default search action
ISDFS 2019: Barcelos, Portugal
- 7th International Symposium on Digital Forensics and Security, ISDFS 2019, Barcelos, Portugal, June 10-12, 2019. IEEE 2019, ISBN 978-1-7281-2827-6
- Faisal Shaman, Bogdan V. Ghita, Nathan L. Clarke, Abdulrahman Alruban:
User Profiling Based on Application-Level Using Network Metadata. 1-8 - Peshraw Ahmed Abdalla, Asaf Varol:
Advantages to Disadvantages of Cloud Computing for Small-Sized Business. 1-6 - Noushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer, Christoph G. Schütz:
An Integrated Framework to Examine Mobile Users' Pathway from Threat Cognition to Action. 1-5 - Halil Ozturk, Sevginur Teke, Murat Karabatak:
A New Approach for Exiting from Parking Lot based on Artificial Neural Network. 1-6 - Hunor Sándor, Béla Genge, Piroska Haller, Andrei Bica:
A Security-Enhanced Interoperability Middleware for the Internet of Things. 1-6 - Anjali Menon:
Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking. 1-5 - Eva Tuba, Raka Jovanovic, Dejan Zivkovic, Marko Beko, Milan Tuba:
Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation. 1-6 - Sertaç Yaman, Merve Yildirim, Bircan Karmshoglu, Yavuz Erol, Hasan Kürüm:
Image and Video Processing Applications Using Xilinx System Generator. 1-5 - Tala Tafazzoli, Babak Sadeghiyan:
A four-step method for investigating network worm propagation. 1-7 - Çagatay Ünal Yurtoz, Ismail Burak Parlak:
Measuring the effects of emojis on Turkish context in sentiment analysis. 1-6 - Giuseppe Amato, Fabrizio Falchi, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas, Alessandro Trivilini, Claudio Vairo:
Face Verification and Recognition for Digital Forensics and Information Security. 1-6 - Zhala Sarkawt Othman, Mehmet Kaya:
Refactoring Code Clone Detection. 1-6 - Peter Szabó, Béla Genge:
Circle Map for Internet of Things Networks. 1-5 - João Lopes, Carlos Serrão, Luís Nunes, Ana de Almeida, João Oliveira:
Overview of machine learning methods for Android malware identification. 1-6 - Sankardas Roy, Yan Wu, Kristina N. LaVenia:
Experience of Incorporating NIST Standards in a Digital Forensics Curricula. 1-6 - Erkan Tanyildizi, Gokce Yildirim:
Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy Animals. 1-4 - Yesim Ülgen Sonmez, Asaf Varol:
Legal and Technical Aspects of Web Forensics. 1-7 - Ayse Cengiz, Derya Avci:
Review of Chaotic Based S-Box Structures. 1-6 - Samer Hamdani, Hassan Sbeyti:
A Comparative study of COAP and MQTT communication protocols. 1-5 - Maha F. Sabir, James H. Jones, Hang Liu, Alex V. Mbaziira:
Predicting Stealthy Watermarks in Files Using Deep Learning. 1-6 - Jose Garcia, Cihan Varol:
SmartThings Event Export using SmartApps. 1-6 - Barbora Celesova, Jozef Val'ko, Rudolf Grezo, Pavol Helebrandt:
Enhancing security of SDN focusing on control plane and data plane. 1-6 - Souheil Chukry, Hassan Sbeyti:
Security Enhancement in Storage Area Network. 1-5 - Ahmed Abdlrazaq, Serkan Varol:
A Trust Management Model for IoT. 1-6 - Emad Sami Jaha:
Augmenting Gabor-based Face Recognition with Global Soft Biometrics. 1-5 - Andrew Johnson, Ross Davies:
Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods. 1-6 - Nilay Yildirim, Asaf Varol:
A Research on Security Vulnerabilities in Online and Mobile Banking Systems. 1-5 - Bradley Lee Snyder, James H. Jones:
Determining the Effectiveness of Data Remanence Prevention in the AWS Cloud. 1-6 - Sapan Noori Azeez, Serkan Varol:
Securing Database Management Systems using RAM Serial Numbers. 1-5 - Ghazi Abdalla Abdalrahman, Hacer Varol:
Defending Against Cyber-Attacks on the Internet of Things. 1-6 - Mohammed Akour, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh:
Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers. 1-7 - Ebu Yusuf Güven, Mehmet Yavuz Yagci, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin:
A Survey on Backbone Attack. 1-5 - Aleksey Maksimov, Mikhail Gashnikov:
Parameter space dimension reduction for multidimensional signals differential pulse-code modulation interpolator. 1-4 - Osman Altay, Mustafa Ulas, Mahmut Ozer, Ece Genc:
An Expert System to Predict Warfarin Dosage in Turkish Patients Depending on Genetic and Non-Genetic Factors. 1-6 - Long Chen, Yi Zhong, Weidong Ai, Difang Zhang:
Continuous Authentication Based on User Interaction Behavior. 1-6 - Yesim Ülgen Sonmez, Asaf Varol:
New Trends in Speech Emotion Recognition. 1-7 - Yildiray Yigit, Murat Karabatak:
A Stenography Application for Hiding Student Information into an Image. 1-4 - Zhiqing Zhang, Hiroshi Esaki, Hideya Ochiai:
Analysis of Malware Hidden Behind Firewalls with Back Scans. 1-6 - Songül Karabatak, Murat Karabatak:
Information Security Awareness of School Administrators. 1-6 - Mirac Karmlslloglu, Feride Kulali:
Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation Analysis (DFA). 1-4 - Rayan Sulaiman Khalaf, Asaf Varol:
Digital Forensics: Focusing on Image Forensics. 1-5 - Yucel Burhan, Firat Artuger, Fatih Özkaynak:
A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms. 1-5 - Songul Karakus, Engin Avci:
Application of Similarity-Based Image Steganography Method to Computerized Tomography Images. 1-4 - Shalaw Mshir, Asaf Varol:
A New Model for Creating Layer Planes Using Steganography for Text Hiding. 1-5 - Özgür Alaca, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin:
A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector. 1-6 - Mikhail Gashnikov:
Multidimensional signal interpolation based on parametric space dimension reduction. 1-5 - Sevinç Ay, Murat Karabatak:
A Target Tracking Application On Mobese Videos. 1-5 - Salim Jibrin Danbatta, Asaf Varol:
Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation. 1-5 - Anna Egorova, Victor Fedoseev:
Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study. 1-6 - Nuno Mateus Coelho, Miguel Peixoto, Maria Manuela Cruz-Cunha:
Prototype of a paranoid mobile operating system distribution. 1-6 - Gamzepelin Aksoy, Murat Karabatak:
Performance Comparison of New Fast Weighted Naïve Bayes Classifier with Other Bayes Classifiers. 1-5 - Sundar Krishnan, Mingkui Wei:
SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident Forensics. 1-6 - Hussein Farooq Tayeb, Cihan Varol:
Android Mobile Device Forensics: A Review. 1-7 - Abdalbasit Mohammed Qadir, Nurhayat Varol:
A Review Paper on Cryptography. 1-6 - Shreya Udhani, Alexander Withers, Masooda N. Bashir:
Human vs Bots: Detecting Human Attacks in a Honeypot Environment. 1-6 - Dejan N. Milic, Marko Smilic, Boiana Nikolic, Milan Tuba, Petar C. Spalevic:
Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel Inversion. 1-6 - Jan Lastinec, Mario Keszeli:
Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks. 1-6 - Zeynep Ozpolat, Murat Karabatak:
Temperature Estimation with Time Series Analysis from Air Quality Data Set. 1-5 - Iliyasu Yahaya Adam, Cihan Varol, Asaf Varol:
Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria. 1-5 - Aykut Diker, Engin Avci:
Feature Extraction of ECG Signal by using Deep Feature. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.