USING A SUBTRACTIVE CENTER BEHAVIORAL MODEL TO DETECT MALWARE |
2020 |
SECURITY AND COMMUNICATION NETWORKS |
A COMPREHENSIVE REVIEW ON MALWARE DETECTION APPROACHES |
2020 |
IEEE ACCESS |
AN EFFECTIVE PREDICTION METHOD FOR NETWORK STATE INFORMATION IN SD-WAN |
2022 |
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES |
A COMPREHENSIVE SYSTEMATIC LITERATURE REVIEW ON INTRUSION DETECTION SYSTEMS |
2021 |
IEEE ACCESS |
SABADT: HYBRID INTRUSION DETECTION APPROACH FOR CYBER ATTACKS IDENTIFICATION IN WLAN |
2021 |
IEEE ACCESS |
A NEW MALWARE CLASSIFICATION FRAMEWORK BASED
ON DEEP LEARNING ALGORITHMS
|
2021 |
IEEE ACCESS |
INTELLIGENT BEHAVIOR-BASED MALWARE DETECTION
SYSTEM ON CLOUD COMPUTING ENVIRONMENT |
2021 |
IEEE ACCESS |
A REVIEW OF CLOUD-BASED MALWARE DETECTION SYSTEM: OPPORTUNITIES, ADVANCES AND CHALLENGES |
2021 |
EUROPEAN JOURNAL OF ENGINEERING AND TECHNOLOGY RESEARCH |
DEVELOPMENT OF A SCALE TO MEASURE CYBERCRIME-AWARENESS ON SOCIAL MEDIA |
2023 |
JOURNAL OF COMPUTER INFORMATION SYSTEMS |
A NOVEL BLOCKCHAIN-BASED SCIENTIFIC PUBLISHING SYSTEM |
2023 |
SUSTAINABILITY |
A COMPREHENSIVE REVIEW OF CYBER SECURITY VULNERABILITIES, THREATS, ATTACKS, AND SOLUTIONS |
2023 |
ELECTRONICS |
SEPARATING MALICIOUS FROM BENIGN SOFTWARE USING DEEP LEARNING ALGORITHM |
2023 |
ELECTRONICS |
AIR POLLUTION IN MARMARA REGION BEFORE AND DURING THE COVID-19 OUTBREAK |
2023 |
ENVIRONMENTAL MONITORING AND ASSESSMENT |
A NOVEL FEATURE SELECTION APPROACH TO CLASSIFY INTRUSION
ATTACKS IN NETWORK COMMUNICATIONS |
2023 |
APPLIED SCIENCES |
A COMPREHENSIVE SURVEY: EVALUATING THE EFFICIENCY OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING TECHNIQUES ON CYBER SECURITY SOLUTIONS |
2024 |
IEEE ACCESS |
EVALUATING SHORT- AND LONG-TERM INVESTMENT STRATEGIES: DEVELOPMENT AND VALIDATION OF THE INVESTMENT STRATEGIES SCALE (ISS) |
2024 |
FINANCIAL INNOVATION |