


default search action
ISDFS 2022: Istanbul, Turkey
- Asaf Varol, Murat Karabatak, Cihan Varol:

10th International Symposium on Digital Forensics and Security, ISDFS 2022, Istanbul, Turkey, June 6-7, 2022. IEEE 2022, ISBN 978-1-6654-9796-1 - Andrew Johnson, Richard Ward:

'Unified Side-Channel Attack - Model' (USCA-M): An Extension with Biometrics Side-Channel Type. 1-5 - David Okore Ukwen, Murat Karabatak:

Text Clustering of COVID-19 Vaccine Tweets. 1-6 - Dawson Ladislaus Msongaleli, Innocent Paschal Mgembe:

Three-Tier Database Forensic Model. 1-3 - Esra Tepe

, Gokhan Bilgin:
Classification of Tissue Types in Histology Images Using Graph Convolutional Networks. 1-3 - S. Sweta Reddy, Santanu Mandal

, Varanasi L. V. S. K. B. Kasyap
, Aswathy R. K:
A Novel Approach to Detect Fake News Using eXtreme Gradient Boosting. 1-4 - Ali Burak Can, Ismail Burak Parlak

, Tankut Acarman
:
A New Method of Automatic Content Analysis in Disaster Management. 1-5 - Nuno Mateus Coelho

, Manuela Cruz-Cunha:
Serverless Service Architectures and Security Minimals. 1-6 - P. V. Sai Charan, P. Mohan Anand, Sandeep K. Shukla, Naveen Selvan, Hrushikesh Chunduri:

DOTMUG: A Threat Model for Target Specific APT Attacks-Misusing Google Teachable Machine. 1-8 - João Gonçalo Pereira, Joaquim Gonçalves:

Human Activity Recognition: A review. 1-5 - Mustafa Gördesli, Asaf Varol:

Comparing Interservice Communications of Microservices for E-Commerce Industry. 1-4 - Serkan Karakus

, Mustafa Kaya
, Seda Arslan Tuncer, M. Taha Bahsi, Merve Açikoglu:
A Deep Learning Based Fast Face Detection and Recognition Algorithm for Forensic Analysis. 1-6 - Rani Al Rahbani, Jawad Khalife:

IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning. 1-6 - Ananthapadmanabhan A, Krishnashree Achuthan:

Threat Modeling and Threat Intelligence System for Cloud using Splunk. 1-6 - Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol

, Amar Rasheed:
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools. 1-10 - Nuno Martins, Pedro Costa, Alexandre Esteves, Tomás Martins, Susana Nicola

, Alberto Pereira:
New Online Reality. 1-4 - Arda Surya Editya, Tohari Ahmad

, Hudan Studiawan:
Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation. 1-6 - Aytug Boyaci, Hasan Hüseyin Balik, Fikret Ata:

Energy-Aware Routing Architecture for Wireless Sensor Networks. 1-5 - Muhammad R. Ahmed, Thirein Myo, Badar Al Baroomi:

Outlier detection to Secure Wireless Sensor Networks Based on iForest. 1-6 - Housam Moustafa, Mohammad Malli, Hussein Hazimeh

:
Real-time Bitcoin price tendency awareness via social media content tracking. 1-6 - Süleyman Muhammed Arikan:

Technical and Legal Strategic Approaches Protecting the Privacy of Personal Data in Cloud-Based Big Data Applications. 1-7 - Habiba Bouijij

, Amine Berqia, Hamadou Saliah-Hassane:
Phishing URL classification using Extra-Tree and DNN. 1-6 - Sai Dheeraj Gummadi

, Anirban Ghosh
, Yeswanth Vootla:
Transfer Learning based Classification of Plasmodium Falciparum Parasitic Blood Smear Images. 1-5 - Filipe Alves, Nuno Mateus Coelho

, Manuela Cruz-Cunha:
ChevroCrypto - Security & Cryptography Broker. 1-5 - Yuri G. Gordienko

, Oleksandr Rokovyi, Oleg Alienin, Sergii G. Stirenko:
Context-Aware Data Augmentation for Efficient Object Detection by UAV Surveillance. 1-6 - Khushi Gupta

, Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol
:
Digital Forensics Lab Design: A framework. 1-6 - Narendrapurapu Surya Chandu, Narayanan Subramanian:

Countering Steganographic Security with CNN. 1-6 - Rami Alnafrani, Duminda Wijesekera:

AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System. 1-6 - Mohd Maaz Khan, Irfan Mabood Khan, Omar Farooq

:
Deep Learning based Lightweight Model for Seizure Detection using Spectrogram Images. 1-6 - Harun Emre Kiran, Akif Akgul, Oktay Yildiz

:
A New Chaos-Based Lightweight Encryption Mechanism for Microcomputers. 1-5 - Joaquim P. Silva

, Joaquim Gonçalves:
Process standardization: the driving factor for bringing artificial intelligence and management analytics to SMEs. 1-5 - Jithin V. O, Narayanan Subramanian:

SECURE-D: Framework For Detecting and Preventing Attacks in SQL and NoSQL Databases. 1-5 - Rui Fernandes

, Nuno Lopes
:
Network Intrusion Detection Packet Classification with the HIKARI-2021 Dataset: a study on ML Algorithms. 1-5 - Naeem Syed

, Majid Ali Khan
, Nazeeruddin Mohammad, Ghassen Ben Brahim, Zubair A. Baig:
Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis. 1-6 - Pelin Dinçoglu, Hüseyin Aygün:

Comparison of Forecasting Algorithms on Retail Data. 1-4 - Asad Raza

, Shahzad Memon, Muhammad Ali Nizamani, Mahmood Hussain Shah
:
Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems. 1-6 - Nicholas Schultz, Adam Duby:

Towards A Framework for Preprocessing Analysis of Adversarial Windows Malware. 1-6 - Bilyaminu Muhammad

, Fatih Özkaynak, Asaf Varol, Türker Tuncer:
A Novel Deep Feature Extraction Engineering for Subtypes of Breast Cancer Diagnosis: A Transfer Learning Approach. 1-7 - Ihsan Riza Kara, Asaf Varol:

Detection of Network Anomalies with Machine Learning Methods. 1-6 - Eva Tuba

, Adis Alihodzic, Una Tuba, Romana Capor-Hrosik
, Milan Tuba:
Swarm Intelligence Approach for Feature Selection Problem. 1-6 - Muhammad Raheel Raza, Walayat Hussain

, Asaf Varol:
Performance Analysis of Deep Approaches on Airbnb Sentiment Reviews. 1-5 - Suleiman Y. Yerima, Yi Min To:

A deep learning-enhanced botnet detection system based on Android manifest text mining. 1-6 - Lina Lin, Hanzhou Wu

:
Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples. 1-6 - Mário Saraiva, Nuno Coelho:

CyberSoc Implementation Plan. 1-6 - Mena Youssef, Serkan Varol, Serkan Catma:

Vehicle Fatality Analysis by Gender using Predictive Analytics. 1-6 - Ray Kresman, Larry A. Dunning, Jinglei Lu:

An Improved Anonymous Identifier. 1-5 - Songül Karabatak, Sevinç Ay, Murat Karabatak:

The Relationship between Nomophobia and Perceived Socialization in the Online Learning Environment. 1-8 - M. Amir Syafiq Rohmat Rose, Nurlida Basir, Nur Fatin Nabila Rafie Heng, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi:

Phishing Detection and Prevention using Chrome Extension. 1-6 - Eduardo Martinez, Cihan Varol

, Narasimha K. Shashidhar, Van Vung Pham
:
Development of a Forensic Toolkit for Small-Medium Size Business (SMB). 1-4 - Innocent Paschal Mgembe, Dawson Ladislaus Msongaleli, Naveen Kumar Chaudhary:

Progressive Standard Operating Procedures for Darkweb Forensics Investigation. 1-3 - Juha Pärssinen

, Petra Raussi
, Sami Noponen
, Mikael Opas, Jarno Salonen:
The Digital Forensics of Cyber-Attacks at Electrical Power Grid Substation. 1-6 - Jean De La Croix Ntivuguruzwa

, Didacienne Mukanyiligira
, Louis Sibomana:
Fuzzy Logic-based Shiitake Mushroom Farm Control for Harvest Enhancement. 1-6 - Rami Alnafrani, Duminda Wijesekera:

An Automated Framework for Generating Attack Graphs Using Known Security Threats. 1-6 - Norshima Humaidi, Saif Hussein Abdallah Alghazo:

Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee's Cybersecurity Protective Behaviour. 1-10 - Sevinç Ay, Songül Karabatak, Murat Karabatak:

The Relationship between Teacher Candidates' Technology Usage and Online Learning Readiness. 1-6 - Ana Rita Antunes

, Miguel V. P. R. Meneses, Joaquim Gonçalves, Ana Cristina Braga
:
An Intelligent System to Detect Drowsiness at the Wheel. 1-6 - Yesim Ülgen Sönmez, Asaf Varol:

The Necessity of Emotion Recognition from Speech Signals for Natural and Effective Human-Robot Interaction in Society 5.0. 1-8 - Mohamed Alji, Khalid Chougdali

:
Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction. 1-4 - Basheer Al-Duwairi, Ahmed S. Shatnawi, Hala Jaradat, Afnan Al-Musa, Hamzah Al-Awadat:

On the Digital Forensics of Social Networking Web-based Applications. 1-6 - Yahya M. Tashtoush

, Areen Magableh, Omar Darwish, Lujain Smadi, Omar Alomari, Anood ALghazoo:
Detecting Arabic YouTube Spam Using Data Mining Techniques. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














