Publications Associated with the CyberMACS Programme

Submitted

  • Author(s): Edra Tabaku, Resul Bedii Gümüş, and Klesida Gjana
    Publication Name: The Socioeconomic Aspect of Cybercrime Victimization
    Submitted to: Journal of Cyber Security and Mobility
    Submission Date: March 13, 2024
  • Author(s): Ibrahim Isiaq Bolaji, Lydiah Muigwa
    Publication Name: Blockchain in Digital Forensics: A Case Study of Pig Butchering Scam in Nigeria
    Submitted to: Digital Forensic Research Workshops (Dfrws Usa 2024)
    Submission Date: January 25, 2024
  • Author(s):Nakić, D, Atabey, B.A., Poudel, N.
    Publication Name: The Psychology Behind Cyber Threat Intelligence: Examining Models and Their Application Across Time
    Submitted to: European Interdisciplinary Cybersecurity Conference - EICC 2024
    Submission Date: January 11, 2024
  • Author(s):Helmi Hibatullah, E. Fatih Yetkin, Tuğçe Ballı
    Publication Name: Verbal harassment detection in online games using machine learning methods
    Submitted to: Entertainment Computing
    Submission Date:
  • Author(s):Ikechukwhu Chukwu, E. Fatih Yetkin, Tuğçe Ballı
    Publication Name: Towards authenticating encryption using adverserial neural networks
    Submitted to: Journal of Information Security and Applications
    Submission Date:

Accepted

  • Author(s): Elissa Mollakuqe, Vesna Dimitrova, Hasan Dag, and Simon Atanasovski
    Publication Name: Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era
    Submitted to: 16th ICT Innovation Conference
    Acceptance Date: 16 August 2024
  • Author(s):John Ikechukwu, Azizakhon Toshpulatova, Elissa Mollakuqe, Ibrahim Isiaq Bolaji, Jose Luis Cano, Patrick Udeckukwu, and Hasan Dag
    Publication Name: Integrating Cryptographic Techniques to Protect AI Systems and Data
    Submitted to: 16th ICT Innovation Conference
    Acceptance Date: 16 August 2024

Published

  • Publication Name:Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity.
    Suggested Reference:Jose Luis Cano Garcia, Izuchukwu Patrick Udechukwu, Isiaq Bolaji Ibrahim, Ikechukwu John Chukwu, Hasan Dag, Vesna Dimitrova and Elissa Mollakuqe (2024). Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity. In the 13th Mediterranean Conference on Embedded Computing Conference.
    Publish Date: 2024
  • Publication Name: Improving COVID-19 detection: leveraging convolutional neural networks in chest X-ray imaging
    Suggested Reference: Jamil, M., Chukwu, I. J., & Creutzburg, R. (2024). Improving COVID-19 detection: leveraging convolutional neural networks in chest X-ray imaging. In Proceedings of SPIE 13033, SPIE Commercial Sensing and Defense Conference, 130330S.
    DOI: https://doi.org/10.1117/12.3028812
    Publish Date: 2024
  • Publication Name: Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection
    Suggested Reference: Mahnoor Jamil, Reiner Creutzburg, Mehmet Nafiz Aydin (2024). Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection. International Conference on Theoretical and Applied Computing (ICTAC).
    DOI: -
    Publish Date: 2024
  • Publication Name: The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility
    Suggested Reference:Mert İlhan Ecevit, Muhammad Hasban Pervez, Reiner Creutzburg, Hasan Dağ (2024). The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility. Electronic Imaging, 2024.
    DOI: https://doi.org/10.2352/EI.2024.36.3.MOBMU-318
    Publish Date: 2024
  • Publication Name: A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models
    Suggested Reference: Heidari, A., Navimipour, N. J.,Dag, H., Talebi, S., & Unal, M. (2024). A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models. Cognitive Computation, 1-19.
    DOI: https://doi.org/10.1007/s12559-024-10255-7
    Publish Date: 2024
  • Publication Name: Phishing Website Detection through Multi-Model Analysis of HTML Content
    Suggested Reference:Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ, Reiner Creutzburg (2024). Phishing Website Detection through Multi-Model Analysis of HTML Content. International Conference on Theoretical and Applied Computing (ICTAC).
    DOI: https://doi.org/10.48550/arXiv.2401.04820
    Publish Date: 2024
  • Publication Name: SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations
    Suggested Reference:Furkan Çolhak, Mert İlhan Ecevit,Hasan Dağ, Reiner Creutzburg (2024). SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations. arXiv preprint arXiv:2401.03196.
    DOI: https://doi.org/10.48550/arXiv.2401.03196
    Publish Date: 2024
  • Publication Name: Open-source Intelligence (OSINT) investigation in Facebook
    Suggested Reference: Pranesh Kumar Narasimhan, Chinmay Bhosale, Muhammad Hasban Pervez, Najiba Zainab Naqvi, Mert Ilhan Ecevit, Klaus Schwarz,Reiner Creutzburg, "Open-source Intelligence (OSINT) investigation in Facebook" in Electronic Imaging, 2023, pp 357-1 - 357-12
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-357
    Publish Date: 2023
  • Publication Name: Deepfake detection using deep learning methods: A systematic and comprehensive review
    Suggested Reference: Heidari, A., Jafari Navimipour, N., Dag, H., & Unal, M. (2023). Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1520.
    DOI: https://doi.org/10.1002/widm.1520
    Publish Date: 2023
  • Publication Name: Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities
    Suggested Reference: Muhammad Hasban Pervez, Mert Ilhan Ecevit, Najiba Zainab Naqvi, Reiner Creutzburg, Hasan Dag, "Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities," 2023 8th International Conference on Computer Science and Engineering (UBMK), Burdur, Turkiye, 2023, pp. 438-443.
    DOI: https://doi.org/10.1109/UBMK59864.2023.10286573
    Publish Date: 2023
  • Publication Name: Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan
    Suggested Reference: Nazneen Mansoor, Klaus Schwarz, Reiner Creutzburg, "Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan" in Electronic Imaging, 2023, pp 354-1 - 354-14.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-354
    Publish Date: 2023
  • Publication Name: Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis
    Suggested Reference: Artem Sklyar, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis" in Electronic Imaging, 2023, pp 355-1 - 355-15.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-355
    Publish Date: 2023
  • Publication Name: Practical OSINT investigation - Similarity calculation using Reddit user profile data
    Suggested Reference: Valeria Vishnevskaya, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation - Similarity calculation using Reddit user profile data" in Electronic Imaging, 2023, pp 356-1 - 356-10.
    DOI: https://doi.org/10.2352/EI.2023.35.3.MOBMU-356
    Publish Date: 2023
  • Publication Name: Application of Machine Learning in Intrusion Detection Systems
    Suggested Reference: M. Gjorgjievska Perusheska, V. Dimitrova: “Application of Machine Learning in Intrusion Detection Systems”. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 711. Springer, Cham. pp. 97-105.
    DOI: https://doi.org/10.1007/978-3-031-37717-4_86
    Publish Date: 2023