Cihan Varol

Orcid: 0000-0002-4940-6808

According to our database1, Cihan Varol authored at least 48 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Urgency Detection in Social Media Texts Using Natural Language Processing.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024

2023
CANAttack: Assessing Vulnerabilities within Controller Area Network.
Sensors, October, 2023

Digital forensic analysis of discord on google chrome.
Forensic Sci. Int. Digit. Investig., March, 2023

A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions.
Inf., 2023

Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms.
Proceedings of the 26th International Symposium on Wireless Personal Multimedia Communications, 2023

Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-Devices.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

A Testbed for a Controller Area Network Communication Protocol in Automobiles.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT.
IEEE Trans. Emerg. Top. Comput., 2022

Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage.
Future Internet, 2022

Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Development of a Forensic Toolkit for Small-Medium Size Business (SMB).
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Digital Forensics Lab Design: A framework.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Penetration Testing: Smart Home IoT Devices.
Proceedings of the Internet of Things - ICIOT 2022, 2022

Walk This Way: Footwear Recognition Using Images & Neural Networks.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

Detection of Web Attacks via PART Classifier.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

2020
Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage.
Future Internet, 2020

Cybersecurity Evaluation with PowerShell.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Time Series Database Preprocessing for Data Mining Using Python.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

On-Premises Versus SECaaS Security Models.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Graphically Display Database Transactions to Enhance Database Forensics.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Using ITIL 4 in Security Management.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Intelligence in Digital Forensics Process.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Testing IoT Security: The Case Study of an IP Camera.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

2019
Android Mobile Device Forensics: A Review.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

SmartThings Event Export using SmartApps.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

2018
A Survey of Privilege Escalation Detection in Android.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

2017
Privacy Preserving Record Linkage Using MetaSoundex Algorithm.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

2016
Identifying Gender from SMS Text Messages.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Performance Evaluation of Phonetic Matching Algorithms on English Words and Street Names - Comparison and Correlation.
Proceedings of the DATA 2016, 2016

2015
Detecting near-duplicate text documents with a hybrid approach.
J. Inf. Sci., 2015

BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis.
Digit. Investig., 2015

2012
Hybrid Matching Algorithm for Personal Names.
ACM J. Data Inf. Qual., 2012

Real-Time Data Quality Monitoring System for Data Cleansing.
Int. J. Bus. Intell. Res., 2012

2011
UXSOM: UML generated XML to software metrics.
ACM SIGSOFT Softw. Eng. Notes, 2011

Risk Assessment of Error-Prone Personal Information in Data Quality Tools.
J. Comput., 2011

Estimation of quality of service in spelling correction using Kullback-Leibler divergence.
Expert Syst. Appl., 2011

Pattern and Phonetic Based Street Name Misspelling Correction.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Author Disambiguation using an Hybrid Approach of Queries and String Matching Techniques.
Int. J. Intell. Inf. Process., 2010

An Overview of Open Source Data Quality Tools.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

Business Process Automation Based on Dependencies.
Proceedings of the Second International Conference on Information, 2010

2008
Measuring Reliability Component in Business Process Automation.
Proceedings of the 14th International Conference on Distributed Multimedia Systems, 2008

2006
Automated data verification in a format-free environment.
ACM SIGSOFT Softw. Eng. Notes, 2006

2005
Application of Software Engineering Fundamentals: A Hands on Experience.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005


  Loading...