Discover how data quality can make or break AI systems – dive into the ‘Garbage In, Garbage Out’ dilemma in my latest video podcast episode!
Citations: 768 (443 since 2016)
h-Index: 12 (as of January 2023)
Research Interest Score: 273 (as of January 2023)
Orta Doğu Teknik Üniversitesi (Middle East Technical University), Informatics Institute
Information Systems, Artificial Intelligence
Thesis: Multi-Perspective Analysis and Systematic Benchmarking for Binary-Classification Performance Evaluation Instruments (Full Text) (Abstract, Visual Abstract)
Gazi Üniversitesi (Gazi University), Department of Computer Engineering
Information Security
Thesis Topic: Analysis, Design and Implementation of Computer Activity Monitoring and Countermeasures
Boğaziçi Üniversitesi (Bosphorus University), Department of Industrial Engineering
Course attendance, no graduation.
İstanbul Teknik Üniversitesi (Istanbul Technical University), English Preparatory Program
İstanbul Teknik Üniversitesi (Istanbul Technical University) , Double Major: Control and Computer Engineering
Thesis: Multi-Perspective Analysis and Systematic Benchmarking for Binary-Classification Performance Evaluation Instruments (Full Text) (Abstract, Visual Abstract)
İstanbul Teknik Üniversitesi (Istanbul Technical University), English Preparatory Program
Distant Education Program, Cyber Security Non-Thesis Master's Program
Information security and its aspects: beyond C-I-A triad
Cyberspace and security
Information and cyber security principles
Cyber defense: pitfalls and dilemmas
Hack, hacking, and hackers: white, gray, and black hat
Cyber threats, threat actors
Cyber attacks: taxonomy and elements
Indicator of comprimise: pyramid of pain and TTP
Cyber threat intelligence
Emerging threats, cyber risks, risk mitigation
Cyber Kill Chain® by Lockheed Martin: offensive and defensive perspective
MITRE's ATT&CK Knowledge Base and Attack Navigator
Other kill chain and attack models
Risk, cyber risk and components, risk mitigation strategies and controls
History and global approaches in cyber defense
Computer programs and software
Software life cycle and stakeholders: software supply chain attacks
(Normal) software vs. malicious software
Offensive and defensive view of software
Malicious software taxonomy
Malware propagation and infection
Risk factors for malware
Trust in software: Ken Thompson
Protection ring
Workforce in cyber security
Information: going up in the data-information-knowledge-wisdom (DIKW) ladder
Parkerian hexad
Information security classification and labeling
Critical threat in software security: fragmentation (desktop, mobil [Android/iOS] cases)
Insider threats in software development life cycle and defense
Payloads: from easter eggs to malicios ones
Turing machine and universal turing machine
Virus: biolagical vs cyber
Computer virus history, life cycle, infection, risks, and mitigation
A course series for information and computer security
Over 50 hours of courses:
A-The Foundations (14 hours, 46 lessons)
B-The Middle Level (16 hours, 57 lessons)
C-The Advanced Level (12 hours, 44 lessons)
E-Introduction to Malware (11 hours, 50 lessons)