Browsing by Author "Dag, H."
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Article Citation - Scopus: 1Algorithm for Key Transparency With Transparent Logs(F1000 Research Ltd, 2024) Mollakuqe, E.; Rexhepi, S.; Bunjaku, R.; Dag, H.; Chukwu, I.J.Background: Cryptography plays a crucial role in securing digital communications and data storage. This study evaluates the Transparent Key Management Algorithm utilizing Merkle trees, focusing on its performance and security effectiveness in cryptographic key handling. Methods: The research employs simulated experiments to systematically measure and analyze key operational metrics such as insertion and verification times. Synthetic datasets are used to mimic diverse operational conditions, ensuring rigorous evaluation under varying workloads and security threats. Implementation is carried out using R programming, integrating cryptographic functions and Merkle tree structures for integrity verification. Results: Performance analysis reveals efficient insertion and verification times under normal conditions, essential for operational workflows. Security evaluations demonstrate the algorithm's robustness against tampering, with approximately 95% of keys verified successfully and effective detection of unauthorized modifications. Simulated attack scenarios underscore its resilience in mitigating security threats. Conclusions: The Transparent Key Management Algorithm, enhanced by Merkle trees and cryptographic hashing techniques, proves effective in ensuring data integrity, security, and operational efficiency. Recommendations include continuous monitoring and adaptive algorithms to bolster resilience against evolving cybersecurity challenges, promoting trust and reliability in cryptographic operations. Copyright: © 2024 Mollakuqe E et al.Conference Object Citation - Scopus: 3Benchmark Static Api Call Datasets for Malware Family Classification(Institute of Electrical and Electronics Engineers Inc., 2022) Gencaydin, B.; Demirkıran, Ferhat; Kahya, C.N.; Demirkiran, F.; Duzgun, B.; Cayir, A.; Dag, H.; Management Information SystemsNowadays, malware and malware incidents are increasing daily, even with various antivirus systems and malware detection or classification methodologies. Machine learning techniques have been the main focus of the security experts to detect malware and determine their families. Many static, dynamic, and hybrid techniques have been presented for that purpose. In this study, the static analysis technique has been applied to malware samples to extract API calls, which is one of the most used features in machine/deep learning models as it represents the behavior of malware samples. Since the rapid increase and continuous evolution of malware affect the detection capacity of antivirus scanners, recent and updated datasets of malicious software became necessary to overcome this drawback. This paper introduces two new datasets: One with 14,616 samples obtained and compiled from VirusShare and one with 9,795 samples from VirusSample. In addition, benchmark results based on static API calls of malware samples are presented using several machine and deep learning models on these datasets. We believe that these two datasets and benchmark results enable researchers to test and validate their methods and approaches in this field. © 2022 IEEE.Conference Object Citation - Scopus: 0Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era(Springer Science and Business Media Deutschland GmbH, 2025) Mollakuqe, E.; Dimitrova, V.; Dag, H.; Atanasovski, S.This research paper delves into the intricacies of network access and communication, logging, and auditing practices within the contexts of public and private institutions. Network access and communication are vital components of information security, encompassing elements such as access controls, authentication, encryption, and network management. The study explores how institutions manage network access and communication to mitigate unauthorized access and ensure data integrity. Through a series of questions and features, we analyze the varying requirements and restrictions imposed on network accessibility, emphasizing the importance of tailored security measures. Additionally, the paper investigates the logging and auditing mechanisms employed by these institutions. Logging involves recording events within systems or networks, while auditing entails reviewing these logs for compliance and anomaly detection. A comparative analysis reveals similarities and differences in how public and private institutions handle sensitive data, link actions to users, and log successful or unsuccessful accesses. Furthermore, it explores the retention periods for logs, critical for compliance, auditing, and security. The research also highlights the significance of business continuity and disaster recovery plans in both sectors, ensuring data restoration and operational resilience during emergencies. By shedding light on the practices and policies in place, this paper offers valuable insights into the strategies employed by institutions to fortify their information security, resilience, and regulatory compliance in the digital age. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.Conference Object Citation - Scopus: 1Reviewing the Effects of Spatial Features on Price Prediction for Real Estate Market: Istanbul Case(Institute of Electrical and Electronics Engineers Inc., 2022) Ecevit, M.I.; Ecevit, Mert İlhan; Erdem, Z.; Dag, H.; Management Information SystemsIn the real estate market, spatial features play a crucial role in determining property appraisals and prices. When spatial features are considered, classification techniques have been rarely studied compared to regression, which is commonly used for price prediction. This study reviews spatial features' effects on predicting the house price ranges for real estate in Istanbul, Turkey, in the classification context. Spatial features are generated and extracted by geocoding the address information from the original data set. This geocoding and feature extraction is another challenge in this research. The experiments compare the performance of Decision Trees (DT), Random Forests (RF), and Logistic Regression (LR) classifier models on the data set with and without spatial features. The prediction models are evaluated based on classification metrics such as accuracy, precision, recall, and F1-Score. We additionally examine the ROC curve of each classifier. The test results show that the RF model outperforms the DT and LR models. It is observed that spatial features, when incorporated with non-spatial features, significantly improve the prediction performance of the models for the house price ranges. It is considered that the results can contribute to making decisions more accurately for the appraisal in the real estate industry. © 2022 IEEE.Conference Object Citation - Scopus: 0Towards Better Energy Efficiency Through Coil-Based Electricity Consumption Forecasting in Steel Manufacturing(Institute of Electrical and Electronics Engineers Inc., 2024) Koca, A.; Erdem, Z.; Dag, H.Forecasting electricity consumption with the possibly-highest accuracy is crucial for cost optimization, operational efficiency, competitiveness, contract negotiation, and achieving the global goals of sustainable development in steel manufacturing. This study focuses on identifying the most appropriate prediction algorithm for coil-based electricity consumption and the most effective implementation purposes in a steel company. Random Forest, Gradient-Boosted Trees, and Deep Neural Networks are preferred because they are suitable for the given problem and widely used for forecasting. The performance of the prediction models is evaluated based on the root mean squared error (RMSE) and the coefficient of determination (R-squared). Experiments show that the Random Forest model outperforms the Gradient-Boosted Trees and Deep Neural Network models. The results will provide benefits for many different purposes. Firstly, during contract negotiations, it will enable us to gain a competitive advantage when purchasing electricity in the day-ahead market. Secondly, in the production scheduling phase, the ones with the highest electricity consumption will be produced during the hours when there is the least demand at the most affordable prices. Finally, when prioritizing sales orders, the use of the existing capacity for orders with lower energy intensity or a higher profit margin will be ensured. © 2024 IEEE.