Abstract is missing.
- * For Attacking Subsystems AvailabilityAmar A. Rasheed, Hacer Varol, Mohamed Baza. 1-8 [doi]
- A novel reversible fragile watermarking in DWT domain for tamper localization and digital image authenticationGökhan Azizoglu, Ahmet Nusret Toprak. 1-6 [doi]
- Prevention Pre-Violence in E-Labs with Machine Learning: PVEAhmet Furkan Aydogan, Narasimha Shashidhar. 1-5 [doi]
- A Substitution-Box Structure Based on Crowd Supply Infinite Noise TRNGHabib Ibrahim, Fatih Özkaynak. 1-5 [doi]
- A New Sustainable Hybrid Software Development Methodology: FIRAT-UGMustafa Ulas, Hakan Güler. 1-4 [doi]
- Selecting the Best Forensic Report by Using a Group Decision Making Method: A case study on three forensic reportsGulsum Akkuzu Kaya, Abdul Badwan. 1-5 [doi]
- CENTER Water: A Secure Testbed Infrastructure Proposal For Waste and Potable Water ManagementIbrahim Özçelik, Murat Iskefiyeli, Musa Balta, Kevser Ovaz Akpinar, Firdevs Sevde Toker. 1-7 [doi]
- A Brief Survey on Ransomware with the Perspective of Internet Security Threat ReportsDanyal Farhat, Malik Shahzad Awan. 1-6 [doi]
- A New Approach to Social Engineering with Natural Language Processing: RAKEAhmet Furkan Aydogan, Min Kyung An, Mehmet Yilmaz. 1-7 [doi]
- Investigation of Self-Directed Learning Skills of Distance Education StudentsMüslim Alanoglu, Songül Karabatak, Murat Karabatak. 1-4 [doi]
- Development and Maintenance of Mobile Forensic Investigation Software ModulesSüleyman Muhammed Arikan, Özgür Yürekten. 1-6 [doi]
- Threat Landscape Expansion During Covid-19: Remote Incident Response HandlingFrank Williams, Cihan Varol, Amar Rasheed, Narasimha Shashihar. 1-7 [doi]
- CAPEN: Cryptographic Accumulator based Privacy Preserving Exposure NotificationIlker Özçelik. 1-6 [doi]
- A Data Mining Based System for Automating Creation of Cyber Threat IntelligenceSüleyman Muhammed Arikan, Sami Acar. 1-7 [doi]
- Earthquake Prediction by Using Time Series AnalysisSultan Lök, Murat Karabatak. 1-6 [doi]
- Exploiting Vulnerabilities of IP Cameras: Lebanon Case StudyPeter Bathich, Mohammad Malli, Hussein Hazimeh. 1-6 [doi]
- MITRE ICS Attack Simulation and Detection on EtherCAT Based Drinking Water SystemFirdevs Sevde Toker, Kevser Ovaz Akpinar, Ibrahim Özçelik. 1-6 [doi]
- A Cost-Effective Security Framework to protect micro enterprises: PALANTIR e-commerce use caseIzidor Mlakar, Primoz Jeran, Valentino Safran, Vangelis Logothetis. 1-6 [doi]
- Fuzzy Rule Based Classification System from Vehicle-to-Grid DataGulsum Akkuzu Kaya, Abdul Badwan. 1-7 [doi]
- Automated Malware Design for Cyber Physical SystemsAshraf Tantawy. 1-6 [doi]
- Analysis and Modeling of Cyber Security PrecautionsÖmer Durmus, Asaf Varol. 1-8 [doi]
- Blockchain-based IoT: An OverviewMuhammad Raheel Raza, Asaf Varol, Walayat Hussain. 1-6 [doi]
- Evaluation of blockchain techniques to ensure secure access on remote FPGA laboratoriesEmilio Werner, Jhennifer Cristine Matias, Marcelo Daniel Berejuck, Hamadou Saliah-Hassane. 1-6 [doi]
- Malware Detection and Classification Using fastText and BERTSalih Yesir, Ibrahim Sogukpinar. 1-6 [doi]
- Graph-Based Malware Detection Using Opcode SequencesSibel Gülmez, Ibrahim Sogukpinar. 1-5 [doi]
- Enterprise Information Systems enhancement: A HyperLedger Fabric based applicationAbdelaziz Bouras, Houssem Gasmi, Abdelhak Belhi, Assam Hammi, Belaïd Aouni. 1-5 [doi]
- A Study of Semiconductor Defects within Automotive Manufacturing using Predictive AnalyticsPatrick O'Dougherty, Keith Ferrel, Serkan Varol. 1-6 [doi]
- Analysis of Network Protocols for Secure CommunicationDavid Caballero, Francisco Gonzalez, Sheikh Ariful Islam. 1-6 [doi]
- A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size BusinessesRoberto Solís, Narasimha Shashidhar, Cihan Varol. 1-5 [doi]
- Sentiment Analysis using Deep Learning in CloudMuhammad Raheel Raza, Walayat Hussain, Erkan Tanyildizi, Asaf Varol. 1-5 [doi]
- A Cost Based Dynamic Response Method for Internet of Things CyberattacksPushpinder-Kaur Chouhan, Bronagh Quigley, Alfie Beard, Liming Chen. 1-6 [doi]
- EDI Based Secure Desing Pattern For Logistic and Supply ChainCeyhun Karatas, Muaz Gultekin. 1-5 [doi]
- Method for Protection of Heterogeneous Data based on Pseudo-Holographic WatermarksYuliya Vybornova. 1-5 [doi]
- Prediction of Arrhythmia with Machine Learning AlgorithmsGünes Gürsoy, Asaf Varol. 1-5 [doi]
- Detection of Web Attacks via PART ClassifierOmar Iskndar Ahmed, Cihan Varol. 1-4 [doi]
- PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M DevicesEngin Karacan, Sedat Akleylek, Aykut Karakaya. 1-5 [doi]
- A Symptom-Based Machine Learning Model for Malaria Diagnosis in NigeriaBilyaminu Muhammad, Asaf Varol. 1-6 [doi]
- Watermarking Graph Neural Networks by Random GraphsXiangyu Zhao, Hanzhou Wu, Xinpeng Zhang 0001. 1-6 [doi]
- Software Engineering for Data Mining (ML-Enabled) Software ApplicationsSabeer Saeed, Mohammed Mansur Abubakar, Murat Karabatak. 1-9 [doi]
- Review of NLP-based Systems in Digital Forensics and CybersecurityDavid Okore Ukwen, Murat Karabatak. 1-9 [doi]
- TTSD: A novel dataset for Turkish Text SummarizationMehtap Ülker, Ahmet Bedri Özer. 1-6 [doi]
- A Comparative Study on the Detection of Image Forgery of Tampered Background or ForegroundMehmet Elmaci, Ahmet Nusret Toprak, Veysel Aslantas. 1-5 [doi]
- Problems Encountered in Distance Teaching Practices Course and Solution SuggestionsMüslim Alanoglu, Songül Karabatak, Murat Karabatak. 1-5 [doi]
- Modeling and Forecasting of Tourism Time Series Data using ANN-Fourier Series Model and Monte Carlo SimulationSalim Jibrin Danbatta, Asaf Varol. 1-6 [doi]