Ibrahim Sogukpinar

Orcid: 0000-0002-0408-0277

According to our database1, Ibrahim Sogukpinar authored at least 38 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analysis of the Dynamic Features on Ransomware Detection Using Deep Learning-based Methods.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Impact Analysis and Performance Model of Social Engineering Techniques.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

2022
Sequential opcode embedding-based malware detection method.
Comput. Electr. Eng., 2022

2021
DroidClone: Attack of the android malware clones - a step towards stopping them.
Comput. Sci. Inf. Syst., 2021

Malware Detection and Classification Using fastText and BERT.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

Graph-Based Malware Detection Using Opcode Sequences.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

2020
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs.
Comput. Stand. Interfaces, 2020

2019
Unsupervised binary feature construction method for networked data.
Expert Syst. Appl., 2019

Model Driven Security in a Mobile Banking Application Context.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

2017
BioTAM: a technology acceptance model for biometric authentication systems.
IET Biom., 2017

2016
Suspect and popular tag detection model for social media.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

Frequency based metamorphic malware detection.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

DroidClone: Detecting android malware variants by exposing code clones.
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016

2015
Sliding window and control flow weight for metamorphic malware detection.
J. Comput. Virol. Hacking Tech., 2015

Scalable risk assessment method for cloud computing using game theory (CCRAM).
Comput. Stand. Interfaces, 2015

A framework for metamorphic malware analysis and real-time detection.
Comput. Secur., 2015

Annotated Control Flow Graph for Metamorphic Malware Detection.
Comput. J., 2015

Community detection in social networks using content and link analysis.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

2014
BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication.
Secur. Commun. Networks, 2014

Current Trends and the Future of Metamorphic Malware Detection.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

In-Cloud Malware Analysis and Detection: State of the Art.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2012
Graph based signature classes for detecting polymorphic worms via content analysis.
Comput. Networks, 2012

2010
An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010

2009
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A Framework for Licensed Digital Signatures.
Proceedings of the First International Conference on Networks and Communications, 2009

Packet Marking with Distance Based Probabilities for IP Traceback.
Proceedings of the First International Conference on Networks and Communications, 2009

Classification Based Revocable Biometric Identity Code Generation.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

2007
Fingerprint Hardening with Randomly Selected Chaff Minutiae.
Proceedings of the Computer Analysis of Images and Patterns, 12th International Conference, 2007

2006
A quantitative method for ISO 17799 gap analysis.
Comput. Secur., 2006

Security Architecture for Web-based Health Insurance Systems.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

2005
ISRAM: information security risk analysis method.
Comput. Secur., 2005

INVUS: INtelligent VUlnerability Scanner.
Proceedings of the Communications and Multimedia Security, 2005

2004
Centroid-Based Language Identification Using Letter Feature Set.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2004

Letter Based Text Scoring Method for Language Identification.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
Understanding users' keystroke patterns for computer access security.
Comput. Secur., 2003

Low Cost and Trusted Electronic Purse System Design.
Proceedings of the Computer and Information Sciences, 2003

1995
Sınır çizgilerini uyuşturma yöntemi ile yerleştirme (Part nesting using contour matching)
PhD thesis, 1995


  Loading...