Abstract is missing.
- Energy-Aware Routing Architecture for Wireless Sensor NetworksAytug Boyaci, Hasan Huseyin Balik, Fikret Ata. 1-5 [doi]
- Direction Estimation of Drone Collision Using Optical Flow for Forensic InvestigationArda Surya Editya, Tohari Ahmad, Hudan Studiawan. 1-6 [doi]
- Network Intrusion Detection Packet Classification with the HIKARI-2021 Dataset: a study on ML AlgorithmsRui Fernandes, Nuno Lopes. 1-5 [doi]
- The Digital Forensics of Cyber-Attacks at Electrical Power Grid SubstationJuha Pärssinen, Petra Raussi, Sami Noponen, Mikael Opas, Jarno Salonen. 1-6 [doi]
- A Novel Approach to Detect Fake News Using eXtreme Gradient BoostingS. Sweta Reddy, Santanu Mandal, Varanasi L. V. S. K. B. Kasyap, Aswathy R. K. 1-4 [doi]
- SECURE-D: Framework For Detecting and Preventing Attacks in SQL and NoSQL DatabasesJithin V. O, Narayanan Subramanian. 1-5 [doi]
- A New Method of Automatic Content Analysis in Disaster ManagementAli Burak Can, Ismail Burak Parlak, Tankut Acarman. 1-5 [doi]
- Unsupervised Machine Learning for Drone Forensics through Flight Path AnalysisNaeem Syed, Majid Ali Khan, Nazeeruddin Mohammad, Ghassen Ben Brahim, Zubair A. Baig. 1-6 [doi]
- Performance Analysis of Deep Approaches on Airbnb Sentiment ReviewsMuhammad Raheel Raza, Walayat Hussain, Asaf Varol. 1-5 [doi]
- Human Activity Recognition: A reviewJoão Gonçalo Pereira, Joaquim Gonçalves. 1-5 [doi]
- Outlier detection to Secure Wireless Sensor Networks Based on iForestMuhammad R. Ahmed, Thirein Myo, Badar Al Baroomi. 1-6 [doi]
- A New Chaos-Based Lightweight Encryption Mechanism for MicrocomputersHarun Emre Kiran, Akif Akgul, Oktay Yildiz. 1-5 [doi]
- Real-time Bitcoin price tendency awareness via social media content trackingHousam Moustafa, Mohammad Malli, Hussein Hazimeh 0002. 1-6 [doi]
- Detecting Arabic YouTube Spam Using Data Mining TechniquesYahya M. Tashtoush, Areen Magableh, Omar Darwish 0001, Lujain Smadi, Omar Alomari, Anood ALghazoo. 1-5 [doi]
- The Relationship between Teacher Candidates' Technology Usage and Online Learning ReadinessSevinç Ay, Songül Karabatak, Murat Karabatak. 1-6 [doi]
- An Automated Framework for Generating Attack Graphs Using Known Security ThreatsRami Alnafrani, Duminda Wijesekera. 1-6 [doi]
- Comparison of Forecasting Algorithms on Retail DataPelin Dinçoglu, Hüseyin Aygün. 1-4 [doi]
- Detection of Network Anomalies with Machine Learning MethodsIhsan Riza Kara, Asaf Varol. 1-6 [doi]
- Context-Aware Data Augmentation for Efficient Object Detection by UAV SurveillanceYuri G. Gordienko, Oleksandr Rokovyi, Oleg Alienin, Sergii G. Stirenko. 1-6 [doi]
- Deep Learning based Lightweight Model for Seizure Detection using Spectrogram ImagesMohd Maaz Khan, Irfan Mabood Khan, Omar Farooq. 1-6 [doi]
- An Improved Anonymous IdentifierRay Kresman, Larry A. Dunning, Jinglei Lu. 1-5 [doi]
- Machine Learning-Based Security Solutions for Critical Cyber-Physical SystemsAsad Raza, Shahzad Memon, Muhammad Ali Nizamani, Mahmood Hussain Shah. 1-6 [doi]
- An Intelligent System to Detect Drowsiness at the WheelAna Rita Antunes, Miguel V. P. R. Meneses, Joaquim Gonçalves, Ana Cristina Braga. 1-6 [doi]
- Swarm Intelligence Approach for Feature Selection ProblemEva Tuba, Adis Alihodzic, Una Tuba, Romana Capor-Hrosik, Milan Tuba. 1-6 [doi]
- CyberSoc Implementation PlanMário Saraiva, Nuno Coelho. 1-6 [doi]
- Comparing Interservice Communications of Microservices for E-Commerce IndustryMustafa Gördesli, Asaf Varol. 1-4 [doi]
- Classification of Tissue Types in Histology Images Using Graph Convolutional NetworksEsra Tepe, Gokhan Bilgin. 1-3 [doi]
- Phishing URL classification using Extra-Tree and DNNHabiba Bouijij, Amine Berqia, Hamadou Saliah-Hassan. 1-6 [doi]
- A deep learning-enhanced botnet detection system based on Android manifest text miningSuleiman Y. Yerima, Yi Min To. 1-6 [doi]
- On the Digital Forensics of Social Networking Web-based ApplicationsBasheer Al-Duwairi, Ahmed S. Shatnawi, Hala Jaradat, Afnan Al-Musa, Hamzah Al-Awadat. 1-6 [doi]
- Digital Forensics Lab Design: A frameworkKhushi Gupta, Ashar Neyaz, Narasimha Shashidhar, Cihan Varol. 1-6 [doi]
- Threat Modeling and Threat Intelligence System for Cloud using SplunkAnanthapadmanabhan A, Krishnashree Achuthan. 1-6 [doi]
- ChevroCrypto - Security & Cryptography BrokerFilipe Alves, Nuno Mateus Coelho, Manuela Cruz-Cunha. 1-5 [doi]
- A Novel Deep Feature Extraction Engineering for Subtypes of Breast Cancer Diagnosis: A Transfer Learning ApproachBilyaminu Muhammad, Fatih Özkaynak, Asaf Varol, Türker Tuncer. 1-7 [doi]
- Transfer Learning based Classification of Plasmodium Falciparum Parasitic Blood Smear ImagesSai Dheeraj Gummadi, Anirban Ghosh 0001, Yeswanth Vootla. 1-5 [doi]
- Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee's Cybersecurity Protective BehaviourNorshima Humaidi, Saif Hussein Abdallah Alghazo. 1-10 [doi]
- Technical and Legal Strategic Approaches Protecting the Privacy of Personal Data in Cloud-Based Big Data ApplicationsSüleyman Muhammed Arikan. 1-7 [doi]
- Towards A Framework for Preprocessing Analysis of Adversarial Windows MalwareNicholas Schultz, Adam Duby. 1-6 [doi]
- Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive SamplesLina Lin, Hanzhou Wu. 1-6 [doi]
- 'Unified Side-Channel Attack - Model' (USCA-M): An Extension with Biometrics Side-Channel TypeAndrew Johnson 0008, Richard Ward. 1-5 [doi]
- Digital Forensics Analysis of Windows 11 Shellbag with Comparative ToolsAshar Neyaz, Narasimha Shashidhar, Cihan Varol, Amar Rasheed. 1-10 [doi]
- AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative SystemRami Alnafrani, Duminda Wijesekera. 1-6 [doi]
- Automatic Forensic Imaging of a Virtual USB Device with Emulated User InteractionMohamed Alji, Khalid Chougdali. 1-4 [doi]
- Fuzzy Logic-based Shiitake Mushroom Farm Control for Harvest EnhancementJean De La Croix Ntivuguruzwa, Didacienne Mukanyiligira, Louis Sibomana. 1-6 [doi]
- New Online RealityNuno Martins, Pedro Costa, Alexandre Esteves, Tomás Martins, Susana Nicola, Alberto Pereira. 1-4 [doi]
- The Necessity of Emotion Recognition from Speech Signals for Natural and Effective Human-Robot Interaction in Society 5.0Yesim Ülgen Sönmez, Asaf Varol. 1-8 [doi]
- Progressive Standard Operating Procedures for Darkweb Forensics InvestigationInnocent Paschal Mgembe, Dawson Ladislaus Msongaleli, Naveen Kumar Chaundhary. 1-3 [doi]
- IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine LearningRani Al Rahbani, Jawad Khalife. 1-6 [doi]
- Development of a Forensic Toolkit for Small-Medium Size Business (SMB)Eduardo Martinez, Cihan Varol, Narasimha Shashidhar, Van Vung Pham. 1-4 [doi]
- A Deep Learning Based Fast Face Detection and Recognition Algorithm for Forensic AnalysisSerkan Karakus, Mustafa Kaya, Seda Arslan Tuncer, M. Taha Bahsi, Merve Açikoglu. 1-6 [doi]
- Serverless Service Architectures and Security MinimalsNuno Mateus Coelho, Manuela Cruz-Cunha. 1-6 [doi]
- Three-Tier Database Forensic ModelDawson Ladislaus Msongaleli, Innocent Paschal Mgembe. 1-3 [doi]
- Phishing Detection and Prevention using Chrome ExtensionM. Amir Syafiq Rohmat Rose, Nurlida Basir, Nur Fatin Nabila Rafie Heng, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi. 1-6 [doi]
- Text Clustering of COVID-19 Vaccine TweetsDavid Okore Ukwen, Murat Karabatak. 1-6 [doi]
- Process standardization: the driving factor for bringing artificial intelligence and management analytics to SMEsJoaquim P. Silva, Joaquim Gonçalves. 1-5 [doi]
- Countering Steganographic Security with CNNNarendrapurapu Surya Chandu, Narayanan Subramanian. 1-6 [doi]
- Vehicle Fatality Analysis by Gender using Predictive AnalyticsMena Youssef, Serkan Varol, Serkan Catma. 1-6 [doi]
- DOTMUG: A Threat Model for Target Specific APT Attacks-Misusing Google Teachable MachineP. V. Sai Charan, P. Mohan Anand, Sandeep K. Shukla, Naveen Selvan, Hrushikesh Chunduri. 1-8 [doi]
- The Relationship between Nomophobia and Perceived Socialization in the Online Learning EnvironmentSongül Karabatak, Sevinç Ay, Murat Karabatak. 1-8 [doi]