Ozgu Can

Ozgu Can
  • Assoc. Prof. Dr.
  • Professor (Associate) at Ege University

About

86
Publications
18,528
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
419
Citations
Current institution
Ege University
Current position
  • Professor (Associate)

Publications

Publications (86)
Article
Full-text available
The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by...
Article
Full-text available
This article explores how cryptographic techniques can be used to ensure the confidentiality of data against machine learning classification algorithms. The study focuses on the Mental Health Corpus dataset, which contains text and tag columns related to mental health issues. Random Forest (RF), Decision Tree (DT) and Support Vector Machine (SVM) c...
Article
Full-text available
The rapid expansion of Internet of Things (IoT) technologies has revolutionized connectivity but has also exposed users to increased cyber threats. This study aims to enhance Intrusion Detection Systems (IDSs) for IoT networks by employing advanced machine learning (ML) techniques and addressing the challenge of dataset selection, moving beyond out...
Article
Full-text available
Acute Lymphocytic Leukemia (ALL) is a form of cancer characterized by the abnormal production of white blood cells in the bone marrow. These cells do not function properly, leading to the overcrowding of healthy cells and weakening the body's immune system, making it more susceptible to infections. ALL progresses rapidly in children, and without ti...
Article
The Internet of Things (IoT) is a rapidly expanding network of interconnected things that use embedded sensors to gather and share data in real‐time. IoT technologies have given rise to many networking applications in our everyday life such as smart homes, smart cities, smart transport, and so forth. Smart healthcare is one such application that ha...
Article
The assessment of Electronic Medical Certification (EMC) plays a pivotal role in modern healthcare infrastructures, serving as a comprehensive repository for patients' medical histories. Given the inherent challenges related to security and privacy within electronic medical certification systems, there exists a critical need to address the issues o...
Article
Full-text available
Today, connected systems are widely used with the recent developments in technology. The internet- connected devices create data traffic when communicating with each other. These data may contain extremely confidential information. Observers can obtain confidential information from the traffic when the security of this traffic cannot be adequately...
Article
Full-text available
Insider threats pose a significant risk to organizations, necessitating robust detection mechanisms to safeguard against potential damage. Traditional methods struggle to detect insider threats operating within authorized access. Therefore, the use of Artificial Intelligence (AI) techniques is essential. This study aimed to provide valuable insight...
Article
In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by bridging the gap between the digital and physical realms. This transformative technology enables rapid changes in the way people conduct business. Its fundamental aim is to connect everything in our world—objects, individuals, locations, and processes—under...
Article
Full-text available
Bilgi ve iletişim teknolojilerinin hızlı gelişimi kişisel verilerin paylaşılmasını ve daha kolay yayılmasını sağlamaktadır. Kişisel verilere olan erişim kolaylığı, kişisel mahremiyeti ve veri güvenliğini tehdit etmektedir. Veri gizliliğini ve güvenliğini sağlamak için 2016 yılında 6698 sayılı Kişisel Verilerin Korunması Kanunu (KVKK) kabul edilmişt...
Chapter
The healthcare industry is a knowledge-driven system and continuously expanding with enormous volumes of narrative data that are typically stored in unstructured and non-standardized formats. Therefore, it is challenging for systems to manage massive amounts of narrative data, comprehend the contents of these data, find relevant and useful healthca...
Article
The assessment of Electronic Medical Certification (EMC) plays a pivotal role in modern healthcare infrastructures, serving as a comprehensive repository for patients' medical histories. Given the inherent challenges related to security and privacy within electronic medical certification systems, there exists a critical need to address the issues o...
Article
Full-text available
Consent management has become an important issue with the increased usage of the Internet and also smart devices that collect personal data. Each country enacts its regulations and laws for consent management. These laws ensure that personal data is not collected without the individual’s consent and cannot be processed with a purpose other than the...
Article
Bulut bilişim, günümüzdeki en önemli teknolojik gelişim ve dönüşümlerinden biri olarak kabul edilmektedir. Bu teknolojinin gelişmesi ile birlikte, veritabanı servislerinin, sunucu ve depolama hizmetlerinin yönetimi ve kullanımı kolaylaşmış ve daha düşük maliyetler ile gerçekleştirilebilir bir hale gelmiştir. Son kullanıcılardan büyük ölçekli işletm...
Chapter
Data integration is the process of combining data from multiple disparate source systems to provide users a unified view of data. Nevertheless, integrating and transforming data from various sources are significant challenges. Also, providing the semantics in data representation is an important issue to perform effective data analysis and visualiza...
Chapter
In today’s Data Age, ensuring security and protecting privacy are critical aspects to preserve information systems from the growing number of attacks. In this environment, access control provides the security of data and preserves user privacy by allowing the restriction and control of unauthorized access to systems and resources. The semantic web...
Article
Full-text available
Ontology Based Data Access (OBDA) is the provision of data access and data integration as a result of the mapping that is established between an ontology and a data source. Thus, storing large amounts of data becomes easier, more powerful queries can be written, and management of complex information systems can be performed quickly and effectively...
Preprint
The Internet of Things (IoT) is a rapidly expanding network of interconnected things that use embedded sensors to gather and share data in real-time. IoT technologies have given rise to many networking applications in our everyday life such as smart homes, smart cities, smart transport, etc. Smart healthcare is one such application that has been re...
Chapter
Today, rapid developments and advances in technology digitalized operations in manufacturing systems. The digital transformation in manufacturing systems has a significant impact on manufacturing operations. Thus, numerous industrial sectors aim to use new technological developments to maximize their manufacturing volumes, reduce their manufacturin...
Article
Full-text available
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly data storage and processing power, without requiring special or direct administration by users. CC, which just made its debut as a collection of public and private data centers, provides clients with a unified platform throughout the Internet. Cloud computi...
Article
In today's fast-paced world, a new technology paradigm known as the Internet of Things (IoT) is advancing every business. It provides communication between the digital and physical worlds, transforming the way people do business quickly. The IoT is a network of physical objects (things) equipped with sensors, intelligent networking, radio-frequency...
Article
Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computational power. Cloud computing refers to data centers acce...
Article
Full-text available
Mobil sağlık, kullanıcıların sağlıklarını takip etmelerini, tıbbi verilerini izlemelerini, tedavi süreçleri ile ilgili hatırlatma uyarılarını almalarını, günlük aktivitelerini ve yaşam biçimlerini izlemelerini sağlamaktadır. Günümüzde mobil cihaz kullanımı sağlıklı yaşam biçiminin sürdürülmesindeki en önemli araçlardan biri haline gelmiştir. Hayatı...
Article
Full-text available
The widespread usage of Internet of Things (IoT) devices is increasing by the recent advances in embedded systems, cloud computing, artificial intelligence, and wireless communications. Besides, a huge amount of data is transmitted between IoT devices over insecure networks. The transferred data can be sensitive and confidential. On the other hand,...
Chapter
The main objective of this chapter is to contribute a better knowledge and understanding of security and privacy issues in the IoT ecosystem and examine the current status in IoT-based healthcare systems. Thus, the fundamental security and privacy concepts in IoT are covered, the security and privacy concerns for the IoT healthcare systems are pres...
Article
Full-text available
The inventory management system ensures the protection of physical assets and the tracking of personnel's usage of these physical assets in an organization. The goal of inventory management is to efficiently distribute all of the company's assets, deliver the appropriate materials to the appropriate person, and retrieve these materials undamaged fo...
Article
Full-text available
As the number of Internet of Things (IoT) devices increases day by day, attacks against these devices are also increasing. In this study, methods of ensuring security in IoT devices and attacks on IoT devices are discussed, and the importance of zero-trust architecture in ensuring IoT security is explained. In addition, the defense rates of padding...
Chapter
Bilişim teknolojilerindeki gelişmeler bilgi sistemlerinin dijital dönüşüm sürecini hızlandırmıştır. Bu dijitalleşmenin bir sonucu olarak, veriler herhangi bir zamanda ve herhangi bir yerden ulaşılabilir ve kullanılabilir hale gelmiştir. Ancak, veriye erişimin kolaylaşması ile kişilerin mahremiyet kaygıları artmış ve veri mahremiyetine yönelik tehdi...
Article
Full-text available
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with higher access classes. Because it better solves the priority inversion problem. A widely used concurrency...
Article
Full-text available
Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even authority that provides such services. It has become an important medium for enterprises to develop their networks because of these reso...
Article
Full-text available
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts be- tween transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with higher access classes. Because it better solves the priority inversion problem. A widely used concurren...
Article
Full-text available
The development of technology accelerated the digital transformation of information systems. As a consequence of this digitization, data became available at any time and in any place. However, despite this ease of data accessibility, persons’ privacy concerns and threats to data privacy have emerged. Thus, serious privacy problems arise while colle...
Chapter
Bir eğitim kurumunda bilgi sisteminin güvenliği sağlanmazsa ya da yeterli seviyede bir güvenliği yoksa bu durum kurum için önemli bir risk oluşturmaktadır. Böyle bir risk, kurumun işlerini sürdürmesini engelleyerek kuruma hem maddi bir kayıp hem de itibar kaybı getirecektir. Bilgi güvenliği yalnızca bilgi güvenliği teknolojisinin araçlarına dayanma...
Chapter
IoT’nin işletmelere entegrasyonunu içeren bu bölümde öncelikle IoT kavramı tanımlanmakta ve tarihçesi anlatılmakta, IoT’nin uygulama alanları açıklanmakta, sonrasında işletmelerde IoT kullanımı açıklanmakta, IoT’nin işletmelere entegrasyonu fırsatlar, zayıflıklar, tehditler ve gelecek öngörüleri ile birlikte değerlendirilmektedir.
Chapter
File integration systems enable file transfers between different systems in order to automate routine business processes. Therefore, the standardization in data exchange between different organizations or decentralized subsidiaries of an organization is achieved. However, abnormal situations may occur during the file integration process. In order t...
Chapter
Advanced Persistent Threats (APTs) are increasingly being a risk for companies and institutions because of their distributed, complicated, multi-step and targeted behaviors. The amount of sensitive data in organizations are increasing and APTs threaten organizations by exfiltrating these data from the organization. The sensitive data not only inclu...
Article
Full-text available
Günümüzde, veri depolama ve yazılım geliştirme teknolojilerinin çeşitliliğinde büyük bir artış yaşanmıştır. Hızla gelişen ve değişen teknolojiler sebebiyle, ortak çalışan organizasyonlardaki entegrasyon ve çok çeşitlilik, temel bir sorun olarak ortaya çıkmaktadır. Bu kapsamda dosya entegrasyonları, farklı iş platformları arasındaki veri bütünleştir...
Article
Full-text available
Provenanc refers to the origin of information. Therefore, provenance is the metadata that record the history of data. As provenance is the derivation history of an object starting from its original source, the provenance information is used to analyse processes that are performed on an object and to track by whom these processes are performed. Thus...
Article
Full-text available
Devletler vatandaşlarının temel hak ve özgürlüklerini korumak için kanun yapma gibi kontrol mekanizmalarını kullanırlar. Temel hak ve özgürlüklerden olan kişisel verilerin korunması için ülkemizde 6698 sayılı Kişisel Verilerin Korunması Kanunu (KVKK) 2016 yılında kabul edilmiştir. Kişisel mahremiyetin sağlanmasına yönelik bu kanuna göre, kişisel ve...
Article
Provenance determines the origin of the data by tracing and recording the actions that are performed on the data. Therefore, provenance is used in many fields to ensure the reliability and quality of data. In this work, provenance information is used to meet the security needs in information systems. For this purpose, a domain-independent provenanc...
Article
Security has preeminent importance in today's technological environment. In recent years, as cyber-attacks have emerged new security concerns have arisen. In order to overcome the serious consequences of these cyber-attacks, fully-functioning and performance-improved intrusion detections systems are required. In this work, we propose a semantic web...
Conference Paper
Full-text available
In recent years, cyber-attacks have emerged and these attacks result in serious consequences. In order to overcome these consequences, a fully-functioning and performance-improved intrusion detections systems are required. For this purpose, we used ontologies to provide semantic expressiveness and knowledge description for an intrusion detection sy...
Article
Full-text available
Today’s technological improvements have made ubiquitous healthcare systems that converge into smart healthcare applications in order to solve patients’ problems, to communicate effectively with patients, and to improve healthcare service quality. The first step of building a smart healthcare information system is representing the healthcare data as...
Conference Paper
Full-text available
In Facebook, every like and interest is a preference. A like is an act of acknowledgement, which can be valuable if it is processed rightfully. In this work, the Facebook Page Like preferences of users are captured and these preferences are enriched by matching them with DBpedia and DaKick entities. To semantify these Facebook preferences, the free...
Poster
Full-text available
zet-Teknolojinin gelişimi süreçlerin elektronik ortama taşınmasını sağlamaktadır. Süreçlerin elektronik ortama taşınmasıyla birlikte internetin yoğun kullanımına paralel olarak kişisel veri yer ve zaman bağımsız ulaşılabilir hale gelmiştir. Kişisel verilerin dijital ortama geçirilmesi ile ortaya çıkan erişim kolaylığının yanında veri güvenliği ve g...
Article
Full-text available
Introduction Obesity is a major public health problem in the world and getting obesity under control is one of the most important goals of the World Health Organization. Cognitive behavioral therapy techniques are helpful for adjusting lifestyle to stay at a healthy weight range. Success of web-based programs which designed with evidence-based beha...
Article
Full-text available
Nowadays, the information that can be accessed online is increasing exponentially. However, this increase in the amount of information brings difficulties to users to access information relevant with their preferences in an effective way. These difficulties could be overcomed with providing customized information or service to an individual by usin...
Conference Paper
Full-text available
In recent years, personal data has been shared between organizations and researchers. While sharing information, individuals’ sensitive data should be preserved. For this purpose, a number of algorithms for privacy-preserving publish data have been designed. These algorithms modify or transform data to protect privacy. While the anonymization algor...
Poster
Full-text available
Health transformation is the head of the electronic transformation which occurs in many areas in parallel with the advances in technology and the increase of the internet usage. The personal health data which is accepted in the personal data in legal adjustments has become to be kept under the name of Electronic Health Record (EHR) after the electr...
Conference Paper
Full-text available
Computers and internet usage have become one of the most important parts of daily life with the added values such as making life easier, increasing productivity and reducing costs. However, the absence of sufficient control and sanctions over the purposes, situations and ways of data usage in the information systems makes it difficult for a person...
Conference Paper
Full-text available
Healthcare information systems needs to share and to reuse the patient's information not only in a department where the information is being formed, but also between the departments of an organization and also among the different organizations. The requirements of health services like providing efficient services and ensuring continuity causes priv...
Conference Paper
Full-text available
The history of data has a crucial importance almost in every scientific application. In order to trust the correctness of data, the ability to determine the origin of data becomes an important issue. Provenance information summarizes the origin of items, the history of the ownership of items and the actions performed on them. Ensuring that data is...
Conference Paper
Electronic Health Record (EHR) is a secure, confidential and point-of-care information resource for health care institutions. EHR provides obtainment to health information in where and when it is needed by authorized users, and gives support to clinical workers by closing loops in communication and accessing to the correct information. However, pri...
Conference Paper
Full-text available
Electronic Health Record (EHR) is a secure, confidential and point-of-care information resource for health care institutions. EHR provides obtainment to health information in where and when it is needed by authorized users, and gives support to clinical workers by closing loops in communication and accessing to the correct information. However, p...
Article
Full-text available
Ağ ve sistem güvenliği politikaları, kurum ağında ve sistemlerde oluşabilecek durumları yetkili/güvenli ve yetkisiz/güvensiz olmak üzere ikiye ayıran yazılı kurallar bütünüdür. Güvenlik politikaları gizlilik, bütünlük ve erişilebilirlik prensiplerini bir bütün halinde ele almaktadır. Kurumsal güvenlik politikaları, kurum bünyesindeki bilişim kaynak...
Conference Paper
Full-text available
Ontology-based knowledge representation and modeling for vaccine domain provides an effective mechanism to improve the quality of healthcare information systems. Vaccination process generally includes different processes like vaccine research and development, production, transportation, administration and tracking of the adverse events that may occ...
Conference Paper
Full-text available
Data protection and privacy has a significant importance in information sharing mechanisms, especially in domains that handle with sensitive information. The knowledge that can be inferred from this sensitive information may unveil the consumer's personal information. Consumers should control who can access their consent data and for what purposes...
Conference Paper
Full-text available
User profiles are personal images of social community users. Users store and share their documents and express themselves with their personal information. In social community, user may also need to describe herself with more than one image and more than one user profile. Today's user profiling methodologies do not support such multi-role based prof...
Article
Full-text available
Bilgisayar teknolojileri yaygınlaştıkça erişim denetimi düzeneklerine olan ihtiyaç da artmaktadır. Erişim denetiminin amacı, bir bilgisayar sistemi kullanıcısının gerçekleştirebileceği işlemleri sınırlandırmaktır. Böylelikle, erişim denetimi, güvenlik ihlaline neden olacak bir etkinliğin önlenmesini sağlamaktadır. Bilginin paylaşılmasını ve yeniden...
Article
Full-text available
The main idea of Semantic Web is creating web pages which are also understood by machines and using ontologies to unify data. Improving a secure Semantic Web is one of the main works in Semantic Web research area. For this purpose, policies are used. Policy is a set of rules and provides an access control mechanism for a resource without making any...
Conference Paper
Full-text available
Preference is a superiority state to determine the preferable or the superior of one entity, property or constraint to another from a specified selection set. Preference issue is heavily studied in Semantic Web research area. The existing preference management approaches only consider the importance of concepts for capturing users‟ interests. This...
Conference Paper
Full-text available
With the growth of Internet and the fast development of semantic web technologies, the access and usage of information will become much more easier. However, the security of information gathering for both information suppliers and demanders is a critical issue. Policies determine the ideal behaviors for web concepts. The concepts of policy, policy...

Network

Cited By