Volgen
Cihan Varol
Titel
Geciteerd door
Geciteerd door
Jaar
Testing IoT security: The case study of an ip camera
PA Abdalla, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2020
392020
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes
RJ McDown, C Varol, L Carvajal, L Chen
Journal of forensic sciences 61, S110-S116, 2016
312016
Performance evaluation of phonetic matching algorithms on English words and street names
K Koneru, VSV Pulla, C Varol
Proceedings of the 5th International Conference on Data Management …, 2016
212016
Hybrid matching algorithm for personal names
C Varol, C Bayrak
Journal of Data and Information Quality (JDIQ) 3 (4), 1-18, 2012
212012
Automatic spoken language recognition with neural networks
V Gazeau, C Varol
Int. J. Inf. Technol. Comput. Sci.(IJITCS) 10 (8), 11-17, 2018
202018
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis
A Mendoza, A Kumar, D Midcap, H Cho, C Varol
Digital investigation 14, 63-75, 2015
202015
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT
A Rasheed, RN Mahapatra, C Varol, K Narashimha
IEEE Transactions on Emerging Topics in Computing 10 (3), 1476-1491, 2021
182021
Using ITIL 4 in security management
D Berger, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
182020
Browser forensic investigations of whatsapp web utilizing indexeddb persistent storage
F Paligu, C Varol
Future Internet 12 (11), 184, 2020
152020
An Overview of Open Source Data Quality Tools.
V Pushkarev, H Neumann, C Varol, JR Talburt
IKE, 370-376, 2010
152010
Comparision of string matching algorithms on spam email detection
C Varol, HMT Abdulhadi
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
142018
Detecting unprotected SIP-based Voice over IP traffic
L Carvajal, L Chen, C Varol, D Rawat
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 44-48, 2016
142016
Detecting near-duplicate text documents with a hybrid approach
C Varol, S Hari
Journal of Information Science 41 (4), 405-414, 2015
142015
Comparison of pattern matching techniques on identification of same family malware
F Mastjik, C Varol, A Varol
International Journal of Information Security Science 4 (3), 104-111, 2015
132015
Digital forensic analysis of discord on google chrome
K Gupta, C Varol, B Zhou
Forensic Science International: Digital Investigation 44, 301479, 2023
122023
BrowStExPlus: a tool to aggregate indexed DB artifacts for forensic analysis
F Paligu, A Kumar, H Cho, C Varol
Journal of forensic sciences 64 (5), 1370-1378, 2019
122019
Identifying gender from SMS text messages
S Silessi, C Varol, M Karabatak
2016 15th IEEE International Conference on Machine Learning and Applications …, 2016
122016
Intelligence in digital forensics process
IY Adam, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
112020
Estimation of quality of service in spelling correction using Kullback–Leibler divergence
C Varol, C Bayrak
Expert Systems with Applications 38 (5), 6307-6312, 2011
112011
Android mobile device forensics: A review
HF Tayeb, C Varol
2019 7th international symposium on digital forensics and security (ISDFS), 1-7, 2019
102019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20