ibrahim Sogukpinar
ibrahim Sogukpinar
Computer Engineering Professor, Gebze Institute of Technology
Verified email at bilmuh.gyte.edu.tr
Title
Cited by
Cited by
Year
ISRAM: information security risk analysis method
B Karabacak, I Sogukpinar
Computers & Security 24 (2), 147-159, 2005
3242005
Analysis and comparison of image encryption algorithms
I Ozturk, I Sogukpinar
International Journal of Information Technology 1 (2), 108-111, 2004
1352004
SIP authentication scheme using ECDH
A Durlanik, I Sogukpinar
World Enformatika Soc Trans Eng Comput Technol 8, 350-353, 2005
1242005
Understanding users' keystroke patterns for computer access security
A Guven, I Sogukpinar
Computers & Security 22 (8), 695-706, 2003
872003
A quantitative method for ISO 17799 gap analysis
B Karabacak, I Sogukpinar
Computers & security 25 (6), 413-419, 2006
682006
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
602015
Scalable risk assessment method for cloud computing using game theory (CCRAM)
E Furuncu, I Sogukpinar
Computer Standards & Interfaces 38, 44-50, 2015
422015
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal 58 (10), 2608-2621, 2015
322015
KxKNN: K-Means ve K En Yakin Komşu Yöntemleri İle Ağlarda Nüfuz Tespiti
SK Çalışkan, İ Soğukpınar
EMO Yayınları, 120-24, 2008
282008
An android malware detection architecture based on ensemble learning
M Ozdemir, I Sogukpinar
Transactions on Machine Learning and Artificial Intelligence 2 (3), 90-106, 2014
262014
Sliding window and control flow weight for metamorphic malware detection
S Alam, I Sogukpinar, I Traore, RN Horspool
Journal of Computer Virology and Hacking Techniques 11 (2), 75-88, 2015
242015
Polymorphic worm detection using token-pair signatures
B Bayoglu, I Sogukpinar
Proceedings of the 4th international workshop on Security, privacy and trust …, 2008
232008
Centroid-based language identification using letter feature set
H Takcı, İ Soğukpınar
International Conference on Intelligent Text Processing and Computational …, 2004
212004
Graph based signature classes for detecting polymorphic worms via content analysis
B Bayoğlu, İ Soğukpınar
Computer Networks 56 (2), 832-844, 2012
192012
Analysis and evaluation of dynamic feature-based malware detection methods
AG Kakisim, M Nar, N Carkaci, I Sogukpinar
International Conference on Security for Information Technology and …, 2018
172018
Droidclone: Detecting android malware variants by exposing code clones
S Alam, R Riley, I Sogukpinar, N Carkaci
2016 Sixth International Conference on Digital Information and Communication …, 2016
172016
In-cloud malware analysis and detection: State of the art
S Alam, I Sogukpinar, I Traore, Y Coady
Proceedings of the 7th International Conference on Security of Information …, 2014
152014
BioPSTM: a formal model for privacy, security, and trust in template‐protecting biometric authentication
A Kanak, I Sogukpinar
Security and Communication Networks 7 (1), 123-138, 2014
132014
Packet marking with distance based probabilities for IP traceback
T Akyuz, I Sogukpinar
2009 First International Conference on Networks & Communications, 433-438, 2009
132009
Letter based text scoring method for language identification
H Takcı, İ Soğukpınar
International Conference on Advances in Information Systems, 283-290, 2004
132004
The system can't perform the operation now. Try again later.
Articles 1–20