Publications Associated with the CyberMACS Programme

Submitted

  • Author(s): Edra Tabaku, Resul Bedii Gümüş, and Klesida Gjana
    Publication Name: The Socioeconomic Aspect of Cybercrime Victimization
    Submitted to: Journal of Cyber Security and Mobility
    Submission Date: March 13, 2024
  • Author(s): Ibrahim Isiaq Bolaji, Lydiah Muigwa
    Publication Name: Blockchain in Digital Forensics: A Case Study of Pig Butchering Scam in Nigeria
    Submitted to: Digital Forensic Research Workshops (Dfrws Usa 2024)
    Submission Date: January 25, 2024
  • Author(s):Nakić, D, Atabey, B.A., Poudel, N.
    Publication Name: The Psychology Behind Cyber Threat Intelligence: Examining Models and Their Application Across Time
    Submitted to: European Interdisciplinary Cybersecurity Conference - EICC 2024
    Submission Date: January 11, 2024
  • Author(s):Helmi Hibatullah, E. Fatih Yetkin, Tuğçe Ballı
    Publication Name: Verbal harassment detection in online games using machine learning methods
    Submitted to: Entertainment Computing
    Submission Date:
  • Author(s):Ikechukwhu Chukwu, E. Fatih Yetkin, Tuğçe Ballı
    Publication Name: Towards authenticating encryption using adverserial neural networks
    Submitted to: Journal of Information Security and Applications
    Submission Date:

Accepted

  • Author(s): Elissa Mollakuqe, Vesna Dimitrova, Hasan Dag, and Simon Atanasovski
    Publication Name: Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era
    Submitted to: 16th ICT Innovation Conference
    Acceptance Date: 16 August 2024
  • Author(s):John Ikechukwu, Azizakhon Toshpulatova, Elissa Mollakuqe, Ibrahim Isiaq Bolaji, Jose Luis Cano, Patrick Udeckukwu, and Hasan Dag
    Publication Name: Integrating Cryptographic Techniques to Protect AI Systems and Data
    Submitted to: 16th ICT Innovation Conference
    Acceptance Date: 16 August 2024
  • Author(s): Elissa Mollakuqe, and Hasan Dag
    Publication Name: Exploring Secure Programming through Functional Paradigms - a Study of Haskell and the Serpent Encryption Algorithm
    Submitted to: MIPRO 2025 - 48th Convention in the Cyber and Information Security (CIS) track
    Acceptance Date:
  • Author(s): Elissa Mollakuqe, Hasan Dag, Vesa Mollakuqe, and Vesna Dimitrova
    Publication Name: Analyzing the Structure of Groupoids of Order 3, 4, and 5 Using PCA
    Submitted to: 10th International Congress on Information and Communication Technology (ICICT 2025)
    Acceptance Date:
  • Published

    • Suggested Reference:Elissa Mollakuqe, Hasan Dag, and Vesna Dimitrova (2024). SMathematical Foundations and Implementation of CONIKS Key Transparency. Journal of Applied Sciences.
      DOI: https://doi.org/10.3390/app14219725
      Publish Date: 2024
    • Suggested Reference:Jose Luis Cano Garcia, Izuchukwu Patrick Udechukwu, Isiaq Bolaji Ibrahim, Ikechukwu John Chukwu, Hasan Dag, Vesna Dimitrova and Elissa Mollakuqe (2024). Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity. In the 13th Mediterranean Conference on Embedded Computing Conference.
      Publish Date: 2024
    • Suggested Reference: Jamil, M., Chukwu, I. J., & Creutzburg, R. (2024). Improving COVID-19 detection: leveraging convolutional neural networks in chest X-ray imaging. In Proceedings of SPIE 13033, SPIE Commercial Sensing and Defense Conference, 130330S.
      DOI: https://doi.org/10.1117/12.3028812
      Publish Date: 2024
    • Suggested Reference: Mahnoor Jamil, Reiner Creutzburg, Mehmet Nafiz Aydin (2024). Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection. International Conference on Theoretical and Applied Computing (ICTAC).
      DOI: -
      Publish Date: 2024
    • Suggested Reference: Mert İlhan Ecevit, Muhammad Hasban Pervez, Reiner Creutzburg, Hasan Dağ (2024). The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility. Electronic Imaging, 2024.
      DOI: https://doi.org/10.2352/EI.2024.36.3.MOBMU-318
      Publish Date: 2024
    • Suggested Reference: Heidari, A., Navimipour, N. J.,Dag, H., Talebi, S., & Unal, M. (2024). A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models. Cognitive Computation, 1-19.
      DOI: https://doi.org/10.1007/s12559-024-10255-7
      Publish Date: 2024
    • Suggested Reference:Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ, Reiner Creutzburg (2024). Phishing Website Detection through Multi-Model Analysis of HTML Content. International Conference on Theoretical and Applied Computing (ICTAC).
      DOI: https://doi.org/10.48550/arXiv.2401.04820
      Publish Date: 2024
    • Suggested Reference:Furkan Çolhak, Mert İlhan Ecevit,Hasan Dağ, Reiner Creutzburg (2024). SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations. arXiv preprint arXiv:2401.03196.
      DOI: https://doi.org/10.48550/arXiv.2401.03196
      Publish Date: 2024
    • Suggested Reference: Pranesh Kumar Narasimhan, Chinmay Bhosale, Muhammad Hasban Pervez, Najiba Zainab Naqvi, Mert Ilhan Ecevit, Klaus Schwarz,Reiner Creutzburg, "Open-source Intelligence (OSINT) investigation in Facebook" in Electronic Imaging, 2023, pp 357-1 - 357-12
      DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-357
      Publish Date: 2023
    • Suggested Reference: Heidari, A., Jafari Navimipour, N., Dag, H., & Unal, M. (2023). Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1520.
      DOI: https://doi.org/10.1002/widm.1520
      Publish Date: 2023
    • Suggested Reference: Muhammad Hasban Pervez, Mert Ilhan Ecevit, Najiba Zainab Naqvi, Reiner Creutzburg, Hasan Dag, "Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities," 2023 8th International Conference on Computer Science and Engineering (UBMK), Burdur, Turkiye, 2023, pp. 438-443.
      DOI: https://doi.org/10.1109/UBMK59864.2023.10286573
      Publish Date: 2023
    • Suggested Reference: Nazneen Mansoor, Klaus Schwarz, Reiner Creutzburg, "Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan" in Electronic Imaging, 2023, pp 354-1 - 354-14.
      DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-354
      Publish Date: 2023
    • Suggested Reference: Artem Sklyar, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis" in Electronic Imaging, 2023, pp 355-1 - 355-15.
      DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-355
      Publish Date: 2023
    • Suggested Reference: Valeria Vishnevskaya, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation - Similarity calculation using Reddit user profile data" in Electronic Imaging, 2023, pp 356-1 - 356-10.
      DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-356
      Publish Date: 2023
    • Suggested Reference: M. Gjorgjievska Perusheska, V. Dimitrova: “Application of Machine Learning in Intrusion Detection Systems”. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 711. Springer, Cham. pp. 97-105.
      DOI: https://doi.org/10.1007/978-3-031-37717-4_86
      Publish Date: 2023