Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Canan BATUR ŞAHİN"'
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9287 (2024)
Industrial control systems (ICSs) are critical components automating the processes and operations of electromechanical systems. These systems are vulnerable to cyberattacks and can be the targets of malicious activities. With increased internet conne
Externí odkaz:
https://doaj.org/article/b7cdb22d2cc6440aa1899969d2d867ac
Autor:
Canan Batur Şahin
Publikováno v:
Soft Computing. 27:5703-5719
Cloud computing is a new technology which refers to an infrastructure where both software and hardware application are operate for the network with the help of internet. Cloud computing provide these services with the help of rule know as you pay as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::75db3223f32eb971d915b011b27ba1bf
https://zenodo.org/record/8133191
https://zenodo.org/record/8133191
Regardless of the past research work in cloud computing some of the challenges still exist related to workload distribution in cloud data centers. Especially in the infrastructure as a service IaaS cloud model. Efficient task allocation is a crucial
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8e88f03d2ede34be488004975556886f
https://doi.org/10.21203/rs.3.rs-2668929/v1
https://doi.org/10.21203/rs.3.rs-2668929/v1
Autor:
CANAN BATUR ŞAHİN
In computer security, semantic learning is helpful in understanding vulnerability requirements, realizing source code semantics, and constructing vulnerability knowledge. Nevertheless, learning how to extract and select the most valuable features for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c4c2851bc7b9ee0fdbae71b37ba2c44
https://doi.org/10.21203/rs.3.rs-1364332/v1
https://doi.org/10.21203/rs.3.rs-1364332/v1
Autor:
Laith Abualigah, Seyedali Mirjalili, Mohamed Abd Elaziz, Heming Jia, Canan Batur Şahin, Ala’ Khalifeh, Amir H. Gandomi
Publikováno v:
Handbook of Moth-Flame Optimization Algorithm ISBN: 9781003205326
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b6e09215417df9bde56d9fbcedc4028a
https://doi.org/10.1201/9781003205326-13
https://doi.org/10.1201/9781003205326-13
Autor:
Laith Abualigah, Mahmoud Omari, Ahmad Ziadeh, Abdulwahab Ali Almazroi, Canan Batur Şahin, Mohamed Abd Elaziz
Publikováno v:
Multimedia Tools and Applications. 80:31569-31597
With the increasing number of electricity consumers, production, distribution, and consumption problems of produced energy have appeared. This paper proposed an optimization method to reduce the peak demand using smart grid capabilities. In the propo
Autor:
Laith Abualigah, Canan Batur Şahin
Publikováno v:
Neural Computing and Applications. 33:14049-14067
The automatic detection of software vulnerabilities is considered a complex and common research problem. It is possible to detect several security vulnerabilities using static analysis (SA) tools, but comparatively high false-positive rates are obser
Publikováno v:
Applied Intelligence. 51:8271-8287
The detection of software vulnerabilities is considered a vital problem in the software security area for a long time. Nowadays, it is challenging to manage software security due to its increased complexity and diversity. So, vulnerability detection
Publikováno v:
European Journal of Science and Technology.