Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Turkish Journal of Electrical Engineering and Computer Sciences

Cyber security

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Electrical and Computer Engineering

A New Classification Method For Encrypted Internet Traffic Using Machine Learning, Mesut Uğurlu, İbrahi̇m Alper Doğru, Recep Si̇nan Arslan Jan 2021

A New Classification Method For Encrypted Internet Traffic Using Machine Learning, Mesut Uğurlu, İbrahi̇m Alper Doğru, Recep Si̇nan Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

The rate of internet usage in the world is over 62% and this rate is increasing day by day. With this increase, it becomes important to ensure the confidentiality of the information in the traffic flowing over the internet. Encryption algorithms and protocols are used for this purpose. This situation, which is beneficial for normal users, is also used by attackers to hide. Cyber attackers or hackers gain the ability to bypass security precautions such as IDS/IPS and antivirus systems with using encrypted traffic. Since payload analysis cannot be performed without deciphering the encrypted traffic, existing commercial security solutions fall …


Electronic Publishing For Engineering Education, Donald G. Dudley Jan 2006

Electronic Publishing For Engineering Education, Donald G. Dudley

Turkish Journal of Electrical Engineering and Computer Sciences

Electronic transmission of text is a revolution in progress with a profound effect on engineering education. As with all revolutions, the result is both a threat and a promise. The promise is the ease and speed of dissemination of text. The threat involves serious difficulties that arise in efforts to protect the intellectual property rights of the authors and publishers of the technical information. In this paper, we discuss both the threat and the promise. We highlight the differences in dealing with books and with journals. We give a wide range of examples from both inside of and outside of …