Murat Aydos

Orcid: 0000-0002-7570-9204

According to our database1, Murat Aydos authored at least 17 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DICEguard: enhancing DICE security for IoT devices with periodic memory forensics.
J. Supercomput., September, 2024

2023
GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings.
Comput. Secur., 2023

Wireless Intrusion Detection Using Shallow Neural Network Models.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
Security testing of web applications: A systematic mapping of the literature.
J. King Saud Univ. Comput. Inf. Sci., 2022

The rise of ransomware: Forensic analysis for windows based ransomware attacks.
Expert Syst. Appl., 2022

ERP failure: A systematic mapping of the literature.
Data Knowl. Eng., 2022

Software Implementation Performances of Block Ciphers: A Systematic Literature Review.
Proceedings of the 7th International Workshop on Big Data and Information Security, 2022

2021
Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision.
Comput. Secur., 2021

2020
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition.
Comput. Secur., 2020

Cyber Fraud: Detection and Analysis of the Crypto-Ransomware.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

2019
Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors.
CoRR, 2019

Utilization and Comparision of Convolutional Neural Networks in Malware Recognition.
Proceedings of the 27th Signal Processing and Communications Applications Conference, 2019

2018
Spam/ham e-mail classification using machine learning methods based on bag of words technique.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

2017
A review on cyber security datasets for machine learning algorithms.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

A New Approach to Utility-Based Privacy Preserving in Data Publishing.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2004
Relay Attacks on Bluetooth Authentication and Solutions.
Proceedings of the Computer and Information Sciences, 2004

2000
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...