Loading [a11y]/accessibility-menu.js
avatar
İlker Kara Assoc. Prof. Dr. HACETTEPE UNIVERSITY, HACETTEPE VOCATIONAL SCHOOL
Publication 22 Review 14 CrossRef Cited 8 TR Dizin Cited 6
22 Publication
14 Review
8 CrossRef Cited
6 TR Dizin Cited

Research Fields

Information and Computing Sciences Information Security Management Information Systems Education Computer Forensics Cyber Espionage Cybersecurity and Privacy (Other)

Institution

HACETTEPE UNIVERSITY, HACETTEPE VOCATIONAL SCHOOL

Popular Publications

Machine Learning Detection of Phishing Websites Using Website Data
DOI: 10.31590/ejosat.1008335
CITED 0 FAVORITE 2 TOTAL DOWNLOAD COUNT 809

0

2

809

WEB HACKLEME(HACKİNG) SALDIRILARI
DOI: -
CITED 0 FAVORITE 2 TOTAL DOWNLOAD COUNT 8101

0

2

8101

Detection, Technical Analysis of Brute Force Attack
DOI: 10.35377/saucis.02.02.561844
CITED 3 FAVORITE 1 TOTAL DOWNLOAD COUNT 3135

3

1

3135

WEB TABANLI ZARARLI YAZILIMLARIN SALDIRI YÖNTEMLERİ VE ANALİZ TEKNİKLERİ
DOI: 10.18640/ubgmd.498048
CITED 2 FAVORITE 1 TOTAL DOWNLOAD COUNT 2322

2

1

2322

Cyber Security of Connected Autonomous Vehicles
DOI: 10.31590/ejosat.1039449
CITED 1 FAVORITE 1 TOTAL DOWNLOAD COUNT 1565

1

1

1565

Publications

Twin Ghosts: Evil Twin Attacks in Wireless Networks and Defense Mechanisms
DOI: 10.17678/beuscitech.1450756
FAVORITE 0 TOTAL DOWNLOAD COUNT 1464

0

1464

0

454

Analyzing TorrentLocker Ransomware Attacks: A Real Case Study
DOI: 10.16984/saufenbilder.1442756
FAVORITE 0 TOTAL DOWNLOAD COUNT 200

0

200

Query by Image Examination: Classification of Digital Image-Based Forensics Using Deep Learning Methods
Published: 2023 , Acta Infologica
DOI: 10.26650/acin.1282567
FAVORITE 0 TOTAL DOWNLOAD COUNT 1058

0

1058

Digital Forensic Analysis of Discord Mobile Application on Android Based Smartphones
Published: 2022 , Acta Infologica
DOI: 10.26650/acin.1109682
FAVORITE 0 TOTAL DOWNLOAD COUNT 933

0

933

Machine Learning Detection of Phishing Websites Using Website Data
DOI: 10.31590/ejosat.1008335
FAVORITE 2 TOTAL DOWNLOAD COUNT 809

2

809

Electronic Banking (e-Banking) Fraud with Phishing Attack Methods
DOI: 10.31590/ejosat.1002963
FAVORITE 0 TOTAL DOWNLOAD COUNT 2567

0

2567

Cyber Security of Connected Autonomous Vehicles
DOI: 10.31590/ejosat.1039449
FAVORITE 1 TOTAL DOWNLOAD COUNT 1565

1

1565

Forensic analysis of web-based phishing attacks
DOI: 10.28948/ngumuh.891261
FAVORITE 0 TOTAL DOWNLOAD COUNT 2186

0

2186

Password Cracking Methods and Techniques in Computer Forensic Investigation
Published: 2021 , Acta Infologica
DOI: 10.26650/acin.804201
FAVORITE 0 TOTAL DOWNLOAD COUNT 7230

0

7230

The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack
DOI: 10.31590/ejosat.897799
FAVORITE 0 TOTAL DOWNLOAD COUNT 1133

0

1133

WEB HACKLEME(HACKİNG) SALDIRILARI
DOI: -
FAVORITE 2 TOTAL DOWNLOAD COUNT 8101

2

8101

Security Risks and Safeguard Measures in Social Media Usage
DOI: 10.31590/ejosat.818375
FAVORITE 0 TOTAL DOWNLOAD COUNT 910

0

910

1

10620

0

1058

İNTERPOL FİDYE YAZILIM SALDIRISI VE ANALİZİ
DOI: -
FAVORITE 0 TOTAL DOWNLOAD COUNT 1478

0

1478

0

2117

Detection, Technical Analysis of Brute Force Attack
DOI: 10.35377/saucis.02.02.561844
FAVORITE 1 TOTAL DOWNLOAD COUNT 3135

1

3135

Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware
Published: 2019 , Information Management
DOI: 10.33721/by.542743
FAVORITE 1 TOTAL DOWNLOAD COUNT 2758

1

2758

1

2322

Publications

Electronic Banking (e-Banking) Fraud with Phishing Attack Methods
DOI: 10.31590/ejosat.1002963
CITED 1 FAVORITE 0 TOTAL DOWNLOAD COUNT 2567

1

0

2567

Cyber Security of Connected Autonomous Vehicles
DOI: 10.31590/ejosat.1039449
CITED 1 FAVORITE 1 TOTAL DOWNLOAD COUNT 1565

1

1

1565

Forensic analysis of web-based phishing attacks
DOI: 10.28948/ngumuh.891261
CITED 1 FAVORITE 0 TOTAL DOWNLOAD COUNT 2186

1

0

2186

Detection, Technical Analysis of Brute Force Attack
DOI: 10.35377/saucis.02.02.561844
CITED 3 FAVORITE 1 TOTAL DOWNLOAD COUNT 3135

3

1

3135

WEB TABANLI ZARARLI YAZILIMLARIN SALDIRI YÖNTEMLERİ VE ANALİZ TEKNİKLERİ
DOI: 10.18640/ubgmd.498048
CITED 2 FAVORITE 1 TOTAL DOWNLOAD COUNT 2322

2

1

2322

Interactive Guide Tool
If you want to see the panel introduction, you can click Start Tour.