Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating IPTV Malware in the Wild., , , , and . Future Internet, 15 (10): 325 (2023)Privacy Goals for the Data Lifecycle., , , and . Future Internet, 14 (11): 315 (2022)Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System., , and . Secur. Commun. Networks, (2022)Imaging and evaluating the memory access for malware., and . Digit. Investig., (2020)Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms., , , , , and . CSR, page 343-347. IEEE, (2021)Trust and Quality Computation for Cyber Threat Intelligence Sharing Platforms., , , , , , , and . CSR, page 360-365. IEEE, (2021)Imaging and evaluating the memory access for malware (Zararlı yazılımlar için bellek erişimlerinin görüntülenmesi ve değerlendirilmesi). Yaşar University, Turkey, (2019)Education in Cyber Physical Systems Security: The Case of Connected Autonomous Vehicles., , and . EDUCON, page 1379-1385. IEEE, (2021)On the Assessment of Completeness and Timeliness of Actionable Cyber Threat Intelligence Artefacts., , , , , and . MCSS, volume 1284 of Communications in Computer and Information Science, page 51-66. Springer, (2020)