Özgü Can

ORCID: 0000-0002-8064-2905
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Semantic Web and Ontologies
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Access Control and Trust
  • Privacy-Preserving Technologies in Data
  • Biomedical Text Mining and Ontologies
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Service-Oriented Architecture and Web Services
  • Data Quality and Management
  • Information and Cyber Security
  • Privacy, Security, and Data Protection
  • Anomaly Detection Techniques and Applications
  • Scientific Computing and Data Management
  • Research Data Management Practices
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Distributed and Parallel Computing Systems
  • Natural Language Processing Techniques
  • Artificial Intelligence in Healthcare
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Advanced Database Systems and Queries
  • Mobile Health and mHealth Applications

Ege University
2015-2024

Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via Internet without any need to know infrastructure knowledge, experience, or even authority that provides such It has become an important medium for enterprises develop their networks because of these resources. With growing cloud computing, security becoming both individuals and business needs. Many researchers have studied computing. Still, gaps threats increasing...

10.1016/j.ijin.2022.04.001 article EN cc-by International Journal of Intelligent Networks 2022-01-01

Summary Cloud computing (CC) refers to the on‐demand availability of network resources, particularly data storage and processing power, without requiring special or direct administration by users. CC, which just made its debut as a collection public private centers, provides clients with unified platform throughout Internet. has revolutionized world, opening up new horizons bright potential due performance, accessibility, low cost, many other benefits. Due exponential rise cloud computing,...

10.1002/cpe.7691 article EN Concurrency and Computation Practice and Experience 2023-04-03

Insider threats pose a significant risk to organizations, necessitating robust detection mechanisms safeguard against potential damage. Traditional methods struggle detect insider operating within authorized access. Therefore, the use of Artificial Intelligence (AI) techniques is essential. This study aimed provide valuable insights for threat research by synthesizing advanced AI methodologies that offer promising avenues enhance organizational cybersecurity defenses. For this purpose, paper...

10.48084/etasr.6911 article EN Engineering Technology & Applied Science Research 2024-04-02

Abstract In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by bridging gap between digital and physical realms. This transformative technology enables rapid changes in way people conduct business. Its fundamental aim to connect everything our world—objects, individuals, locations, processes—under a unified infrastructure, providing valuable information control over state environment. The IoT represents novel approach developing diverse distributed...

10.1002/spy2.378 article EN Security and Privacy 2024-03-04

Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. is on-demand availability of computer system resources, especially data storage (cloud storage) computational power. refers centers accessible numerous customers over Internet. It ability utilize resources at a cost fast speed. security becoming increasingly important as we shift our devices, centers, business processes, assets...

10.1080/01969722.2023.2175117 article EN Cybernetics & Systems 2023-02-15

Abstract Provenanc refers to the origin of information. Therefore, provenance is metadata that record history data. As derivation an object starting from its original source, information used analyse processes are performed on and track by whom these performed. Thus, shows trustworthiness quality In a management system in order verify trustworthy information, security needs must be also fulfilled. this work, ontology‐based privacy‐aware model proposed. The proposed based Open Provenance...

10.1111/exsy.12427 article EN Expert Systems 2019-07-01

Today’s technological improvements have made ubiquitous healthcare systems that converge into smart applications in order to solve patients’ problems, communicate effectively with patients, and improve service quality. The first step of building a information system is representing the data as connected, reachable, sharable. In achieve this representation, ontologies are used describe data. Combining ontological obtained can be maintained by storing entire health domain inside big stores...

10.3390/e19010030 article EN cc-by Entropy 2017-01-11

Individual privacy protection in the released data sets has become an important issue recent years. The release of microdata provides a significant information resource for researchers, whereas person-specific poses threat to individual privacy. Unfortunately, could be linked with publicly available exactly re-identify individuals' identities. In order relieve concerns, protected mechanism before its disclosure. k -anonymity model is method reduce risk re-identification release. This...

10.1049/iet-ifs.2016.0613 article EN IET Information Security 2018-02-28

Provenance determines the origin of data by tracing and recording actions that are performed on data. Therefore, provenance is used in many fields to ensure reliability quality In this work, information meet security needs systems. For purpose, a domain-independent model proposed. The proposed based Open Model Semantic Web technologies. goal integrate concepts order detect privacy violations querying evaluate model, we illustrated our integrating it with an infectious disease domain...

10.1177/0165551519827882 article EN Journal of Information Science 2019-02-21

The development of technology accelerated the digital transformation information systems. As a consequence this digitization, data became available at any time and in place. However, despite ease accessibility, persons' privacy concerns threats to have emerged. Thus, serious problems arise while collecting, storing, accessing, sharing, archiving personal data. Consent management aims prevent these by preserving protecting Hence, there are international treaties legal regulations for...

10.1109/access.2022.3204970 article EN cc-by IEEE Access 2022-01-01

User profiles are personal images of social community users. Users store and share their documents express themselves with information. In community, user may also need to describe herself more than one image profile. Today's profiling methodologies do not support such multi-role based profile management. We develop a new methodology create policy management model use policies for better personalization networking control. present framework on increase the efficiency

10.1109/compsac.2012.49 article EN 2012-07-01
Coming Soon ...