关注
Cihan Varol
标题
引用次数
引用次数
年份
Testing IoT security: The case study of an ip camera
PA Abdalla, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2020
432020
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes
RJ McDown, C Varol, L Carvajal, L Chen
Journal of forensic sciences 61, S110-S116, 2016
312016
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT
A Rasheed, RN Mahapatra, C Varol, K Narashimha
IEEE Transactions on Emerging Topics in Computing 10 (3), 1476-1491, 2021
222021
Performance evaluation of phonetic matching algorithms on English words and street names
K Koneru, VSV Pulla, C Varol
Proceedings of the 5th International Conference on Data Management …, 2016
212016
Automatic spoken language recognition with neural networks
V Gazeau, C Varol
Int. J. Inf. Technol. Comput. Sci.(IJITCS) 10 (8), 11-17, 2018
202018
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis
A Mendoza, A Kumar, D Midcap, H Cho, C Varol
Digital investigation 14, 63-75, 2015
202015
Hybrid matching algorithm for personal names
C Varol, C Bayrak
Journal of Data and Information Quality (JDIQ) 3 (4), 1-18, 2012
202012
Using ITIL 4 in security management
D Berger, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
182020
Browser forensic investigations of whatsapp web utilizing indexeddb persistent storage
F Paligu, C Varol
Future Internet 12 (11), 184, 2020
162020
An Overview of Open Source Data Quality Tools.
V Pushkarev, H Neumann, C Varol, JR Talburt
IKE, 370-376, 2010
152010
Digital forensic analysis of discord on google chrome
K Gupta, C Varol, B Zhou
Forensic Science International: Digital Investigation 44, 301479, 2023
142023
Comparision of string matching algorithms on spam email detection
C Varol, HMT Abdulhadi
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
142018
Detecting unprotected SIP-based Voice over IP traffic
L Carvajal, L Chen, C Varol, D Rawat
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 44-48, 2016
142016
Detecting near-duplicate text documents with a hybrid approach
C Varol, S Hari
Journal of Information Science 41 (4), 405-414, 2015
142015
Intelligence in digital forensics process
IY Adam, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
132020
Comparison of pattern matching techniques on identification of same family malware
F Mastjik, C Varol, A Varol
International Journal of Information Security Science 4 (3), 104-111, 2015
132015
BrowStExPlus: a tool to aggregate indexed DB artifacts for forensic analysis
F Paligu, A Kumar, H Cho, C Varol
Journal of forensic sciences 64 (5), 1370-1378, 2019
122019
Identifying gender from SMS text messages
S Silessi, C Varol, M Karabatak
2016 15th IEEE International Conference on Machine Learning and Applications …, 2016
122016
Open source data quality tools: Revisited
VSV Pulla, C Varol, M Al
Information Technology: New Generations: 13th International Conference on …, 2016
122016
Tools for collecting volatile data: A survey study
L Carvajal, C Varol, L Chen
2013 The International Conference on Technological Advances in Electrical …, 2013
122013
系统目前无法执行此操作,请稍后再试。
文章 1–20