


default search action
ISDFS 2021: Elazig, Turkey
- Asaf Varol, Murat Karabatak, Ihan Varol:

9th International Symposium on Digital Forensics and Security, ISDFS 2021, Elazig, Turkey, June 28-29, 2021. IEEE 2021, ISBN 978-1-6654-4481-1 - Muhammad Raheel Raza, Walayat Hussain

, Erkan Tanyildizi, Asaf Varol:
Sentiment Analysis using Deep Learning in Cloud. 1-5 - Ilker Özçelik

:
CAPEN: Cryptographic Accumulator based Privacy Preserving Exposure Notification. 1-6 - Bilyaminu Muhammad

, Asaf Varol:
A Symptom-Based Machine Learning Model for Malaria Diagnosis in Nigeria. 1-6 - Habib Ibrahim, Fatih Özkaynak:

A Substitution-Box Structure Based on Crowd Supply Infinite Noise TRNG. 1-5 - Emilio Werner, Jhennifer Cristine Matias, Marcelo Daniel Berejuck, Hamadou Saliah-Hassane

:
Evaluation of blockchain techniques to ensure secure access on remote FPGA laboratories. 1-6 - Sabeer Saeed, Mohammed Mansur Abubakar, Murat Karabatak:

Software Engineering for Data Mining (ML-Enabled) Software Applications. 1-9 - Peter Bathich, Mohammad Malli, Hussein Hazimeh

:
Exploiting Vulnerabilities of IP Cameras: Lebanon Case Study. 1-6 - Salim Jibrin Danbatta

, Asaf Varol:
Modeling and Forecasting of Tourism Time Series Data using ANN-Fourier Series Model and Monte Carlo Simulation. 1-6 - Yuliya D. Vybornova:

Method for Protection of Heterogeneous Data based on Pseudo-Holographic Watermarks. 1-5 - Amar A. Rasheed, Hacer Varol, Mohamed Baza

:
Clock Gating-Assisted Malware (CGAM): Leveraging Clock Gating On ARM Cortex M* For Attacking Subsystems Availability. 1-8 - Omar Iskndar Ahmed, Cihan Varol

:
Detection of Web Attacks via PART Classifier. 1-4 - Firdevs Sevde Toker, Kevser Ovaz Akpinar

, Ibrahim Özçelik
:
MITRE ICS Attack Simulation and Detection on EtherCAT Based Drinking Water System. 1-6 - Süleyman Muhammed Arikan, Sami Acar:

A Data Mining Based System for Automating Creation of Cyber Threat Intelligence. 1-7 - Mehtap Ülker, Ahmet Bedri Özer:

TTSD: A novel dataset for Turkish Text Summarization. 1-6 - Gökhan Azizoglu

, Ahmet Nusret Toprak
:
A novel reversible fragile watermarking in DWT domain for tamper localization and digital image authentication. 1-6 - Engin Karacan, Sedat Akleylek, Aykut Karakaya:

PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices. 1-5 - Ahmet Furkan Aydogan, Min Kyung An

, Mehmet Yilmaz:
A New Approach to Social Engineering with Natural Language Processing: RAKE. 1-7 - Ömer Durmus

, Asaf Varol:
Analysis and Modeling of Cyber Security Precautions. 1-8 - Danyal Farhat, Malik Shahzad Awan:

A Brief Survey on Ransomware with the Perspective of Internet Security Threat Reports. 1-6 - Ahmet Furkan Aydogan, Narasimha K. Shashidhar:

Prevention Pre-Violence in E-Labs with Machine Learning: PVE. 1-5 - Frank Williams, Cihan Varol

, Amar Rasheed, Narasimha K. Shashidhar:
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling. 1-7 - Xiangyu Zhao, Hanzhou Wu

, Xinpeng Zhang:
Watermarking Graph Neural Networks by Random Graphs. 1-6 - Süleyman Muhammed Arikan, Özgür Yürekten

:
Development and Maintenance of Mobile Forensic Investigation Software Modules. 1-6 - David Okore Ukwen, Murat Karabatak:

Review of NLP-based Systems in Digital Forensics and Cybersecurity. 1-9 - David Caballero, Francisco Gonzalez, Sheikh Ariful Islam

:
Analysis of Network Protocols for Secure Communication. 1-6 - Sultan Lök, Murat Karabatak:

Earthquake Prediction by Using Time Series Analysis. 1-6 - Izidor Mlakar, Primoz Jeran, Valentino Safran

, Vangelis Logothetis:
A Cost-Effective Security Framework to protect micro enterprises: PALANTIR e-commerce use case. 1-6 - Muhammad Raheel Raza, Asaf Varol, Walayat Hussain

:
Blockchain-based IoT: An Overview. 1-6 - Pushpinder Kaur Chouhan, Bronagh Quigley

, Alfie Beard, Liming Chen:
A Cost Based Dynamic Response Method for Internet of Things Cyberattacks. 1-6 - Mehmet Elmaci

, Ahmet Nusret Toprak
, Veysel Aslantas:
A Comparative Study on the Detection of Image Forgery of Tampered Background or Foreground. 1-5 - Ibrahim Özçelik

, Murat Iskefiyeli, Musa Balta, Kevser Ovaz Akpinar
, Firdevs Sevde Toker:
CENTER Water: A Secure Testbed Infrastructure Proposal For Waste and Potable Water Management. 1-7 - Patrick O'Dougherty, Keith Ferrel, Serkan Varol

:
A Study of Semiconductor Defects within Automotive Manufacturing using Predictive Analytics. 1-6 - Gulsum Akkuzu Kaya, Abdul Badwan:

Fuzzy Rule Based Classification System from Vehicle-to-Grid Data. 1-7 - Abdelaziz Bouras, Houssem Gasmi, Abdelhak Belhi, Assam Hammi, Belaïd Aouni:

Enterprise Information Systems enhancement: A HyperLedger Fabric based application. 1-5 - Roberto Solís, Narasimha K. Shashidhar, Cihan Varol

:
A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses. 1-5 - Ceyhun Karatas

, Muaz Gultekin:
EDI Based Secure Desing Pattern For Logistic and Supply Chain. 1-5 - Salih Yesir, Ibrahim Sogukpinar:

Malware Detection and Classification Using fastText and BERT. 1-6 - Müslim Alanoglu

, Songül Karabatak, Murat Karabatak:
Investigation of Self-Directed Learning Skills of Distance Education Students. 1-4 - Gulsum Akkuzu Kaya, Abdul Badwan:

Selecting the Best Forensic Report by Using a Group Decision Making Method: A case study on three forensic reports. 1-5 - Günes Gürsoy

, Asaf Varol:
Prediction of Arrhythmia with Machine Learning Algorithms. 1-5 - Ashraf Tantawy:

Automated Malware Design for Cyber Physical Systems. 1-6 - Mustafa Ulas, Hakan Güler

:
A New Sustainable Hybrid Software Development Methodology: FIRAT-UG. 1-4 - Sibel Gülmez

, Ibrahim Sogukpinar:
Graph-Based Malware Detection Using Opcode Sequences. 1-5 - Müslim Alanoglu

, Songül Karabatak, Murat Karabatak:
Problems Encountered in Distance Teaching Practices Course and Solution Suggestions. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














