ibrahim Sogukpinar
ibrahim Sogukpinar
Other namesİbrahim Sogukpınar
Computer Engineering Professor, Gebze Institute of Technology
Verified email at
Cited by
Cited by
ISRAM: information security risk analysis method
B Karabacak, I Sogukpinar
Computers & Security 24 (2), 147-159, 2005
Analysis and comparison of image encryption algorithms
I Ozturk, I Sogukpinar
International Journal of Information Technology 1 (2), 108-111, 2004
SIP authentication scheme using ECDH
A Durlanik, I Sogukpinar
World Enformatika Soc Trans Eng Comput Technol 8, 350-353, 2005
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
Understanding users' keystroke patterns for computer access security
A Guven, I Sogukpinar
Computers & Security 22 (8), 695-706, 2003
A quantitative method for ISO 17799 gap analysis
B Karabacak, I Sogukpinar
Computers & security 25 (6), 413-419, 2006
Scalable risk assessment method for cloud computing using game theory (CCRAM)
E Furuncu, I Sogukpinar
Computer Standards & Interfaces 38, 44-50, 2015
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal 58 (10), 2608-2621, 2015
Analysis and evaluation of dynamic feature-based malware detection methods
AG Kakisim, M Nar, N Carkaci, I Sogukpinar
Innovative Security Solutions for Information Technology and Communications …, 2019
Kxknn: K-means ve k en yakin komşu yöntemleri ile ağlarda nüfuz tespiti
SK Çalışkan, İ Soğukpınar
EMO Yayınları, 120-24, 2008
Metamorphic malware identification using engine-specific patterns based on co-opcode graphs
AG Kakisim, M Nar, I Sogukpinar
Computer Standards & Interfaces 71, 103443, 2020
Droidclone: Detecting android malware variants by exposing code clones
S Alam, R Riley, I Sogukpinar, N Carkaci
2016 sixth international conference on digital information and communication …, 2016
An android malware detection architecture based on ensemble learning
M Ozdemir, I Sogukpinar
Transactions on Machine Learning and Artificial Intelligence 2 (3), 90-106, 2014
Sliding window and control flow weight for metamorphic malware detection
S Alam, I Sogukpinar, I Traore, R Nigel Horspool
Journal of Computer Virology and Hacking Techniques 11, 75-88, 2015
Graph based signature classes for detecting polymorphic worms via content analysis
B Bayoğlu, İ Soğukpınar
Computer Networks 56 (2), 832-844, 2012
Centroid-based language identification using letter feature set
H Takcı, İ Soğukpınar
Computational Linguistics and Intelligent Text Processing: 5th International …, 2004
Analysis and comparison of disassemblers for opcode based malware analysis
M Nar, AG Kakisim, MN Yavuz, İ Soğukpinar
2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019
Polymorphic worm detection using token-pair signatures
B Bayoglu, I Sogukpinar
Proceedings of the 4th international workshop on Security, privacy and trust …, 2008
BioTAM: a technology acceptance model for biometric authentication systems
A Kanak, I Sogukpinar
IET Biometrics 6 (6), 457-467, 2017
In-cloud malware analysis and detection: State of the art
S Alam, I Sogukpinar, I Traore, Y Coady
Proceedings of the 7th International Conference on Security of Information …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20