222 results
Search Results
Now showing 1 - 10 of 222
Book Part A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs(inst Engineering Tech-iet, 2019) Daneshgadeh, Salva; Oney, Mehmet Ugur; Kemmerich, Thomas; Baykal, NazifeThe continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes.Book Part JAK Inhibitors/Drug Interactions(Springer Science+Business Media, 2025) Demirci Saadet, E.JAK inhibitors are a group of drugs that can affect the signaling of various cytokines simultaneously. The number of indications in dermatology has been increasing in recent years. JAK inhibitors are largely metabolized by the liver. Therefore, drug–drug interactions may occur when used with cytochrome P450 and CYP2C19 inhibitors or inducers, and drug dosages should be adjusted or not used together. In addition, OAT-3 inhibitors, which are known to play a role in renal elimination, interact with some JAK inhibitors, and dose adjustment is recommended. During treatment, drug–drug interactions should be reviewed in combination with JAK inhibitors and other drugs. © 2025 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.Book Part Citation - Scopus: 1Boundary-Element Method in Microfluidics(Springer Science+Business Media, 2015) Çetin, Barbaros; Baranoğlu, BesimBook Part Citation - Scopus: 3Making Foreign Policy Through Twitter: an Analysis of Trump's Tweets on Iran(IGI Global, 2020) Orhan,D.D.Through the development of technology, the understanding of traditional foreign policy has changed. Foreign policy making, which was shaped by diplomatic correspondence, visits, agreements, and notes between countries, is carried out today via messages sent over the Internet. Twitter is the most frequently used internet tool in the hands of institutions, decision makers, and leaders in foreign policy making. US President Donald J. Trump is one of the leaders who use Twitter most effectively. Twitter was the center of Trump's messages, both during the presidential campaign and after his election. Trump is not just using Twitter as a platform for meeting his supporters and announcing the country's official policies. Twitter has also been an important way for Trump to challenge and send harsh messages to certain countries, companies, and individuals. Iran is one of the countries that Trump targets through Twitter. This study aims to examine the use of Twitter as a platform in foreign policy making by using content analysis method through Trump's tweets about Iran. © 2021, IGI Global.Book Part Citation - Scopus: 1Materials and Processes for Treatment of Microbiological Pollution in Water(Springer, 2021) Alazzawi,M.; Turkoglu Sasmazel,H.Clean and safe water is vital for the life and health of human beings. However, there are still millions of people around the world with inadequate clean water sources. Microbiological pollution is one of the most concerned water pollutants and is the crucial cause of waterborne diseases like diarrhea, resulting in about two million deaths annually due to severe dehydration (WHO in Guidelines for drinking-water quality. Incorporating the first addendum, WHO, Geneva, 2017). It is critical to develop methods using advanced materials and process to mitigate contaminants from water resources. Production of safe water usually involves disinfection and decontamination processes. Conventional disinfection process, such as chlorination, is challenged by the formation of disinfection by-products. Furthermore, the presence of emerging pathogenic, that resist conventional water treatment techniques, raised the crucial necessity for emerging materials and techniques for treating water from microbiological pollution (Shannon et al. in Nature 452:301–310, 2008). This chapter describes bacterial, viral, and protozoal microbiological pollution in water supplies and the application of emerging materials and techniques to eliminate such contaminations. © 2021, Springer Nature Switzerland AG.Book Part Citation - Scopus: 1Web Privacy: Issues, Legislations, and Technological Challenges(IGI Global, 2008) Mishra,A.; Mishra,D.People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private organizations, governments and employers. Privacy relates to issues regarding collection, secure transmission, storage, authorized access, usage, and disclosure of personal information. This information is used for commercial gain by many organizations. Individual privacy concerns significantly affects consumer willingness to engage in electronic commerce over the Internet. The increased use of the Internet and Web for everyday activities is bringing new threats to personal privacy. This chapter assessed various issues related to individual privacy on the Web, growing concerns among the Web users, technologies employed for collecting and protecting information on the Web, privacy-enhancing technologies and the legal provisions to curb the Web privacy. This chapter also reported detailed discussion about Platform for Privacy Preferences (P3P), its structure, present scenario of its implementation and its future success. Global consistency on Internet privacy protection is important to promote the growth of electronic commerce. To protect consumers in a globally consistent manner, legislation, self-regulation, technical solutions and combination solutions are different ways that can be implemented. © 2008, IGI Global.Book Part Clinical Development of Quinone-Based Drugs(Elsevier, 2024) Altuner, E.E.; Issa, G.; Ozalp, V.C.; Aldemir, O.; Torlak, Y.; Dar, U.A.This chapter provides a detailed explanation of the clinical investigations, pharmacological effects, and characteristics of quinone and quinone derivatives, along with references to pertinent sources. Although quinones have an oxygen group in their structure, they are quickly oxidized and interact with reactive oxygen species. This demonstrates how quinones work as drugs. Quinones and their derivatives are used as medications to treat a wide range of diseases, including cancer, lung, kidney, brain, and tumor disorders. Each of the following has effects on a different area of health; lapochols, anthraquinones, naphthoquinone and its derivatives, and other wide range of quinone derivatives are thoroughly explored in this chapter. © 2025 Elsevier Inc. All rights reserved.Book Part Drawing a Portrait of Refugee Representation in Turkish Newspapers: A Framing Analysis of Hürriyet and Sabah(Bloomsbury Publishing Plc., 2020) Özoran, Beris Artan; Seyidov, IlgarBook Part Shocks, Scans, and Reliability Systems(Springer New York, 2024) Eryilmaz,S.This chapter summarizes the close connection between one of the widely studied shock models known as δ-shock model and runs/scans. Under discrete time setting, i.e., when the shocks occur according to a binomial process, the linkage between the lifetime of the system under the shock model and the waiting time for the first scan is presented. Such a useful connection may create a new perspective to study the reliability properties of the system under the δ-shock model. © Springer Science+Business Media, LLC, part of Springer Nature 2024.Book Part Conclusion(Springer International Publishing, 2022) Yilmaz,G.This book explores non-discrimination in Turkey by dividing the principle into issue areas. It provides a detailed analysis of many areas within the principle of non-discrimination. © The Editor(s)(if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022.

