Zobrazeno 1 - 10
of 223
pro vyhledávání: '"Seyit Camtepe"'
Fuzzing is one of the most effective technique to identify potential software vulnerabilities. Most of the fuzzers aim to improve the code coverage, and there is lack of directedness (e.g., fuzz the specified path in a software). In this paper, we pr
Externí odkaz:
http://arxiv.org/abs/2010.12149
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 4, Pp 1499-1515 (2023)
We consider the multi-user detection (MUD) problem in uplink grant-free non-orthogonal multiple access (NOMA), where the access point has to identify the total number and correct identity of the active Internet of Things (IoT) devices and decode thei
Externí odkaz:
https://doaj.org/article/b5d45f987dd4490983a12501bec06c8d
Publikováno v:
Future Internet, Vol 15, Iss 6, p 214 (2023)
Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware fam
Externí odkaz:
https://doaj.org/article/efd4e2acc61b4e26a4ed324afe3f9886
Autor:
Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng
Publikováno v:
Sensors, Vol 23, Iss 9, p 4346 (2023)
The use of artificial intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which has opened it up to a myriad of privacy, trust, and legal issues. Moreover, organizations have been loath to share ema
Externí odkaz:
https://doaj.org/article/88e5af244f0c4f2787df4021478b5f5b
Autor:
Josef Pieprzyk, Jarek Duda, Marcin Pawłowski, Seyit Camtepe, Arash Mahboubi, Paweł Morawiecki
Publikováno v:
Entropy, Vol 25, Iss 4, p 672 (2023)
Source coding has a rich and long history. However, a recent explosion of multimedia Internet applications (such as teleconferencing and video streaming, for instance) renews interest in fast compression that also squeezes out as much redundancy as p
Externí odkaz:
https://doaj.org/article/2d08df75e1e04820badec29a8ff0ff89
Publikováno v:
IEEE Access, Vol 9, Pp 146810-146821 (2021)
Distributed Denial-of-Service (DDoS) attacks are increasing as the demand for Internet connectivity massively grows in recent years. Conventional shallow machine learning-based techniques for DDoS attack classification tend to be ineffective when the
Externí odkaz:
https://doaj.org/article/ac33e481129640ae8caa3ddace890695
Publikováno v:
IEEE Access, Vol 8, Pp 228818-228830 (2020)
The Internet of Things (IoT) devices are being widely deployed and have been targeted and victimized by malware attacks. The mathematical modelling for an accurate prediction of malicious spreads of botnets across IoT networks is of great importance.
Externí odkaz:
https://doaj.org/article/e0d96f0a9e74488dbbddd70e59383468
Publikováno v:
Methods and Protocols, Vol 5, Iss 4, p 60 (2022)
Machine learning (ML) in healthcare data analytics is attracting much attention because of the unprecedented power of ML to extract knowledge that improves the decision-making process. At the same time, laws and ethics codes drafted by countries to g
Externí odkaz:
https://doaj.org/article/6baad551885c4865b5cb3a6f337d5ff7
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:1186-1199
Publikováno v:
IEEE Sensors Journal. 23:3787-3800