Publications Associated with the CyberMACS Programme

Submitted

  • Author(s): Usman Haider and Tajriyan Rahman
    Publication Name: From Awareness to Action: Surveying Cybersecurity Mindsets in Software Development.
    Submitted to: The 30th Nordic Conference on Secure IT Systems, Tartu, Estonia.
    Submission Date: 2025
  • Author(s): Purujit Srinivasan, Gertrude Nabasirye, Gainkamal Batayeva, E. Fatih Yetkin, and Tuğçe Ballı
    Publication Name: Lightweight SAX-LSTM Approach for IoT Network Intrusion Detection
    Submitted to: IEEE Internet of Things Journal
    Submission Date: 2025
  • Author(s): Edra Tabaku, Resul Bedii Gümüş, and Klesida Gjana
    Publication Name: The Socioeconomic Aspect of Cybercrime Victimization
    Submitted to: Journal of Cyber Security and Mobility
    Submission Date: March 13, 2024
  • Author(s): Ibrahim Isiaq Bolaji, Lydiah Muigwa
    Publication Name: Blockchain in Digital Forensics: A Case Study of Pig Butchering Scam in Nigeria
    Submitted to: Digital Forensic Research Workshops (Dfrws Usa 2024)
    Submission Date: January 25, 2024
  • Author(s): Nakić, D, Atabey, B.A., Poudel, N.
    Publication Name: The Psychology Behind Cyber Threat Intelligence: Examining Models and Their Application Across Time
    Submitted to: European Interdisciplinary Cybersecurity Conference - EICC 2024
    Submission Date: January 11, 2024
  • Author(s): Ikechukwhu Chukwu, E. Fatih Yetkin, Tuğçe Ballı
    Publication Name: Towards authenticating encryption using adverserial neural networks
    Submitted to: Journal of Information Security and Applications
    Submission Date: -

Accepted

  • Author(s): Lenear Amagove Mwondi, Allan Onyango, and Tajriyan Rahman.
    Publication Name: Enhancing Cloud Security: Best Practices for Deploying Advanced Firewalls in Cloud Architectures
    Submitted to: International Applied Cybersecurity Conference IACyC 2025
    Acceptance Date: 2025
  • Author(s): Elissa Mollakuqe, and Hasan Dag
    Publication Name: Exploring Secure Programming through Functional Paradigms - a Study of Haskell and the Serpent Encryption Algorithm
    Submitted to: MIPRO 2025 - 48th Convention in the Cyber and Information Security (CIS) track
    Acceptance Date: 2025
  • Author(s): K. P. Bhandari and I. Chorbev
    Publication Name: Behavioral Authentication: Evaluation of Reliability in Contemporary Web Security
    Submitted to: Proceedings of International Applied Cybersecurity Conference 2025
    Acceptance Date: 2025
  • Author(s): K. Gjana, H. Mihajloska, and E. F. Yetkin
    Publication Name: 'JaVul': a Novel Java Dataset for Code Vulnerability Detection Based on CWE Labeling
    Submitted to: Proceedings of International Applied Cybersecurity Conference 2025
    Acceptance Date: 2025
  • Author(s): B. E. Atabey, S. Gramatikov, and M. N. Aydın
    Publication Name: Assessing Vulnerabilities in IoT Protocols: A Cross-Layer Approach
    Submitted to: Proceedings of International Applied Cybersecurity Conference 2025
    Acceptance Date: 2025
  • Author(s): R. B. Gümüş, B. Joksimoski, and T. Ballı
    Publication Name: Evaluation of Privacy-Enhancing Technologies Against Web Tracking
    Submitted to: Proceedings of International Applied Cybersecurity Conference 2025
    Acceptance Date: 2025

Published

  • Suggested Reference: Usman Haider, Meli Tchouala Imelda, Nikola Nachevski (2025). Overview of Personal Privacy Risks and Their Consequences in Smart Homes. 2025 IEEE 4th International Conference on Computing and Machine Intelligence (ICMI).
    DOI: https://doi.org/10.1109/ICMI65310.2025.11141297
    Publish Date: September 2025
  • Suggested Reference: Helmi Hibatullah, E. Fatih Yetkin, Tuğçe Ballı (2025). Verbal harassment detection in online games using machine learning methods. Elsevier / Entertainment Computing.
    DOI: https://doi.org/10.1016/j.entcom.2025.101009
    Publish Date: September 2025
  • Suggested Reference: Elissa Mollakuqe, Hasan Dag, Vesa Mollakuqe, and Vesna Dimitrova (2025). Analyzing the Structure of Groupoids of Order 3, 4, and 5 Using PCA. 10th International Congress on Information and Communication Technology (ICICT 2025).
    Publish Date: 01 October, 2025
  • Suggested Reference: Rana Shafi, Simran Shilpakar, E. Fatih Yetkin, and Tuğçe Ballı (2025). Privacy-Aware PCA with Noise Perturbation for IIoT Data. IEEE Xplore / UBMK Conference.
    DOI: https://doi.org/10.1109/UBMK67458.2025.11206787
    Publish Date: 2025
  • Suggested Reference: Jamil, M., Mihajloska Trpcheska, H., Popovska-Mitrovikj, A., Dimitrova, V., & Creutzburg, R. (2025). Advancing image spam detection: Evaluating machine learning models through comparative analysis. Applied Sciences, 15(11), 6158.
    DOI: https://doi.org/10.3390/app15116158
    Publish Date: 2025
  • Suggested Reference: Sristi Mitra, Vaishnavi Santosh Sable, Danium Syed Reputation and Energy-Aware Dynamic Hybrid Consensus (READ-HC) Model for IIoT. The JBBA.
    DOI: doi:10.31585/jbba-8-2-(3)2025
    Publish Date: 3rd July, 2025
  • Suggested Reference: R. Creutzburg, V. Dimitrova, I. Chorbev, E. Dilan, A. Gücüyener, H. Dağ (2025). International Cybersecurity Cooperation: The Cybermacs Erasmus Mundus Initiative for A Secure Global Digital Future, INTED2025 Proceedings, pp. 1700-1704.
    Publish Date: 2025
  • Suggested Reference: Elissa Mollakuqe, Vesna Dimitrova, Hasan Dag, and Simon Atanasovski (2025). Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era. 16th ICT Innovation Conference.
    DOI: https://doi.org/10.1007/978-3-031-86162-8_4
    Publish Date: April, 2025
  • Suggested Reference: Jamil, M., & Creutzburg, R. (2025). Enhancing cybersecurity in critical infrastructure: Utilizing random forest AI model for threat detection. Future of Information and Communication Conference, 388–398.
    Publish Date: 2025
  • Suggested Reference: Jamil, M., & Creutzburg, R. (2025). Enhancing brain tumor detection: Leveraging convolutional neural network (CNN) models for improved diagnostic accuracy. Electronic Imaging, 37, 1–6.
    Publish Date: 2025
  • Suggested Reference: Ecevit, M. I., Feta, A., Creutzburg, R., & Dağ, H. (2025). Educational metaverse–cybersecurity aspects and challenges. INTED2025 Proceedings, 2745–2752.
    Publish Date: 2025
  • Suggested Reference: Jamil, M., Creutzburg, R., Nafiz Aydin, M. (2025). Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection. ICTAC 2024. Algorithms for Intelligent Systems. Springer.
    DOI: https://doi.org/10.1007/978-981-97-6957-5_14
    Publish Date: 2025
  • Suggested Reference: L. W. Muigwa and I. Chorbev (2025). A State-of-the-Art Review on Social Media Exposure and Cyber Threats. Proceedings of the 22nd International Conference of Informatics and Information Technologies (CIIT), pp. 331-334.
    Publish Date: 2025
  • Suggested Reference: A. Mousa and P. Lameski (2025). Mapping the Landscape of Anonymous CTI Sharing. Proceedings of the 22nd International Conference of Informatics and Information Technologies (CIIT), pp. 340-344.
    Publish Date: 2025
  • Suggested Reference: A. Ismailov (2025). Access Control Using Threshold Cryptography and Dynamic Policy Management. Proceedings of the 22nd International Conference of Informatics and Information Technologies (CIIT), pp. 349-353.
    Publish Date: 2025
  • Suggested Reference: I. B. Ibrahim (2025). Android Digital Forensics of Vulnerable Mobile Applications: Data Extraction and Analysis of Hardcoded Strings. Proceedings of the 22nd International Conference of Informatics and Information Technologies (CIIT), pp. 192-197.
    Publish Date: 2025
  • Suggested Reference: K. Gjana (2025). AI-Driven Vulnerability Detection in Code: A State-of-the-Art Review with a Focus on CWE and Java Frameworks. Proc. 22nd Int. Conf. Informatics and Information Technologies (CiiT 2025), pp 231-234.
    Publish Date: 2025
  • Suggested Reference: B. E. Atabey and S. Gramatikov (2025). A Review of Cross-Layer Security Vulnerabilities in IoT Communication Protocols. Proc. 22nd Int. Conf. Informatics and Information Technologies (CiiT 2025), pp. 327-330.
    Publish Date: 2025
  • Suggested Reference: R. B. Gümüş and B. Joksimoski (2025). Web Tracking Technologies - current research analysis. Proc. 22nd Int. Conf. Informatics and Information Technologies (CiiT 2025), pp 157-161.
    Publish Date: 2025
  • Suggested Reference: M. Taneska and I. J. Chukwu (2025). Ciphertext-Only Attacks Using Large Language Models. Proc. 22nd Int. Conf. Informatics and Information Technologies (CiiT 2025), pp. 240-244.
    Publish Date: 2025
  • Suggested Reference: I. J. Chukwu and V. Dimitrova (2025). Software Implementations of Lightweight Ciphers: A Survey with Focus on ASCON. Proc. 22nd Int. Conf. Informatics and Information Technologies (CiiT 2025), pp 272-277.
    Publish Date: 2025
  • Suggested Reference: Ikechukwu, J., Toshpulatova, A., Mollakuqe, E., Bolaji, I. I., Cano, J. L., Udeckukwu, P., & Dag, H. (2024). Integrating cryptographic techniques to protect AI systems and data. 16th ICT Innovations Conference.
    Publish Date: August 16, 2024
  • Suggested Reference: A. Gücüyener, E. Dilan, V. Dimitrova, I. Chorbev, R. Creutzburg, H. Dag (2024). Cybermacs Erasmus Mundus Project as An Innovative, Industry-Focused International Collaboration on Cybersecurity Education, ICERI2024 Proceedings, pp. 8085-8093.
    Publish Date: 2024
  • Suggested Reference: Elissa Mollakuqe, Hasan Dag, and Vesna Dimitrova (2024). Mathematical Foundations and Implementation of CONIKS Key Transparency. Journal of Applied Sciences.
    DOI: https://doi.org/10.3390/app14219725
    Publish Date: 2024
  • Suggested Reference: Jose Luis Cano Garcia, Izuchukwu Patrick Udechukwu, Isiaq Bolaji Ibrahim, Ikechukwu John Chukwu, Hasan Dag, Vesna Dimitrova and Elissa Mollakuqe (2024). Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity. 13th Mediterranean Conference on Embedded Computing Conference.
    DOI: 10.1109/MECO62516.2024.10577883
    Publish Date: 2024
  • Suggested Reference: Jamil, M., Chukwu, I. J., & Creutzburg, R. (2024). Improving COVID-19 detection: leveraging convolutional neural networks in chest X-ray imaging. Proceedings of SPIE 13033, 130330S.
    DOI: https://doi.org/10.1117/12.3028812
    Publish Date: 2024
  • Suggested Reference: Mahnoor Jamil, Reiner Creutzburg, Mehmet Nafiz Aydin (2024). Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection. International Conference on Theoretical and Applied Computing (ICTAC).
    Publish Date: 2024
  • Suggested Reference: Mert İlhan Ecevit, Muhammad Hasban Pervez, Reiner Creutzburg, Hasan Dağ (2024). The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility. Electronic Imaging, 36(3), MOBMU-318.
    DOI: https://doi.org/10.2352/EI.2024.36.3.MOBMU-318
    Publish Date: 2024
  • Suggested Reference: Heidari, A., Navimipour, N. J., Dag, H., Talebi, S., & Unal, M. (2024). A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models. Cognitive Computation, 1-19.
    DOI: https://doi.org/10.1007/s12559-024-10255-7
    Publish Date: 2024
  • Suggested Reference: Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ, Reiner Creutzburg (2024). Phishing Website Detection through Multi-Model Analysis of HTML Content. International Conference on Theoretical and Applied Computing (ICTAC).
    DOI: https://doi.org/10.48550/arXiv.2401.04820
    Publish Date: 2024
  • Suggested Reference: Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ, Reiner Creutzburg (2024). SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations. arXiv preprint arXiv:2401.03196.
    DOI: https://doi.org/10.48550/arXiv.2401.03196
    Publish Date: 2024
  • Suggested Reference: Çolhak, F., Ecevit, M. I., Dağ, H., & Creutzburg, R. (2024). Comparing deep neural networks and machine learning for detecting malicious domain name registrations. IEEE International Conference on Omni-layer Intelligent Systems (COINS 2024).
    Publish Date: 2024
  • Suggested Reference: Çolhak, F., Ecevit, M. I., Dağ, H., & Creutzburg, R. (2024). SecureReg: Combining NLP and MLP for enhanced detection of malicious domain name registrations. International Conference on Electrical, Computer and Energy.
    Publish Date: 2024
  • Suggested Reference: Pranesh Kumar Narasimhan, Chinmay Bhosale, Muhammad Hasban Pervez, Najiba Zainab Naqvi, Mert Ilhan Ecevit, Klaus Schwarz, Reiner Creutzburg, "Open-source Intelligence (OSINT) investigation in Facebook" in Electronic Imaging, 2023, pp 357-1 - 357-12
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-357
    Publish Date: 2023
  • Suggested Reference: Heidari, A., Jafari Navimipour, N., Dag, H., & Unal, M. (2023). Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1520.
    DOI: https://doi.org/10.1002/widm.1520
    Publish Date: 2023
  • Suggested Reference: Muhammad Hasban Pervez, Mert Ilhan Ecevit, Najiba Zainab Naqvi, Reiner Creutzburg, Hasan Dag, "Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities," 2023 8th International Conference on Computer Science and Engineering (UBMK), Turkiye, pp. 438-443.
    DOI: https://doi.org/10.1109/UBMK59864.2023.10286573
    Publish Date: 2023
  • Suggested Reference: Nazneen Mansoor, Klaus Schwarz, Reiner Creutzburg, "Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan" in Electronic Imaging, 2023, pp 354-1 - 354-14.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-354
    Publish Date: 2023
  • Suggested Reference: Artem Sklyar, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis" in Electronic Imaging, 2023, pp 355-1 - 355-15.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-355
    Publish Date: 2023
  • Suggested Reference: Valeria Vishnevskaya, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation - Similarity calculation using Reddit user profile data" in Electronic Imaging, 2023, pp 356-1 - 356-10.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-356
    Publish Date: 2023
  • Suggested Reference: M. Gjorgjievska Perusheska, V. Dimitrova: “Application of Machine Learning in Intrusion Detection Systems”. SAI 2023. Springer, Cham. pp. 97-105.
    DOI: https://doi.org/10.1007/978-3-031-37717-4_86
    Publish Date: 2023