TY - DATA AU - Bhuiyan,Touhid AU - Güneşer,Muhammet Tahir AU - Çelik,Yüksel AU - Albayrak,Zafer AU - Kahraman,İdris AU - İleri,Kadir AU - Gökmen,Mahmut Selman TI - Proceeding Book of the International Conference on Cyber Security and Computer Science (ICONCS 2018) : 18-20 October 2018 /Safranbolu, Turkey SN - 9786059554329 AV - E-KITAP PY - 2018/// CY - Karabük PB - Karabük Üniversitesi KW - Social sciences KW - Congresses N1 - Includes bibliographical references; Table of Contents; An online-tool for tuning ensemble learning algorithms 1; The Management and Configuration System for Low Cost Portable Crypto Device in an Embedded System 6; 112 Emergency Call Positioning Message Support Application for Smart Phones 9; Confidential Data Transport In Noise Image 12; A hybrid cloud-based Intrusion Detection and Response System (IDRS) based on Grey Wolf; Optimizer (GWO) and Neural Network (NN) 17; An investigation on factors influencing wearable device adoption: A partial least squares approach; 22; Quantitative Assessment on Broken Access Control Vulnerability in Web Applications 26; A comparison of some soft computing methods on Imbalanced data 33; A hybrid intrusion detection system based on Sine Cosine Algorithm and Naïve Bayes algorithm 38; Trend Estimation of Stock Market: An Intelligent Decision System 44; A Study on Remote Code Execution Vulnerability in Web Applications 50; A New Algorithm for the Colored Image Encryption via the Modified Chua’s Circuit 58; Implementation of GOST 28147-89 Encryption and Decryption Algorithm on FPGA 67; A Method Based on Particle Swarm Optimization for Finding Optimum Opacity Transfer Function 71; Information Security Risk Management and Risk Assessment Methodology and Tools 73; An Analysis of the Current State of Security in the Internet of Things 79; A WildCAT Based Observable Bayesian Student Model 86; Composite ElGamal Cryptosystem and An Application of The Cryptosystem to Asymmetric; Cryptography 92; Differences between Free Open Source and Commercial Sandboxes 95; An Analysis of DRDoS Amplifiers in Europe 99; An Ontology-based Approach to Terminology Management for Healthcare Systems 104; Big Data Applications: A Review 108; Anomaly-Based Detection of Non-Recursive HTTP GET Flood DDoS Attack 112; Gait Recognition via Machine Learning 119; How to Assess Security and Efficiency of Authenticated Encryption Algorithms 124; The Interaction Of Infants With The Television, Smart Phone And Tablet Computers 130; Classification Bhp Flooding Attack In Obs Network With Data Mining Techniques 134; An investigation on factors influencing smart watch adoption: A partial least squares approach 138; Comparing Common Supervised Machine Learning Algorithms For Twitter Spam Detection in Scikit Learn. 142; A Numerical Algorithm for the Analysis of the Thermal Stress-Stain State of a Rod 146; Comparison of Cryptography Algorithms for Mobile Payment Systems 150; Classification of Tweets about Violence against Women. 156; Algorithms for Runtime Generation of Homogeneous Classes of Objects 160; Short-Term Load Forecasting by Knowledge Based Systems on the basis of Priority Index for; Selection of Similar Days 165; A Review: Active Queue Management Algorithms in Mobile Communication 171; An inventive method for eco-efficient operation of home energy management system 176; A New Entropy-based Feature Selection Method for Load Forecasting in Smart Homes 185; Big Data Analytics for Load Forecasting in Smart Grids: A Survey. 193; Fog as-a-Power Economy Sharing Service. 203; The Development of Information System of Formation and Use of Information Resources For; Evaluation of Parameters and Evaluation af Recommendations Based On Big Data Technology; Tools: Work With Mongodb 208; Vertical Search Engine for Academic Publications. 212; Optimum unit sizing of a stand-alone hybrid PV-WT-FC system using Jaya algorithm 216; Optimal Foraging Algorithm (OFA) for Solving Constrained Optimization Problems 223; Performance Evaluation of 28 and 73 GHz Ultra High Frequency Bands for Outdoor MIMO 227; Hash Equations and Cryptographic Applications on Forensic. 233 UR - https://kutuphane.karabuk.edu.tr/yuklenen/dosyalar/1262272019110951.pdf ER -