Testing IoT security: The case study of an ip camera PA Abdalla, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2020 | 43 | 2020 |
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes RJ McDown, C Varol, L Carvajal, L Chen Journal of forensic sciences 61, S110-S116, 2016 | 31 | 2016 |
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT A Rasheed, RN Mahapatra, C Varol, K Narashimha IEEE Transactions on Emerging Topics in Computing 10 (3), 1476-1491, 2021 | 22 | 2021 |
Performance evaluation of phonetic matching algorithms on English words and street names K Koneru, VSV Pulla, C Varol Proceedings of the 5th International Conference on Data Management …, 2016 | 21 | 2016 |
Automatic spoken language recognition with neural networks V Gazeau, C Varol Int. J. Inf. Technol. Comput. Sci.(IJITCS) 10 (8), 11-17, 2018 | 20 | 2018 |
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis A Mendoza, A Kumar, D Midcap, H Cho, C Varol Digital investigation 14, 63-75, 2015 | 20 | 2015 |
Hybrid matching algorithm for personal names C Varol, C Bayrak Journal of Data and Information Quality (JDIQ) 3 (4), 1-18, 2012 | 20 | 2012 |
Using ITIL 4 in security management D Berger, N Shashidhar, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 18 | 2020 |
Browser forensic investigations of whatsapp web utilizing indexeddb persistent storage F Paligu, C Varol Future Internet 12 (11), 184, 2020 | 16 | 2020 |
An Overview of Open Source Data Quality Tools. V Pushkarev, H Neumann, C Varol, JR Talburt IKE, 370-376, 2010 | 15 | 2010 |
Digital forensic analysis of discord on google chrome K Gupta, C Varol, B Zhou Forensic Science International: Digital Investigation 44, 301479, 2023 | 14 | 2023 |
Comparision of string matching algorithms on spam email detection C Varol, HMT Abdulhadi 2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018 | 14 | 2018 |
Detecting unprotected SIP-based Voice over IP traffic L Carvajal, L Chen, C Varol, D Rawat 2016 4th International Symposium on Digital Forensic and Security (ISDFS), 44-48, 2016 | 14 | 2016 |
Detecting near-duplicate text documents with a hybrid approach C Varol, S Hari Journal of Information Science 41 (4), 405-414, 2015 | 14 | 2015 |
Intelligence in digital forensics process IY Adam, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 13 | 2020 |
Comparison of pattern matching techniques on identification of same family malware F Mastjik, C Varol, A Varol International Journal of Information Security Science 4 (3), 104-111, 2015 | 13 | 2015 |
BrowStExPlus: a tool to aggregate indexed DB artifacts for forensic analysis F Paligu, A Kumar, H Cho, C Varol Journal of forensic sciences 64 (5), 1370-1378, 2019 | 12 | 2019 |
Identifying gender from SMS text messages S Silessi, C Varol, M Karabatak 2016 15th IEEE International Conference on Machine Learning and Applications …, 2016 | 12 | 2016 |
Open source data quality tools: Revisited VSV Pulla, C Varol, M Al Information Technology: New Generations: 13th International Conference on …, 2016 | 12 | 2016 |
Tools for collecting volatile data: A survey study L Carvajal, C Varol, L Chen 2013 The International Conference on Technological Advances in Electrical …, 2013 | 12 | 2013 |