default search action
Ibrahim Sogukpinar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Sibel Gülmez, Arzu Gorgulu Kakisim, Ibrahim Sogukpinar:
XRan: Explainable deep learning-based ransomware detection using dynamic analysis. Comput. Secur. 139: 103703 (2024) - 2023
- [c23]Seydanur Ahi Duman, Rukiye Hayran, Ibrahim Sogukpinar:
Impact Analysis and Performance Model of Social Engineering Techniques. ISDFS 2023: 1-6 - [c22]Sibel Gülmez, Arzu Gorgulu Kakisim, Ibrahim Sogukpinar:
Analysis of the Dynamic Features on Ransomware Detection Using Deep Learning-based Methods. ISDFS 2023: 1-6 - 2022
- [j14]Arzu Gorgulu Kakisim, Sibel Gülmez, Ibrahim Sogukpinar:
Sequential opcode embedding-based malware detection method. Comput. Electr. Eng. 98: 107703 (2022) - 2021
- [j13]Shahid Alam, Ibrahim Sogukpinar:
DroidClone: Attack of the android malware clones - a step towards stopping them. Comput. Sci. Inf. Syst. 18(1): 67-91 (2021) - [c21]Sibel Gülmez, Ibrahim Sogukpinar:
Graph-Based Malware Detection Using Opcode Sequences. ISDFS 2021: 1-5 - [c20]Salih Yesir, Ibrahim Sogukpinar:
Malware Detection and Classification Using fastText and BERT. ISDFS 2021: 1-6 - 2020
- [j12]Arzu Gorgulu Kakisim, Mert Nar, Ibrahim Sogukpinar:
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs. Comput. Stand. Interfaces 71: 103443 (2020)
2010 – 2019
- 2019
- [j11]Arzu Gorgulu Kakisim, Ibrahim Sogukpinar:
Unsupervised binary feature construction method for networked data. Expert Syst. Appl. 121: 256-265 (2019) - [c19]Serafettin Sentürk, Hasan Yasar, Ibrahim Sogukpinar:
Model Driven Security in a Mobile Banking Application Context. ARES 2019: 62:1-62:7 - 2018
- [c18]Arzu Gorgulu Kakisim, Mert Nar, Necmettin Carkaci, Ibrahim Sogukpinar:
Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods. SecITC 2018: 247-258 - 2017
- [j10]Alper Kanak, Ibrahim Sogukpinar:
BioTAM: a technology acceptance model for biometric authentication systems. IET Biom. 6(6): 457-467 (2017) - 2016
- [c17]Shahid Alam, Ryan D. Riley, Ibrahim Sogukpinar, Necmeddin Carkaci:
DroidClone: Detecting android malware variants by exposing code clones. DICTAP 2016: 79-84 - [c16]Necmettin Carkaci, Ibrahim Sogukpinar:
Frequency based metamorphic malware detection. SIU 2016: 421-424 - [c15]Arzu Kakisim, Yavuz Oguz Ipek, Ibrahim Sogukpinar:
Suspect and popular tag detection model for social media. SIU 2016: 893-896 - 2015
- [j9]Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Annotated Control Flow Graph for Metamorphic Malware Detection. Comput. J. 58(10): 2608-2621 (2015) - [j8]Shahid Alam, R. Nigel Horspool, Issa Traoré, Ibrahim Sogukpinar:
A framework for metamorphic malware analysis and real-time detection. Comput. Secur. 48: 212-233 (2015) - [j7]Evrim Furuncu, Ibrahim Sogukpinar:
Scalable risk assessment method for cloud computing using game theory (CCRAM). Comput. Stand. Interfaces 38: 44-50 (2015) - [j6]Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, R. Nigel Horspool:
Sliding window and control flow weight for metamorphic malware detection. J. Comput. Virol. Hacking Tech. 11(2): 75-88 (2015) - [c14]Arzu Kakisim, Ibrahim Sogukpinar:
Community detection in social networks using content and link analysis. SIU 2015: 1521-1524 - 2014
- [j5]Alper Kanak, Ibrahim Sogukpinar:
BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. Secur. Commun. Networks 7(1): 123-138 (2014) - [c13]Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Current Trends and the Future of Metamorphic Malware Detection. SIN 2014: 411 - [c12]Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady:
In-Cloud Malware Analysis and Detection: State of the Art. SIN 2014: 473 - 2012
- [j4]Burak Bayoglu, Ibrahim Sogukpinar:
Graph based signature classes for detecting polymorphic worms via content analysis. Comput. Networks 56(2): 832-844 (2012) - 2010
- [c11]Alper Ugur, Ibrahim Sogukpinar:
An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations. WiMo 2010: 398-408
2000 – 2009
- 2009
- [c10]Alper Kanak, Ibrahim Sogukpinar:
Classification Based Revocable Biometric Identity Code Generation. COST 2101/2102 Conference 2009: 276-284 - [c9]Alper Ugur, Ibrahim Sogukpinar:
A Framework for Licensed Digital Signatures. NetCoM 2009: 428-432 - [c8]Turker Akyuz, Ibrahim Sogukpinar:
Packet Marking with Distance Based Probabilities for IP Traceback. NetCoM 2009: 433-438 - [c7]Mucahit Mutlugun, Ibrahim Sogukpinar:
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics. SECURWARE 2009: 93-98 - 2007
- [c6]Alper Kanak, Ibrahim Sogukpinar:
Fingerprint Hardening with Randomly Selected Chaff Minutiae. CAIP 2007: 383-390 - 2006
- [j3]Bilge Karabacak, Ibrahim Sogukpinar:
A quantitative method for ISO 17799 gap analysis. Comput. Secur. 25(6): 413-419 (2006) - [c5]Mucahit Mutlugun, Ibrahim Sogukpinar:
Security Architecture for Web-based Health Insurance Systems. ICSNC 2006: 24 - 2005
- [j2]Bilge Karabacak, Ibrahim Sogukpinar:
ISRAM: information security risk analysis method. Comput. Secur. 24(2): 147-159 (2005) - [c4]Turker Akyuz, Ibrahim Sogukpinar:
INVUS: INtelligent VUlnerability Scanner. Communications and Multimedia Security 2005: 264-265 - 2004
- [c3]Hidayet Takçi, Ibrahim Sogukpinar:
Letter Based Text Scoring Method for Language Identification. ADVIS 2004: 283-290 - [c2]Hidayet Takçi, Ibrahim Sogukpinar:
Centroid-Based Language Identification Using Letter Feature Set. CICLing 2004: 640-648 - 2003
- [j1]Aykut Güven, Ibrahim Sogukpinar:
Understanding users' keystroke patterns for computer access security. Comput. Secur. 22(8): 695-706 (2003) - [c1]Mehmet Ercan Kuruoglu, Ibrahim Sogukpinar:
Low Cost and Trusted Electronic Purse System Design. ISCIS 2003: 131-138
1990 – 1999
- 1995
- [b1]Ibrahim Sogukpinar:
Sınır çizgilerini uyuşturma yöntemi ile yerleştirme (Part nesting using contour matching). İstanbul Technical University, Turkey, 1995
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint