ibrahim Sogukpinar
ibrahim Sogukpinar
Computer Engineering Professor, Gebze Institute of Technology
Verified email at
Cited by
Cited by
ISRAM: information security risk analysis method
B Karabacak, I Sogukpinar
Computers & Security 24 (2), 147-159, 2005
Analysis and comparison of image encryption algorithms
I Ozturk, I Sogukpinar
International Journal of Information Technology 1 (2), 108-111, 2004
SIP authentication scheme using ECDH
A Durlanik, I Sogukpinar
World Enformatika Soc Trans Eng Comput Technol 8, 350-353, 2005
Understanding users' keystroke patterns for computer access security
A Guven, I Sogukpinar
Computers & Security 22 (8), 695-706, 2003
A quantitative method for ISO 17799 gap analysis
B Karabacak, I Sogukpinar
Computers & security 25 (6), 413-419, 2006
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
Scalable risk assessment method for cloud computing using game theory (CCRAM)
E Furuncu, I Sogukpinar
Computer Standards & Interfaces 38, 44-50, 2015
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal 58 (10), 2608-2621, 2015
Kxknn: K-means ve k en yakin komşu yöntemleri ile ağlarda nüfuz tespiti
SK Çalışkan, İ Soğukpınar
EMO Yayınları, 120-24, 2008
Sliding window and control flow weight for metamorphic malware detection
S Alam, I Sogukpinar, I Traore, R Nigel Horspool
Journal of Computer Virology and Hacking Techniques 11 (2), 75-88, 2015
Droidclone: Detecting android malware variants by exposing code clones
S Alam, R Riley, I Sogukpinar, N Carkaci
2016 Sixth International Conference on Digital Information and Communication …, 2016
An android malware detection architecture based on ensemble learning
M Ozdemir, I Sogukpinar
Transactions on Machine Learning and Artificial Intelligence 2 (3), 90-106, 2014
Analysis and evaluation of dynamic feature-based malware detection methods
AG Kakisim, M Nar, N Carkaci, I Sogukpinar
International Conference on Security for Information Technology and …, 2018
Polymorphic worm detection using token-pair signatures
B Bayoglu, I Sogukpinar
Proceedings of the 4th international workshop on Security, privacy and trust …, 2008
Centroid-based language identification using letter feature set
H Takcı, İ Soğukpınar
International Conference on Intelligent Text Processing and Computational …, 2004
In-cloud malware analysis and detection: State of the art
S Alam, I Sogukpinar, I Traore, Y Coady
Proceedings of the 7th International Conference on Security of Information …, 2014
Graph based signature classes for detecting polymorphic worms via content analysis
B Bayoğlu, İ Soğukpınar
Computer Networks 56 (2), 832-844, 2012
Letter based text scoring method for language identification
H Takcı, İ Soğukpınar
International Conference on Advances in Information Systems, 283-290, 2004
BioPSTM: a formal model for privacy, security, and trust in template‐protecting biometric authentication
A Kanak, I Sogukpinar
Security and Communication Networks 7 (1), 123-138, 2014
BioTAM: a technology acceptance model for biometric authentication systems
A Kanak, I Sogukpinar
IET Biometrics 6 (6), 457-467, 2017
The system can't perform the operation now. Try again later.
Articles 1–20