Abstract is missing.
- A Security-Enhanced Interoperability Middleware for the Internet of ThingsHunor Sándor, Béla Genge, Piroska Haller, Andrei Bica. 1-6 [doi]
- SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident ForensicsSundar Krishnan, Mingkui Wei. 1-6 [doi]
- A Review Paper on CryptographyAbdalbasit Mohammed Qadir, Nurhayat Varol. 1-6 [doi]
- Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative StudyAnna Egorova, Victor Fedoseev. 1-6 [doi]
- Human vs Bots: Detecting Human Attacks in a Honeypot EnvironmentShreya Udhani, Alexander Withers, Masooda Bashir. 1-6 [doi]
- A Survey on Backbone AttackEbu Yusuf Guven, Mehmet Yavuz Yagci, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin. 1-5 [doi]
- Circle Map for Internet of Things NetworksPeter Szabó, Béla Genge. 1-5 [doi]
- Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic TrackingAnjali Menon. 1-5 [doi]
- Multidimensional signal interpolation based on parametric space dimension reductionMikhail Gashnikov. 1-5 [doi]
- Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation Analysis (DFA)Mirac Karmlslloglu, Feride Kulali. 1-4 [doi]
- A Research on Security Vulnerabilities in Online and Mobile Banking SystemsNilay Yildirim, Asaf Varol. 1-5 [doi]
- A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy DetectorÖzgür Alaca, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydn. 1-6 [doi]
- Augmenting Gabor-based Face Recognition with Global Soft BiometricsEmad Sami Jaha. 1-5 [doi]
- Defending Against Cyber-Attacks on the Internet of ThingsGhazi Abdalla Abdalrahman, Hacer Varol. 1-6 [doi]
- A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning AlgorithmsYucel Burhan, Firat Artuger, Fatih Özkaynak. 1-5 [doi]
- Digital Forensics: Focusing on Image ForensicsRayan Sulaiman Khalaf, Asaf Varol. 1-5 [doi]
- Prototype of a paranoid mobile operating system distributionNuno Mateus Coelho, Miguel Peixoto, Maria Manuela Cruz-Cunha. 1-6 [doi]
- New Trends in Speech Emotion RecognitionYesim Ülgen Sonmez, Asaf Varol. 1-7 [doi]
- Overview of machine learning methods for Android malware identificationJoão Lopes, Carlos Serrão, Luís Nunes, Ana de Almeida 0002, João Oliveira. 1-6 [doi]
- Securing Database Management Systems using RAM Serial NumbersSapan Noori Azeez, Serkan Varol. 1-5 [doi]
- SmartThings Event Export using SmartAppsJose Garcia, Cihan Varol. 1-6 [doi]
- A New Approach for Exiting from Parking Lot based on Artificial Neural NetworkHalil Ozturk, Sevginur Teke, Murat Karabatak. 1-6 [doi]
- Security Enhancement in Storage Area NetworkSouheil Chukry, Hassan Sbeyti. 1-5 [doi]
- An Expert System to Predict Warfarin Dosage in Turkish Patients Depending on Genetic and Non-Genetic FactorsOsman Altay, Mustafa Ulas, Mahmut Ozer, Ece Genc. 1-6 [doi]
- Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home AutomationSalim Jibrin Danbatta, Asaf Varol. 1-5 [doi]
- A Stenography Application for Hiding Student Information into an ImageYildiray Yigit, Murat Karabatak. 1-4 [doi]
- Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel InversionDejan N. Milic, Marko Smilic, Boiana Nikolic, Milan Tuba, Petar C. Spalevic. 1-6 [doi]
- User Profiling Based on Application-Level Using Network MetadataFaisal Shaman, Bogdan V. Ghita, Nathan L. Clarke, Abdulrahman Alruban. 1-8 [doi]
- A Target Tracking Application On Mobese VideosSevinc AY, Murat Karabatak. 1-5 [doi]
- Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc NetworksJan Lastinec, Mario Keszeli. 1-6 [doi]
- Image and Video Processing Applications Using Xilinx System GeneratorSertaç Yaman, Merve Yildrim, Bircan Karmshoglu, Yavuz Erol, Hasan Kürüm. 1-5 [doi]
- Predicting Daily Activities Effectiveness Using Base-level and Meta level ClassifiersMohammed Akour, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh. 1-7 [doi]
- Determining the Effectiveness of Data Remanence Prevention in the AWS CloudBradley Lee Snyder, James H. Jones. 1-6 [doi]
- A four-step method for investigating network worm propagationTala Tafazzoli, Babak Sadeghiyan. 1-7 [doi]
- Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image SegmentationEva Tuba, Raka Jovanovic, Dejan Zivkovic, Marko Beko, Milan Tuba. 1-6 [doi]
- Parameter space dimension reduction for multidimensional signals differential pulse-code modulation interpolatorAleksey Maksimov, Mikhail Gashnikov. 1-4 [doi]
- Temperature Estimation with Time Series Analysis from Air Quality Data SetZeynep Ozpolat, Murat Karabatak. 1-5 [doi]
- Analysis of Malware Hidden Behind Firewalls with Back ScansZhiqing Zhang, Hiroshi Esaki, Hideya Ochiai. 1-6 [doi]
- Predicting Stealthy Watermarks in Files Using Deep LearningMaha F. Sabir, James H. Jones, Hang Liu, Alex V. Mbaziira. 1-6 [doi]
- Advantages to Disadvantages of Cloud Computing for Small-Sized BusinessPeshraw Ahmed Abdalla, Asaf Varol. 1-6 [doi]
- A Comparative study of COAP and MQTT communication protocolsSamer Hamdani, Hassan Sbeyti. 1-5 [doi]
- Application of Similarity-Based Image Steganography Method to Computerized Tomography ImagesSongul Karakus, Engin Avci. 1-4 [doi]
- Experience of Incorporating NIST Standards in a Digital Forensics CurriculaSankardas Roy, Yan Wu, Kristina N. LaVenia. 1-6 [doi]
- Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in NigeriaIliyasu Yahaya Adam, Cihan Varol, Asaf Varol. 1-5 [doi]
- An Integrated Framework to Examine Mobile Users' Pathway from Threat Cognition to ActionNoushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer, Christoph G. Schutz. 1-5 [doi]
- Legal and Technical Aspects of Web ForensicsYesim Ülgen Sonmez, Asaf Varol. 1-7 [doi]
- Refactoring Code Clone DetectionZhala Sarkawt Othman, Mehmet Kaya. 1-6 [doi]
- Measuring the effects of emojis on Turkish context in sentiment analysisÇagatay Ünal Yurtoz, Ismail Burak Parlak. 1-6 [doi]
- Continuous Authentication Based on User Interaction BehaviorLong Chen, Yi Zhong, Weidong Ai, Difang Zhang. 1-6 [doi]
- Enhancing security of SDN focusing on control plane and data planeBarbora Celesova, Jozef Val'ko, Rudolf Grezo, Pavol Helebrandt. 1-6 [doi]
- Performance Comparison of New Fast Weighted Naïve Bayes Classifier with Other Bayes ClassifiersGamzepelin Aksoy, Murat Karabatak. 1-5 [doi]
- Feature Extraction of ECG Signal by using Deep FeatureAykut Diker, Engin Avci. 1-6 [doi]
- Face Verification and Recognition for Digital Forensics and Information SecurityGiuseppe Amato, Fabrizio Falchi, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas, Alessandro Trivilini, Claudio Vairo. 1-6 [doi]
- A Trust Management Model for IoTAhmed Abdlrazaq, Serkan Varol. 1-6 [doi]
- Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methodsAndrew Johnson, Ross Davies. 1-6 [doi]
- Android Mobile Device Forensics: A ReviewHussein Farooq Tayeb, Cihan Varol. 1-7 [doi]
- Information Security Awareness of School AdministratorsSongül Karabatak, Murat Karabatak. 1-6 [doi]
- Review of Chaotic Based S-Box StructuresAyse CENGIZ, Derya Avci. 1-6 [doi]
- A New Model for Creating Layer Planes Using Steganography for Text HidingShalaw Mshir, Asaf Varol. 1-5 [doi]
- Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy AnimalsErkan Tanyildizl, Gokce Yildirim. 1-4 [doi]