default search action
Cihan Varol
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Ahmet Furkan Aydogan, Cihan Varol, Aysenur Vanli, Hacer Varol:
A New Security Mechanism for IoT Devices: Electroencephalogram (EEG) Signals. ACR 2024: 306-317 - [c39]Fnu Aakanksha, Avinash Kumar, Cihan Varol, Hyuk Cho, Amar Rasheed:
Persistent Browser Storage Data Extractor. ISDFS 2024: 1-5 - [c38]Sarah Adair, Cihan Varol, Fan Liang, Vung Pham:
Malware API Call-Based Multiclass-Classification Using Machine Learning and Deep Learning. ISDFS 2024: 1-7 - [c37]Chiamaka Femi-Adeyinka, Nuri Alperen Kose, Tosin Akinsowon, Cihan Varol:
Digital Forensics Analysis of YouTube, Instagram, and TikTok on Android Devices: A Comparative Study. ISDFS 2024: 1-6 - [c36]Kubra Gundogan, Jeffrey Berg, Cihan Varol:
Investigating YouTube, TikTok, and Instagram Social Media Interactions on Chrome and Edge Browsers. ISDFS 2024: 1-6 - [c35]Kubra Gundogan, Khushi Gupta, Laura Garland, Cihan Varol, Narasimha K. Shashidhar:
Identifying Malware Family with String Matching Algorithms Based on API Calls and Entire Strings. ISDFS 2024: 1-7 - [c34]Mario Merendon, Cihan Varol, Narasimha K. Shashidhar, Kirk Burns:
iOS Mobile Forensics Methodologies, Extracting Biome Artifacts, and Overlooked Artifacts Needed to Improve Investigations. ISDFS 2024: 1-7 - [c33]Navya Makkena, Abm Rezbaul Islam, Cihan Varol, Min Kyung An:
Urgency Detection in Social Media Texts Using Natural Language Processing. ICSC 2024: 156-163 - 2023
- [j15]Khushi Gupta, Cihan Varol, Bing Zhou:
Digital forensic analysis of discord on google chrome. Forensic Sci. Int. Digit. Investig. 44: 301479 (2023) - [j14]Khushi Gupta, Damilola Oladimeji, Cihan Varol, Amar Rasheed, Narasimha Shahshidhar:
A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions. Inf. 14(12): 629 (2023) - [j13]Damilola Oladimeji, Amar Rasheed, Cihan Varol, Mohamed Baza, Hani Alshahrani, Abdullah Baz:
CANAttack: Assessing Vulnerabilities within Controller Area Network. Sensors 23(19): 8223 (2023) - [c32]Damilola Oladimeji, Amar Rasheed, Narasimha K. Shashidhar, Cihan Varol:
A Testbed for a Controller Area Network Communication Protocol in Automobiles. CCNC 2023: 1-6 - [c31]Phani Lanka, Cihan Varol, Narasimha K. Shashidhar:
Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals. ISDFS 2023: 1-6 - [c30]Matthias Seul, Cihan Varol:
Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-Devices. ISDFS 2023: 1-7 - [c29]Amar Rasheed, Mohamed Baza, Mohammad Khan, Narasimha Karpoor, Cihan Varol, Gautam Srivastava:
Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms. WPMC 2023: 76-82 - 2022
- [j12]Furkan Paligu, Cihan Varol:
Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage. Future Internet 14(6): 188 (2022) - [j11]Amar Rasheed, Rabi N. Mahapatra, Cihan Varol, Narasimha Karpoor:
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT. IEEE Trans. Emerg. Top. Comput. 10(3): 1476-1491 (2022) - [c28]Valentin Gazeau, William Glisson, Cihan Varol, Qingzhong Liu:
Walk This Way: Footwear Recognition Using Images & Neural Networks. HICSS 2022: 1-13 - [c27]Ashok Adarsh Angadi, Cihan Varol, Narasimha K. Shashidhar:
Penetration Testing: Smart Home IoT Devices. ICIOT 2022: 33-46 - [c26]Khushi Gupta, Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol:
Digital Forensics Lab Design: A framework. ISDFS 2022: 1-6 - [c25]Eduardo Martinez, Cihan Varol, Narasimha K. Shashidhar, Van Vung Pham:
Development of a Forensic Toolkit for Small-Medium Size Business (SMB). ISDFS 2022: 1-4 - [c24]Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol, Amar Rasheed:
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools. ISDFS 2022: 1-10 - [e1]Asaf Varol, Murat Karabatak, Cihan Varol:
10th International Symposium on Digital Forensics and Security, ISDFS 2022, Istanbul, Turkey, June 6-7, 2022. IEEE 2022, ISBN 978-1-6654-9796-1 [contents] - 2021
- [c23]Omar Iskndar Ahmed, Cihan Varol:
Detection of Web Attacks via PART Classifier. ISDFS 2021: 1-4 - [c22]Roberto Solís, Narasimha K. Shashidhar, Cihan Varol:
A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses. ISDFS 2021: 1-5 - [c21]Frank Williams, Cihan Varol, Amar Rasheed, Narasimha K. Shashidhar:
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling. ISDFS 2021: 1-7 - 2020
- [j10]Furkan Paligu, Cihan Varol:
Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage. Future Internet 12(11): 184 (2020) - [c20]Peshraw Ahmed Abdalla, Cihan Varol:
Testing IoT Security: The Case Study of an IP Camera. ISDFS 2020: 1-5 - [c19]Iliyasu Yahaya Adam, Cihan Varol:
Intelligence in Digital Forensics Process. ISDFS 2020: 1-6 - [c18]Safa Aktepe, Cihan Varol, Narasimha K. Shashidhar:
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities. ISDFS 2020: 1-5 - [c17]Derrick Berger, Narasimha K. Shashidhar, Cihan Varol:
Using ITIL 4 in Security Management. ISDFS 2020: 1-6 - [c16]Christine Orosco, Cihan Varol, Narasimha K. Shashidhar:
Graphically Display Database Transactions to Enhance Database Forensics. ISDFS 2020: 1-6 - [c15]Luis Francisco Plá, Narasimha K. Shashidhar, Cihan Varol:
On-Premises Versus SECaaS Security Models. ISDFS 2020: 1-6 - [c14]Hussein Faroq Tayeb, Murat Karabatak, Cihan Varol:
Time Series Database Preprocessing for Data Mining Using Python. ISDFS 2020: 1-4 - [c13]Steven Zavala, Narasimha K. Shashidhar, Cihan Varol:
Cybersecurity Evaluation with PowerShell. ISDFS 2020: 1-6
2010 – 2019
- 2019
- [c12]Iliyasu Yahaya Adam, Cihan Varol, Asaf Varol:
Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria. ISDFS 2019: 1-5 - [c11]Jose Garcia, Cihan Varol:
SmartThings Event Export using SmartApps. ISDFS 2019: 1-6 - [c10]Hussein Farooq Tayeb, Cihan Varol:
Android Mobile Device Forensics: A Review. ISDFS 2019: 1-7 - 2018
- [c9]Shinelle Hutchinson, Cihan Varol:
A Survey of Privilege Escalation Detection in Android. UEMCON 2018: 726-731 - 2017
- [c8]Keerthi Koneru, Cihan Varol:
Privacy Preserving Record Linkage Using MetaSoundex Algorithm. ICMLA 2017: 443-447 - 2016
- [c7]Keerthi Koneru, Venkata Sai Venkatesh Pulla, Cihan Varol:
Performance Evaluation of Phonetic Matching Algorithms on English Words and Street Names - Comparison and Correlation. DATA 2016: 57-64 - [c6]Shannon Silessi, Cihan Varol, Murat Karabatak:
Identifying Gender from SMS Text Messages. ICMLA 2016: 488-491 - 2015
- [j9]Abner Mendoza, Avinash Kumar, David Midcap, Hyuk Cho, Cihan Varol:
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis. Digit. Investig. 14: 63-75 (2015) - [j8]Cihan Varol, Sairam Hari:
Detecting near-duplicate text documents with a hybrid approach. J. Inf. Sci. 41(4): 405-414 (2015) - 2012
- [j7]Cihan Varol, Henry Neumann:
Real-Time Data Quality Monitoring System for Data Cleansing. Int. J. Bus. Intell. Res. 3(1): 83-93 (2012) - [j6]Cihan Varol, Coskun Bayrak:
Hybrid Matching Algorithm for Personal Names. ACM J. Data Inf. Qual. 3(4): 8:1-8:18 (2012) - 2011
- [j5]Cihan Varol, Coskun Bayrak:
Estimation of quality of service in spelling correction using Kullback-Leibler divergence. Expert Syst. Appl. 38(5): 6307-6312 (2011) - [j4]Cihan Varol, Coskun Bayrak:
Risk Assessment of Error-Prone Personal Information in Data Quality Tools. J. Comput. 6(2): 155-161 (2011) - [j3]Murali K. Nuthakki, Mutlu Mete, Cihan Varol, Sang C. Suh:
UXSOM: UML generated XML to software metrics. ACM SIGSOFT Softw. Eng. Notes 36(3): 1-6 (2011) - [c5]Cihan Varol, John R. Talburt:
Pattern and Phonetic Based Street Name Misspelling Correction. ITNG 2011: 553-558 - 2010
- [j2]Cihan Varol, Benjamin Stafford, Kiran Kovvuri, Rishi Chitti:
Author Disambiguation using an Hybrid Approach of Queries and String Matching Techniques. Int. J. Intell. Inf. Process. 1(1): 3-11 (2010) - [c4]Cihan Varol, Coskun Bayrak:
Business Process Automation Based on Dependencies. eKNOW 2010: 17-22 - [c3]Val Pushkarev, Henry Neumann, Cihan Varol, John R. Talburt:
An Overview of Open Source Data Quality Tools. IKE 2010: 370-376
2000 – 2009
- 2008
- [c2]Cihan Varol, Coskun Bayrak:
Measuring Reliability Component in Business Process Automation. DMS 2008: 21-26 - 2006
- [j1]Michael Collins, Charles Reynolds, Christine Le, Cihan Varol, Coskun Bayrak:
Automated data verification in a format-free environment. ACM SIGSOFT Softw. Eng. Notes 31(2): 1-4 (2006) - 2005
- [c1]Cihan Varol, Coskun Bayrak, Robert Ludwig:
Application of Software Engineering Fundamentals: A Hands on Experience. Software Engineering Research and Practice 2005: 579-583
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint