Abstract is missing.
- The Relationship between Transactional Distance Perceptions and Academic Self-EfficacyMüslim Alanoglu, Songül Karabatak, Murat Karabatak. 1-4 [doi]
- Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature ReviewZein Al-Abidin Mohammad Fneish, Mohammad El-Hajj, Khouloud Samrouth. 1-7 [doi]
- Data Security Approach Using Blockchain Mechanism and Cryptography AlgorithmsNavdeep Singh, Kurunandan Jain. 1-6 [doi]
- Localization by OSS and BSS Collected DataNaveed Ahmed, Asaf Varol, Ahad Nasab. 1-7 [doi]
- A Review on Latest Developments in Post-Quantum Based Secure Blockchain SystemsAykut Karakaya, Ahmet Ulu. 1-6 [doi]
- Feature Selection Optimization for Heart Rate VariabilityAna Rita Antunes, Joaquim P. Silva, Ana Cristina Braga, Joaquim Gonçalves. 1-6 [doi]
- Analysis of Variance of Accident Data to Detect Factors Correlating to Fatalities in TennesseeMd Kamrul Hasan Sabbir, Serkan Varol. 1-5 [doi]
- Universal Simulation Platform Online, A Multi-Participants I.E.D. Disposal SimulatorArman Hamzehlou Kahrizi, Christopher Chun Ki Chan, Alexander Ferworn. 1-5 [doi]
- Survey of the Challenges and Solutions in Cybersecurity Awareness Among College StudentsHala Strohmier Berry. 1-6 [doi]
- Local-Export Quality Classification Device for Multiple Unripe Carabao Mango using Single Shot Detector AlgorithmMenchie Rosales, Regiena Marie Culpable, Christian Cayanan, Gino Forcadela, Gilian Mae Boctil, Maria Cecilia Venal. 1-6 [doi]
- Effectiveness of Multiple Memory-Images in detecting Fileless MalwareSwapna Mele Pottaraikkal, Akash Sujeer Sugatha. 1-5 [doi]
- Comparison of QSVM with Other Machine Learning Algorithms on EEG SignalsGamzepelin Aksoy, Murat Karabatak. 1-5 [doi]
- Less is More: Deep Learning Framework for Digital Forensics in Resource-Constrained EnvironmentsSuman Rath, Tapadhir Das, Ignacio Astaburuaga, Shamik Sengupta. 1-6 [doi]
- Importance of Machine Learning and Deep Learning Algorithms in Earthquake Prediction: A ReviewGünes Gürsoy, Asaf Varol, Ahad Nasab. 1-6 [doi]
- A Survey of Privacy and Security Challenges in Industrial SettingsAnil Sezgin, Aytug Boyaci. 1-7 [doi]
- Towards A Unique Online Healthcare Information (OHI) Recommender: A Preliminary Case StudyAnkur Chattopadhayay, Zackary Luedtke. 1-8 [doi]
- BotTriNet: A Unified and Efficient Embedding for Social Bots Detection via Metric LearningJun Wu, Xuesong Ye, Yanyuet Man. 1-6 [doi]
- Leveling Up Survey of How Nation States Leverage Cyber Operations to Even the Playing FieldJason Ford, Hala Strohmier Berry. 1-5 [doi]
- Lung And Colon Cancer Detection Using Weighted Average Ensemble Transfer LearningLava Th. Omar, Judy M. Hussein, Lava F. Omer, Abdalbasit Mohammed Qadir, Mazen Ismaeel Ghareb. 1-7 [doi]
- Emotion Detection in SpeechDishant Banga, Prerana Singh. 1-4 [doi]
- Streamlining Enterprise Data Processing, Reporting and Realtime Alerting using Apache KafkaKiran Peddireddy. 1-4 [doi]
- A Hybrid Approach to Osteosarcoma Detection Using Densenet201-SVM ModelDeraw Kamaran Salih, Abdalbasit Mohammed Qadir, Mazen Ismaeel Ghareb. 1-5 [doi]
- A Deep Learning Method to Predict Loss of Coolant Accident in Nuclear Power PlantsFaiyaz Fahim. 1-4 [doi]
- IEWS: a Free Open Source Intelligent Early Warning System Based on Machine LearningAbdulrahman A. El Tawil, Khouloud Samrouth. 1-3 [doi]
- Mechatronics Education- Current and Future TrendsKhalid Tantawi, Ahad Nasab, Lyn Potter, Omar Tantawi, Nancy Wilson, Alisa Henrie, Arif Sirinterlikci, Erkan Kaplanoglu. 1-5 [doi]
- Encryption process of Blockchain based online course curriculum education systemMd. Rayhan Ahmmed, Md. Mamun Sakib, Maruf Ur Rahman, Rabeya Bibi, Md. Maruf Hasan Talukder, Ms. Johora Akter Polin. 1-7 [doi]
- Identification of Providers with Similar Risk Profiles in Healthcare Claims Using GraphsSal Aguinaga, Daniel Lasaga, Shivashankar Danthuri, John Helms, Edward Bowen, Sanmitra Bhattacharya. 1-6 [doi]
- Fused Syntactic and Semantic Parsing for Measuring Privacy Level in Unstructured TextSiQi Xie, Xiuxia Tian. 1-6 [doi]
- Quantization-Based Watermarking Methods with Reduced DistortionVictor Fedoseev. 1-6 [doi]
- A CNN-Based Novel Approach for The Detection of Compound Bangla Handwritten CharactersSheikh Shamshad Ahmed, Afrin Akter Mim, Dipto Saha, Kamrun Nahar, Md. Aynul Hasan Nahid. 1-6 [doi]
- Child and Maternal Mortality Risk Factor Analysis Using Machine Learning ApproachesMd. Alif Sheakh, Mst. Sazia Tahosin, Md Maruf Hasan, Taminul Islam, Onamika Islam, Md Masum Rana. 1-6 [doi]
- The impact of identifiable features in ML Classification algorithms with the HIKARI-2021 DatasetRui Fernandes, João Silva, Óscar Ribeiro, Irene Portela, Nuno Lopes. 1-5 [doi]
- CyberTMS : A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0Gahangir Hossain, Josh Tarrant. 1-6 [doi]
- Shape Detection Using Air-DrawingSami Haj Ali, Hüseyin Aygün. 1-5 [doi]
- Surveillance, Reconnaissance and Detection Services for Disaster Operations of IoT-Based eVTOL UAVs with Swarm IntelligenceMurat Bakirci, Muhammed Mirac Ozer. 1-6 [doi]
- An Investigation of the Effects of the Numerical Missing Value Imputation Methods for Click-through Rate Estimation PerformancesEkin Can Erkus, Müslüm Ersel Er, Alper Yildiz, Mustafa Gencer. 1-5 [doi]
- Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic TimelineSwardiantara Silalahi, Tohari Ahmad, Hudan Studiawan. 1-6 [doi]
- Detection of Web-Attack using DistilBERT, RNN, and LSTMBiodoumoye George Bokolo, Lei Chen, Qingzhong Liu. 1-6 [doi]
- FIGO: Fingerprint Identification Approach Using GAN and One Shot Learning TechniquesIbrahim Yilmaz, Mahmoud Abouyoussef. 1-6 [doi]
- W.A.R. - Wheelchair Activity RecognitionHugo Lopes, Filipe Coelho, Joaquim Gonçalves. 1-6 [doi]
- Battery Drain using WiFi BeaconsAkhil Raj, Sriram Sankaran. 1-6 [doi]
- A Novel 4D Hyperchaotic System with Its Dynamical Analysis and SynchronizationErman Ozpolat, Arif Gülten. 1-5 [doi]
- CHI2CV : Feature Selection using Chi-Square with Cross-Validation for Intrusion Detection SystemAulia Teaku Nururrahmah, Tohari Ahmad. 1-6 [doi]
- Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity AnalysisMuhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi. 1-6 [doi]
- A Low-Cost UAV Design for Surveillance Purposes in Swarm SystemsMurat Bakirci, Muhammed Mirac Ozer. 1-6 [doi]
- Development of Low-Latency and Real-Time Filipino Children Automatic Speech Recognition System using Deep Neural NetworkBonry Dorado, Alonica Villanueva. 1-6 [doi]
- FineEHR: Refine Clinical Note Representations to Improve Mortality PredictionJun Wu, Xuesong Ye, Chengjie Mou, Weinan Dai. 1-6 [doi]
- Wiegand vs. OSDP in Cyber SecurityShahriar Saadat. 1-3 [doi]
- Deep Learning Model for Automatic Number/License Plate Detection and Recognition System in Campus GatesTwana Mustafa, Murat Karabatak. 1-5 [doi]
- A Predictive Classification Model for Identifying Conversation-related Mobile Forensic Data in Instant Messaging ApplicationsWei-Che Lee, Hong-Yen Chen, Tsung-Nan Lin. 1-6 [doi]
- Data Converter Device in Detecting Water Toxicity for Poultry IndustryMenchie Rosales, Jade Berasis, Sajuid Kyle Dancel, Angelo Sahagun, Jeremiah Tacardon, Alonica Villanueva. 1-6 [doi]
- The Relationship between Digital Citizenship and Information Security AchievementSongül Karabatak, Sevinç Ay, Murat Karabatak. 1-5 [doi]
- Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high ImperceptibilityIngororano Théophile, Jean De La Croix Ntivuguruzwa, Tohari Ahmad. 1-6 [doi]
- A Testbed for LoRa Wireless Communication between IoT devicesNurettin Selcuk Senol, Amar Rasheed. 1-6 [doi]
- Network Anomaly Detection Using NetFlow and Network AutomationAnthony Niño S. Aquino, Alonica R. Villanueva. 1-6 [doi]
- Random Number Generator Based on Optimization and Chaotic SystemGokce Yildirim, Erkan Tanyildizi. 1-4 [doi]
- Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT AttributionKelsie Edie, Cole Mckee, Adam Duby. 1-6 [doi]
- Feature Selection for Phishing Website by Using Naive Bayes ClassifierTwana Mustafa, Murat Karabatak. 1-4 [doi]
- A Harmful Disorder: Predictive and Comparative Analysis for fetal Anemia Disease by Using Different Machine Learning ApproachesMahadi Hasan, Mst. Sazia Tahosin, Afia Farjana, Md. Alif Sheakh, Md Maruf Hasan. 1-6 [doi]
- Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing ProcessRichard Ward, Andrew Johnson 0008. 1-5 [doi]
- Applying Machine Learning Algorithms for Opinion Mining on a Digital Internet Service ProviderAmalia Utamima, Farrel Istihsan Aditya, Firdaus W. G. Ashaari, Alfito K. Nugraha. 1-5 [doi]
- A Lightweight Medical Image Encryption Scheme Using Chaotic Maps and Image ScramblingSujitha Sudevan, Kurunandan Jain. 1-6 [doi]
- Virtualization and Validation of Emulated STM-32 Blue Pill Using the QEMU Open-Source FrameworkDiana Gutierrez, William Ocampo, Alexander Perez-Pons, Himanshu Upadhyay, Santosh Joshi. 1-6 [doi]
- Brain Tumor Segmentation and Classification using Texture Features and Support Vector MachineLeah McIntyre, Eva Tuba. 1-5 [doi]
- Differentiating Systematic Cyber Attacks from Random Attacks in Space CommunicationHacer Varol, Timothy W. Kaufman. 1-5 [doi]
- Reliable Face Identification System for Criminal InvestigationAndrew Fredrick Nyoka, Kelvin Sauli Godfrey, Happines Gideon Mwakilembe, Leonard Jonas Mugendi, Oscar David Mbita, Adramane Assoumana, Dawson Ladislaus Msongaleli. 1-5 [doi]
- 5G Network Supported Unmanned Aerial Vehicle Avionics for Military Zone Surveillance and SecurityMurat Bakirci, Muhammed Mirac Ozer. 1-6 [doi]
- A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly JammingOkan Yaman, Tolga Ayav, Yusuf Murat Erten. 1-5 [doi]
- Who are youƒ OSINT-based Profiling of Infrastructure Honeypot VisitorsTakayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto. 1-6 [doi]
- Image Steganography Using HBV And Padded RSAAswathy Krishna R, Narayanan Subramanian, Kurunandan Jain. 1-6 [doi]
- AI-Based Network Security Anomaly Prediction and Detection in Future NetworkGunay Abdiyeva-Aliyeva. 1-5 [doi]
- Improved ECC-based Phase Watermarking Method for Video Copyright ProtectionDavid Shapiro, Vladislav Sergeyev, Victor Fedoseev. 1-6 [doi]
- Deep Learning-Based Attribute Optimization Method for ABACYuan Wei, Xiuxia Tian. 1-5 [doi]
- GPS Spoofing Detection in UAV Using Motion Processing UnitPrasanna Srinivasan S, Shiju Sathyadevan. 1-4 [doi]
- Multivariate and multi-output indoor air quality prediction using bidirectional LSTMNuno Fernandes, Joaquim Gonçalves. 1-6 [doi]
- Predict Malware Using Machine LearningDomingos Araújo, Joaquim Silva, Patricia Leite Brandao, Óscar Ribeiro, Paulo Teixeira. 1-6 [doi]
- Evaluation of DeepMedic Neural Network for a Region of Interest Eextraction in Medical Image WatermarkingAnna Denisova. 1-6 [doi]
- Exploring Advanced Encryption and Steganography Techniques for Image SecurityMohak Kataria, Kurunandan Jain, Narayanan Subramanian. 1-6 [doi]
- Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-DevicesMatthias Seul, Cihan Varol. 1-7 [doi]
- The Importance of Cybersecurity in Supply ChainHala Strohmier Berry. 1-5 [doi]
- Towards Complex Regional Pain Syndrome (CRPS) Monitoring and Management Using an AI Powered Mobile ApplicationJulia Loncala, Madeline Irvin, Alyson Globis, Katie Harvat, Mason Seitz, Garrett Goodman. 1-6 [doi]
- Driver Drowsiness Classification using Machine Learning and Heart Rate VariabilityMiguel V. P. R. Meneses, Ana Rita Antunes, Joaquim Gonçalves. 1-6 [doi]
- Impact Analysis and Performance Model of Social Engineering TechniquesSeydanur Ahi Duman, Rukiye Hayran, Ibrahim Sogukpinar. 1-6 [doi]
- A Pre-Diagnosis Model for Indoor Radon Potential AssessmentPaulo Meneses, Nuno Lopes, Patrícia Leite, Paulo Teixeira, Joaquim Gonçalves, Joaquim P. Silva. 1-6 [doi]
- ACE-PE: An Automated Code Evaluation Software Tool For Programming EducationBurcu Alper, Selma Nazlioglu, Hürevren Kiliç. 1-5 [doi]
- Exploring the Potential of Quantum-Based Machine Learning: A Comparative Study of QSVM and Classical Machine Learning AlgorithmsZeynep Ozpolat, Murat Karabatak. 1-5 [doi]
- The Effect of Distance Instruction Based on the ARCS Motivation Model on the Course InterestMüslim Alanoglu, Songül Karabatak, Murat Karabatak. 1-4 [doi]
- Challenges in Automatic License Plate Recognition System ReviewTwana Mustafa, Murat Karabatak. 1-6 [doi]
- Cross Protocol Attack on IPSec-based VPNAmaldeep S, Sriram Sankaran. 1-6 [doi]
- Distribution of High-Frequency Words: An Analytical InvestigationCan Özbey, Eyüp Kaan Ülgen. 1-6 [doi]
- Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance GoalsPhani Lanka, Cihan Varol, Narasimha K. Shashidhar. 1-6 [doi]
- Feature Selection for Classification Problems by Binary Bare Bones Fireworks AlgorithmUna Tuba, Eva Tuba, Milan Tuba, Mladen D. Veinovic. 1-6 [doi]
- Analysis of the Dynamic Features on Ransomware Detection Using Deep Learning-based MethodsSibel Gülmez, Arzu Gorgulu Kakisim, Ibrahim Sogukpinar. 1-6 [doi]
- Genetic Algorithm and Local Search for Optimization of Tourism Trips as an Orienteering ProblemAchmad Mufliq, Amalia Utamima. 1-5 [doi]