Testing IoT security: The case study of an ip camera PA Abdalla, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2020 | 55 | 2020 |
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes RJ McDown, C Varol, L Carvajal, L Chen Journal of forensic sciences 61, S110-S116, 2016 | 33 | 2016 |
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT A Rasheed, RN Mahapatra, C Varol, K Narashimha IEEE Transactions on Emerging Topics in Computing 10 (3), 1476-1491, 2021 | 31 | 2021 |
Browser forensic investigations of whatsapp web utilizing indexeddb persistent storage F Paligu, C Varol Future Internet 12 (11), 184, 2020 | 21 | 2020 |
Using ITIL 4 in security management D Berger, N Shashidhar, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 21 | 2020 |
Performance evaluation of phonetic matching algorithms on English words and street names K Koneru, VSV Pulla, C Varol Proceedings of the 5th International Conference on Data Management …, 2016 | 21 | 2016 |
Automatic spoken language recognition with neural networks V Gazeau, C Varol Int. J. Inf. Technol. Comput. Sci.(IJITCS) 10 (8), 11-17, 2018 | 20 | 2018 |
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis A Mendoza, A Kumar, D Midcap, H Cho, C Varol Digital investigation 14, 63-75, 2015 | 20 | 2015 |
Hybrid matching algorithm for personal names C Varol, C Bayrak Journal of Data and Information Quality (JDIQ) 3 (4), 1-18, 2012 | 20 | 2012 |
Digital forensic analysis of discord on google chrome K Gupta, C Varol, B Zhou Forensic Science International: Digital Investigation 44, 301479, 2023 | 18 | 2023 |
Intelligence in digital forensics process IY Adam, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 18 | 2020 |
Comparision of string matching algorithms on spam email detection C Varol, HMT Abdulhadi 2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018 | 18 | 2018 |
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools A Neyaz, N Shashidhar, C Varol, A Rasheed 2022 10th International Symposium on Digital Forensics and Security (ISDFS …, 2022 | 16 | 2022 |
Android mobile device forensics: A review HF Tayeb, C Varol 2019 7th international symposium on digital forensics and security (ISDFS), 1-7, 2019 | 16 | 2019 |
An Overview of Open Source Data Quality Tools. V Pushkarev, H Neumann, C Varol, JR Talburt IKE, 370-376, 2010 | 16 | 2010 |
CANAttack: Assessing Vulnerabilities within Controller Area Network D Oladimeji, A Rasheed, C Varol, M Baza, H Alshahrani, A Baz Sensors 23 (19), 8223, 2023 | 15 | 2023 |
BrowStExPlus: a tool to aggregate indexed DB artifacts for forensic analysis F Paligu, A Kumar, H Cho, C Varol Journal of forensic sciences 64 (5), 1370-1378, 2019 | 15 | 2019 |
Detecting unprotected SIP-based Voice over IP traffic L Carvajal, L Chen, C Varol, D Rawat 2016 4th International Symposium on Digital Forensic and Security (ISDFS), 44-48, 2016 | 15 | 2016 |
Open source data quality tools: Revisited VSV Pulla, C Varol, M Al Information Technology: New Generations: 13th International Conference on …, 2016 | 14 | 2016 |
Detecting near-duplicate text documents with a hybrid approach C Varol, S Hari Journal of Information Science 41 (4), 405-414, 2015 | 14 | 2015 |