Publications Associated with the CyberMACS Programme

Publication Name Suggested Reference DOI Publish Date
Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection
Mahnoor Jamil, Reiner Creutzburg, Mehmet Nafiz Aydin (2024). Enhancing Critical Infrastructure Cybersecurity: Leveraging AI-Based Solutions for Threat Detection. International Conference on Theoretical and Applied Computing (ICTAC).

2024

The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility
Mert İlhan Ecevit, Muhammad Hasban Pervez, Reiner Creutzburg & Hasan Dağ (2024). The Open-Source Intelligence (OSINT) in the Electricity Sector - Balancing Utility and Responsibility. Electronic Imaging, 2024

2024

A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models
Heidari, A., Navimipour, N. J., Dag, H., Talebi, S., & Unal, M. (2024). A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models. Cognitive Computation, 1-19.

2024

Phishing Website Detection through Multi-Model Analysis of HTML Content

Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ & Reiner Creutzburg (2024). Phishing Website Detection through Multi-Model Analysis of HTML Content. International Conference on Theoretical and Applied Computing (ICTAC).

2024

SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations

Furkan Çolhak, Mert İlhan Ecevit, Hasan Dağ & Reiner Creutzburg (2024). SecureReg: A Combined Framework for Proactively Exposing Malicious Domain Name Registrations. arXiv preprint arXiv:2401.03196.

2024

Open-source Intelligence (OSINT) investigation in Facebook
Pranesh Kumar Narasimhan, Chinmay Bhosale, Muhammad Hasban Pervez, Najiba Zainab Naqvi, Mert Ilhan Ecevit, Klaus Schwarz, Reiner Creutzburg, "Open-source Intelligence (OSINT) investigation in Facebook" in Electronic Imaging, 2023, pp 357-1 - 357-12
2023
Deepfake detection using deep learning methods: A systematic and comprehensive review
Heidari, A., Jafari Navimipour, N., Dag, H., & Unal, M. (2023). Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1520.
2023
Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities
Muhammad Hasban Pervez, Mert Ilhan Ecevit, Najiba Zainab Naqvi, Reiner Creutzburg and Hasan Dag, "Towards Better Cyber Security Consciousness: The Ease and Danger of OSINT Tools in Exposing Critical Infrastructure Vulnerabilities," 2023 8th International Conference on Computer Science and Engineering (UBMK), Burdur, Turkiye, 2023, pp. 438-443
2023
Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan
Nazneen Mansoor, Klaus Schwarz, Reiner Creutzburg, "Importance of OSINT/SOCMINT for modern disaster management evaluation - Australia, Haiti, Japan" in Electronic Imaging, 2023, pp 354-1 - 354-14
2023
Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis
Artem Sklyar, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation in Twitter utilizing AI-based aggressiveness analysis" in Electronic Imaging, 2023, pp 355-1 - 355-15
2023
Practical OSINT investigation - Similarity calculation using Reddit user profile data
Valeria Vishnevskaya, Klaus Schwarz, Reiner Creutzburg, "Practical OSINT investigation - Similarity calculation using Reddit user profile data" in Electronic Imaging, 2023, pp 356-1 - 356-10
2023
Application of Machine Learning in Intrusion Detection Systems
M. Gjorgjievska Perusheska, V. Dimitrova: “Application of Machine Learning in Intrusion Detection Systems”. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 711. Springer, Cham. pp. 97-105
2023
Applications of Quasigroups in Cryptography and Coding Theory
S. Markovski, V. Bakeva, V. Dimitrova, A. Mileva, A. Popovska-Mitrovikj, H. Mihajloska Trpcheska: “Applications of Quasigroups in Cryptography and Coding Theory”. In: Hounkonnou, M.N., Mitrović, M., Abbas, M., Khan, M. (eds) Algebra without Borders – Classical and Constructive Nonassociative Algebraic Structures. STEAM-H: Science, Technology, Engineering, Agriculture, Mathematics & Health. Springer, Cham. pp. 419-490
2023
Data Protection by Defining the Necessary Controls to Reduce the Risk of Unauthorized Access to Sensitive Data
E. Mollakuqe, V. Dimitrova: “Data Protection by Defining the Necessary Controls to Reduce the Risk of Unauthorized Access to Sensitive Data”, Conference paper, 2023, Published at: 13th International Conference on Information Society and Technology - ICIST digital repository, ICIST 2023, Volume 2023, Kopaonik, February 2023, pp. 11-15
-
2023
Assessing the State of Digital Security in North Macedonia: a Study of Readiness, Capacity and Threats
S. Atanasovski, M. Mihajlovska, E. Mollakuqe, A. Popovska-Mitrovikj, V. Dimitrova: “Assessing the State of Digital Security in North Macedonia: a Study of Readiness, Capacity and Threats”, 20th International Conference on Informatics and Information Technologies - CIIT 2023, http:// ciit.finki.ukim.mk/, Publisher: Ss Cyril and Methodius University in Skopje, Faculty of Computer Science and Engineering, Republic of North Macedonia, July 2023, pp.118-122
-
2023
Android vs IOS Phone Forensics: Tools and Techniques
M. Dodevska, V. Dimitrova, J. Dobreva, E. Mollakuqe: “Android vs IOS Phone Forensics: Tools and Techniques”, 13th International Conference on Information Society and Technology - ICIST digital repository, ICIST 2023, Volume 2023, Kopaonik, pp. 65-74
-
2023
Detecting Malware in Android Applications using XGBoost
A. Kitanovski, H. Mihajloska Trpcheska, V. Dimitrova: “Detecting Malware in Android Applications using XGBoost”, 20th International Conference on Informatics and Information Technologies - CIIT 2023, http:// ciit.finki.ukim.mk/, Publisher: Ss Cyril and Methodius University in Skopje, Faculty of Computer Science and Engineering, Republic of North Macedonia, July 2023, pp. 43-46
-
2023
Analysis of Cyberattacks in the Western Balkans Countries - with a Focus on the Treatment of Policy Violations and Strategies that States Use to Protect Against Attacks – Review
E. Mollakuqe, V. Dimitrova, A. Popovska-Mitrovikj: “Analysis of Cyberattacks in the Western Balkans Countries - with a Focus on the Treatment of Policy Violations and Strategies that States Use to Protect Against Attacks – Review”, Fourrages Journal, Volume 9
-
2023
Comparative Analysis of Identity Management, Access Control, and Authorization Practices in Public and Private Universities
E. Mollakuqe, V. Dimitrova: ”Comparative Analysis of Identity Management, Access Control, and Authorization Practices in Public and Private Universities”, Journal: https://open-research-europe.ec.europa.eu/
-
2023
Data Security Analysis Based on Data Classification According to Data Sensitivity. Case Study: Data on Public and Private Universities in the Republic of Kosovo
E. Mollakuqe, V. Dimitrova: “Data Security Analysis Based on Data Classification According to Data Sensitivity. Case Study: Data on Public and Private Universities in the Republic of Kosovo”, Selcuk University Journal of Engineering Sciences (SUJES), https://sujes.selcuk.edu.tr/
-
2023
StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images
I. Tasevski, V. Nikolovska, A. Petrova, J. Dobreva, A. Popovska-Mitrovikj, V. Dimitrova: “StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images”, In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2. FTC 2022. Lecture Notes in Networks and Systems, vol 560. Springer, Cham. pp. 467-485
2022
StegIm: Image in Image Steganography
I. Tasevski, J. Dobreva, S. Andonov, H. Mihajloska, A. Popovska-Mitrovikj, V. Dimitrova: “StegIm: Image in Image Steganography”. In: Zdravkova, K., Basnarkov, L. (eds) ICT Innovations 2022. Reshaping the Future Towards a New Normal. ICT Innovations 2022. Communications in Computer and Information Science, vol 1740. Springer, Cham. pp. 13-25
2022
Data Classification Based on Sensitivity in Public and Private Enterprises
E. Mollakuqe, V. Dimitrova, A. Popovska-Mitrovikj: “Data Classification Based on Sensitivity in Public and Private Enterprises”, ICT Innovations 2022, Web Proceedings, pp. 192-200
-
2022
Data Security Analysis Based on Data Classification According to Data Sensitivity. Case Study: Data on Public and Private Universities in the Republic of Kosovo
E. Mollakuqe, V. Dimitrova: “Data Security Analysis Based on Data Classification According to Data Sensitivity. Case Study: Data on Public and Private Universities in the Republic of Kosovo”, ICENTE22, pp.168-170
-
2022