This page refers to Dr. Sari's published resources such as books, book chapters, articles, short letters and research papers in the filed of cybersecurity, computer networks, network security similar field of management information systems. Below are the research papers published between 2016-2018. Please contact for more information and publications.
'Sari, A. (2018); "Turkish national cyber-firewall to mitigate countrywide cyber-attacks”, Computers & Electrical Engineering, Elsevier, Vol 73., No. 1, pp. 128-144, ISSN: 0045-7906, DOI: https://doi.org/10.1016/j.compeleceng.2018.11.008.
'Sari, A. (2018); "Sari, A. (2018) Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir, Journal of Cyber Security Technology, 2:1, 14-36, DOI: http://dx.doi.org/10.1080/23742917.2018.1476956 .
'Kirikkaleli, D., Ozun, A., Sari, A. (2018) How can policy makers foster innovation? Observations from an analysis of OECD countries, Innovation, Journal of Cyber Security Technology, 2:1, 14-36, DOI: http://dx.doi.org/10.1080/23742917.2018.1476956 .
'Sari, A. (2016); "E-Government Attempts in Small Island Developing States: The Rate of Corruption with Virtualization”, Science and Engineering Ethcis, Springer , Vol 23., No. 6, pp.1673-1688, ISSN-O: 1353-3452,DOI: http://dx.doi.org/10.1007/s11948-016-9848-0
'Sari, A., Kilic, S., (2017); "Exploiting Cryptocurrency Miners with OSINT Techniqeus”, Arif Sari, Seyfullah Kilic; Exploiting Cryptocurrency Miners with OSINT Techniques, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 62-76. http://dx.doi.org/10.14738/tnc.56.4083
'Sari, A., Akkaya, M., Abdalla B., (2017) “Assessing e-Government systems success in Jordan (e-JC): A validation of TAM and IS Success model”. International Journal of Computer Science and Information Security, Vol.15, No.2, pp.277-304, ISSN:1947-5500.
'Sari, A, (2017) "The Blockchain: Overview of “Past” and “Future”", Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 39-47. http://dx.doi.org/10.14738/tnc.56.4061
Sari, A., Qayyum, Z.A., and Onursal, O (2017); The Dark Side of the China: The Government, Society and the Great Cannon, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 48-61. http://dx.doi.org/10.14738/tnc.56.4062
Sari, A, Akkaya, M., Fadiya, S., (2016) “A conceptual model selection of big data application: improvement for decision support system user organisation” International Journal of Qualitative Research in Services, Vol.2, No.3, pp. 200-210. http://dx.doi.org/10.1504/IJQRS.2016.10003553
Alzubi, A. and Sari, A. (2016) Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN). Int. J. Communications, Network and System Sciences, Vol.9,No.12, pp. 613-621. http://dx.doi.org/10.4236/ijcns.2016.912047
Sari, A., Onursal, O. and Akkaya, M. (2015) Review of the Security Issues in Vehicular Ad Hoc Net-works (VANET). Int. J. Communications, Network and System Sciences, Vol. 8, No.13, pp. 552-566. http://dx.doi.org/10.4236/ijcns.2015.813050
THE BOOKS and CHAPTERS
New Threats and Countermeasures in Digital Crime & CyberTerrorism
New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Network Security Attacks & Countermeasures
Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors.
This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
The journal publishes articles in the field of Cognitive Science, Social Science, Pedagogy, Psychology, Artificial intelligence, Linguistics, Philosophy, Computer Science and Neuroscience. Dr. Sari participating in IJCRSEE as an Editorial Advisory board member since 2015.
ISSN 2334-847X (Printed)
ISSN 2334-8496 (Online)
Indexed by Scopus.