default search action
ISDFS 2022: Istanbul, Turkey
- Asaf Varol, Murat Karabatak, Cihan Varol:
10th International Symposium on Digital Forensics and Security, ISDFS 2022, Istanbul, Turkey, June 6-7, 2022. IEEE 2022, ISBN 978-1-6654-9796-1 - Andrew Johnson, Richard Ward:
'Unified Side-Channel Attack - Model' (USCA-M): An Extension with Biometrics Side-Channel Type. 1-5 - David Okore Ukwen, Murat Karabatak:
Text Clustering of COVID-19 Vaccine Tweets. 1-6 - Dawson Ladislaus Msongaleli, Innocent Paschal Mgembe:
Three-Tier Database Forensic Model. 1-3 - Esra Tepe, Gokhan Bilgin:
Classification of Tissue Types in Histology Images Using Graph Convolutional Networks. 1-3 - S. Sweta Reddy, Santanu Mandal, Varanasi L. V. S. K. B. Kasyap, Aswathy R. K:
A Novel Approach to Detect Fake News Using eXtreme Gradient Boosting. 1-4 - Ali Burak Can, Ismail Burak Parlak, Tankut Acarman:
A New Method of Automatic Content Analysis in Disaster Management. 1-5 - Nuno Mateus Coelho, Manuela Cruz-Cunha:
Serverless Service Architectures and Security Minimals. 1-6 - P. V. Sai Charan, P. Mohan Anand, Sandeep K. Shukla, Naveen Selvan, Hrushikesh Chunduri:
DOTMUG: A Threat Model for Target Specific APT Attacks-Misusing Google Teachable Machine. 1-8 - João Gonçalo Pereira, Joaquim Gonçalves:
Human Activity Recognition: A review. 1-5 - Mustafa Gördesli, Asaf Varol:
Comparing Interservice Communications of Microservices for E-Commerce Industry. 1-4 - Serkan Karakus, Mustafa Kaya, Seda Arslan Tuncer, M. Taha Bahsi, Merve Açikoglu:
A Deep Learning Based Fast Face Detection and Recognition Algorithm for Forensic Analysis. 1-6 - Rani Al Rahbani, Jawad Khalife:
IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning. 1-6 - Ananthapadmanabhan A, Krishnashree Achuthan:
Threat Modeling and Threat Intelligence System for Cloud using Splunk. 1-6 - Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol, Amar Rasheed:
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools. 1-10 - Nuno Martins, Pedro Costa, Alexandre Esteves, Tomás Martins, Susana Nicola, Alberto Pereira:
New Online Reality. 1-4 - Arda Surya Editya, Tohari Ahmad, Hudan Studiawan:
Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation. 1-6 - Aytug Boyaci, Hasan Hüseyin Balik, Fikret Ata:
Energy-Aware Routing Architecture for Wireless Sensor Networks. 1-5 - Muhammad R. Ahmed, Thirein Myo, Badar Al Baroomi:
Outlier detection to Secure Wireless Sensor Networks Based on iForest. 1-6 - Housam Moustafa, Mohammad Malli, Hussein Hazimeh:
Real-time Bitcoin price tendency awareness via social media content tracking. 1-6 - Süleyman Muhammed Arikan:
Technical and Legal Strategic Approaches Protecting the Privacy of Personal Data in Cloud-Based Big Data Applications. 1-7 - Habiba Bouijij, Amine Berqia, Hamadou Saliah-Hassane:
Phishing URL classification using Extra-Tree and DNN. 1-6 - Sai Dheeraj Gummadi, Anirban Ghosh, Yeswanth Vootla:
Transfer Learning based Classification of Plasmodium Falciparum Parasitic Blood Smear Images. 1-5 - Filipe Alves, Nuno Mateus Coelho, Manuela Cruz-Cunha:
ChevroCrypto - Security & Cryptography Broker. 1-5 - Yuri G. Gordienko, Oleksandr Rokovyi, Oleg Alienin, Sergii G. Stirenko:
Context-Aware Data Augmentation for Efficient Object Detection by UAV Surveillance. 1-6 - Khushi Gupta, Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol:
Digital Forensics Lab Design: A framework. 1-6 - Narendrapurapu Surya Chandu, Narayanan Subramanian:
Countering Steganographic Security with CNN. 1-6 - Rami Alnafrani, Duminda Wijesekera:
AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System. 1-6 - Mohd Maaz Khan, Irfan Mabood Khan, Omar Farooq:
Deep Learning based Lightweight Model for Seizure Detection using Spectrogram Images. 1-6 - Harun Emre Kiran, Akif Akgul, Oktay Yildiz:
A New Chaos-Based Lightweight Encryption Mechanism for Microcomputers. 1-5 - Joaquim P. Silva, Joaquim Gonçalves:
Process standardization: the driving factor for bringing artificial intelligence and management analytics to SMEs. 1-5 - Jithin V. O, Narayanan Subramanian:
SECURE-D: Framework For Detecting and Preventing Attacks in SQL and NoSQL Databases. 1-5 - Rui Fernandes, Nuno Lopes:
Network Intrusion Detection Packet Classification with the HIKARI-2021 Dataset: a study on ML Algorithms. 1-5 - Naeem Syed, Majid Ali Khan, Nazeeruddin Mohammad, Ghassen Ben Brahim, Zubair A. Baig:
Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis. 1-6 - Pelin Dinçoglu, Hüseyin Aygün:
Comparison of Forecasting Algorithms on Retail Data. 1-4 - Asad Raza, Shahzad Memon, Muhammad Ali Nizamani, Mahmood Hussain Shah:
Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems. 1-6 - Nicholas Schultz, Adam Duby:
Towards A Framework for Preprocessing Analysis of Adversarial Windows Malware. 1-6 - Bilyaminu Muhammad, Fatih Özkaynak, Asaf Varol, Türker Tuncer:
A Novel Deep Feature Extraction Engineering for Subtypes of Breast Cancer Diagnosis: A Transfer Learning Approach. 1-7 - Ihsan Riza Kara, Asaf Varol:
Detection of Network Anomalies with Machine Learning Methods. 1-6 - Eva Tuba, Adis Alihodzic, Una Tuba, Romana Capor-Hrosik, Milan Tuba:
Swarm Intelligence Approach for Feature Selection Problem. 1-6 - Muhammad Raheel Raza, Walayat Hussain, Asaf Varol:
Performance Analysis of Deep Approaches on Airbnb Sentiment Reviews. 1-5 - Suleiman Y. Yerima, Yi Min To:
A deep learning-enhanced botnet detection system based on Android manifest text mining. 1-6 - Lina Lin, Hanzhou Wu:
Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples. 1-6 - Mário Saraiva, Nuno Coelho:
CyberSoc Implementation Plan. 1-6 - Mena Youssef, Serkan Varol, Serkan Catma:
Vehicle Fatality Analysis by Gender using Predictive Analytics. 1-6 - Ray Kresman, Larry A. Dunning, Jinglei Lu:
An Improved Anonymous Identifier. 1-5 - Songül Karabatak, Sevinç Ay, Murat Karabatak:
The Relationship between Nomophobia and Perceived Socialization in the Online Learning Environment. 1-8 - M. Amir Syafiq Rohmat Rose, Nurlida Basir, Nur Fatin Nabila Rafie Heng, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi:
Phishing Detection and Prevention using Chrome Extension. 1-6 - Eduardo Martinez, Cihan Varol, Narasimha K. Shashidhar, Van Vung Pham:
Development of a Forensic Toolkit for Small-Medium Size Business (SMB). 1-4 - Innocent Paschal Mgembe, Dawson Ladislaus Msongaleli, Naveen Kumar Chaudhary:
Progressive Standard Operating Procedures for Darkweb Forensics Investigation. 1-3 - Juha Pärssinen, Petra Raussi, Sami Noponen, Mikael Opas, Jarno Salonen:
The Digital Forensics of Cyber-Attacks at Electrical Power Grid Substation. 1-6 - Jean De La Croix Ntivuguruzwa, Didacienne Mukanyiligira, Louis Sibomana:
Fuzzy Logic-based Shiitake Mushroom Farm Control for Harvest Enhancement. 1-6 - Rami Alnafrani, Duminda Wijesekera:
An Automated Framework for Generating Attack Graphs Using Known Security Threats. 1-6 - Norshima Humaidi, Saif Hussein Abdallah Alghazo:
Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee's Cybersecurity Protective Behaviour. 1-10 - Sevinç Ay, Songül Karabatak, Murat Karabatak:
The Relationship between Teacher Candidates' Technology Usage and Online Learning Readiness. 1-6 - Ana Rita Antunes, Miguel V. P. R. Meneses, Joaquim Gonçalves, Ana Cristina Braga:
An Intelligent System to Detect Drowsiness at the Wheel. 1-6 - Yesim Ülgen Sönmez, Asaf Varol:
The Necessity of Emotion Recognition from Speech Signals for Natural and Effective Human-Robot Interaction in Society 5.0. 1-8 - Mohamed Alji, Khalid Chougdali:
Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction. 1-4 - Basheer Al-Duwairi, Ahmed S. Shatnawi, Hala Jaradat, Afnan Al-Musa, Hamzah Al-Awadat:
On the Digital Forensics of Social Networking Web-based Applications. 1-6 - Yahya M. Tashtoush, Areen Magableh, Omar Darwish, Lujain Smadi, Omar Alomari, Anood ALghazoo:
Detecting Arabic YouTube Spam Using Data Mining Techniques. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.