Bilal Gonen
YOU?
Author Swipe
View article: Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)
Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web) Open
In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, informa…
View article: Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection Open
An autoencoder has the potential to overcome the limitations of current intrusion detection methods by recognizing benign user activity rather than differentiating between benign and malicious activity. However, the line separating them is…
View article: E-Loox, A Hybrid Learning Management System
E-Loox, A Hybrid Learning Management System Open
E-loox is an educational software application that has been designed specifically for students located in areas with limited Internet access. Unlike the majority of existing educational applications, E-loox is a “hybrid app”– meaning it ca…
View article: E-Loox, A Hybrid Learning Management System
E-Loox, A Hybrid Learning Management System Open
E-loox is an educational software application that has been designed specifically for students located in areas with limited Internet access. Unlike the majority of existing educational applications, E-loox is a “hybrid app”– meaning it ca…
View article: Relative Importance of Blockchain in Cryptocurrency, Banking & Health Care
Relative Importance of Blockchain in Cryptocurrency, Banking & Health Care Open
This paper looks at the opportunities and challenges of implementing blockchain technology across medical, finance and banking sectors, and provides a clear view which can enable Blockchain for more extents. After going through few article…
View article: Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence Open
Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users....
View article: Plunge into the Underworld: A Survey on Emergence of Darknet
Plunge into the Underworld: A Survey on Emergence of Darknet Open
The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can …
View article: A Prevention and a Traction System for Ransomware Attacks
A Prevention and a Traction System for Ransomware Attacks Open
Over the past three years, especially following WannaCry malware, ransomware\nhas become one of the biggest concerns for private businesses, state, and local\ngovernment agencies. According to Homeland Security statistics, 1.5 million\nran…
View article: Graphical data mining of cancer mechanisms with SEMA
Graphical data mining of cancer mechanisms with SEMA Open
Motivation An important goal of cancer genomics initiatives is to provide the research community with the resources for the unbiased query of cancer mechanisms. Several excellent web platforms have been developed to enable the visual analy…
View article: Public Key Cryptosystem based on Matrices
Public Key Cryptosystem based on Matrices Open
In this article, a novel public key cryptosystem is introduced by using an abelian subgroup of GL(k, Z n ) where n and k are positive integers.Instead of exponentiation, the conjugation automorphisms are mainly used to define the public an…
View article: A Survey of Social Network Forensics
A Survey of Social Network Forensics Open
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices s…