Fatih Ertam

Fatih Ertam
Firat University · Digital Forensics Engineering

Ph.D.

About

46
Publications
14,860
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
541
Citations
Introduction
Fatih Ertam currently works at the Digital Forensics Engineering, Firat University. Fatih does research in Information Systems and Network Security and Reliability. Their current project is 'Network.'
Additional affiliations
December 2020 - present
Firat University
Position
  • Professor (Associate)
January 2018 - December 2020
Firat University
Position
  • Professor (Assistant)
December 2000 - January 2018
Firat University
Position
  • Lecturer
Education
June 2016 - June 2021
Firat University
Field of study
  • Software Engineering

Publications

Publications (46)
Article
Intrusion Detection Systems are one of the most effective technologies that protect systems against cyber-attacks. In this study, a new Comprehensive Cyber Security Intrusion Detection Dataset (CCiDD) was created. The CCiDD_A and CCiDD_B datasets are derived from the created dataset. Two datasets were compared with the NSL-KDD, UNSW-NB15 and CSE-CI...
Article
The development and widespread use of computer systems has increased the need for secure storage of data. At the same time, the analysis of digital data storage devices is very important for forensic IT professionals who aim to access information to clarify the crime. File systems of disk drives use partition structures to securely store data and p...
Article
Purpose There are hundreds of thousands of books in libraries, causing problems in searching and counting books. To overcome these problems, this research presents a received signal strength indicator (RSSI) dataset and a new automated book location classification model using the RSSI dataset. Materials and method In this study, a RSSI signals dat...
Article
Exponential increase in the amount of textual data made available on the Internet results in new challenges in terms of accessing information accurately and quickly. Text summarization can be defined as reducing the dimensions of the expressions to be summarized without spoiling the meaning. Summarization can be performed as extractive and abstract...
Article
Full-text available
Driver fatigue is the one of the main reasons of the traffic accidents. The human brain is a complex structure, whose function can be evaluated with electroencephalogram (EEG). Automated driver fatigue detection utilizing EEG decreases the incidence probability of related traffic accidents. Therefore, devising an appropriate feature extraction tech...
Article
Full-text available
Cyber-attacks have become a significant problem worldwide. Therefore, many methods, networks, and applications have been suggested for providing information security in the literature. Automated malware classification has become one of the hot-topic research areas in information security and digital forensics. Image processing methods have been use...
Article
The increase in internet usage brings security problems with it. Malicious software can affect the operation of the systems and disrupt data confidentiality due to the security gaps in the systems. Intrusion Detection Systems (IDS) have been developed to detect and report attacks. In order to develop IDS systems, artificial intelligence-based appro...
Article
Full-text available
Nowadays, mobile devices have been widely used worldwide and they have variable sensors. By using these sensors, many applications for instance navigation, healthcare, and human activity recognition (HAR) have been developed. The primary objective of this paper is to present a multi lightweight HAR method with high prediction performance. To implem...
Article
One of the crucial problems of the signal processing, digital forensics and machine learning is the environmental sound classification (ESC). Several ESC methods have been presented to obtain highly accurate model. In this work, a novel multileveled ESC method is presented. The presented ESC method uses two novel algorithms namely Spiral Pattern an...
Article
Full-text available
Malware recognition has been widely used in the literature. One of the malware recognition methods is the byte code based methods. These methods generally use image processing and machine learning methods together to recognize malware. In this article, a novel byte code based malware recognition method is presented, and it consists of feature extra...
Article
Full-text available
In this study, a method is proposed for ultra high frequency radio frequency identification (UHF RFID)‐based book positioning and counting developed for smart libraries. In the experimental setup created, RFID tags placed in books were automatically detected using three RFID antennas. Using received signal strength indicator information from each a...
Article
Electroencephalogram (EEG) signals have been extensively utilized to identify brain disorders such as epilepsy. In this study, a novel feature extraction network based on local graph structure (LGS) is utilized for EEG signal classification. The aim of this work is to create a framework which utilize ensemble of LGS that uses logically extended LGS...
Article
Sensor signals have been frequently used for activity recognition and gender classification in the literature. In this study, a new multi-kernel local diamond pattern (MK-LDP) is proposed as a novel local descriptor method for the feature extraction. The proposed MK-LDP is aimed to generate distinctive features from a signal or image using vertical...
Conference Paper
The emergence of databases has become one of the most important achievements in the field of software. Databases are at the core of information systems (Online and Offline), and this has fundamentally made them a target for malicious intents because they contain sensitive information. Digital forensics tends to outwit such malicious activities by p...
Article
Full-text available
Nowadays, deep learning is one of the popular research area of the computer sciences and many deep networks have been proposed to solve artificial intelligence and machine learning problems. Residual Networks (ResNet) for instance ResNet18, ResNet50, ResNet101 have been widely used deep network in the literature. In this paper, a novel ResNets base...
Article
Survey is one of the crucial data retrieval methods in the literature. However, surveys often contain missing data and redundant features. Therefore, missing feature completion and feature selection have been widely used for knowledge extraction from surveys. We have a hypothesis to solve these two problems. To implement our hypothesis, a classific...
Article
Voices have been widely used for disease detection in the literature but these methods are non-invasive. In this article a 1D local binary pattern (LBP) based feature extraction network (1D-LBPNet) is proposed to extract stable features from voices. The proposed 1D-LBPNet is inspired by convolutional neural networks (CNN) for instance AlexNet, Goog...
Article
Parkinson's disease is one of the mostly seen neurological disease. It affects to nervous system and hinders people's vital activities. The majority of Parkinson's patients lose their ability to speak, write and balance. Many machine learning methods have been proposed to automatically diagnose Parkinson's disease using acoustic, hand writing and g...
Article
Hepatocellular carcinoma (HCC) is one of the most commonly seen malignancy type of liver cancer worldwide. In this paper, a model is presented to classify HCC. The proposed model consists of missing feature completion, feature reduction and feature classification phases. In the missing feature completion phase, a supervised algorithm is presented a...
Article
It is not difficult to estimate the gender of the human from other people's audio files. In general, people can easily identify the gender of the owner of a conversation with the experience they have acquired. However, it is not easy to predict whether a person is a man or a woman by computer systems. Hence, many papers and proposals have been pres...
Article
Nowadays, internet is mostly used communication tool worldwide. However, the major problem of the internet is to provide security. To provide internet security, many researches and papers have been suggested about information and network security. The commonly used system against network attacks is firewalls. In this study, a novel firewall data cl...
Conference Paper
Full-text available
Recently, face detection and classification have become a popular field of study thanks to the Convolutional Neural Networks (CNN), and datasets containing face images such as VGGFace. In this study, we aim to recognize faces within digital files obtained from the criminal objects using forensic software tools in judicial cases. To this end, we mak...
Conference Paper
Full-text available
With the widespread use of the Internet, there are also a growing number of attacks on the Internet. The categorization of the attack and the precautions taken so that these attacks can be eliminated is crucial for security. In this study, KDDCUP99 data set which is frequently used in intrusion detection studies is classified by deep learning appro...
Conference Paper
Full-text available
With the concept of the industry 4.0, the concept of the internet of objects has developed and the internet has started to be used at every moment of our life and every field. The need and usage of this concept is increasing day by day because the concept of the internet contains many fields such as applications, news, education, social media which...
Conference Paper
It is very important to analyze the logs on the Firewall devices and control the internet traffic according to these analysis results. In this study, some logs obtained with the Firewall Device used at Firat University are classified using multiclass support vector machine (SVM) classifier. Linear, polynomial, sigmoid and Radial Basis Function (RBF...
Article
Full-text available
In recent years, the use of the internet has become widespread with developing technologies. Internet is used for many needs, especially social media. Today, internet is needed for remote use of electronic devices used in homes and offices. Continuous access to the internet is very important for the quality of life of people. In this study, a propo...
Conference Paper
With the internet of objects, the number of devices with internet connection is increasing day by day. This leads to a very high amount of data circulating on the internet. It is one of the most common problems that can be distinguished from normal and abnormal traffic by analyzing in high data amount. In this study, an analysis was carried out by...
Conference Paper
Full-text available
Social media has a great place in today's internet usage. In particular, it is important for companies that want to advertise on social media to invest in which area. Facebook has the highest usage rate among social media tools. In this study, artificial intelligence techniques were used to classify a data set generated with Facebook data. In order...
Article
Full-text available
The classification of data on the internet in order to make internet use more efficient has an important place especially for network administrators managing corporate networks. Studies for the classification of internet traffic have increased recently. By these studies, it is aimed to increase the quality of service on the network, use the network...
Article
The classification of internet traffic is one of the very popular topics of the present-day. In particular, the classification studies performed along with the use of machine learning (ML) approaches is increasing a little more with each passing day. In this study, Extreme Learning Machine (ELM) methods were used for the classification of Internet...
Conference Paper
Full-text available
Network forensics is to capture, record and analyze security attacks and other problems, which might occur on the network. Network forensics is accepted as a sub-branch of digital forensics. Also, it is possible to consider network device forensics as a sub-branch of network forensics. In order to determine whether there is a crime or not, it is no...
Conference Paper
Full-text available
Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective...
Conference Paper
Full-text available
DHCP (Dynamic Host Configuration Protocol) is a protocol, automatically provides such as IP address, subnet mask, default gateway, and DNS address to client devices. Besides the benefits brought about by a number of networks, the DHCP leaves the door open to security threats require the necessary measures to be taken. A person Establishing and runn...

Network

Cited By

Projects

Projects (2)
Project
It is aimed to analyze the data received through the firewall with deep learning methods.