Yazar "Dinler, Ozlem Batur" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Cloud computing and 5G challenges and open issues(Intelektual Pustaka Media Utama, 2022) Ullah, Arif; Aznaoui, Hanane; Şahin, Canan Batur; Sadie, Mahanz; Dinler, Ozlem Batur; Imane, LaassarThe obtainable fourth-generation technology (4G) networks have been extensively used in the cloud application and are constantly evolving to match the needs of the future cloud applications. The fifth-generation (5G) networks are probable to immense expand today's cloud that can boost communication operations, cloud security, and network challenges and drive the cloud future to the edge and internet of things (IoT) applications. The existing cloud solutions are facing a number of challenges such as large number of connection of nodes, security, and new standards. This paper reviews the current research state-of-the-art of 5G cloud, key-enabling technologies, and current research trends and challenges in 5G along with cloud application. © 2022, Intelektual Pustaka Media Utama. All rights reserved.Öğe Improving Deceptive Patch Solutions Using Novel Deep Learning-Based Time Analysis Model for Industrial Control Systems(Mdpi, 2024) Tanyildiz, Hayriye; Sahin, Canan Batur; Dinler, Ozlem BaturIndustrial control systems (ICSs) are critical components automating the processes and operations of electromechanical systems. These systems are vulnerable to cyberattacks and can be the targets of malicious activities. With increased internet connectivity and integration with the Internet of Things (IoT), ICSs become more vulnerable to cyberattacks, which can have serious consequences, such as service interruption, financial losses, and security hazards. Threat actors target these systems with sophisticated attacks that can cause devastating damage. Cybersecurity vulnerabilities in ICSs have recently led to increasing cyberattacks and malware exploits. Hence, this paper proposes to develop a security solution with dynamic and adaptive deceptive patching strategies based on studies on the use of deceptive patches against attackers in industrial control systems. Within the present study's scope, brief information on the adversarial training method and window size manipulation will be presented. It will emphasize how these methods can be integrated into industrial control systems and how they can increase cybersecurity by combining them with deceptive patch solutions. The discussed techniques represent an approach to improving the network and system security by making it more challenging for attackers to predict their targets and attack methods. The acquired results demonstrate that the suggested hybrid method improves the application of deception to software patching prediction, reflecting enhanced patch security.Öğe Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features(Springer, 2021) Sahin, Canan Batur; Dinler, Ozlem Batur; Abualigah, LaithThe detection of software vulnerabilities is considered a vital problem in the software security area for a long time. Nowadays, it is challenging to manage software security due to its increased complexity and diversity. So, vulnerability detection applications play a significant part in software development and maintenance. The ability of the forecasting techniques in vulnerability detection is still weak. Thus, one of the efficient defining features methods that have been used to determine the software vulnerabilities is the metaheuristic optimization methods. This paper proposes a novel software vulnerability prediction model based on using a deep learning method and SYMbiotic Genetic algorithm. We are first to apply Diploid Genetic algorithms with deep learning networks on software vulnerability prediction to the best of our knowledge. In this proposed method, a deep SYMbiotic-based genetic algorithm model (DNN-SYMbiotic GAs) is used by learning the phenotyping of dominant-features for software vulnerability prediction problems. The proposed method aimed at increasing the detection abilities of vulnerability patterns with vulnerable components in the software. Comprehensive experiments are conducted on several benchmark datasets; these datasets are taken from Drupal, Moodle, and PHPMyAdmin projects. The obtained results revealed that the proposed method (DNN-SYMbiotic GAs) enhanced vulnerability prediction, which reflects improving software quality prediction.