Home > CSC-OpenAccess Library > Computer Security & Networks > International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJS | |||||||||||||||
|
IJS - Editorial Board Member (EBM)
Dr. Umit Karabiyik
Purdue University - United States of America
Contact Details
Email - ukarabiy@purdue.edu
401 N.Grant St., Knoy Hall Room 241
United States of America
About Dr. Umit Karabiyik
Dr. Umit Karabiyik is an Assistant Professor in the Department of Computer and Information Technology at Purdue University. Prior to his appointment at Purdue, Dr. K was an Assistant Professor in the Department of Computer Science at Sam Houston State University from 2015 to 2018. Dr. Karabiyik received his M.S. and Ph.D. degrees from Florida State University in 2010 and 2015, respectively. His research interests broadly lie in Digital Forensics, Cybersecurity, User and Data Privacy, Artificial Intelligence in Security, Privacy and Forensics Applications. He has secured federal and industrial funding from the U.S. National Institute of Justice, U.S. Department of Homeland Security, U.S. Federal Emergency Management Agency, and Lockheed Martin Corporation. He is an Associate Editor-in-Chief for Journal of Digital Forensics, Security and Law, Topic Editor for MDPI’s Electronics journal, and technical program committee (TPC) member of high-quality international conferences in Digital Forensics, Cybersecurity, and Networking.Dr. Umit Karabiyik handles review of manuscripts that are submitted under the following topics.
- Computer forensics
- Data confidentiality issues
- Data integrity issues
- Fraudulent usage
- Information hiding and watermarking
- Privacy protection
- Computer forensics
- Confidentiality, privacy, integrity, authenticatio
- Data recovery
- Information hiding and watermarking
- Network forensics