Suivre
Cihan Varol
Titre
Citée par
Citée par
Année
Testing IoT security: The case study of an ip camera
PA Abdalla, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2020
552020
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes
RJ McDown, C Varol, L Carvajal, L Chen
Journal of forensic sciences 61, S110-S116, 2016
332016
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT
A Rasheed, RN Mahapatra, C Varol, K Narashimha
IEEE Transactions on Emerging Topics in Computing 10 (3), 1476-1491, 2021
312021
Browser forensic investigations of whatsapp web utilizing indexeddb persistent storage
F Paligu, C Varol
Future Internet 12 (11), 184, 2020
212020
Using ITIL 4 in security management
D Berger, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
212020
Performance evaluation of phonetic matching algorithms on English words and street names
K Koneru, VSV Pulla, C Varol
Proceedings of the 5th International Conference on Data Management …, 2016
212016
Automatic spoken language recognition with neural networks
V Gazeau, C Varol
Int. J. Inf. Technol. Comput. Sci.(IJITCS) 10 (8), 11-17, 2018
202018
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis
A Mendoza, A Kumar, D Midcap, H Cho, C Varol
Digital investigation 14, 63-75, 2015
202015
Hybrid matching algorithm for personal names
C Varol, C Bayrak
Journal of Data and Information Quality (JDIQ) 3 (4), 1-18, 2012
202012
Digital forensic analysis of discord on google chrome
K Gupta, C Varol, B Zhou
Forensic Science International: Digital Investigation 44, 301479, 2023
182023
Intelligence in digital forensics process
IY Adam, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
182020
Comparision of string matching algorithms on spam email detection
C Varol, HMT Abdulhadi
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
182018
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools
A Neyaz, N Shashidhar, C Varol, A Rasheed
2022 10th International Symposium on Digital Forensics and Security (ISDFS …, 2022
162022
Android mobile device forensics: A review
HF Tayeb, C Varol
2019 7th international symposium on digital forensics and security (ISDFS), 1-7, 2019
162019
An Overview of Open Source Data Quality Tools.
V Pushkarev, H Neumann, C Varol, JR Talburt
IKE, 370-376, 2010
162010
CANAttack: Assessing Vulnerabilities within Controller Area Network
D Oladimeji, A Rasheed, C Varol, M Baza, H Alshahrani, A Baz
Sensors 23 (19), 8223, 2023
152023
BrowStExPlus: a tool to aggregate indexed DB artifacts for forensic analysis
F Paligu, A Kumar, H Cho, C Varol
Journal of forensic sciences 64 (5), 1370-1378, 2019
152019
Detecting unprotected SIP-based Voice over IP traffic
L Carvajal, L Chen, C Varol, D Rawat
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 44-48, 2016
152016
Open source data quality tools: Revisited
VSV Pulla, C Varol, M Al
Information Technology: New Generations: 13th International Conference on …, 2016
142016
Detecting near-duplicate text documents with a hybrid approach
C Varol, S Hari
Journal of Information Science 41 (4), 405-414, 2015
142015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20