


default search action
ISDFS 2019: Barcelos, Portugal
- 7th International Symposium on Digital Forensics and Security, ISDFS 2019, Barcelos, Portugal, June 10-12, 2019. IEEE 2019, ISBN 978-1-7281-2827-6

- Faisal Shaman, Bogdan V. Ghita

, Nathan L. Clarke
, Abdulrahman Alruban:
User Profiling Based on Application-Level Using Network Metadata. 1-8 - Peshraw Ahmed Abdalla

, Asaf Varol
:
Advantages to Disadvantages of Cloud Computing for Small-Sized Business. 1-6 - Noushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer, Christoph G. Schütz:

An Integrated Framework to Examine Mobile Users' Pathway from Threat Cognition to Action. 1-5 - Halil Ozturk, Sevginur Teke, Murat Karabatak:

A New Approach for Exiting from Parking Lot based on Artificial Neural Network. 1-6 - Hunor Sándor, Béla Genge, Piroska Haller

, Andrei Bica:
A Security-Enhanced Interoperability Middleware for the Internet of Things. 1-6 - Anjali Menon:

Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking. 1-5 - Eva Tuba

, Raka Jovanovic
, Dejan Zivkovic
, Marko Beko, Milan Tuba:
Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation. 1-6 - Sertaç Yaman, Merve Yildirim, Bircan Karmshoglu, Yavuz Erol

, Hasan Kürüm:
Image and Video Processing Applications Using Xilinx System Generator. 1-5 - Tala Tafazzoli, Babak Sadeghiyan:

A four-step method for investigating network worm propagation. 1-7 - Çagatay Ünal Yurtoz, Ismail Burak Parlak

:
Measuring the effects of emojis on Turkish context in sentiment analysis. 1-6 - Giuseppe Amato

, Fabrizio Falchi
, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas, Alessandro Trivilini, Claudio Vairo:
Face Verification and Recognition for Digital Forensics and Information Security. 1-6 - Zhala Sarkawt Othman

, Mehmet Kaya:
Refactoring Code Clone Detection. 1-6 - Peter Szabó, Béla Genge:

Circle Map for Internet of Things Networks. 1-5 - João Lopes, Carlos Serrão

, Luís Nunes
, Ana de Almeida, João Oliveira
:
Overview of machine learning methods for Android malware identification. 1-6 - Sankardas Roy, Yan Wu, Kristina N. LaVenia:

Experience of Incorporating NIST Standards in a Digital Forensics Curricula. 1-6 - Erkan Tanyildizi

, Gokce Yildirim:
Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy Animals. 1-4 - Yesim Ülgen Sonmez

, Asaf Varol
:
Legal and Technical Aspects of Web Forensics. 1-7 - Ayse Cengiz, Derya Avci

:
Review of Chaotic Based S-Box Structures. 1-6 - Samer Hamdani, Hassan Sbeyti:

A Comparative study of COAP and MQTT communication protocols. 1-5 - Maha F. Sabir, James H. Jones, Hang Liu, Alex V. Mbaziira:

Predicting Stealthy Watermarks in Files Using Deep Learning. 1-6 - Jose Garcia, Cihan Varol

:
SmartThings Event Export using SmartApps. 1-6 - Barbora Celesova, Jozef Val'ko, Rudolf Grezo, Pavol Helebrandt

:
Enhancing security of SDN focusing on control plane and data plane. 1-6 - Souheil Chukry, Hassan Sbeyti:

Security Enhancement in Storage Area Network. 1-5 - Ahmed Abdlrazaq, Serkan Varol:

A Trust Management Model for IoT. 1-6 - Emad Sami Jaha:

Augmenting Gabor-based Face Recognition with Global Soft Biometrics. 1-5 - Andrew Johnson, Ross Davies:

Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods. 1-6 - Nilay Yildirim, Asaf Varol

:
A Research on Security Vulnerabilities in Online and Mobile Banking Systems. 1-5 - Bradley Lee Snyder, James H. Jones:

Determining the Effectiveness of Data Remanence Prevention in the AWS Cloud. 1-6 - Sapan Noori Azeez, Serkan Varol:

Securing Database Management Systems using RAM Serial Numbers. 1-5 - Ghazi Abdalla Abdalrahman

, Hacer Varol:
Defending Against Cyber-Attacks on the Internet of Things. 1-6 - Mohammed Akour

, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh:
Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers. 1-7 - Ebu Yusuf Güven

, Mehmet Yavuz Yagci
, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin
:
A Survey on Backbone Attack. 1-5 - Aleksey Maksimov

, Mikhail Gashnikov
:
Parameter space dimension reduction for multidimensional signals differential pulse-code modulation interpolator. 1-4 - Osman Altay

, Mustafa Ulas
, Mahmut Ozer, Ece Genc:
An Expert System to Predict Warfarin Dosage in Turkish Patients Depending on Genetic and Non-Genetic Factors. 1-6 - Long Chen, Yi Zhong, Weidong Ai, Difang Zhang:

Continuous Authentication Based on User Interaction Behavior. 1-6 - Yesim Ülgen Sonmez

, Asaf Varol
:
New Trends in Speech Emotion Recognition. 1-7 - Yildiray Yigit, Murat Karabatak:

A Stenography Application for Hiding Student Information into an Image. 1-4 - Zhiqing Zhang, Hiroshi Esaki, Hideya Ochiai:

Analysis of Malware Hidden Behind Firewalls with Back Scans. 1-6 - Songül Karabatak, Murat Karabatak:

Information Security Awareness of School Administrators. 1-6 - Mirac Karmlslloglu

, Feride Kulali:
Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation Analysis (DFA). 1-4 - Rayan Sulaiman Khalaf, Asaf Varol

:
Digital Forensics: Focusing on Image Forensics. 1-5 - Yucel Burhan, Firat Artuger, Fatih Özkaynak:

A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms. 1-5 - Songul Karakus

, Engin Avci:
Application of Similarity-Based Image Steganography Method to Computerized Tomography Images. 1-4 - Shalaw Mshir, Asaf Varol

:
A New Model for Creating Layer Planes Using Steganography for Text Hiding. 1-5 - Özgür Alaca, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin:

A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector. 1-6 - Mikhail Gashnikov

:
Multidimensional signal interpolation based on parametric space dimension reduction. 1-5 - Sevinç Ay, Murat Karabatak:

A Target Tracking Application On Mobese Videos. 1-5 - Salim Jibrin Danbatta

, Asaf Varol
:
Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation. 1-5 - Anna Egorova, Victor Fedoseev

:
Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study. 1-6 - Nuno Mateus Coelho

, Miguel Peixoto, Maria Manuela Cruz-Cunha
:
Prototype of a paranoid mobile operating system distribution. 1-6 - Gamzepelin Aksoy

, Murat Karabatak:
Performance Comparison of New Fast Weighted Naïve Bayes Classifier with Other Bayes Classifiers. 1-5 - Sundar Krishnan

, Mingkui Wei:
SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident Forensics. 1-6 - Hussein Farooq Tayeb, Cihan Varol

:
Android Mobile Device Forensics: A Review. 1-7 - Abdalbasit Mohammed Qadir, Nurhayat Varol:

A Review Paper on Cryptography. 1-6 - Shreya Udhani, Alexander Withers, Masooda N. Bashir:

Human vs Bots: Detecting Human Attacks in a Honeypot Environment. 1-6 - Dejan N. Milic

, Marko Smilic
, Boiana Nikolic, Milan Tuba, Petar C. Spalevic:
Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel Inversion. 1-6 - Jan Lastinec, Mario Keszeli:

Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks. 1-6 - Zeynep Ozpolat

, Murat Karabatak:
Temperature Estimation with Time Series Analysis from Air Quality Data Set. 1-5 - Iliyasu Yahaya Adam, Cihan Varol

, Asaf Varol
:
Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria. 1-5 - Aykut Diker

, Engin Avci:
Feature Extraction of ECG Signal by using Deep Feature. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














