Scopus İndeksli Yayınlar Koleksiyonu
Permanent URI for this collectionhttps://gcris.yasar.edu.tr/handle/123456789/11290
Browse
Browsing Scopus İndeksli Yayınlar Koleksiyonu by Publisher "ACAD CONFERENCES LTD"
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
Conference Object A Programmable Threat Intelligence Framework for Containerized Clouds(ACAD CONFERENCES LTD, 2018) Cagatay Yucel; Ahmet Koltuksuz; Murat Odemis; Anas Mu'aza Kademi; Gokhan Ozbilgin; Yücel, Çağatay; Özbilgin, Gökhan; Ödemiş, Murat; Kademi, Anas Muazu; Koltuksuz, Ahmet; JS Hurley; JQ ChenContemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented.Conference Object Citation - WoS: 2Citation - Scopus: 2A Proposal for a Novel e-Learning System for the Visually Impaired(ACAD CONFERENCES LTD, 2014) Ahmed Rana; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Rana, Ahmed; Zincir, Ibrahim; R Orngreen; KT LevinsenAccording to World Health Organization (WHO) 285 million people are estimated to be visually impaired worldwide: 39 million are blind and 246 million have low vision. It is a well-known fact that for the visually impaired it is not possible to access the information via drawings and figures as there is no interpretation. In addition it is not easy to search through a passage for the relevant information as Braille takes much more time to read and finally a lot of memorization is necessary in order to achieve success in life. As standard procedures and systems for education are not sufficient for these people a novel approach is necessary. The recent advances in information and communication technologies (ICTs) have placed e-learning at the front row of education methodologies for the disabled. E-learning applications and websites specifically designed for accessibility help to improve the quality of the education without undermining the functionality and the usability. This paper first outlines the challenges and the shortcomings of e-learning schemas for the visually impaired and then proposes a novel touch screen application implemented via an effective and interactive user-friendly e-learning system.Conference Object Citation - WoS: 1Citation - Scopus: 1An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers(ACAD CONFERENCES LTD, 2014) Cagatay Yucel; Ahmet Koltuksuz; Yucel, Cagatay; Koltuksuz, Ahmet; A Liaropoulos; G TsihrintzisSince 2008 Cyberspace is officially regarded as a distinct military domain along with land sea and air for many countries (Goel 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of warfare in cyberspace is radically different than the traditional warfare: the attacks are more remote stealthy and it may be impossible to detect the identity of the adversary (Greengard 2010). Moreover the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even if the target is at the globally farthest point possible. Therefore the power and impacts of cyber operations are limited by fast computation and transmission skills of your front. Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. With cyber intelligence of high quality nations can assess the effects of attacks, detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well-defined decisions (Rudner 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies including defensive identification methods such as incident response strategies social network analysis (Yip et al. 2012) (Benjamin and Hsinchun 2012) intrusion detection systems (Zaman and Karray 2009) and anomaly detections (Chandola et al. 2009) as well as offensive methods such as disinformation destruction of information and communication and advance persistent threats (APTs).Conference Object ELCARE: A Novel Approach for Educating Caretakers of Elderly(ACAD CONFERENCES LTD, 2015) Ibrahim Zincir; Samsun Basarici; Ahmed Rana; Fisun Senuzun; Basarici, Samsun; Zincir, Ibrahim; Senuzun, Fisun; Rana, Ahmed; A Jefferies; M CubricElderly care or simply eldercare is the fulfillment of the special needs and requirements that are unique to senior citizens. Elderly care emphasizes the social and personal requirements of senior citizens who need some assistance for daily activities and health care but who desire to age with dignity. With the improvements made in health technologies the life expectancy in EU is increasing and more than 80 million people are aged over 60 in Europe today. Experts believe that the increasing number of elderly people who need help with basic tasks but have been left to struggle by an unprecedented withdrawal of state-funded social care create a huge problem, lack of nurses/caretakers for the elderly. This paper discusses an e-learning system for elderly care that simply educates/trains the people who want to take care of the elderly, either those who want to become professional caretakers or those who are volunteers or social workers. The novel system inherits web and mobile apps and will be deployed multilingual. The main goal of the system is to increase the social intellectual and cognitive abilities of the target group like increasing the patience devotion physical endurance etc. The system is buildup of modules that have a linear character i.e. user has to pass a module successfully in order to proceed to the next one.Conference Object Spymasters Tools: A Comparative Approach to Side Channel Attacks(ACAD CONFERENCES LTD, 2014) Tugce Kalkavan; Kalkavan, Tugce; A Liaropoulos; G TsihrintzisIn many security protocols implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. In public cryptography research on side channel attacks started with works of (Kocher et al. 2004 Kocher 1996 Kocher et al. 1999). Side channel attacks is a passive attack which basically depend on collecting information through physically observable phenomenon's created by the execution of computing tasks in microelectronic devices and logical gates in order to break cryptographic algorithms such as timing information proposed in (Kocher 1996 Jean-Fran et al. 2000) power consumption studied in (Kocher et al. 1999) and electromagnetic radiation in (Agrawal et al. 2003). This paper serves as an introduction to basic level of side channel attacks method and techniques used in these attacks and many other countermeasures such as Simple Power Analysis Differential Power Analysis, Data bit Differential Power Analysis against such attacks.Conference Object Citation - WoS: 1Citation - Scopus: 2The Role of Leadership in Digital Transformation: A Review and Suggestions for Future Research(ACAD CONFERENCES LTD, 2021) Ozge Can; Can, Ozge; F BezzinaDigital transformation (DT) through the advance and use of diverse digital technologies (e.g. big data business analytics mobile applications internet of things digital platforms) has assumed great importance for organizations. Digitalization efforts by organizations in different industries have become even more prominent by recent crises and disruptions such as the Covid-19 pandemic. Simultaneously digitalization also increase complexity for managers regarding the initiation of multiple changes in and around organizations including work processes working arrangements and stakeholder alignment. Despite these developments we have only limited knowledge about what role leaders play in these processes in generating positive impact including sustainable organizational performance enhanced innovation and creativity or industrial and social improvements. Although certain leadership concepts and approaches have been associated with DT so far no research has discussed these leadership orientations in a comprehensive manner or argued how they can be adopted by managers to connect digital capabilities to organizational value creation and strategic outcomes. Furthermore only a small number of studies have attempted to assess the leadership challenges relevant in DT processes and how these challenges can be managed or eliminated. To address these gaps through a review of the existing literature this study seeks to build an overall understanding of the impact of leadership on the success of complex digital transformations. A set of suggestions are made as possible avenues for future research clarifying the emergence of multiple and nuanced roles leaders play in DT and what new skills and responsibilities managers should assume in guiding the organization towards desired digitalization goals.Conference Object Citation - WoS: 5Citation - Scopus: 5The Security and the Credibility Challenges in e-Voting Systems(ACAD CONFERENCES LTD, 2015) Ahmed Rana; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Rana, Ahmed; Zincir, Ibrahim; N AbouzakharE-voting is one of the most emerging social innovations of the 21st century which is being adopted by many countries since it represents the peak of e-government solutions and also enables an easier way to vote for their citizens and expatriates. In addition e-voting systems will not only increase the amount of voters' participation but also will decrease the total cost of electoral process. The main concern with the e-voting system is security. Unlike any other offence it is first difficult to observe ambiguities in voting and also it is much more difficult to locate the lost or to detect the rigged votes. Challenges such as how to authenticate the voter how to securely cast his/her vote and then how to store and to count these votes without outside influence generate whole scrutiny over the e-voting systems. This paper first discusses these challenges and then proposes a unique approach to ensure public confidence and credibility over the electoral systems. This proposal inherits 2 independent modules, first module to verify authentication by implementing an e-government application and smartphone to identify a registered voter. After the completion of successful validation the second module that provides anonymity to the voter similar to TOR (The Onion Router) will be activated to cast the e-ballot.

