Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Ibrahim Zincir"'
Autor:
Aybuke Kececi, Armağan Yildirak, Kaan Ozyazici, Gulsen Ayluctarhan, Onur Agbulut, Ibrahim Zincir
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 23, Iss 4, Pp 931-937 (2020)
The basis of biometric authentication is that each person's physical and behavioural characteristics can be accurately defined. Many authentication techniques were developed over the years. Human gait recognition is one of these techniques. This arti
Externí odkaz:
https://doaj.org/article/2c9c725786e542898d692534eeb3fbfb
Publikováno v:
Building Research & Information. :1-19
Publikováno v:
Journal of Cyber Security and Mobility.
This paper explores the concept of entropy of a flow to augment flow statistical features for encrypted DNS tunnelling detection, specifically DNS over HTTPS traffic. To achieve this, the use of flow exporters, namely Argus, DoHlyzer and Tranalyzer2
Publikováno v:
Proceedings of the Future Technologies Conference (FTC) 2020, Volume 1 ISBN: 9783030631277
In many real-world applications, a high number of words could result in noisy and redundant information, which could degrade the general performance of text classification tasks. Feature selection techniques with the purpose of eliminating uninformat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4107e717e49392aa12e122ea37587c46
https://doi.org/10.1007/978-3-030-63128-4_52
https://doi.org/10.1007/978-3-030-63128-4_52
Publikováno v:
GECCO Companion
The Android platform commands a dramatic majority of the mobile market, and this popularity makes it an appealing target for malicious actors. Android malware is especially dangerous because of the versatility in distribution and acquisition of softw
Autor:
Gulsen Ayluctarhan, Armağan Yildirak, Kaan Ozyazici, Onur Agbulut, Ibrahim Zincir, Aybuke Kececi
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 23, Iss 4, Pp 931-937 (2020)
The basis of biometric authentication is that each person's physical and behavioural characteristics can be accurately defined. Many authentication techniques were developed over the years. Human gait recognition is one of these techniques. This arti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4eebd93871840a11f71c6c9cfdedd5a2
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/7257
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/7257
Publikováno v:
CNSM
The usage of Network Address Translation (NAT) devices is common among end users, organizations, and Internet Service Providers. NAT provides anonymity for users within an organization by replacing their internal IP addresses with a single external w
Face identification has become more significant and relevant in the recent years. It is widely used for security purposes in enterprises and state-owned business since it has many advantages and benefits compared to other state of the art security ap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::674f11e26c9918d184e79ad72c95c2ed
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078347291&doi=10.1109/ASYU48272.2019.8946343&partnerID=40&md5=71b363612597ebb5c794f1b7b69d53b7
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078347291&doi=10.1109/ASYU48272.2019.8946343&partnerID=40&md5=71b363612597ebb5c794f1b7b69d53b7
Publikováno v:
International Journal of Software Engineering and Knowledge Engineering. 25:513-550
This research focuses on the identification of relevant experience required for solving IT (Information Technology) problems in small- to medium-sized enterprises. To achieve this, we integrated information retrieval techniques with clustering and op
Publikováno v:
GECCO (Companion)
Identification of P2P (peer to peer) applications inside network traffic plays an important role for route provisioning, traffic policing, flow prioritization, network service pricing, network capacity planning and network resource management. Inspec