About
27
Publications
83,696
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,713
Citations
Introduction
Current institution
Publications
Publications (27)
As a result of technological improvements, computer systems facing not only traditional security attacks, but also facing new cyber attacks which are more sophisticated and harmful threats such as Stuxnet, and Dragonfly. These attacks may cause enormous destruction to victim machine, steal confidential information or use infected machine to attack...
With the widespread adoption of social media, cybersecurity threats such as data breaches, online fraud, and identity theft have become increasingly prevalent. Despite these risks, many users remain unaware of potential security threats and fail to take adequate precautions to protect their privacy and confidentiality. This study aims to develop an...
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause s...
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The number, sophistication, and severity of network-related attacks are growing rapidly. There are a va...
The lockdowns and curfews during the COVID-19 pandemic have halted economic and transportation activities across the world. This study aims to investigate air pollution levels in the Marmara region, particularly in Istanbul, before and during the COVID-19 pandemic. The study used real data provided by the General Directorate of Meteorology and appl...
This study developed a psychometric scale to measure users' cybercrime awareness level on social media. Psychometric properties of the Cybercrime Awareness on Social Media Scale (CASM-S) were tested based on data collected from 1045 social media users. Exploratory factor analysis (EFA) with principal components analysis was used to identify the und...
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emergi...
The scientific publishing industry is dominated by a few publishers that use centralized systems, which decrease the quality of studies and make the publication process longer. Traditional publication systems generally have high publication costs, slow and biased review processes, copyrights held by publishers, lack of rewards for contributors, lac...
In recent years, ransomware has become highly profitable cyber attacks. This is because, everyday there are several new devices attending to computer networks before testing their security strength. In addition, it is easy to launch ransomware attacks by using Ransomware-as-a-Service. This paper proposed a new method that creates the ransomware spe...
Malware (Malicious Software) is any software which performs malicious activities on computer-based systems without the user's consent. The number, severity, and complexity of malware have been increasing recently. The detection of malware becomes challenging because new malware variants are using obfuscation techniques to hide themselves from the m...
Distributed denial of service (DDoS) attacks is one of the most destructive cyber attacks which target the availability of the system when legitimate users try to access the system. Not only computers, but also the growing number of smartphones as well as Internet of Things (IoT) devices are affected by DDoS attacks. There is no well-known system w...
Intrusion detection systems (IDSs) are used extensively to protect computer networks from the network related cyber attacks. The goal is to detect intrusions when data is transmitted across the internet. Current IDSs are mainly using signature and anomaly based detection approaches when detecting attacks in the communication networks. In this paper...
Due to the Internet making human life easier, every day plenty of devices are connected to the Internet. Individual and big companies' private data such as user bank accounts, health related data, social media data, etc. are accessible by using the Internet. Since almost everything can be accessible online, the protection of digital data becomes a...
The scientific publishing industry is dominated by a few publishers that use centralized systems, which decrease the quality of studies and make the publication process longer. Traditional publication systems generally have high publication costs, slow and biased review processes, copyrights held by publishers, lack of rewards for contributors, lac...
With the advancement of technology, the use of wireless media and devices are increasing every day. In particular, the use of wireless local area networks (WLAN) has increased rapidly in recent years and is expected to increase further. The current state of wireless local area network technologies makes the network vulnerable to attacks ranging fro...
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer net...
These days, cloud computing is one of the most promising technologies to store information and provide services online efficiently. Using this rapidly developing technology to protect computer-based systems from cyber-related attacks can bring many advantages over traditional protection schemes. The protected assets can be any computer-based system...
Recent technological developments in computer systems transfer human life from real to virtual environments. Covid-19 disease has accelerated this process. Cyber criminals’ interest has shifted in a real to virtual life as well. This is because it is easier to commit a crime in cyberspace rather than regular life. Malicious software (malware) is un...
Cloud computing has an important role in all aspects of storing information and providing services online. It brings several advantages over traditional storing and sharing schema such as an easy access, on-request storage, scalability and decreasing cost. Using its rapidly developing technologies can bring many advantages to the protection of Inte...
In recent years, malware has evolved by using different obfuscation techniques; due to this evolution, the detection of malware has become problematic. Signature-based and traditional behavior-based malware detectors cannot effectively detect this new generation of malware. This paper proposes a subtractive center behavior model (SCBM) to create a...
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from the malware, the malware needs to be detected before it affects a large number of systems. Recently, there have...
Malware stands for malicious software, which is installed on a computer system without the knowledge of the system owner. It performs malicious actions such as stealing confidential information and allowing remote code execution, and it can cause denial of service. Recently, malware creators started to publish new malware, which can bypass anti-mal...
Any software which executes malicious payloads on victim machines is considered as a malware such as the following: Viruses, worms, Trojan horses, rootkits, backdoor and ransomware. In recent years, the number and the severity of these malicious software have been increasing rapidly. The harm that malware inflicts on the world economy and private c...