Mustafa Aydin

Orcid: 0000-0001-8414-0008

According to our database1, Mustafa Aydin authored at least 16 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A couple of novel image enhancement methods depending on the Prabhakar fractional approaches.
Signal Image Video Process., December, 2024

Relative controllability of nonlinear delayed multi-agent systems.
Int. J. Control, February, 2024

The Sequential Conformable Langevin-Type Differential Equations and Their Applications to the RLC Electric Circuit Problems.
J. Appl. Math., 2024

2022
Sahte internet sitelerinin URL özellikleri temelinde tespit edilmesi amacıyla özellik seçme metotlarının ve öğrenme algoritmalarının analizi (Analysis of feature selection methods and learning algorithms for phishing websites detection based on URL)
PhD thesis, 2022

A multilevel modeling approach to investigating factors impacting computer and information literacy: ICILS Korea and Finland sample.
Educ. Inf. Technol., 2022

2021
Does the digital divide matter? Factors and conditions that promote ICT literacy.
Telematics Informatics, 2021

Classification of neonatal jaundice in mobile application with noninvasive image processing methods.
Turkish J. Electr. Eng. Comput. Sci., 2021

Scalable Wi-Fi Intrusion Detection for IoT Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2016
Neonatal Jaundice Detection System.
J. Medical Syst., 2016

Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review.
CoRR, 2015

Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Feature extraction and classification phishing websites based on URL.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors.
Proceedings of the CLOSER 2014, 2014

2013
A comparison of major issues for the development of forensics in cloud computing.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013


  Loading...