• Analyzing Amazon Products Sentiment: A Comparative Study of Machine and Deep Learning, and Transformer-Based Techniques 

      Ali, Hashir; Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Shaikh, Sarang (Journal article; Peer reviewed, 2024)
      In recent years, online shopping has surged in popularity, with customer reviews becoming a crucial aspect of the decision-making process. Reviews not only help potential customers make informed choices, but also provide ...
    • An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway 

      Yildirim Yayilgan, Sule; Holik, Filip; Abomhara, Mohamed; Abraham, Doney; Gebremedhin, Alemayehu (Peer reviewed; Journal article, 2022)
      In this paper, we provide an approach for analyzing cyber security threats and attacks in digital substations, which is based on several steps we performed within our work on two Research Council of Norway (RCN) projects. ...
    • Attacking IEC 61850 Substations by Targeting the PTP Protocol 

      Akbarzadeh, Aida; Erdödi, László; Houmb, Siv Hilde; Soltvedt, Tore Geir; Muggerud, Hans Kristian (Peer reviewed; Journal article, 2023)
      Digital substations, also referred to as modern power grid substations, utilize the IEC 61850 station and process bus in conjunction with IP-based communication. This includes communication with switch yard equipment within ...
    • Distributed Deep Neural-Network-Based Middleware for Cyber-Attacks Detection in Smart IoT Ecosystem: A Novel Framework and Performance Evaluation Approach 

      Bhandari, Guru; Lyth, Andreas; Shalaginov, Andrii; Grønli, Tor-Morten (Peer reviewed; Journal article, 2023)
      Cyberattacks always remain the major threats and challenging issues in the modern digital world. With the increase in the number of internet of things (IoT) devices, security challenges in these devices, such as lack of ...
    • A framework for using humanoid robots in the school learning environment 

      Mishra, Deepti; Parish, Karen; Lugo, Ricardo Gregorio; Wang, Hao (Peer reviewed; Journal article, 2021)
      With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ...
    • Holding on to Compliance While Adopting DevSecOps: An SLR 

      Ramaj, Xhesika; Sanchez Gordon, Mary Luz; Gkioulos, Vasileios; Chockalingam, Sabarathinam; Colomo-Palacios, Ricardo (Journal article; Peer reviewed, 2022)
      The software industry has witnessed a growing interest in DevSecOps due to the premises of integrating security in the software development lifecycle. However, security compliance cannot be disregarded, given the importance ...
    • Impact of Unreliable Content on Social Media Users during COVID-19 and Stance Detection System 

      Wani, Mudasir Ahmad; Agarwal, Nancy; Bours, Patrick (Peer reviewed; Journal article, 2021)
      The abundant dissemination of misinformation regarding coronavirus disease 2019 (COVID-19) presents another unprecedented issue to the world, along with the health crisis. Online social network (OSN) platforms intensify ...
    • Lex-pos feature-based grammar error detection system for the English language 

      Agarwal, Nancy; Wani, Mudasir Ahmad; Bours, Patrick (Peer reviewed; Journal article, 2020)
      This work focuses on designing a grammar detection system that understands both structural and contextual information of sentences for validating whether the English sentences are grammatically correct. Most existing systems ...
    • A Novel hybrid IDS based on modified NSGAII-ANN and Random Forest 

      Golrang, Anahita; Golrang, Alale; Yildirim Yayilgan, Sule; Elezaj, Ogerta (Peer reviewed; Journal article, 2020)
      Machine-learning techniques have received popularity in the intrusion-detection systems in recent years. Moreover, the quality of datasets plays a crucial role in the development of a proper machine-learning approach. ...
    • Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm 

      Catak, Ferhat Özgur; Aydin, Ismail; Elezaj, Ogerta; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2020)
      The protection and processing of sensitive data in big data systems are common problems as the increase in data size increases the need for high processing power. Protection of the sensitive data on a system that contains ...
    • A Robust Framework for Object Detection in a Traffic Surveillance System 

      Akhtar, Malik Javed; Mahum, Rabbia; Butt, Faisal Shafique; Amin, Rashid; El-Sherbeeny, Ahmed M.; Lee, Seongkwan Mark; Shaikh, Sarang (Peer reviewed; Journal article, 2022)
      Object recognition is the technique of specifying the location of various objects in images or videos. There exist numerous algorithms for the recognition of objects such as R-CNN, Fast R-CNN, Faster R-CNN, HOG, R-FCN, ...
    • Threat Modeling of a Smart Grid Secondary Substation 

      Holik, Filip; Flå, Lars; JAATUN, Martin Gilje; Yildirim Yayilgan, Sule; Foros, Jørn (Peer reviewed; Journal article, 2022)
      A full smart grid implementation requires the digitization of all parts of the smart grid infrastructure, including secondary electrical substations. Unfortunately, this introduces new security threats, which were not ...