Abstract is missing.
- Design and Implementation of a Simple Online Court Case Management System Based on the Android PlatformChawan Taha Hama Ali, Asaf Varol. 1-4 [doi]
- A Robust Copy-Move Forgery Detection In Digital Image Forensics Using SURFAbdelhalim Badr, Aliaa Youssif, Maged Wafi. 1-6 [doi]
- Z Generation Students and Their Digital FootprintsSongül Karabatak, Murat Karabatak. 1-5 [doi]
- Overview of Digital Forensics and Anti-Forensics TechniquesHussein Majed, Hassan N. Noura, Ali Chehab. 1-5 [doi]
- To Review and Compare Evolutionary Algorithms in Optimization of Distributed Database QueryMohammed Hussein Abdalla, Murat Karabatak. 1-5 [doi]
- Remote Monitoring Real Time Air pollution - IoT (Cloud Based)Murat Karabatak, Twana Mustafa, Chawan Hamaali. 1-6 [doi]
- A Study on Automatic Speech Recognition SystemsHabib Ibrahim, Asaf Varol. 1-5 [doi]
- An Android Case Study on Technical Anti-Forensic Challenges of WhatsApp ApplicationMohammad M. Mirza, Fahad E. Salamh, Umit Karabiyik. 1-6 [doi]
- A Conceptual Framework for Database Anti-forensics Impact MitigationBashir Zak Adamu, Murat Karabatak, Fatih Ertam. 1-6 [doi]
- Graphically Display Database Transactions to Enhance Database ForensicsChristine Orosco, Cihan Varol, Narasimha Shashidhar. 1-6 [doi]
- Filtering Turkish Spam Using LSTM From Deep Learning TechniquesErsin Enes Eryilmaz, Durmus Özkan Sahin, Erdal Kiliç. 1-6 [doi]
- QIM-Based Semi-Fragile Watermarking for H.264 Video AuthenticationAnna Egorova 0002, Victor Fedoseev. 1-6 [doi]
- GPS-based Mobile Cross-platform Cargo Tracking System with Web-based ApplicationAbdalbasit Mohammed Qadir, Peter Cooper. 1-7 [doi]
- Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic CircuitKok Seen Chong, Chern Nam Yap, Zheng Hong Tew. 1-4 [doi]
- In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion RecognitionYesim Ülgen Sönmez, Asaf Varol. 1-8 [doi]
- Augmented reality based criminal investigation system (ARCRIME)Shaheryar Ehsan I Haque, Shahzad Saleem. 1-6 [doi]
- District Ransomware: Static and Dynamic AnalysisNeil Andes, Mingkui Wei. 1-6 [doi]
- Method for Image Copyright Protection Based on Construction of Highly Robust WatermarksYuliya Vybornova. 1-4 [doi]
- Predicting Student's Final Graduation CGPA Using Data Mining and Regression Methods: A Case Study of Kano Informatics InstituteSalim Jibrin Danbatta, Asaf Varol. 1-7 [doi]
- Cloud Computing Security Challenges and ThreatsZina Balani, Hacer Varol. 1-4 [doi]
- Decision-Tree-Based Interpolation for Multidimensional Signal CompressionMikhail Gashnikov. 1-5 [doi]
- Testing IoT Security: The Case Study of an IP CameraPeshraw Ahmed Abdalla, Cihan Varol. 1-5 [doi]
- Signature Recognition Using Machine LearningShalaw Mshir, Mehmet Kaya. 1-4 [doi]
- Mirai Botnet In LebanonHasan k. Idriss. 1-6 [doi]
- Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case StudyReem A. Nabha, Hassan Sbeyti. 1-7 [doi]
- Using ITIL 4 in Security ManagementDerrick Berger, Narasimha Shashidhar, Cihan Varol. 1-6 [doi]
- An efficient IP core of Consultative Committee for Space Data Systems (CCSDS) Recommended Authenticated Cryptographic AlgorithmDeepa Muraleedharan, Sanil. K. Daniel. 1-6 [doi]
- Effects of Homework Supported Distance Education on Academic Satisfaction, Academic Achievement, and Attitude towards Distance EducationSongül Karabatak, Müslim Alanoglu, Murat Karabatak. 1-5 [doi]
- Intelligence in Digital Forensics ProcessIliyasu Yahaya Adam, Cihan Varol. 1-6 [doi]
- Predicting Crime Scene Location Details for First RespondersSundar Krishnan, Bing Zhou. 1-7 [doi]
- Cloud and Fog Computing: A Survey to the Concept and ChallengesMuhammad Raheel Raza, Asaf Varol, Nurhayat Varol. 1-6 [doi]
- Classifying Software Vulnerabilities by Using the Bugs FrameworkThamali Madhushani Adhikari, Yan Wu. 1-6 [doi]
- Students' Usage of Smartphones during the LecturesMüslim Alanoglu, Songül Karabatak. 1-4 [doi]
- Database Security Threats and ChallengesAbdulazeez Mousa, Murat Karabatak, Twana Mustafa. 1-5 [doi]
- Cybersecurity Evaluation with PowerShellSteven Zavala, Narasimha Shashidhar, Cihan Varol. 1-6 [doi]
- Classification of Live/Lifeless Assets with Laser Beams in Different Humidity EnvironmentsNevzat Olgun, Ibrahim Türkoglu. 1-6 [doi]
- Cinema Station Application (CSA): An augmented reality application for accessing film information and online cinema bookingSamar M. Alkhuraiji. 1-6 [doi]
- The Role of Machine Learning in Digital ForensicsAbdalbasit Mohammed Qadir, Asaf Varol. 1-5 [doi]
- Overview of Efficient Symmetric Cryptography: Dynamic vs Static ApproachesHassan N. Noura, Ali Chehab, Raphaël Couturier. 1-6 [doi]
- Effect of Mean Filter on Face Image from Video FramesPawan Sh. Othman, Ridwan B. Marqas, Diler N. Abdulqader, Saman M. Almufti. 1-7 [doi]
- Review of the Internet of Things for Healthcare MonitoringTwana Mustafa, Asaf Varol. 1-6 [doi]
- On the Cyber Security of Lebanon: A Large Scale Empirical Study of Critical VulnerabilitiesYasser Fadlallah, Mohamad Sbeiti, Mohamad Hammoud, Mohamad Nehme, Ahmad Fadlallah. 1-6 [doi]
- Remote Sensing Image Inpainting with Generative Adversarial NetworksAndrey Kuznetsov, Mikhail Gashnikov. 1-6 [doi]
- Big Data Architecture: Designing the Right Solution for Social Network AnalysisInnocent Agbo, Alexander Kupriyanov, Igor Rytsarev. 1-5 [doi]
- Time Series Database Preprocessing for Data Mining Using PythonHussein Faroq Tayeb, Murat Karabatak, Cihan Varol. 1-4 [doi]
- A Study on Cybersecurity Challenges in E-learning and Database Management SystemHabib Ibrahim, Songül Karabatak, Abdullahi Abba Abdullahi. 1-5 [doi]
- Introducing The 'Unified Side Channel Attack - Model' (USCA-M)Andrew Johnson, Richard Ward. 1-9 [doi]
- Critical Analysis of Cryptographic AlgorithmsMazoon AlRoubiei, Thuraiya AlYarubi, Basant Kumar. 1-7 [doi]
- A Review of Image Segmentation Using MATLAB EnvironmentAwf Abdulrahman, Serkan Varol. 1-5 [doi]
- QoS Parameters for Viable SLA in CloudMuhammad Raheel Raza, Asaf Varol. 1-5 [doi]
- Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction ToolsSamiha S. Shimmi, Gokila Dorai, Umit Karabiyik, Sudhir Aggarwal. 1-7 [doi]
- Challenges of acquiring mobile devices while minimizing the loss of usable forensics dataLazaro A. Herrera. 1-5 [doi]
- On-Premises Versus SECaaS Security ModelsLuis Francisco Plá, Narasimha Shashidhar, Cihan Varol. 1-6 [doi]
- Importance of rooting in an Android data acquisitionMarie-Rose Boueiz. 1-4 [doi]
- MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining ActivitiesSafa Aktepe, Cihan Varol, Narasimha Shashidhar. 1-5 [doi]
- Comparison of the IoT Platform Vendors, Microsoft Azure, Amazon Web Services, and Google Cloud, from Users' PerspectivesAina'u Shehu Muhammed, Derya Ucuz. 1-4 [doi]