default search action
ISDFS 2021: Elazig, Turkey
- Asaf Varol, Murat Karabatak, Ihan Varol:
9th International Symposium on Digital Forensics and Security, ISDFS 2021, Elazig, Turkey, June 28-29, 2021. IEEE 2021, ISBN 978-1-6654-4481-1 - Muhammad Raheel Raza, Walayat Hussain, Erkan Tanyildizi, Asaf Varol:
Sentiment Analysis using Deep Learning in Cloud. 1-5 - Ilker Özçelik:
CAPEN: Cryptographic Accumulator based Privacy Preserving Exposure Notification. 1-6 - Bilyaminu Muhammad, Asaf Varol:
A Symptom-Based Machine Learning Model for Malaria Diagnosis in Nigeria. 1-6 - Habib Ibrahim, Fatih Özkaynak:
A Substitution-Box Structure Based on Crowd Supply Infinite Noise TRNG. 1-5 - Emilio Werner, Jhennifer Cristine Matias, Marcelo Daniel Berejuck, Hamadou Saliah-Hassane:
Evaluation of blockchain techniques to ensure secure access on remote FPGA laboratories. 1-6 - Sabeer Saeed, Mohammed Mansur Abubakar, Murat Karabatak:
Software Engineering for Data Mining (ML-Enabled) Software Applications. 1-9 - Peter Bathich, Mohammad Malli, Hussein Hazimeh:
Exploiting Vulnerabilities of IP Cameras: Lebanon Case Study. 1-6 - Salim Jibrin Danbatta, Asaf Varol:
Modeling and Forecasting of Tourism Time Series Data using ANN-Fourier Series Model and Monte Carlo Simulation. 1-6 - Yuliya D. Vybornova:
Method for Protection of Heterogeneous Data based on Pseudo-Holographic Watermarks. 1-5 - Amar A. Rasheed, Hacer Varol, Mohamed Baza:
Clock Gating-Assisted Malware (CGAM): Leveraging Clock Gating On ARM Cortex M* For Attacking Subsystems Availability. 1-8 - Omar Iskndar Ahmed, Cihan Varol:
Detection of Web Attacks via PART Classifier. 1-4 - Firdevs Sevde Toker, Kevser Ovaz Akpinar, Ibrahim Özçelik:
MITRE ICS Attack Simulation and Detection on EtherCAT Based Drinking Water System. 1-6 - Süleyman Muhammed Arikan, Sami Acar:
A Data Mining Based System for Automating Creation of Cyber Threat Intelligence. 1-7 - Mehtap Ülker, Ahmet Bedri Özer:
TTSD: A novel dataset for Turkish Text Summarization. 1-6 - Gökhan Azizoglu, Ahmet Nusret Toprak:
A novel reversible fragile watermarking in DWT domain for tamper localization and digital image authentication. 1-6 - Engin Karacan, Sedat Akleylek, Aykut Karakaya:
PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices. 1-5 - Ahmet Furkan Aydogan, Min Kyung An, Mehmet Yilmaz:
A New Approach to Social Engineering with Natural Language Processing: RAKE. 1-7 - Ömer Durmus, Asaf Varol:
Analysis and Modeling of Cyber Security Precautions. 1-8 - Danyal Farhat, Malik Shahzad Awan:
A Brief Survey on Ransomware with the Perspective of Internet Security Threat Reports. 1-6 - Ahmet Furkan Aydogan, Narasimha K. Shashidhar:
Prevention Pre-Violence in E-Labs with Machine Learning: PVE. 1-5 - Frank Williams, Cihan Varol, Amar Rasheed, Narasimha K. Shashidhar:
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling. 1-7 - Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Watermarking Graph Neural Networks by Random Graphs. 1-6 - Süleyman Muhammed Arikan, Özgür Yürekten:
Development and Maintenance of Mobile Forensic Investigation Software Modules. 1-6 - David Okore Ukwen, Murat Karabatak:
Review of NLP-based Systems in Digital Forensics and Cybersecurity. 1-9 - David Caballero, Francisco Gonzalez, Sheikh Ariful Islam:
Analysis of Network Protocols for Secure Communication. 1-6 - Sultan Lök, Murat Karabatak:
Earthquake Prediction by Using Time Series Analysis. 1-6 - Izidor Mlakar, Primoz Jeran, Valentino Safran, Vangelis Logothetis:
A Cost-Effective Security Framework to protect micro enterprises: PALANTIR e-commerce use case. 1-6 - Muhammad Raheel Raza, Asaf Varol, Walayat Hussain:
Blockchain-based IoT: An Overview. 1-6 - Pushpinder Kaur Chouhan, Bronagh Quigley, Alfie Beard, Liming Chen:
A Cost Based Dynamic Response Method for Internet of Things Cyberattacks. 1-6 - Mehmet Elmaci, Ahmet Nusret Toprak, Veysel Aslantas:
A Comparative Study on the Detection of Image Forgery of Tampered Background or Foreground. 1-5 - Ibrahim Özçelik, Murat Iskefiyeli, Musa Balta, Kevser Ovaz Akpinar, Firdevs Sevde Toker:
CENTER Water: A Secure Testbed Infrastructure Proposal For Waste and Potable Water Management. 1-7 - Patrick O'Dougherty, Keith Ferrel, Serkan Varol:
A Study of Semiconductor Defects within Automotive Manufacturing using Predictive Analytics. 1-6 - Gulsum Akkuzu Kaya, Abdul Badwan:
Fuzzy Rule Based Classification System from Vehicle-to-Grid Data. 1-7 - Abdelaziz Bouras, Houssem Gasmi, Abdelhak Belhi, Assam Hammi, Belaïd Aouni:
Enterprise Information Systems enhancement: A HyperLedger Fabric based application. 1-5 - Roberto Solís, Narasimha K. Shashidhar, Cihan Varol:
A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses. 1-5 - Ceyhun Karatas, Muaz Gultekin:
EDI Based Secure Desing Pattern For Logistic and Supply Chain. 1-5 - Salih Yesir, Ibrahim Sogukpinar:
Malware Detection and Classification Using fastText and BERT. 1-6 - Müslim Alanoglu, Songül Karabatak, Murat Karabatak:
Investigation of Self-Directed Learning Skills of Distance Education Students. 1-4 - Gulsum Akkuzu Kaya, Abdul Badwan:
Selecting the Best Forensic Report by Using a Group Decision Making Method: A case study on three forensic reports. 1-5 - Günes Gürsoy, Asaf Varol:
Prediction of Arrhythmia with Machine Learning Algorithms. 1-5 - Ashraf Tantawy:
Automated Malware Design for Cyber Physical Systems. 1-6 - Mustafa Ulas, Hakan Güler:
A New Sustainable Hybrid Software Development Methodology: FIRAT-UG. 1-4 - Sibel Gülmez, Ibrahim Sogukpinar:
Graph-Based Malware Detection Using Opcode Sequences. 1-5 - Müslim Alanoglu, Songül Karabatak, Murat Karabatak:
Problems Encountered in Distance Teaching Practices Course and Solution Suggestions. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.