Publications Associated with the CyberMACS Programme

Submitted

  • Author(s): Usman Haider and Tajriyan Rahman
    Publication Name: From Awareness to Action: Surveying Cybersecurity Mindsets in Software Development.
    Submitted to: The 30th Nordic Conference on Secure IT Systems, Tartu, Estonia.
    Submission Date:
  • Author(s): Purujit Srinivasan, Gertrude Nabasirye, Gainkamal Batayeva, E. Fatih Yetkin, and Tuğçe Ballı
    Publication Name: Lightweight SAX-LSTM Approach for IoT Network Intrusion Detection
    Submitted to: IEEE Internet of Things Journal
    Submission Date:
  • Author(s): Edra Tabaku, Resul Bedii Gümüş, and Klesida Gjana
    Publication Name: The Socioeconomic Aspect of Cybercrime Victimization
    Submitted to: Journal of Cyber Security and Mobility
    Submission Date: March 13, 2024
  • Author(s): Ibrahim Isiaq Bolaji, Lydiah Muigwa
    Publication Name: Blockchain in Digital Forensics: A Case Study of Pig Butchering Scam in Nigeria
    Submitted to: Digital Forensic Research Workshops (Dfrws Usa 2024)
    Submission Date: January 25, 2024
  • Author(s):Nakić, D, Atabey, B.A., Poudel, N.
    Publication Name: The Psychology Behind Cyber Threat Intelligence: Examining Models and Their Application Across Time
    Submitted to: European Interdisciplinary Cybersecurity Conference - EICC 2024
    Submission Date: January 11, 2024
  • Author(s):Ikechukwhu Chukwu, E. Fatih Yetkin, Tuğçe Ballı
    Publication Name: Towards authenticating encryption using adverserial neural networks
    Submitted to: Journal of Information Security and Applications
    Submission Date:

Accepted

  • Author(s): Lenear Amagove Mwondi, Allan Onyango, and Tajriyan Rahman.
    Publication Name: Enhancing Cloud Security: Best Practices for Deploying Advanced Firewalls in Cloud Architectures
    Submitted to:International Applied Cybersecurity Conference IACyC 2025
    Acceptance Date:
  • Author(s): Elissa Mollakuqe, and Hasan Dag
    Publication Name: Exploring Secure Programming through Functional Paradigms - a Study of Haskell and the Serpent Encryption Algorithm
    Submitted to: MIPRO 2025 - 48th Convention in the Cyber and Information Security (CIS) track
    Acceptance Date:

Published

  • Suggested Reference: Usman Haider, Meli Tchouala Imelda, Nikola Nachevski (2025). Overview of Personal Privacy Risks and Their Consequences in Smart Homes. 2025 IEEE 4th International Conference on Computing and Machine Intelligence (ICMI).
    DOI: https://doi.org/10.1109/ICMI65310.2025.11141297
    Publish Date: September 2025
  • Suggested Reference: Helmi Hibatullah, E. Fatih Yetkin, Tuğçe Ballı (2025). Verbal harassment detection in online games using machine learning methods. Elsevier.
    DOI: https://doi.org/10.1016/j.entcom.2025.101009
    Publish Date: September 2025
  • Suggested Reference: Rana Shafi, Simran Shilpakar, E. Fatih Yetkin, and Tuğçe Ballı (2025). Privacy-Aware PCA with Noise Perturbation for IIoT Data. IEEE Xplore.
    DOI: https://doi.org/10.1109/UBMK67458.2025.11206787
    Publish Date: 2025
  • Suggested Reference: Elissa Mollakuqe, Hasan Dag, Vesa Mollakuqe, and Vesna Dimitrova (2025). Analyzing the Structure of Groupoids of Order 3, 4, and 5 Using PCA. 10th International Congress on Information and Communication Technology (ICICT 2025).
    Publish Date: 01 October, 2025
  • Suggested Reference:Sristi Mitra, Vaishnavi Santosh Sable, Danium Syed Reputation and Energy-Aware Dynamic Hybrid Consensus (READ-HC) Model for IIoT
    Publish Date: 3rd July, 2025
  • Suggested Reference:R. Creutzburg, V. Dimitrova, I. Chorbev, E. Dilan, A. Gücüyener, H. Dağ (2025).International Cybersecurity Cooperation: The Cybermacs Erasmus Mundus Initiative for A Secure Global Digital Future, INTED2025 Proceedings, pp. 1700-1704.
    Publish Date: 2025
  • Suggested Reference: Elissa Mollakuqe, Vesna Dimitrova, Hasan Dag, and Simon Atanasovski (2025). Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era.16th ICT Innovation Conference.
    Publish Date: April, 2025
  • Suggested Reference:A. Gücüyener, E. Dilan, V. Dimitrova, I. Chorbev, R. Creutzburg, H. Dag (2024).Cybermacs Erasmus Mundus Project as An Innovative, Industry-Focused International Collaboration on Cybersecurity Education, ICERI2024 Proceedings, pp. 8085-8093.
    Publish Date: 2024
  • Suggested Reference:Elissa Mollakuqe, Hasan Dag, and Vesna Dimitrova (2024). SMathematical Foundations and Implementation of CONIKS Key Transparency. Journal of Applied Sciences.
    DOI: https://doi.org/10.3390/app14219725
    Publish Date: 2024
  • Suggested Reference:Jose Luis Cano Garcia, Izuchukwu Patrick Udechukwu, Isiaq Bolaji Ibrahim, Ikechukwu John Chukwu, Hasan Dag, Vesna Dimitrova and Elissa Mollakuqe (2024). Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity. In the 13th Mediterranean Conference on Embedded Computing Conference.
    Publish Date: 2024
  • Suggested Reference: Jamil, M., Chukwu, I. J., & Creutzburg, R. (2024). Improving COVID-19 detection: leveraging convolutional neural networks in chest X-ray imaging. In Proceedings of SPIE 13033, SPIE Commercial Sensing and Defense Conference, 130330S.
    DOI: https://doi.org/10.1117/12.3028812
    Publish Date: 2024
  • Suggested Reference: Mahnoor Jamil, Reiner Creutzburg, Mehmet Nafiz Aydin (2024). Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection. International Conference on Theoretical and Applied Computing (ICTAC).
    DOI: -
    Publish Date: 2024
  • Suggested Reference: Mert İlhan Ecevit, Muhammad Hasban Pervez, Reiner Creutzburg, Hasan Dağ (2024). The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility. Electronic Imaging, 2024.
    DOI: https://doi.org/10.2352/EI.2024.36.3.MOBMU-318
    Publish Date: 2024
  • Suggested Reference: Heidari, A., Navimipour, N. J.,Dag, H., Talebi, S., & Unal, M. (2024). A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models. Cognitive Computation, 1-19.
    DOI: https://doi.org/10.1007/s12559-024-10255-7
    Publish Date: 2024
  • Suggested Reference:Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ, Reiner Creutzburg (2024). Phishing Website Detection through Multi-Model Analysis of HTML Content. International Conference on Theoretical and Applied Computing (ICTAC).
    DOI: https://doi.org/10.48550/arXiv.2401.04820
    Publish Date: 2024
  • Suggested Reference:Furkan Çolhak, Mert İlhan Ecevit,Hasan Dağ, Reiner Creutzburg (2024). SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations. arXiv preprint arXiv:2401.03196.
    DOI: https://doi.org/10.48550/arXiv.2401.03196
    Publish Date: 2024
  • Suggested Reference: Pranesh Kumar Narasimhan, Chinmay Bhosale, Muhammad Hasban Pervez, Najiba Zainab Naqvi, Mert Ilhan Ecevit, Klaus Schwarz,Reiner Creutzburg, "Open-source Intelligence (OSINT) investigation in Facebook" in Electronic Imaging, 2023, pp 357-1 - 357-12
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-357
    Publish Date: 2023
  • Suggested Reference: Heidari, A., Jafari Navimipour, N., Dag, H., & Unal, M. (2023). Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1520.
    DOI: https://doi.org/10.1002/widm.1520
    Publish Date: 2023
  • Suggested Reference: Muhammad Hasban Pervez, Mert Ilhan Ecevit, Najiba Zainab Naqvi, Reiner Creutzburg, Hasan Dag, "Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities," 2023 8th International Conference on Computer Science and Engineering (UBMK), Burdur, Turkiye, 2023, pp. 438-443.
    DOI: https://doi.org/10.1109/UBMK59864.2023.10286573
    Publish Date: 2023
  • Suggested Reference: Nazneen Mansoor, Klaus Schwarz, Reiner Creutzburg, "Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan" in Electronic Imaging, 2023, pp 354-1 - 354-14.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-354
    Publish Date: 2023
  • Suggested Reference: Artem Sklyar, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis" in Electronic Imaging, 2023, pp 355-1 - 355-15.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-355
    Publish Date: 2023
  • Suggested Reference: Valeria Vishnevskaya, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation - Similarity calculation using Reddit user profile data" in Electronic Imaging, 2023, pp 356-1 - 356-10.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-356
    Publish Date: 2023
  • Suggested Reference: M. Gjorgjievska Perusheska, V. Dimitrova: “Application of Machine Learning in Intrusion Detection Systems”. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 711. Springer, Cham. pp. 97-105.
    DOI: https://doi.org/10.1007/978-3-031-37717-4_86
    Publish Date: 2023