Fatih Ertam

Fatih Ertam
Verified
Fatih verified their affiliation via an institutional email.
Verified
Fatih verified their affiliation via an institutional email.
Fırat University · Digital Forensics Engineering

Ph.D.

About

61
Publications
22,660
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,530
Citations
Introduction
Fatih Ertam currently works at the Digital Forensics Engineering, Firat University. Fatih does research in Information Systems and Network Security and Reliability. Their current project is 'Network.'
Additional affiliations
December 2020 - present
Fırat University
Position
  • Professor (Associate)
January 2018 - December 2020
Fırat University
Position
  • Professor (Assistant)
December 2000 - January 2018
Fırat University
Position
  • Lecturer
Education
June 2016 - June 2021
Fırat University
Field of study
  • Software Engineering

Publications

Publications (61)
Article
Full-text available
As technology advances, the frequency of attacks targeting technological devices has surged. This rise in cyber threats poses a constant risk to the devices we rely on. Any device connected to a network becomes vulnerable to exploitation by attackers. Given the extensive interconnectedness of devices in network environments, this research endeavors...
Article
One of the biggest innovations brought by the digitalized world is undoubtedly the invention of crypto money, which is decentralized, anonymous and complex, and connected to blockchain technology. This relatively new technology has attracted the attention of many people with its revolutionary changes in payment systems and great price movements in...
Article
Full-text available
Underwater image processing is a very important research area to detect cracks in underwater constructions. In this study, a new light computer vision method is proposed to detect cracks in underwater structures. The proposed model uses Multilevel DWT (Discrete Wavelet Transform) and LPQ (Local Phase Quantization) for underwater crack classificatio...
Article
Text summarization is the process of reducing text size while preserving its key points. Thanks to this process, the reading time of the text is also reduced which contributes to reaching the desired information quickly, especially in today's world where time is much more important. In addition, summarization can be used to create a solution to ext...
Article
Full-text available
Nowadays, the internet is the most used communication environment, and therefore it becomes very important to try to determine the behavior of users regarding internet use. Due to the internet of behaviors (IoBe) information, user-specific recommendations can be customized in various fields such as trade, health, economy, law, and entertainment. Th...
Article
Widespread proliferation of interconnected healthcare equipment, accompanying software, operating systems, and networks in the Internet of Medical Things (IoMT) raises the risk of security compromise as the bulk of IoMT devices are not built to withstand internet attacks. In this work, we have developed a cyber-attack and anomaly detection model ba...
Article
Ensuring the security of critical infrastructures and information systems has always been a challenging problem. Intrusion Detection Systems (IDS) have become an indispensable element in ensuring the security of network structures and information systems. it is important to increase the intrusion detection performance of IDS systems. Although a lot...
Article
Full-text available
In the digital age, many people have used mobile phones, thus, mobile phones are one of the most commonly used crime tools. Users can take security measures to their mobile devices using various authorization methods such as passwords or screen patterns (touch screen security authentication). The used security measures generally make mobile forensi...
Article
Intrusion Detection Systems are one of the most effective technologies that protect systems against cyber-attacks. In this study, a new Comprehensive Cyber Security Intrusion Detection Dataset (CCiDD) was created. The CCiDD_A and CCiDD_B datasets are derived from the created dataset. Two datasets were compared with the NSL-KDD, UNSW-NB15 and CSE-CI...
Article
The development and widespread use of computer systems has increased the need for secure storage of data. At the same time, the analysis of digital data storage devices is very important for forensic IT professionals who aim to access information to clarify the crime. File systems of disk drives use partition structures to securely store data and p...
Article
Purpose There are hundreds of thousands of books in libraries, causing problems in searching and counting books. To overcome these problems, this research presents a received signal strength indicator (RSSI) dataset and a new automated book location classification model using the RSSI dataset. Materials and method In this study, a RSSI signals dat...
Article
Exponential increase in the amount of textual data made available on the Internet results in new challenges in terms of accessing information accurately and quickly. Text summarization can be defined as reducing the dimensions of the expressions to be summarized without spoiling the meaning. Summarization can be performed as extractive and abstract...
Article
Full-text available
Driver fatigue is the one of the main reasons of the traffic accidents. The human brain is a complex structure, whose function can be evaluated with electroencephalogram (EEG). Automated driver fatigue detection utilizing EEG decreases the incidence probability of related traffic accidents. Therefore, devising an appropriate feature extraction tech...
Article
Full-text available
Cyber-attacks have become a significant problem worldwide. Therefore, many methods, networks, and applications have been suggested for providing information security in the literature. Automated malware classification has become one of the hot-topic research areas in information security and digital forensics. Image processing methods have been use...
Article
The increase in internet usage brings security problems with it. Malicious software can affect the operation of the systems and disrupt data confidentiality due to the security gaps in the systems. Intrusion Detection Systems (IDS) have been developed to detect and report attacks. In order to develop IDS systems, artificial intelligence-based appro...
Article
Full-text available
Nowadays, mobile devices have been widely used worldwide and they have variable sensors. By using these sensors, many applications for instance navigation, healthcare, and human activity recognition (HAR) have been developed. The primary objective of this paper is to present a multi lightweight HAR method with high prediction performance. To implem...
Article
One of the crucial problems of the signal processing, digital forensics and machine learning is the environmental sound classification (ESC). Several ESC methods have been presented to obtain highly accurate model. In this work, a novel multileveled ESC method is presented. The presented ESC method uses two novel algorithms namely Spiral Pattern an...
Article
Full-text available
In this study, a method is proposed for ultra high frequency radio frequency identification (UHF RFID)‐based book positioning and counting developed for smart libraries. In the experimental setup created, RFID tags placed in books were automatically detected using three RFID antennas. Using received signal strength indicator information from each a...
Article
Full-text available
Malware recognition has been widely used in the literature. One of the malware recognition methods is the byte code based methods. These methods generally use image processing and machine learning methods together to recognize malware. In this article, a novel byte code based malware recognition method is presented, and it consists of feature extra...
Article
Electroencephalogram (EEG) signals have been extensively utilized to identify brain disorders such as epilepsy. In this study, a novel feature extraction network based on local graph structure (LGS) is utilized for EEG signal classification. The aim of this work is to create a framework which utilize ensemble of LGS that uses logically extended LGS...
Article
Sensor signals have been frequently used for activity recognition and gender classification in the literature. In this study, a new multi-kernel local diamond pattern (MK-LDP) is proposed as a novel local descriptor method for the feature extraction. The proposed MK-LDP is aimed to generate distinctive features from a signal or image using vertical...
Conference Paper
The emergence of databases has become one of the most important achievements in the field of software. Databases are at the core of information systems (Online and Offline), and this has fundamentally made them a target for malicious intents because they contain sensitive information. Digital forensics tends to outwit such malicious activities by p...
Article
Full-text available
Android işletim sistemin mobil işletim sistemi pazarına hâkim olması ile Android cihazlardan veri toplama yöntemi, mobil adli bilişim teknolojisi üzerine yapılan araştırmaların odak noktası olmuştur. Bununla birlikte, Android işletim sistemi sürümlerinin sürekli güncellenmesi ve güvenlik teknolojilerinin devreye alınması nedeniyle, mevcut veri topl...
Article
Full-text available
Nowadays, deep learning is one of the popular research area of the computer sciences and many deep networks have been proposed to solve artificial intelligence and machine learning problems. Residual Networks (ResNet) for instance ResNet18, ResNet50, ResNet101 have been widely used deep network in the literature. In this paper, a novel ResNets base...
Article
Survey is one of the crucial data retrieval methods in the literature. However, surveys often contain missing data and redundant features. Therefore, missing feature completion and feature selection have been widely used for knowledge extraction from surveys. We have a hypothesis to solve these two problems. To implement our hypothesis, a classific...
Article
Full-text available
Wireless access points (APs), which allow many devices to be easily connected to the Internet, are widely used today because they offer the easiest way to connect to the Internet. With the development of the concept of Internet of Things (IoT), WiFi networks are widely used in our homes, workplaces, social areas, campus areas. With the increase of...
Article
Voices have been widely used for disease detection in the literature but these methods are non-invasive. In this article a 1D local binary pattern (LBP) based feature extraction network (1D-LBPNet) is proposed to extract stable features from voices. The proposed 1D-LBPNet is inspired by convolutional neural networks (CNN) for instance AlexNet, Goog...
Article
Parkinson's disease is one of the mostly seen neurological disease. It affects to nervous system and hinders people's vital activities. The majority of Parkinson's patients lose their ability to speak, write and balance. Many machine learning methods have been proposed to automatically diagnose Parkinson's disease using acoustic, hand writing and g...
Article
Hepatocellular carcinoma (HCC) is one of the most commonly seen malignancy type of liver cancer worldwide. In this paper, a model is presented to classify HCC. The proposed model consists of missing feature completion, feature reduction and feature classification phases. In the missing feature completion phase, a supervised algorithm is presented a...
Article
It is not difficult to estimate the gender of the human from other people's audio files. In general, people can easily identify the gender of the owner of a conversation with the experience they have acquired. However, it is not easy to predict whether a person is a man or a woman by computer systems. Hence, many papers and proposals have been pres...
Article
Nowadays, internet is mostly used communication tool worldwide. However, the major problem of the internet is to provide security. To provide internet security, many researches and papers have been suggested about information and network security. The commonly used system against network attacks is firewalls. In this study, a novel firewall data cl...
Conference Paper
Full-text available
Recently, face detection and classification have become a popular field of study thanks to the Convolutional Neural Networks (CNN), and datasets containing face images such as VGGFace. In this study, we aim to recognize faces within digital files obtained from the criminal objects using forensic software tools in judicial cases. To this end, we mak...
Conference Paper
Full-text available
With the widespread use of the Internet, there are also a growing number of attacks on the Internet. The categorization of the attack and the precautions taken so that these attacks can be eliminated is crucial for security. In this study, KDDCUP99 data set which is frequently used in intrusion detection studies is classified by deep learning appro...
Conference Paper
Full-text available
With the concept of the industry 4.0, the concept of the internet of objects has developed and the internet has started to be used at every moment of our life and every field. The need and usage of this concept is increasing day by day because the concept of the internet contains many fields such as applications, news, education, social media which...
Conference Paper
It is very important to analyze the logs on the Firewall devices and control the internet traffic according to these analysis results. In this study, some logs obtained with the Firewall Device used at Firat University are classified using multiclass support vector machine (SVM) classifier. Linear, polynomial, sigmoid and Radial Basis Function (RBF...
Article
Full-text available
In recent years, the use of the internet has become widespread with developing technologies. Internet is used for many needs, especially social media. Today, internet is needed for remote use of electronic devices used in homes and offices. Continuous access to the internet is very important for the quality of life of people. In this study, a propo...
Conference Paper
With the internet of objects, the number of devices with internet connection is increasing day by day. This leads to a very high amount of data circulating on the internet. It is one of the most common problems that can be distinguished from normal and abnormal traffic by analyzing in high data amount. In this study, an analysis was carried out by...
Conference Paper
Full-text available
Social media has a great place in today's internet usage. In particular, it is important for companies that want to advertise on social media to invest in which area. Facebook has the highest usage rate among social media tools. In this study, artificial intelligence techniques were used to classify a data set generated with Facebook data. In order...
Article
Full-text available
The classification of data on the internet in order to make internet use more efficient has an important place especially for network administrators managing corporate networks. Studies for the classification of internet traffic have increased recently. By these studies, it is aimed to increase the quality of service on the network, use the network...
Article
The classification of internet traffic is one of the very popular topics of the present-day. In particular, the classification studies performed along with the use of machine learning (ML) approaches is increasing a little more with each passing day. In this study, Extreme Learning Machine (ELM) methods were used for the classification of Internet...
Conference Paper
Full-text available
Network forensics is to capture, record and analyze security attacks and other problems, which might occur on the network. Network forensics is accepted as a sub-branch of digital forensics. Also, it is possible to consider network device forensics as a sub-branch of network forensics. In order to determine whether there is a crime or not, it is no...
Conference Paper
Full-text available
Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective...
Conference Paper
Full-text available
DHCP (Dynamic Host Configuration Protocol) is a protocol, automatically provides such as IP address, subnet mask, default gateway, and DNS address to client devices. Besides the benefits brought about by a number of networks, the DHCP leaves the door open to security threats require the necessary measures to be taken. A person Establishing and runn...

Network

Cited By