Ahmet Ali Suzen

Work place: Isparta University of Applied Sciences, Department of Information Security, Isparta, Turkey

E-mail: ahmetsuzen@isparta.edu.tr

Website:

Research Interests: Software Development Process, Software Engineering, Data Structures and Algorithms

Biography

Ahmet Ali SÜZEN is head of cyber security application and researching center at Isparta University of Applied Sciences. He completed his doctorate in computer engineering. He has program development experience cyber security, deep learning and software development. He has 4 books in the field of deep learning and software development. He has been editor-in-chief of the journal in two 2 international journals in the field of engineering. He also has project management experience, having successfully completed 2 projects about cyber security and mobile software development.

Author Articles
Real-Time Tree Counting Android Application and Central Monitoring System

By Ahmet Ali Suzen Remzi Gurfidan Kiyas Kayaalp Mehmet Ali Simsek

DOI: https://doi.org/10.5815/ijitcs.2020.02.02, Pub. Date: 8 Apr. 2020

In this study, a cloud-based android application and centralized tracking software were developed to perform an accurate and uninterrupted tree count across open lands. The application is used to count the desired number of trees and species at the same time. User-logged data and location information are saved in real-time to the application's cloud database. The application can work online and with offline mod. In cases where there is no internet connection, it inserts the data to the local SQLite database. After the connection is established, the pairing continues. It's used Google Firebase on the cloud server for data storage. The processing of target locations and GPS coordinates was developed with the Google Map Library. The tree counting application automatically picks up the user's current location when it is first opened. The counting starts after the tree and tree species that the user has selected from the menu. The software developed shows that tree counting is done simultaneously at the desired point. It also solves confusion caused by different tree species during the counting. We've received feedback from 100 people using the application. The users answered five questions. As a result, it is aimed to provide a comfortable transition between tree species and its users with its simple use to eliminate the complexity of counting and save time.

[...] Read more.
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem

By Ahmet Ali Suzen

DOI: https://doi.org/10.5815/ijcnis.2020.01.01, Pub. Date: 8 Feb. 2020

The development of technology and uses increases the interconnected digital ecosystem. This is accompanied by dense data usage. Wherever digital data is available, cyber-attacks are threatened and increase the need for cybersecurity prevention. The fact that Industry 4.0 basic fuel is data indicates that the risk of cyber-attack will continue to increase in Industry 4.0. In this study, the sources of cybersecurity threats in the Industry 4.0 ecosystem are examined in the corporate and end-user dimensions. The cybersecurity vulnerabilities most evident in Industry 4.0 systems have been determined to consist of vulnerabilities in control systems protocols, unprotected thing connections, neglect of periodic infiltration tests, inability to manage network devices effectively and untrained personnel. The cyber defense strategies and requirements for these vulnerabilities have been determined. At the same time, corporates and end-users have been told how to implement these preventions. As a result, it is not possible to completely prevent cyber-attacks within the Industry 4.0 ecosystem. Preventing the vulnerabilities identified in the study will ensure that the damage is minimal in attacks.

[...] Read more.
Other Articles