Measuring the Security Effectiveness of Machine Learning Methods Used Against Cyber Attacks in Web Applications
Abstract
Keywords
Kaynakça
- [1] Yin Z., Liu W., Chawla S., Adversarial Attack, Defense, and Applications with Deep Learning Frameworks, (2019) 1–25. doi:10.1007/978-3-030-13057-2_1.
- [2] Jang-Jaccard J., Nepal S., A survey of emerging threats in cybersecurity, J Comput Syst Sci, (2014) 80:973–93. doi:https://doi.org/10.1016/j.jcss.2014.02.005.
- [3] Nguyen M.H., Gruber J., Fuchs J., Marler W., Hunsaker A., Hargittai E., Changes in Digital Communication During the COVID-19 Global Pandemic: Implications for Digital Inequality and Future Research, Soc Media + Soc, (2020) 6:2056305120948255. doi:10.1177/2056305120948255.
- [4] Dunton G.F., Do B., Wang S.D., Early effects of the COVID-19 pandemic on physical activity and sedentary behavior in children living in the U.S., BMC Public Health, (2020) 20:1351. doi:10.1186/s12889-020-09429-3.
- [5] Buchanan R., What We Know about Identity Theft and Fraud Victims from Research-and Practice-Based Evidence center for victim Research Report, (2019) 34.
- [6] Hashizume K., Rosado D.G., Fernández-Medina E., Fernandez E.B., An analysis of security issues for cloud computing, J Internet Serv Appl, (2013) 4:5. doi:10.1186/1869-0238-4-5.
- [7] Marashdih A.W., Zaaba Z.F., Suwais K., Mohd N.A., Web application security: An investigation on static analysis with other algorithms to detect cross site scripting, Procedia Comput Sci, (2019) 161:1173–81. doi:10.1016/j.procs.2019.11.230.
- [8] Ferrara E., The history of digital spam, Commun ACM, (2019) 62:82–91. doi:10.1145/3299768.
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yazarlar
Mesut Toğaçar
*
0000-0002-8264-3899
Türkiye
Yayımlanma Tarihi
29 Aralık 2021
Gönderilme Tarihi
10 Haziran 2021
Kabul Tarihi
8 Kasım 2021
Yayımlandığı Sayı
Yıl 2021 Cilt: 9 Sayı: 4
Cited By
Experimental and artificial intelligence approaches to measuring the wear behavior of DIN St28 steel boronized by the box boronizing method using a mechanically alloyed powder source
Engineering Applications of Artificial Intelligence
https://doi.org/10.1016/j.engappai.2023.105910Kötü Amaçlı Yazılım Türlerinin Tespitinde Kullanılan 1B Verilerin 2B Barkod Türlerine Dönüştürülerek Derin Ağlarla Analizlerinin Gerçekleştirilmesi
Mühendislik Bilimleri ve Araştırmaları Dergisi
https://doi.org/10.46387/bjesr.1262841Tarım ve Hayvancılık Alanında Dijital Dönüşüm: Evrişimsel Sinir Ağları ve Regresyon Modelleri Kullanılarak Sığırlarda Canlı Ağırlık Tahmini
Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji
https://doi.org/10.29109/gujsc.1541362
