• Facebook Classic
  • Twitter Classic
  • c-youtube

RESEARCH PAPERS

 

This page refers to Dr. Sari's published resources such as books, book chapters, articles, short letters and research papers in the filed of cybersecurity, computer networks, network security similar field of management information systems. Below are the research papers published between 2016-2018. Please contact for more information and publications.

 

 

 

18

'Sari, A. (2018); "Turkish national cyber-firewall to mitigate countrywide cyber-attacks”, Computers & Electrical Engineering, Elsevier, Vol 73., No. 1, pp. 128-144, ISSN: 0045-7906, DOI: https://doi.org/10.1016/j.compeleceng.2018.11.008.

18

'Sari, A. (2018); "Sari, A.  (2018) Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir, Journal of Cyber Security Technology, 2:1, 14-36, DOI: http://dx.doi.org/10.1080/23742917.2018.1476956 .

18

'Kirikkaleli, D., Ozun, A., Sari, A. (2018) How can policy makers foster innovation? Observations from an analysis of OECD countries, Innovation, Journal of Cyber Security Technology, 2:1, 14-36, DOI: http://dx.doi.org/10.1080/23742917.2018.1476956 .

18

'Sari, A. (2016); "E-Government Attempts in Small Island Developing States: The Rate of Corruption with Virtualization”, Science and Engineering Ethcis, Springer , Vol 23., No. 6, pp.1673-1688, ISSN-O: 1353-3452,DOI: http://dx.doi.org/10.1007/s11948-016-9848-0

18

'Sari, A., Kilic, S., (2017); "Exploiting Cryptocurrency Miners with OSINT Techniqeus”, Arif Sari, Seyfullah Kilic; Exploiting Cryptocurrency Miners with OSINT Techniques, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 62-76. http://dx.doi.org/10.14738/tnc.56.4083

18

'Sari, A., Akkaya, M., Abdalla B., (2017) “Assessing e-Government systems success in Jordan (e-JC): A validation of TAM and IS Success model”. International Journal of Computer Science and Information Security, Vol.15, No.2, pp.277-304, ISSN:1947-5500.

18

'Sari, A, (2017) "The Blockchain: Overview of “Past” and “Future”", Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 39-47. http://dx.doi.org/10.14738/tnc.56.4061

18

Sari, A., Qayyum, Z.A., and Onursal, O (2017); The Dark Side of the China: The Government, Society and the Great Cannon, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 48-61. http://dx.doi.org/10.14738/tnc.56.4062

18

Sari, A, Akkaya, M., Fadiya, S., (2016) “A conceptual model selection of big data application: improvement for decision support system user organisation” International Journal of Qualitative Research in Services, Vol.2, No.3, pp. 200-210. http://dx.doi.org/10.1504/IJQRS.2016.10003553
 
 
 

18

Alzubi, A. and Sari, A. (2016) Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN). Int. J. Communications, Network and System Sciences, Vol.9,No.12, pp. 613-621. http://dx.doi.org/10.4236/ijcns.2016.912047 

 

 

 

1

Sari, A., Onursal, O. and Akkaya, M. (2015) Review of the Security Issues in Vehicular Ad Hoc Net-works (VANET). Int. J. Communications, Network and System Sciences, Vol. 8, No.13, pp. 552-566. http://dx.doi.org/10.4236/ijcns.2015.813050

  • Facebook Classic
  • Twitter Classic
  • c-youtube

THE BOOKS and CHAPTERS

 
 
 
New Threats and Countermeasures in Digital Crime & CyberTerrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Network Security Attacks & Countermeasures 

Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors.

 

This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

 

 

JOURNALS

International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE)

The journal publishes articles in the field of Cognitive Science, Social Science, Pedagogy, Psychology, Artificial intelligence, Linguistics, Philosophy, Computer Science and Neuroscience. Dr. Sari participating in IJCRSEE as an Editorial Advisory board member since 2015.

ISSN 2334-847X (Printed)

ISSN 2334-8496 (Online)

Indexed by Scopus.

FOLLOW ME

  • Facebook Classic
  • Twitter Classic
  • c-youtube

© 2016 by Arif Sari. Proudly created with Wix.com

This site was designed with the
.com
website builder. Create your website today.
Start Now
tsec20.v001.i03-04.cover

Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir

Go to link