Ömer Aslan

Ömer Aslan
  • Doctor of Engineering
  • Professor (Assistant) at Bandırma Onyedi Eylül University

About

27
Publications
83,696
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,713
Citations
Current institution
Bandırma Onyedi Eylül University
Current position
  • Professor (Assistant)

Publications

Publications (27)
Conference Paper
Full-text available
As a result of technological improvements, computer systems facing not only traditional security attacks, but also facing new cyber attacks which are more sophisticated and harmful threats such as Stuxnet, and Dragonfly. These attacks may cause enormous destruction to victim machine, steal confidential information or use infected machine to attack...
Article
Full-text available
With the widespread adoption of social media, cybersecurity threats such as data breaches, online fraud, and identity theft have become increasingly prevalent. Despite these risks, many users remain unaware of potential security threats and fail to take adequate precautions to protect their privacy and confidentiality. This study aims to develop an...
Article
Full-text available
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause s...
Article
Full-text available
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The number, sophistication, and severity of network-related attacks are growing rapidly. There are a va...
Article
Full-text available
The lockdowns and curfews during the COVID-19 pandemic have halted economic and transportation activities across the world. This study aims to investigate air pollution levels in the Marmara region, particularly in Istanbul, before and during the COVID-19 pandemic. The study used real data provided by the General Directorate of Meteorology and appl...
Article
Full-text available
This study developed a psychometric scale to measure users' cybercrime awareness level on social media. Psychometric properties of the Cybercrime Awareness on Social Media Scale (CASM-S) were tested based on data collected from 1045 social media users. Exploratory factor analysis (EFA) with principal components analysis was used to identify the und...
Article
Full-text available
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emergi...
Article
Full-text available
The scientific publishing industry is dominated by a few publishers that use centralized systems, which decrease the quality of studies and make the publication process longer. Traditional publication systems generally have high publication costs, slow and biased review processes, copyrights held by publishers, lack of rewards for contributors, lac...
Article
Full-text available
In recent years, ransomware has become highly profitable cyber attacks. This is because, everyday there are several new devices attending to computer networks before testing their security strength. In addition, it is easy to launch ransomware attacks by using Ransomware-as-a-Service. This paper proposed a new method that creates the ransomware spe...
Article
Full-text available
Malware (Malicious Software) is any software which performs malicious activities on computer-based systems without the user's consent. The number, severity, and complexity of malware have been increasing recently. The detection of malware becomes challenging because new malware variants are using obfuscation techniques to hide themselves from the m...
Article
Full-text available
Distributed denial of service (DDoS) attacks is one of the most destructive cyber attacks which target the availability of the system when legitimate users try to access the system. Not only computers, but also the growing number of smartphones as well as Internet of Things (IoT) devices are affected by DDoS attacks. There is no well-known system w...
Conference Paper
Full-text available
Intrusion detection systems (IDSs) are used extensively to protect computer networks from the network related cyber attacks. The goal is to detect intrusions when data is transmitted across the internet. Current IDSs are mainly using signature and anomaly based detection approaches when detecting attacks in the communication networks. In this paper...
Conference Paper
Full-text available
Due to the Internet making human life easier, every day plenty of devices are connected to the Internet. Individual and big companies' private data such as user bank accounts, health related data, social media data, etc. are accessible by using the Internet. Since almost everything can be accessible online, the protection of digital data becomes a...
Article
Full-text available
The scientific publishing industry is dominated by a few publishers that use centralized systems, which decrease the quality of studies and make the publication process longer. Traditional publication systems generally have high publication costs, slow and biased review processes, copyrights held by publishers, lack of rewards for contributors, lac...
Article
Full-text available
With the advancement of technology, the use of wireless media and devices are increasing every day. In particular, the use of wireless local area networks (WLAN) has increased rapidly in recent years and is expected to increase further. The current state of wireless local area network technologies makes the network vulnerable to attacks ranging fro...
Article
Full-text available
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer net...
Article
Full-text available
These days, cloud computing is one of the most promising technologies to store information and provide services online efficiently. Using this rapidly developing technology to protect computer-based systems from cyber-related attacks can bring many advantages over traditional protection schemes. The protected assets can be any computer-based system...
Article
Full-text available
Recent technological developments in computer systems transfer human life from real to virtual environments. Covid-19 disease has accelerated this process. Cyber criminals’ interest has shifted in a real to virtual life as well. This is because it is easier to commit a crime in cyberspace rather than regular life. Malicious software (malware) is un...
Article
Cloud computing has an important role in all aspects of storing information and providing services online. It brings several advantages over traditional storing and sharing schema such as an easy access, on-request storage, scalability and decreasing cost. Using its rapidly developing technologies can bring many advantages to the protection of Inte...
Article
Full-text available
In recent years, malware has evolved by using different obfuscation techniques; due to this evolution, the detection of malware has become problematic. Signature-based and traditional behavior-based malware detectors cannot effectively detect this new generation of malware. This paper proposes a subtractive center behavior model (SCBM) to create a...
Article
Full-text available
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from the malware, the malware needs to be detected before it affects a large number of systems. Recently, there have...
Conference Paper
Full-text available
Malware stands for malicious software, which is installed on a computer system without the knowledge of the system owner. It performs malicious actions such as stealing confidential information and allowing remote code execution, and it can cause denial of service. Recently, malware creators started to publish new malware, which can bypass anti-mal...
Conference Paper
Full-text available
Any software which executes malicious payloads on victim machines is considered as a malware such as the following: Viruses, worms, Trojan horses, rootkits, backdoor and ransomware. In recent years, the number and the severity of these malicious software have been increasing rapidly. The harm that malware inflicts on the world economy and private c...

Network

Cited By