\u0627\u0628\u0644\u0629 \u0644\u0644\u062a\u0637\u0648\u064a\u0631 \u0648\u0645\u0648\u062b\u0648\u0642\u0629 \u0648\u0641\u0639\u0627\u0644\u0629\u060c \u062d\u064a\u062b \u062a\u0624\u0643\u062f \u0627\u0644\u0645\u0646\u0647\u062c\u064a\u0629 \u0627\u0644\u0645\u0642\u062a\u0631\u062d\u0629 \u0639\u0644\u0649 \u0645\u0642\u0627\u0631\u0646\u0629 \u0627\u0644\u0646\u0645\u0627\u0630\u062c \u0641\u064a \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0642\u0648\u0629 \u0627\u0644\u062a\u0639\u0644\u0645 \u0627\u0644\u0622\u0644\u064a \u0648\u0627\u0644\u062a\u0639\u0644\u0645 \u0627\u0644\u0639\u0645\u064a\u0642.<br \/>\u0648\u0628\u0639\u062f \u0645\u0646\u0627\u0642\u0634\u0629 \u0627\u0644\u0628\u0627\u062d\u062b \u0641\u064a \u0645\u0634\u0631\u0648\u0639 \u0628\u062d\u062b\u0647 \u0648\u0645\u0627 \u062a\u0648\u0635\u0644 \u0627\u0644\u064a\u0647 \u0645\u0646 \u0646\u062a\u0627\u0626\u062c \u0645\u0646 \u0642\u0628\u0644 \u0631\u0626\u064a\u0633 \u0648\u0623\u0639\u0636\u0627\u0621 \u0644\u062c\u0646\u0629 \u0627\u0644\u0645\u0646\u0627\u0642\u0634\u0629 \u062d\u0635\u0644 \u0627\u0644\u0637\u0627\u0644\u0628 \u0639\u0644\u0649 \u062f\u0631\u062c\u0629 \u0627\u0644\u0645\u0627\u062c\u0633\u062a\u064a\u0631 \u0628\u062a\u0642\u062f\u064a\u0631 \u062c\u064a\u062f \u062c\u062f\u0627\u064b .  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u062c\u0631\u062a \u0641\u064a \u0645\u0639\u0647\u062f \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u064a\u0629 \u0644\u0644\u062f\u0631\u0627\u0633\u0627\u062a \u0627\u0644\u0639\u0644\u064a\u0627 \u0628\u062c\u0627\u0645\u0639\u0629 \u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a  [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":28757,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,179],"tags":[183,181],"class_list":["post-28761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-68","category-179","tag-home-ar","tag-181"],"_links":{"self":[{"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/posts\/28761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/comments?post=28761"}],"version-history":[{"count":0,"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/posts\/28761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/media\/28757"}],"wp:attachment":[{"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/media?parent=28761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/categories?post=28761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uoitc.edu.iq\/ar\/wp-json\/wp\/v2\/tags?post=28761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}