{"id":3303,"date":"2019-06-17T23:30:05","date_gmt":"2019-06-17T20:30:05","guid":{"rendered":"https:\/\/ishik.edu.iq\/conf\/iec\/?p=3303"},"modified":"2020-11-04T10:04:45","modified_gmt":"2020-11-04T07:04:45","slug":"information-security-and-its-new-challenges","status":"publish","type":"post","link":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/","title":{"rendered":"Information Security and its new challenges"},"content":{"rendered":"<h4><span style=\"color: #800000;\"><strong>The Cognitive Computation and its Applications in Information Security<\/strong><\/span><\/h4>\n<p><strong>Prof. Dr. Eng. Sattar B. Sadkhan, SMIEEE<\/strong><br \/>\nIT College, Babylon University, IRAQ<br \/>\ndrengsattar@ieee.org<\/p>\n<p><strong><em>Abstract:<\/em><\/strong>\u00a0Cognitive science is the interdisciplinary study of mind and intelligence, philosophy, psychology, artificial intelligence, neuroscience, education linguistics, and anthropology. The Cognitive neuroscience\u00a0is an academic field concerned with the scientific study of the biological processes and aspects that underlie\u00a0Cognition. with a specific focus on the neural connections in the brain which are involved in\u00a0mental processes. It addresses the questions of how psychological\/cognitive activities are affected or controlled by neural circuits in the brain.<br \/>\nThe cognitive security is characterized by technology that is able to understand, reason and learn. A much greater scale of Key point relevant security data is now accessible with cognitive systems that can process and interpret the 80% of today&#8217;s data that&#8217;s unstructured, such as written and spoken language.<\/p>\n<p><em><strong>Profile:<\/strong><\/em><br \/>\nProf. \u00a0Dr. Eng. Sattar B. Sadkhan Al-Maliky &#8211; SMIEEE<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3308 alignright\" src=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg\" alt=\"\" width=\"123\" height=\"165\" srcset=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg 200w, https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan-125x168.jpg 125w\" sizes=\"auto, (max-width: 123px) 100vw, 123px\" \/><br \/>\nWireless Digital Communication and Information Security<br \/>\n&#8211; Diploma in Radar Repairing in IRAQ (1970-1974(<br \/>\n&#8211; B.Sc. Electrical and Electronic Engineering, IRAQ , 1978<br \/>\n&#8211; MSc, Wireless Digital Communication, Czech Republic, 1981<br \/>\n&#8211; PhD, Detection of Digital Modulated Signals, Czech Republic, 1984<br \/>\n&#8211; Diploma, Information Security, Crypto \u2013 Switzerland, 1988.<br \/>\n&#8211; Published more than (230 ) papers in International Conferences, and International Journals.<br \/>\n&#8211; Supervised (140) M.Sc. and PhD Postgraduates since 1984<br \/>\n&#8211; Editor in Chief of (8) International Scientific Journals (in many countries).<br \/>\n&#8211; Member of Editing Board of (32) International Journal (in many countries).<br \/>\n&#8211; Member of International Scientific Committees more than (230) International Conferences committees.).<br \/>\nKey Note Speaker in Many International Conferences (since 2011) in many International Conferences in (Turkey, China, India, Pakistan, Malaysia , in IRAQ)<\/p>\n<h4><span style=\"color: #800000;\"><strong>The Blockchain Technology as a New Trend: Abstracting, Usability, and Future Directions<\/strong><\/span><\/h4>\n<p><strong>Assist. Prof. Dr. Jumana Waleed<\/strong><br \/>\nDepartment of Computer Science, College of Science, University of Diyala, Iraq jumanawaleed@sciences.uodiyala.edu.iq<\/p>\n<p><em><strong>Abstract: <\/strong><\/em>Bitcoin paved the way for a highly successful FinTech (Financial Technology) application on the basis of a newer technology termed blockchain. Blockchain is one of the most disruptive and promising emerging technologies, and it appears to have the potential for significantly affecting the accounting and auditing fields. Essentially, blockchain is a freely open and publicly shared database that keeps track of transactions and protects data from tampering. Once a transaction is committed, it is practically irreversible and immutable unless the majority of the blockchain users collude. Blockchain technology provides a method to share a database among the participants even if they do not trust each other, and it creates a marketplace to transfer assets based on a peer-to-peer network without a central authority. Using cryptographic algorithms (e.g., digital signature and hash function), the blockchain protocol is able to guarantee data integrity, making it impossible to tamper with the transaction history. The aim of this workshop is to provide an overview of the Blockchain technology, the main advantages, disadvantages, application areas, and future directions.<\/p>\n<p><em><strong>Profile:<\/strong><\/em><br \/>\nAssist. Prof. Dr. Jumana Waleed Salih<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3307 alignright\" src=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-jumana-waleed.jpg\" alt=\"\" width=\"122\" height=\"165\" srcset=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-jumana-waleed.jpg 148w, https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-jumana-waleed-125x169.jpg 125w\" sizes=\"auto, (max-width: 122px) 100vw, 122px\" \/><br \/>\nEducation<strong>: <\/strong>Doctor of Philosophy in Science (Computer Application Technology), School of Information Science and Engineering, Central South University, China, (2011 &#8211; 2015).<br \/>\nMaster Degree in Computer Science\/Data Security, Computer Science Department, University of Technology, Baghdad, Iraq, (2006 &#8211; 2009).<br \/>\nWork Experience: Lecturer, Computer Science Department, College of Science, University of Diyala, Iraq, (2009 &#8211; till now).<br \/>\nResearch Interests: Home Automation; Forensics Techniques; Optimization Techniques; Information Security, Digital image processing.<br \/>\nPublications: More than 30 scientific research papers indexed in Scopus and Thomson Reuters.<\/p>\n<h4><span style=\"color: #800000;\"><strong>Blockchain Technology <\/strong><strong>(Common Risks and Auditing Environment)<\/strong><\/span><\/h4>\n<p><strong>Assist. Prof. Dr. Thekra Abbas<\/strong><br \/>\nDepartment of Computer Science, College of Science, Mustansiriyah, Iraq<br \/>\nthekra.abbas@uomustansiriyah.edu.iq<\/p>\n<p><em><strong>Abstract: <\/strong><\/em>Since its inception, the blockchain technology has shown promising application prospects. From the initial cryptocurrency to the current smart contract, blockchain has been applied to many fields. Blockchain is one of the megatrends for the next years. Researchers and organizations are starting to understand the potential benefits of this technology and are exploring how it can disrupt the world we live in with a diverse range of applications. But the truth is the ability to move blockchain from concept to adoption and production has been minimal yet. In this workshop, we conduct a systematic study on the risks threats to blockchain and survey the corresponding real attack to popular blockchain systems. We also review the security enhancement solutions for blockchain, which could be used in the development of various blockchain systems, and suggest some future directions to stir research efforts into this area.<\/p>\n<p><em><strong>Profile:<\/strong><\/em><br \/>\nAssist. Prof. Dr. Thekra Hydar Ali Abbas<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3309 alignright\" src=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-thikra-abbas.gif\" alt=\"\" width=\"127\" height=\"169\" \/><br \/>\nEducation: Doctor of Philosophy in Science (Computer Application Technology), School of Information Science and Engineering, Central South University, China, (2009 &#8211; 2013).<br \/>\nMaster Degree in Computer Science, Computer Science Department, Mustansiriyah University, Baghdad, Iraq, (2002 &#8211; 2004).<br \/>\nWork Experience: Lecturer, Computer Science Department, College of Science, Mustansiriyah University, Iraq, (2000 \u2013 till now).<br \/>\nResearch Interests: Digital image processing; Multimedia; Forensics Techniques; Information Security, Medical Image Processing; Data Mining.<br \/>\nPublications: More than 20 scientific research papers indexed in Scopus and Thomson Reuters.<\/p>\n<h4><strong><span style=\"color: #800000;\">Emotion in Decision Making<\/span><\/strong><\/h4>\n<p><strong>Rusul Sattar. B. Sadkhan, MIEEE<\/strong><br \/>\nAl-Mustaqbel University College- Babylon-Iraq<br \/>\nrusul.sattar2014@gmail.com<\/p>\n<p><em><strong>Abstract:<\/strong> <\/em>Emotions are one of the important unconscious mechanisms that influence human behaviors, attentions, and decision-making. The emotion process helps to determine how humans perceive their internal status and needs in order to form consciousness of an individual. Emotions have been studied from multidisciplinary perspectives and covered a wide range of empirical and psychological topics, such as understanding the emotional processes, creating cognitive and computational models of emotions, and applications in computational intelligence. The aim of this talk will describe the effects of emotion ( of human) on taking a decision.<\/p>\n<p><em><strong>Profile:<\/strong><\/em><br \/>\nRusul Sattar B. Sadkhan<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3306 alignright\" src=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/rusul-sattar.png\" alt=\"\" width=\"133\" height=\"156\" srcset=\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/rusul-sattar.png 809w, https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/rusul-sattar-256x300.png 256w, https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/rusul-sattar-768x900.png 768w, https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/rusul-sattar-125x146.png 125w, https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/rusul-sattar-615x721.png 615w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><br \/>\nEducation:<br \/>\nB.SC, Computer Science \u2013 Iraq (2012)<br \/>\nM.Sc. Information Technology \u2013 Iran\/ AL- Razi University (2017)<br \/>\nExperience:<br \/>\nNetBeans, Eclipse, PHP, Asp.Net, Clips, Fuzzy Clips, Matlab, Arduino, Android Studio, Portege, SQL Server, EEG, ECG, Emotion Detection<br \/>\nLecturer and programmer, Iraq-Babel, Al-Mustaqbal University Collage (2018-)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cognitive Computation and its Applications in Information Security Prof. Dr. Eng. Sattar B. Sadkhan, SMIEEE IT College, Babylon University, IRAQ drengsattar@ieee.org Abstract:\u00a0Cognitive science is the interdisciplinary study of mind and intelligence, philosophy, psychology, artificial intelligence, neuroscience, education linguistics, and anthropology. The Cognitive neuroscience\u00a0is an academic field concerned with the scientific study of the biological &hellip; <\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-3303","post","type-post","status-publish","format-standard","hentry","category-news-updates"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security and its new challenges - Tishk International university<\/title>\n<meta name=\"description\" content=\"The Cognitive Computation and its Applications in Information Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security and its new challenges - Tishk International university\" \/>\n<meta property=\"og:description\" content=\"The Cognitive Computation and its Applications in Information Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-17T20:30:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-04T07:04:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg\" \/>\n<meta name=\"author\" content=\"Web Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\"},\"author\":{\"name\":\"Web Admin\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203\"},\"headline\":\"Information Security and its new challenges\",\"datePublished\":\"2019-06-17T20:30:05+00:00\",\"dateModified\":\"2020-11-04T07:04:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\"},\"wordCount\":979,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#organization\"},\"image\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg\",\"articleSection\":[\"Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\",\"name\":\"Information Security and its new challenges - Tishk International university\",\"isPartOf\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg\",\"datePublished\":\"2019-06-17T20:30:05+00:00\",\"dateModified\":\"2020-11-04T07:04:45+00:00\",\"description\":\"The Cognitive Computation and its Applications in Information Security\",\"breadcrumb\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg\",\"contentUrl\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg\",\"width\":200,\"height\":268},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conferences.tiu.edu.iq\/iec\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security and its new challenges\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#website\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/\",\"name\":\"TIU - IEC 2020\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conferences.tiu.edu.iq\/iec\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#organization\",\"name\":\"Tishk International University\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png\",\"contentUrl\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png\",\"width\":116,\"height\":63,\"caption\":\"Tishk International University\"},\"image\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\",\"https:\/\/www.instagram.com\/tishk.international.university\/\",\"https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203\",\"name\":\"Web Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"caption\":\"Web Admin\"},\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/author\/web_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security and its new challenges - Tishk International university","description":"The Cognitive Computation and its Applications in Information Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/","og_locale":"en_US","og_type":"article","og_title":"Information Security and its new challenges - Tishk International university","og_description":"The Cognitive Computation and its Applications in Information Security","og_url":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2019-06-17T20:30:05+00:00","article_modified_time":"2020-11-04T07:04:45+00:00","og_image":[{"url":"https:\/\/www.conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg","type":"","width":"","height":""}],"author":"Web Admin","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Web Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#article","isPartOf":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/"},"author":{"name":"Web Admin","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203"},"headline":"Information Security and its new challenges","datePublished":"2019-06-17T20:30:05+00:00","dateModified":"2020-11-04T07:04:45+00:00","mainEntityOfPage":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/"},"wordCount":979,"commentCount":0,"publisher":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#organization"},"image":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg","articleSection":["Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/","url":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/","name":"Information Security and its new challenges - Tishk International university","isPartOf":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage"},"image":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg","datePublished":"2019-06-17T20:30:05+00:00","dateModified":"2020-11-04T07:04:45+00:00","description":"The Cognitive Computation and its Applications in Information Security","breadcrumb":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#primaryimage","url":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg","contentUrl":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2019\/06\/dr-sattar-sadkhan.jpg","width":200,"height":268},{"@type":"BreadcrumbList","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/information-security-and-its-new-challenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conferences.tiu.edu.iq\/iec\/"},{"@type":"ListItem","position":2,"name":"Information Security and its new challenges"}]},{"@type":"WebSite","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#website","url":"https:\/\/conferences.tiu.edu.iq\/iec\/","name":"TIU - IEC 2020","description":"","publisher":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conferences.tiu.edu.iq\/iec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#organization","name":"Tishk International University","url":"https:\/\/conferences.tiu.edu.iq\/iec\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/","url":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png","contentUrl":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png","width":116,"height":63,"caption":"Tishk International University"},"image":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni","https:\/\/www.instagram.com\/tishk.international.university\/","https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q"]},{"@type":"Person","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203","name":"Web Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","caption":"Web Admin"},"url":"https:\/\/conferences.tiu.edu.iq\/iec\/author\/web_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts\/3303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/comments?post=3303"}],"version-history":[{"count":5,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts\/3303\/revisions"}],"predecessor-version":[{"id":3314,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts\/3303\/revisions\/3314"}],"wp:attachment":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/media?parent=3303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/categories?post=3303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/tags?post=3303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}