The current state and future of mobile security in the light of the recent mobile security threat reports
AC Cinar, TB Kara - Multimedia Tools and Applications, 2023 - Springer
Smartphones have become small computers that meet many of our needs, from e-mail and
banking transactions to communication and social media use. In line with these attractive …
banking transactions to communication and social media use. In line with these attractive …
Social network data analysis to highlight privacy threats in sharing data
Social networks are a vast source of information, and they have been increasing impact on
people's daily lives. They permit us to share emotions, passions, and interactions with other …
people's daily lives. They permit us to share emotions, passions, and interactions with other …
[HTML][HTML] Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study
The web browser has become one of the basic tools of everyday life. A tool that is
increasingly used to manage personal information. This has led to the introduction of new …
increasingly used to manage personal information. This has led to the introduction of new …
[PDF][PDF] A Visual Privacy Tool to Help Users in Preserving Social Network Data.
In the current era, social network platforms are increasingly important, especially for
disseminating data that refers to virtual lives that, in most cases, are strictly coupled with real …
disseminating data that refers to virtual lives that, in most cases, are strictly coupled with real …
A machine learning based sentient multimedia framework to increase safety at work
In the last few decades, we have witnessed an increasing focus on safety in the workplace.
ICT has always played a leading role in this context. One ICT sector that is increasingly …
ICT has always played a leading role in this context. One ICT sector that is increasingly …
Multi-Resolution Analysis with Visualization to Determine Network Attack Patterns
Analyzing network traffic activities is imperative in network security to detect attack patterns.
Due to the complex nature of network traffic event activities caused by continuously …
Due to the complex nature of network traffic event activities caused by continuously …
Fine-tuning SalGAN and PathGAN for extending saliency map and gaze path prediction from natural images to websites
In recent years, researches dealing with the study of visual attention have become very
popular thanks to the enormous increase of Artificial Intelligence. Machine Learning and, in …
popular thanks to the enormous increase of Artificial Intelligence. Machine Learning and, in …
[HTML][HTML] Develo** a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) have revolutionized wireless communications by
enabling dynamic, infrastructure-free connectivity across various applications, from disaster …
enabling dynamic, infrastructure-free connectivity across various applications, from disaster …
Interactive Web-Based Visual Analysis on Network Traffic Data
Network traffic data analysis is important for securing our computing environment and data.
However, analyzing network traffic data requires tremendous effort because of the …
However, analyzing network traffic data requires tremendous effort because of the …
Weighted transformer neural network for web attack detection using request URL
Web application firewalls (WAFs) and other Intrusion Detection Systems (IDS) techniques
are employed to defend the network against web attacks. Even so, attacks may succeed …
are employed to defend the network against web attacks. Even so, attacks may succeed …