ISRAM: information security risk analysis method B Karabacak, I Sogukpinar Computers & Security 24 (2), 147-159, 2005 | 411 | 2005 |
Analysis and comparison of image encryption algorithms I Ozturk, I Sogukpinar International Journal of Information Technology 1 (2), 108-111, 2004 | 157 | 2004 |
SIP authentication scheme using ECDH A Durlanik, I Sogukpinar World Enformatika Soc Trans Eng Comput Technol 8, 350-353, 2005 | 148 | 2005 |
A framework for metamorphic malware analysis and real-time detection S Alam, RN Horspool, I Traore, I Sogukpinar computers & security 48, 212-233, 2015 | 97 | 2015 |
Understanding users' keystroke patterns for computer access security A Guven, I Sogukpinar Computers & Security 22 (8), 695-706, 2003 | 91 | 2003 |
A quantitative method for ISO 17799 gap analysis B Karabacak, I Sogukpinar Computers & security 25 (6), 413-419, 2006 | 80 | 2006 |
Scalable risk assessment method for cloud computing using game theory (CCRAM) E Furuncu, I Sogukpinar Computer Standards & Interfaces 38, 44-50, 2015 | 62 | 2015 |
Annotated Control Flow Graph for Metamorphic Malware Detection S Alam, I Traore, I Sogukpinar The Computer Journal 58 (10), 2608-2621, 2015 | 57 | 2015 |
Analysis and evaluation of dynamic feature-based malware detection methods AG Kakisim, M Nar, N Carkaci, I Sogukpinar Innovative Security Solutions for Information Technology and Communications …, 2019 | 43 | 2019 |
Kxknn: K-means ve k en yakin komşu yöntemleri ile ağlarda nüfuz tespiti SK Çalışkan, İ Soğukpınar EMO Yayınları, 120-24, 2008 | 42 | 2008 |
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs AG Kakisim, M Nar, I Sogukpinar Computer Standards & Interfaces 71, 103443, 2020 | 36 | 2020 |
Droidclone: Detecting android malware variants by exposing code clones S Alam, R Riley, I Sogukpinar, N Carkaci 2016 sixth international conference on digital information and communication …, 2016 | 35 | 2016 |
An android malware detection architecture based on ensemble learning M Ozdemir, I Sogukpinar Transactions on Machine Learning and Artificial Intelligence 2 (3), 90-106, 2014 | 32 | 2014 |
Sliding window and control flow weight for metamorphic malware detection S Alam, I Sogukpinar, I Traore, R Nigel Horspool Journal of Computer Virology and Hacking Techniques 11, 75-88, 2015 | 30 | 2015 |
Graph based signature classes for detecting polymorphic worms via content analysis B Bayoğlu, İ Soğukpınar Computer Networks 56 (2), 832-844, 2012 | 26 | 2012 |
Centroid-based language identification using letter feature set H Takcı, İ Soğukpınar Computational Linguistics and Intelligent Text Processing: 5th International …, 2004 | 25 | 2004 |
Analysis and comparison of disassemblers for opcode based malware analysis M Nar, AG Kakisim, MN Yavuz, İ Soğukpinar 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 23 | 2019 |
Polymorphic worm detection using token-pair signatures B Bayoglu, I Sogukpinar Proceedings of the 4th international workshop on Security, privacy and trust …, 2008 | 23 | 2008 |
Graph-based malware detection using opcode sequences S Gülmez, I Sogukpinar 2021 9th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2021 | 22 | 2021 |
BioTAM: a technology acceptance model for biometric authentication systems A Kanak, I Sogukpinar IET Biometrics 6 (6), 457-467, 2017 | 21 | 2017 |