Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Erhan Akbal is active.

Publication


Featured researches published by Erhan Akbal.


Journal of Software | 2016

Digital Forensic Analyses of Web Browser Records

Erhan Akbal; Fatma Günes; Ayhan Akbal

The most used applications by the majority of user of computer are web browsers. Users performs their many activities such as, browsing on the internet, download files, use social media applications, accessing e-mail accounts via web browser. Many of the crimes committed on digital resources must be analyzed user activities by examining the records of web browsers. Especially regarding crimes involving entered the URL, access times, browser type, time, downloaded files, search words, such information must be included in the reports of the examiners will create one of the data obtained. Web browser stores user records in different ways. Also, according to user operating systems differ in the locations for storing data. In this study, it is shown that how it should be done the analysis of web browsers on the digital resources which are subject to criminal, the data of different browsers on different operating systems, storage types and data types that can be obtained. In addition, it is showed that, the tools and features used to examine the records in the web browser.


Bilişim Teknolojileri Dergisi | 2018

Android İşletim Sisteminde Whatsapp Uygulamasının Adli Bilişim Açısından İncelenmesi

Erhan Akbal; Sengul Dogan; Ibrahim Baloglu

Gunumuzde pek cok kisinin sahip oldugu sosyal medya hesaplari insanlarin vazgecilmez iletisim araclari haline gelismistir. Yaygin kullanilan uygulamalardan biri olan WhatsApp artik akilli telefon sahibi olan bireylerin bircogunun telefonunda bulunmaktadir. Uygulama internete sahip tum akilli telefonlarda mesajlasma, goruntulu sohbet gibi pek cok avantajlar saglamaktadir. Bu kadar yaygin kullanilan bu uygulama adli sureclere yardimci olabilecek pek cok delil icerebilmektedir. Bu calismada sosyal medya kullaniminin buyuk bir hizla arttigi gunumuzde yaygin kullanilan WhatsApp uygulamasinin adli bilisim acisindan incelenmesi sunulmustur. Calismada Android tabanli bir telefon rootlu ve rootsuz olarak incelenerek elde edilebilecek veriler ve konumlari gosterilmistir.


international convention on information and communication technology electronics and microelectronics | 2017

Analysis of mobile phones in digital forensics

Sengul Dogan; Erhan Akbal

Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.


international convention on information and communication technology electronics and microelectronics | 2017

Digital forensic analysis through Firewall for detection of information crimes in hospital networks

Ayhan Akbal; Erhan Akbal

Digital forensics analysis was done by taking a view of Firewall on the Firewall used in the hospitals, and the data that could create a criminal element were determined. As is known, all network traffic on the networks is over the firewall. For this reason, the traffic on the entire network is recorded on the firewall. When these records need to be analyzed in terms of forensic information and criminal elements should be detected, the records on the firewall should be analyzed without deterioration. For this purpose, the image of the firewall needs to be taken. However, in order to obtain images, it is necessary to calculate MD5 and SHA-1 HASH values with international validity, which confirm the integrity of the image. For this purpose, the Juniper SSG 550 firewall device used in Firat University Hospital will be analyzed. For analysis, FTK Imager program which is developed by AccessData firm and offered for free use will be used. This image will be analyzed with forensic tools such as forensics explorer.


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

The importance of standardization in biometric data for digital forensics

Semih Ulupinar; Sengul Dogan; Erhan Akbal; Türker Tuncer

Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.


international conference on connected vehicles and expo | 2014

A smart trip advice model by inter-car voting data over Internet towards pleasant driving

Aytuğ Boyaci; M. Kaya; Sengul Dogan; Erhan Akbal; Haluk Eren

Almost every day we can observe that most of people spend quite a long time in traffic environment. In the course of driving, motorists occasionally desire to get traditional travel information, such as traffic, road, car and safety related driving data. In the near future, we shall quite likely mention about new generation drivers who wish to get social based data and its manipulation. Hence, we should develop new driver necessity strategies satisfying Internet based requirements of new generation drivers. Here, we propose a system offering sub-trip options without ruining drivers primary trip plan. In fact, we consider driving efficiency taking pleasure in driving by means of social computing rather exploiting traditional data manipulations such as safe driving, fuel-efficient driving, and obtaining traffic data. For the sake of new generation driver wishes, we develop a model using trip data and feedback information provided by drivers earlier visiting intended attraction place. Then, we utilize a social platform associated with central server holding social data such as road safety, weather conditions, and satisfaction rate of attraction place. In this study, we earlier define driver profiles as gourmand, shopaholic, adventurer, art lover, and technophile. Therefore, we propose a system satisfying possible sub-trip expectations of drivers having different profiles. Eventually, we have modeled a new generation inter car sub-route advice platform for pleasant and efficient trip.


signal processing and communications applications conference | 2018

Investigation of cloud computing systems in terms of Turkey and international legislation

Sengul Dogan; Mehmet Fatih Yasar; Erhan Akbal; Türker Tuncer


International Journal of Computer Network and Information Security | 2018

Forensics Image Acquisition Process of Digital Evidence

Erhan Akbal; Sengul Dogan


Fırat Üniversitesi Mühendislik Bilimleri Dergisi | 2017

ID3 Algoritması Kullanılarak Telefon Dolandırıcılığı Verilerinin Analizi Üzerine Bir Uygulama

Erhan Akbal; Şengül Doğan; Nurhayat Varol


Fırat Üniversitesi Mühendislik Bilimleri Dergisi | 2017

Karar Ağaçları ile Telefon Dolandırıcılığı Verilerinin Analizi

Erhan Akbal; Şengül Doğan; Nurhayat Varol

Collaboration


Dive into the Erhan Akbal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge