This page refers to Dr. Sari's published resources such as books, book chapters, articles, short letters and research papers in the filed of cybersecurity, computer networks, network security similar field of management information systems. Below are the research papers published between 2016-2018. Please contact for more information and publications.
Sari, Arif, and Joshua Chibuike Sopuru(2021). "Bayesian Model for Evaluating Real-World Adaptation Progress of a Cyber-Physical System." Artificial Intelligence Paradigms for Smart Cyber-Physical Systems. IGI Global, 2021. 324-343. https://www.igi-global.com/chapter/bayesian-model-for-evaluating-real-world-adaptation-progress-of-a-cyber-physical-system/266146
'Sari, A. (2018); "Turkish national cyber-firewall to mitigate countrywide cyber-attacks”, Computers & Electrical Engineering, Elsevier, Vol 73., No. 1, pp. 128-144, ISSN: 0045-7906, DOI: https://doi.org/10.1016/j.compeleceng.2018.11.008
'Sari, A. (2018); "Sari, A. (2018) Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir, Journal of Cyber Security Technology, 2:1, 14-36, DOI: http://dx.doi.org/10.1080/23742917.2018.1476956
'Kirikkaleli, D., Ozun, A., Sari, A. (2018) How can policy makers foster innovation? Observations from an analysis of OECD countries, Innovation, Journal of Cyber Security Technology, 2:1, 14-36, DOI: http://dx.doi.org/10.1080/23742917.2018.1476956
'Sari, A. (2016); "E-Government Attempts in Small Island Developing States: The Rate of Corruption with Virtualization”, Science and Engineering Ethcis, Springer , Vol 23., No. 6, pp.1673-1688, ISSN-O: 1353-3452,DOI: http://dx.doi.org/10.1007/s11948-016-9848-0
'Sari, A., Kilic, S., (2017); "Exploiting Cryptocurrency Miners with OSINT Techniqeus”, Arif Sari, Seyfullah Kilic; Exploiting Cryptocurrency Miners with OSINT Techniques, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 62-76. http://dx.doi.org/10.14738/tnc.56.4083
'Sari, A., Akkaya, M., Abdalla B., (2017) “Assessing e-Government systems success in Jordan (e-JC): A validation of TAM and IS Success model”. International Journal of Computer Science and Information Security, Vol.15, No.2, pp.277-304, ISSN:1947-5500. http://www.academia.edu/32053226/Assessing_e-Government_systems_success_in_Jordan_e-JC_A_validation_of_TAM_and_IS_Success_model_Validation_of_TAM_and_IS_for_e-Government_Systems_Success_in_Jordan
Sari, A, (2017)" The Blockchain: Overview of “Past” and “Future ", Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 39-47. http://dx.doi.org/10.14738/tnc.56.4061
Sari, A., Qayyum, Z.A., and Onursal, O (2017); The Dark Side of the China: The Government, Society and the Great Cannon, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 48-61. http://dx.doi.org/10.14738/tnc.56.4062
Sari, A, Akkaya, M., Fadiya, S., (2016) “A conceptual model selection of big data application: improvement for decision support system user organisation” International Journal of Qualitative Research in Services, Vol.2, No.3, pp. 200-210. http://dx.doi.org/10.1504/IJQRS.2016.10003553
Alzubi, A. and Sari, A. (2016) Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN) . Int. J. Communications, Network and System Sciences, Vol.9,No.12, pp. 613-621. http://dx.doi.org/10.4236/ijcns.2016.912047
Sari, A., Onursal, O. and Akkaya, M. (2015)Review of the Security Issues in Vehicular Ad Hoc Net-works (VANET) . Int. J. Communications, Network and System Sciences, Vol. 8, No.13, pp. 552-566. http://dx.doi.org/10.4236/ijcns.2015.813050
This section refers to Dr. Sari's published book chapters in international publishing houses such as Elsevier, Springer, IGI Global etc. in the filed of cybersecurity, computer networks, network security and similar fields of management information systems. Below are book chapters published between 2016-2021. Please contact for more information and publications.
Sari, A., & Sopuru, J. C. (2021). Bayesian Model for Evaluating Real-World Adaptation Progress of a Cyber-Physical System. In Luhach, A. K., & Elçi, A. (Ed.), Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (pp. 324-343). IGI Global. http://doi:10.4018/978-1-7998-5101-1.ch015
Onursal, O., & Sari, A. (2019). Enhanced Security for Network Communication With Proposed IS-IS Protocol. In Sari, A. (Ed.), Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (pp. 269-290). IGI Global. http://doi:10.4018/978-1-5225-8976-1.ch011
Sari, A. (2019). Ensuring Security With Evolutionary Green Computing Solutions for Sustainability of Mission Critical Cyber-Physical Systems. In: Saleem Hashmi, Imtiaz Ahmed Choudhury (eds) Encyclopedia of Renewable and Sustainable Materials. Elsevier, pp. 64-70,Print ISBN 978-0-128-13196-1 ,doi: https://doi.org/10.1016/B978-0-12-803581-8.11552-8
Sari A. (2019) Countering the IoT-Powered Volumetric Cyberattacks with Next-Generation Cyber-Firewall: Seddulbahir. In: Mahmood Z. (eds) Security, Privacy and Trust in the IoT Environment. Springer, Cham, pp. 83-96,Print ISBN 978-3-030-18074-4,Online ISBN 978-3-030-18075-1,doi: https://dx.doi.org/10.1007/978-3-030-18075-1_5
Atasoy, U.,Sari,A.,(2019) “Multidisciplinary Intel Fusion Technique for Proactive Cyber Intelligence Model for the IoT”, Springer Book onSecurity, Privacy and Trust in the IoT Environment, In Mahmood Z. (eds).Springer International Publishing, pp. 61-81, Print ISBN 978-3-030-18074-4,Online ISBN 978-3-030-18075-1,doi: https://dx.doi.org/10.1007/978-3-030-18075-1_5
Sari, A.(2018) “Context-Aware Intelligent Systems of Fog Computing For Cyber-Threat Intelligence” Springer International Publishing, Springer Book on “Fog Computing: Concepts, Frameworks and Technologies”, In: Mahmood Z. (eds). Online ISBN: 978-3-319-94890-4, Print ISBN: 978-3-319-94889-8., doi: https://doi.org/10.1007/978-3-319-94890-4_10
Sari, A., & Atasoy, U. C. (2019). Taxonomy of Cyber Attack Weapons, Defense Strategies, and Cyber War Incidents. In A. Sari (Ed.), Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (pp. 1-45). Hershey, PA: IGI Global. doi: https://dx.doi.org/10.4018/978-1-5225-8976-1.ch001
Megdadi, K., Akkaya, M., & Sari, A. (2018). Internet of Things and Smart City Initiatives in Middle Eastern Countries. In P. Raj, & A. Raman (Eds.), Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science (pp. 289-311). Hershey, PA: IGI Global.ISBN: ISBN13: 9781522559726,doi: https://doi.org/10.4018/978-1-5225-5972-6.ch014
Sari, A., Caglar, E., (2017).Load Balancing Algorithms and Protocols to Enhance Quality of Service and Performance in Data of WSN, In Intelligent Data-Centric Systems, edited by Massimo Ficco and Francesco Palmieri, Academic Press, 2018, Pages 143-178, Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, ISBN 9780128113738, doi: https://doi.org/10.1016/B978-0-12-811373-8.00007-0
Sari, A., Alzubi, A., (2017) Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework, In Intelligent Data-Centric Systems, edited by Massimo Ficco and Francesco Palmieri, Academic Press, 2018, Pages 285-313, Security and Resilience in Intelligent Data-Centric Systems andCommunication Networks, ISBN 9780128113738,doi: https://doi.org/10.1016/B978-0-12-811373-8.00013-6
Rahnama, B., Sari, A., & Ghafour, M. Y. (2016). Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation. In D. G., M. Singh, & M. Jayanthi (Eds.) Network Security Attacks and Countermeasures (pp. 270-312). Hershey, PA: Information Science Reference.Doi: https://doi.org/10.4018/978-1-4666-8761-5.ch012
Sari, A. (2016) "Security Issues in Mobile Wireless Networks." In Network Security Attacks and Countermeasures. edited by Dileep Kumar G. , Manoj Kumar Singh , and M.K. Jayanthi, 49-77. Hershey, PA: IGI Global, 2016. http://doi:10.4018/978-1-4666-8761-5.ch002
Sari, A. (2015) " Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, IGI Global, 2015, pp. 66-94. http://doi:10.4018/978-1-4666-8345-7.ch005
This section refers to Dr. Sari's published books in international publishing houses such as Elsevier, Springer, IGI Global etc. in the filed of cybersecurity, computer networks, network security and similar fields of management information systems. Below are books published between 2016-2020. Please contact for more information and publications.
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors.
This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
BUY ITNew Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
BUY ITThe journal publishes articles in the field of Cognitive Science, Social Science, Pedagogy, Psychology, Artificial intelligence, Linguistics, Philosophy, Computer Science and Neuroscience. Dr. Sari is participating in IJCRSEE as an Editorial Advisory board member since 2015.
ISSN 2334-847X (Printed)
ISSN 2334-8496 (Online)
Indexed by Scopus.