


default search action
ISDFS 2023: Chattanooga, TN, USA
- 11th International Symposium on Digital Forensics and Security, ISDFS 2023, Chattanooga, TN, USA, May 11-12, 2023. IEEE 2023, ISBN 979-8-3503-3698-6

- Matthias Seul, Cihan Varol

:
Leveraging P2P- and Edge-Based Processing for Compliance Management of IoT-Devices. 1-7 - Gamzepelin Aksoy, Murat Karabatak:

Comparison of QSVM with Other Machine Learning Algorithms on EEG Signals. 1-5 - Phani Lanka, Cihan Varol

, Narasimha K. Shashidhar:
Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals. 1-6 - Arman Hamzehlou Kahrizi, Christopher Chun Ki Chan, Alexander Ferworn:

Universal Simulation Platform Online, A Multi-Participants I.E.D. Disposal Simulator. 1-5 - Sheikh Shamshad Ahmed, Afrin Akter Mim, Dipto Saha, Kamrun Nahar, Md. Aynul Hasan Nahid

:
A CNN-Based Novel Approach for The Detection of Compound Bangla Handwritten Characters. 1-6 - Ekin Can Erkus

, Müslüm Ersel Er, Alper Yildiz, Mustafa Gencer:
An Investigation of the Effects of the Numerical Missing Value Imputation Methods for Click-through Rate Estimation Performances. 1-5 - Twana Mustafa, Murat Karabatak:

Challenges in Automatic License Plate Recognition System Review. 1-6 - Gokce Yildirim, Erkan Tanyildizi:

Random Number Generator Based on Optimization and Chaotic System. 1-4 - Diana Gutierrez, William Ocampo, Alexander Perez-Pons

, Himanshu Upadhyay, Santosh Joshi:
Virtualization and Validation of Emulated STM-32 Blue Pill Using the QEMU Open-Source Framework. 1-6 - Nuno Fernandes, Joaquim Gonçalves:

Multivariate and multi-output indoor air quality prediction using bidirectional LSTM. 1-6 - Siqi Xie, Xiuxia Tian:

Fused Syntactic and Semantic Parsing for Measuring Privacy Level in Unstructured Text. 1-6 - Murat Bakirci, Muhammed Mirac Ozer

:
Surveillance, Reconnaissance and Detection Services for Disaster Operations of IoT-Based eVTOL UAVs with Swarm Intelligence. 1-6 - Khalid Hasan Tantawi

, Ahad Nasab, Lyn Potter, Omar Tantawi, Nancy Wilson, Alisa Henrie, Arif Sirinterlikci, Erkan Kaplanoglu:
Mechatronics Education- Current and Future Trends. 1-5 - Abdulrahman A. El Tawil, Khouloud Samrouth:

IEWS: a Free Open Source Intelligent Early Warning System Based on Machine Learning. 1-3 - Yuan Wei, Xiuxia Tian:

Deep Learning-Based Attribute Optimization Method for ABAC. 1-5 - Sami Haj Ali, Hüseyin Aygün:

Shape Detection Using Air-Drawing. 1-5 - Erman Ozpolat, Arif Gülten

:
A Novel 4D Hyperchaotic System with Its Dynamical Analysis and Synchronization. 1-5 - Deraw Kamaran Salih, Abdalbasit Mohammed Qadir, Mazen Ismaeel Ghareb:

A Hybrid Approach to Osteosarcoma Detection Using Densenet201-SVM Model. 1-5 - Leah McIntyre, Eva Tuba:

Brain Tumor Segmentation and Classification using Texture Features and Support Vector Machine. 1-5 - Gahangir Hossain

, Josh Tarrant:
CyberTMS : A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0. 1-6 - Una Tuba, Eva Tuba, Milan Tuba, Mladen D. Veinovic:

Feature Selection for Classification Problems by Binary Bare Bones Fireworks Algorithm. 1-6 - Jun Wu

, Xuesong Ye, Chengjie Mou, Weinan Dai:
FineEHR: Refine Clinical Note Representations to Improve Mortality Prediction. 1-6 - Ingororano Théophile, Jean De La Croix Ntivuguruzwa

, Tohari Ahmad
:
Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility. 1-6 - Swapna Mele Pottaraikkal, Akash Sujeer Sugatha:

Effectiveness of Multiple Memory-Images in detecting Fileless Malware. 1-5 - Prasanna Srinivasan S, Shiju Sathyadevan:

GPS Spoofing Detection in UAV Using Motion Processing Unit. 1-4 - Aulia Teaku Nururrahmah, Tohari Ahmad

:
CHI2CV : Feature Selection using Chi-Square with Cross-Validation for Intrusion Detection System. 1-6 - Shahriar Saadat:

Wiegand vs. OSDP in Cyber Security. 1-3 - Achmad Mufliq, Amalia Utamima

:
Genetic Algorithm and Local Search for Optimization of Tourism Trips as an Orienteering Problem. 1-5 - Andrew Fredrick Nyoka, Kelvin Sauli Godfrey, Happines Gideon Mwakilembe, Leonard Jonas Mugendi, Oscar David Mbita, Adramane Assoumana, Dawson Ladislaus Msongaleli:

Reliable Face Identification System for Criminal Investigation. 1-5 - Okan Yaman

, Tolga Ayav, Yusuf Murat Erten:
A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming. 1-5 - Menchie Rosales, Jade Berasis, Sajuid Kyle Dancel, Angelo Sahagun, Jeremiah Tacardon, Alonica R. Villanueva

:
Data Converter Device in Detecting Water Toxicity for Poultry Industry. 1-6 - Swardiantara Silalahi

, Tohari Ahmad
, Hudan Studiawan:
Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline. 1-6 - Anna Denisova

:
Evaluation of DeepMedic Neural Network for a Region of Interest Eextraction in Medical Image Watermarking. 1-6 - Bonry Dorado, Alonica R. Villanueva

:
Development of Low-Latency and Real-Time Filipino Children Automatic Speech Recognition System using Deep Neural Network. 1-6 - Twana Mustafa, Murat Karabatak:

Deep Learning Model for Automatic Number/License Plate Detection and Recognition System in Campus Gates. 1-5 - Murat Bakirci, Muhammed Mirac Ozer

:
5G Network Supported Unmanned Aerial Vehicle Avionics for Military Zone Surveillance and Security. 1-6 - Günes Gürsoy

, Asaf Varol, Ahad Nasab:
Importance of Machine Learning and Deep Learning Algorithms in Earthquake Prediction: A Review. 1-6 - Akhil Raj, Sriram Sankaran:

Battery Drain using WiFi Beacons. 1-6 - Md. Rayhan Ahmmed, Md. Mamun Sakib, Maruf Ur Rahman, Rabeya Bibi, Md. Maruf Hasan Talukder, Ms. Johora Akter Polin:

Encryption process of Blockchain based online course curriculum education system. 1-7 - Seydanur Ahi Duman, Rukiye Hayran, Ibrahim Sogukpinar:

Impact Analysis and Performance Model of Social Engineering Techniques. 1-6 - Naveed Ahmed, Asaf Varol, Ahad Nasab:

Localization by OSS and BSS Collected Data. 1-7 - Hacer Varol, Timothy W. Kaufman:

Differentiating Systematic Cyber Attacks from Random Attacks in Space Communication. 1-5 - Murat Bakirci, Muhammed Mirac Ozer

:
A Low-Cost UAV Design for Surveillance Purposes in Swarm Systems. 1-6 - Burcu Alper, Selma Nazlioglu, Hürevren Kiliç

:
ACE-PE: An Automated Code Evaluation Software Tool For Programming Education. 1-5 - Md. Kamrul Hasan Sabbir, Serkan Varol:

Analysis of Variance of Accident Data to Detect Factors Correlating to Fatalities in Tennessee. 1-5 - Sal Aguiñaga, Daniel Lasaga, Shivashankar Danthuri, John Helms, Edward Bowen, Sanmitra Bhattacharya:

Identification of Providers with Similar Risk Profiles in Healthcare Claims Using Graphs. 1-6 - Ankur Chattopadhayay, Zackary Luedtke:

Towards A Unique Online Healthcare Information (OHI) Recommender: A Preliminary Case Study. 1-8 - David Shapiro

, Vladislav Sergeyev, Victor Fedoseev
:
Improved ECC-based Phase Watermarking Method for Video Copyright Protection. 1-6 - Ana Rita Antunes, Joaquim P. Silva

, Ana Cristina Braga
, Joaquim Gonçalves:
Feature Selection Optimization for Heart Rate Variability. 1-6 - Amaldeep S, Sriram Sankaran:

Cross Protocol Attack on IPSec-based VPN. 1-6 - Navdeep Singh, Kurunandan Jain

:
Data Security Approach Using Blockchain Mechanism and Cryptography Algorithms. 1-6 - Can Özbey, Eyüp Kaan Ülgen:

Distribution of High-Frequency Words: An Analytical Investigation. 1-6 - Julia Loncala, Madeline Irvin, Alyson Globis, Katie Harvat, Mason Seitz, Garrett Goodman

:
Towards Complex Regional Pain Syndrome (CRPS) Monitoring and Management Using an AI Powered Mobile Application. 1-6 - Müslim Alanoglu

, Songül Karabatak, Murat Karabatak:
The Effect of Distance Instruction Based on the ARCS Motivation Model on the Course Interest. 1-4 - Kiran Peddireddy

:
Streamlining Enterprise Data Processing, Reporting and Realtime Alerting using Apache Kafka. 1-4 - Suman Rath, Tapadhir Das

, Ignacio Astaburuaga
, Shamik Sengupta:
Less is More: Deep Learning Framework for Digital Forensics in Resource-Constrained Environments. 1-6 - Ibrahim Yilmaz

, Mahmoud Abouyoussef
:
FIGO: Fingerprint Identification Approach Using GAN and One Shot Learning Techniques. 1-6 - Victor Fedoseev

:
Quantization-Based Watermarking Methods with Reduced Distortion. 1-6 - Menchie Rosales, Regiena Marie Culpable, Christian Cayanan, Gino Forcadela, Gilian Mae Boctil, Maria Cecilia Venal:

Local-Export Quality Classification Device for Multiple Unripe Carabao Mango using Single Shot Detector Algorithm. 1-6 - Domingos Araújo, Joaquim Silva

, Patricia Leite Brandao, Óscar Ribeiro
, Paulo Teixeira
:
Predict Malware Using Machine Learning. 1-6 - Dishant Banga, Prerana Singh:

Emotion Detection in Speech. 1-4 - Jason Ford

, Hala Strohmier Berry
:
Leveling Up Survey of How Nation States Leverage Cyber Operations to Even the Playing Field. 1-5 - Zeynep Ozpolat, Murat Karabatak:

Exploring the Potential of Quantum-Based Machine Learning: A Comparative Study of QSVM and Classical Machine Learning Algorithms. 1-5 - Biodoumoye George Bokolo, Lei Chen, Qingzhong Liu:

Detection of Web-Attack using DistilBERT, RNN, and LSTM. 1-6 - Md. Alif Sheakh

, Mst. Sazia Tahosin
, Md Maruf Hasan, Taminul Islam
, Onamika Islam, Md Masum Rana:
Child and Maternal Mortality Risk Factor Analysis Using Machine Learning Approaches. 1-6 - Muhammad Aidiel Rachman Putra

, Tohari Ahmad
, Dandy Pramana Hostiadi
:
Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis. 1-6 - Hala Strohmier Berry

:
The Importance of Cybersecurity in Supply Chain. 1-5 - Songül Karabatak, Sevinç Ay, Murat Karabatak:

The Relationship between Digital Citizenship and Information Security Achievement. 1-5 - Lava Th. Omar, Judy M. Hussein, Lava F. Omer, Abdalbasit Mohammed Qadir, Mazen Ismaeel Ghareb:

Lung And Colon Cancer Detection Using Weighted Average Ensemble Transfer Learning. 1-7 - Mahadi Hasan, Mst. Sazia Tahosin

, Afia Farjana, Md. Alif Sheakh
, Md Maruf Hasan:
A Harmful Disorder: Predictive and Comparative Analysis for fetal Anemia Disease by Using Different Machine Learning Approaches. 1-6 - Jun Wu

, Xuesong Ye, Yanyuet Man:
BotTriNet: A Unified and Efficient Embedding for Social Bots Detection via Metric Learning. 1-6 - Aykut Karakaya, Ahmet Ulu

:
A Review on Latest Developments in Post-Quantum Based Secure Blockchain Systems. 1-6 - Gunay Abdiyeva-Aliyeva:

AI-Based Network Security Anomaly Prediction and Detection in Future Network. 1-5 - Hala Strohmier Berry

:
Survey of the Challenges and Solutions in Cybersecurity Awareness Among College Students. 1-6 - Wei-Che Lee, Hong-Yen Chen, Tsung-Nan Lin:

A Predictive Classification Model for Identifying Conversation-related Mobile Forensic Data in Instant Messaging Applications. 1-6 - Faiyaz Fahim

:
A Deep Learning Method to Predict Loss of Coolant Accident in Nuclear Power Plants. 1-4 - Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:

Who are youƒ OSINT-based Profiling of Infrastructure Honeypot Visitors. 1-6 - Anil Sezgin, Aytug Boyaci:

A Survey of Privacy and Security Challenges in Industrial Settings. 1-7 - Hugo Lopes, Filipe Coelho, Joaquim Gonçalves:

W.A.R. - Wheelchair Activity Recognition. 1-6 - Nurettin Selcuk Senol, Amar Rasheed:

A Testbed for LoRa Wireless Communication between IoT devices. 1-6 - Sibel Gülmez

, Arzu Gorgulu Kakisim, Ibrahim Sogukpinar:
Analysis of the Dynamic Features on Ransomware Detection Using Deep Learning-based Methods. 1-6 - Richard Ward, Andrew Johnson:

Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing Process. 1-5 - Rui Fernandes

, João Carlos Silva, Óscar Ribeiro
, Irene Portela, Nuno Lopes
:
The impact of identifiable features in ML Classification algorithms with the HIKARI-2021 Dataset. 1-5 - Kelsie Edie, Cole Mckee, Adam Duby:

Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution. 1-6 - Zein Al-Abidin Mohammad Fneish, Mohammad El-Hajj, Khouloud Samrouth:

Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review. 1-7 - Müslim Alanoglu

, Songül Karabatak, Murat Karabatak:
The Relationship between Transactional Distance Perceptions and Academic Self-Efficacy. 1-4 - Anthony Niño S. Aquino, Alonica R. Villanueva

:
Network Anomaly Detection Using NetFlow and Network Automation. 1-6 - Miguel V. P. R. Meneses, Ana Rita Antunes, Joaquim Gonçalves:

Driver Drowsiness Classification using Machine Learning and Heart Rate Variability. 1-6 - Sujitha Sudevan, Kurunandan Jain

:
A Lightweight Medical Image Encryption Scheme Using Chaotic Maps and Image Scrambling. 1-6 - Twana Mustafa, Murat Karabatak:

Feature Selection for Phishing Website by Using Naive Bayes Classifier. 1-4 - Amalia Utamima

, Farrel Istihsan Aditya, Firdaus W. G. Ashaari, Alfito K. Nugraha:
Applying Machine Learning Algorithms for Opinion Mining on a Digital Internet Service Provider. 1-5 - Paulo Meneses, Nuno Lopes

, Patrícia Leite, Paulo Teixeira
, Joaquim Gonçalves, Joaquim P. Silva
:
A Pre-Diagnosis Model for Indoor Radon Potential Assessment. 1-6 - Mohak Kataria, Kurunandan Jain

, Narayanan Subramanian:
Exploring Advanced Encryption and Steganography Techniques for Image Security. 1-6 - Aswathy Krishna R, Narayanan Subramanian, Kurunandan Jain

:
Image Steganography Using HBV And Padded RSA. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














