- Semantic Web and Ontologies
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Access Control and Trust
- Privacy-Preserving Technologies in Data
- Biomedical Text Mining and Ontologies
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Service-Oriented Architecture and Web Services
- Data Quality and Management
- Information and Cyber Security
- Privacy, Security, and Data Protection
- Anomaly Detection Techniques and Applications
- Scientific Computing and Data Management
- Research Data Management Practices
- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Distributed and Parallel Computing Systems
- Natural Language Processing Techniques
- Artificial Intelligence in Healthcare
- User Authentication and Security Systems
- Chaos-based Image/Signal Encryption
- Advanced Database Systems and Queries
- Mobile Health and mHealth Applications
Ege University
2015-2024
Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via Internet without any need to know infrastructure knowledge, experience, or even authority that provides such It has become an important medium for enterprises develop their networks because of these resources. With growing cloud computing, security becoming both individuals and business needs. Many researchers have studied computing. Still, gaps threats increasing...
Summary Cloud computing (CC) refers to the on‐demand availability of network resources, particularly data storage and processing power, without requiring special or direct administration by users. CC, which just made its debut as a collection public private centers, provides clients with unified platform throughout Internet. has revolutionized world, opening up new horizons bright potential due performance, accessibility, low cost, many other benefits. Due exponential rise cloud computing,...
Insider threats pose a significant risk to organizations, necessitating robust detection mechanisms safeguard against potential damage. Traditional methods struggle detect insider operating within authorized access. Therefore, the use of Artificial Intelligence (AI) techniques is essential. This study aimed provide valuable insights for threat research by synthesizing advanced AI methodologies that offer promising avenues enhance organizational cybersecurity defenses. For this purpose, paper...
Abstract In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by bridging gap between digital and physical realms. This transformative technology enables rapid changes in way people conduct business. Its fundamental aim to connect everything our world—objects, individuals, locations, processes—under a unified infrastructure, providing valuable information control over state environment. The IoT represents novel approach developing diverse distributed...
Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. is on-demand availability of computer system resources, especially data storage (cloud storage) computational power. refers centers accessible numerous customers over Internet. It ability utilize resources at a cost fast speed. security becoming increasingly important as we shift our devices, centers, business processes, assets...
Abstract Provenanc refers to the origin of information. Therefore, provenance is metadata that record history data. As derivation an object starting from its original source, information used analyse processes are performed on and track by whom these performed. Thus, shows trustworthiness quality In a management system in order verify trustworthy information, security needs must be also fulfilled. this work, ontology‐based privacy‐aware model proposed. The proposed based Open Provenance...
Today’s technological improvements have made ubiquitous healthcare systems that converge into smart applications in order to solve patients’ problems, communicate effectively with patients, and improve service quality. The first step of building a information system is representing the data as connected, reachable, sharable. In achieve this representation, ontologies are used describe data. Combining ontological obtained can be maintained by storing entire health domain inside big stores...
Individual privacy protection in the released data sets has become an important issue recent years. The release of microdata provides a significant information resource for researchers, whereas person-specific poses threat to individual privacy. Unfortunately, could be linked with publicly available exactly re-identify individuals' identities. In order relieve concerns, protected mechanism before its disclosure. k -anonymity model is method reduce risk re-identification release. This...
Provenance determines the origin of data by tracing and recording actions that are performed on data. Therefore, provenance is used in many fields to ensure reliability quality In this work, information meet security needs systems. For purpose, a domain-independent model proposed. The proposed based Open Model Semantic Web technologies. goal integrate concepts order detect privacy violations querying evaluate model, we illustrated our integrating it with an infectious disease domain...
The development of technology accelerated the digital transformation information systems. As a consequence this digitization, data became available at any time and in place. However, despite ease accessibility, persons' privacy concerns threats to have emerged. Thus, serious problems arise while collecting, storing, accessing, sharing, archiving personal data. Consent management aims prevent these by preserving protecting Hence, there are international treaties legal regulations for...
User profiles are personal images of social community users. Users store and share their documents express themselves with information. In community, user may also need to describe herself more than one image profile. Today's profiling methodologies do not support such multi-role based profile management. We develop a new methodology create policy management model use policies for better personalization networking control. present framework on increase the efficiency