Dr. Cihan Varol

Associate Professor

Department of Computer Science

Sam Houston State University

Huntsville, TX, 77341

Phone: 1-936-294-3930

Fax: 1-936-294-4312

Email: cvarol@shsu.edu

Selected Journal Papers

[1] McDOWN, R., VAROL, C., CARVAJAL, L., CHEN, L. "In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes", Journal of Forensic Sciences (JFS), Volume 61, Issue 51, pp. 110-116, January 2016 (Impact Factor: 1.306)

[2] MASTJIK, F., VAROL, C., VAROL, A. "Comparison of Pattern Matching Techniques on Identification of Same Family Malware", International Journal of Information Security Science (IJISS), Volume 4, Issue 3, pp. 104-111, September 2015

[3] MENDOZA, A., KUMAR, A., MIDCAP, D., CHO, H., VAROL, C., "BrowStEx: A Tool to Aggregate Browser Storage Artifacts for Forensic Analysis", Digital Investigation Journal , Volume 14, pp. 63-75, September 2015, ISSN 1742-2876 (Impact Factor: 1.648)

[4] VAROL, C., HARI, S., "Detecting Near Duplicate Text Documents with a Hybrid Approach", Journal of Information Science, Volume 41, Issue 4, pp. 405-414, August 2015, DOI:10.1177/0165551515577912 (Impact Factor: 1.087)

[5] VILLEGAS, A., VAROL, C., "CVOIP-FRU: Comprehensive VoIP Forensics Report Utility", International Journal of Computer, Information Science and Engineering, Volume 8, Issue 4, pp. 1-6, March 2014

[6] AMSDEN, N., VAROL, C., "Malware Detection from a Virtual Machine: Correlating Unusual Keystrokes, Network Traffic, and Suspicious Registry Access", International Journal of Computer and Information Technology (IJCIT), Volume 2, Issue 6, pp. 1029-1034, November 2013, ISSN: 2279 - 0764 (Impact Factor: 0.687)

[7] CALPOUZOS, G., VAROL, C., "GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec", Computer Science and Information Technology, Volume 1, Issue 2, pp. 153 - 158, September 2013, DOI: 10.13189/csit.2013.010212

[8] VAROL, C., BAYRAK, C., "Hybrid Matching Algorithm for Personal Names" ACM Journal of Data and Information Quality (ACM JDIQ), Volume 3, Issue 4, Article No: 8, September 2012, doi>10.1145/2348828.2348830

[9] VAROL, C., NEUMANN, H., "Real-Time Data Quality Monitoring System for Data Cleansing", International Journal of Business Intelligence Research, Volume 3, Issue 1, January 2012, pp. 83-93, ISSN: 1947-3591

[10] NUTHAKKI, M. K., METE, M., VAROL, C., SUH, S. C., "UXSOM: UML Generated XML to Software Metrics", ACM SIGSOFT Software Engineering Notes, Vol. 36 Issue 3, May 2011, pp. 1-6, ISSN: 0163-5948

[11] VAROL, C., BAYRAK, C., "Estimation of Quality of Service in Spelling Correction using Kullback-Leibler divergence", Elsevier: Expert Systems with Application, Volume 38, Issue 5, May 2011, Pages 6307-6312 (Impact Factor: 3.162)

Selected Conference Proceedings

[1] SILESSI, S., VAROL, C., KARABATAK, M., "Identifying Gender from SMS Text Messages", The 15th IEEE International Conference on Machine Learning and Applications (IEEE ICMLA'16), December 18-20, 2016, pp. 488-491, Anaheim, CA, USA. ISBN: 978-1-5090-6167-9/16

[2] KONERU, K., VAROL, C., "Enhancement of Lempel-Ziv Algorithm to Estimate Randomness in a Dataset", International Conference on Machine Learning and Data Analysis (ICMLDA'16), October 19-21, 2016, pp. 486-491, San Francisco, CA, USA

[3] KONERU, K., PULLA, V., VAROL, C., "Performance Evaluation of Phonetic Matching Algorithms on English Words and Street Name: Comparison and Correlation", 5th International Conference on Data Management Technologies and Applications (DATA 2016), July 24-26, 2016, pp. 57-64, Lisbon, Portugal

[4] CARVAJAL, L., CHEN, L., VAROL, C., RAWAT, D., "Detecting Unprotected SIP-based Voice Over IP Traffic", 4th International Symposium on Digital Forensics and Security (ISDFS 2016), April 25-27, 2016, pp. 44-48, Little Rock, Arkansas, USA

[5] PULLA, V., VAROL, C., AL, M., "Open Source Data Quality Tools: Revisited", 13th International Conference on Information Technology: New Generations (ITNG 2016), April 11-13, 2016, pp. 893-904, Las Vegas, Nevada, USA

[6] VAROL, C., HARI, S., "Improving Near Duplicate Data Detection via DSound Phonetic Matching Algorithm: A Solution to Address Typographical Problems", The Seventh International Conference on Advances in Databases, Knowledge, and Data Application (DBKDA 2015), May 24-29, 2015, pp. 9-14, Rome, Italy. ISBN: 978-1-61208-408-4

[7] ONOCHIE, U.A., VAROL, C., "An Exploration and Evaluation of Low-Cost SIEM Solutions for Risk Mitigation and PCI DSS Compliance: A Case Study", 3rd International Symposium on Digital Forensics and Security (ISDFS 2015), May 11-12, 2015, Ankara, Turkey

[8] VAROL, C., VAROL, A., COOPER, P., "Digital Forensics Education in Turkey", The First International Symposium on Digital Forensics and Security (ISDFS 2013), May 20-21, 2013, Elazig, Turkey

[9] SILESSI, S., VAROL, H., OLAMIDE, K., KEY, D., HOUCK, B., VAROL, C., "Dragon Drop Pictorial Programming", 4th International Conference on Education and Educational Technologies (EET 13), January 31- February 1, 2013, pp. 51-56, Cambridge, MA, USA

[10] MENDOZA, A., VAROL, C., "Tracking Malware using Internet Activity Data", International Conference on Computer Science and Applications (ICSSA 12), October 24-26, 2012, pp. 102-105. San Francisco, California, USA

[11] VAROL, C., "Dynamic Job Scheduling in Multilayer Grid Networks", International Conference on Systems Engineering and Engineering Management (ICSEEM 12), October 24-26, 2012, pp. 1449-1452. San Francisco, California, USA

Current Graduate Students

  • Megan Roddie (M.S. in DF) - "Pattern Matching to Categorize Similar Cyber Intelligence Records" - To graduate in Fall 2017
  • Troy Mills (M.S. in IAS) - "Security Vulnerabilities of Battery Management Firmware"- To be graduate Fall 2015.
  • Shannon Silessi (M.S. in IAS) - "Gender Identification from Text Messages", To be graduate Fall 2015.
  • Jose Garcia (M.S. in DF) - "Smart Home Forensics", To graduate Spring 2017.

Past Graduate Students

  • Keerthi Koneru (M.S. in CS) - "Phonetic Matching Toolkit with State-of- the-art MetaSoundex Algorithm for English and Spanish Words" Graduated Fall 2016
  • Gloria Pena (M.S. in DF) - "Mobile Phone Anti-Forensic Goals & Techniques", Graduated Summer 2016
  • David Barnett (M.S. in IAS) - "Security concerns in DTN Bundle Protocols", Graduated Summer 2016
  • Srikanth Kambam (M.S. in CS) - "Author Disambiguation using Longest Common Substring Algorithm", Graduated Spring 2016
  • Abhinov Chinthireddy (M.S. in CS) - "Designing a Universal Rating Web Based Application Using Sentiment Analysis", Graduated Spring 2016
  • Venkata Pulla (M.S. in CS) - "Mobile Application Security via Selfie", Graduated Spring 2016
  • Troy Mills (M.S. in IAS) - "Security Vulnerabilities of Battery Management Firmware", Graduated Fall 2015
  • Shannon Silessi (M.S. in IAS) - "Gender Identification from Text Messages", Graduated Fall 2015 - Works as Software Developer at Groves Indusrt Supply, Houston, TX
  • Leighton Colvin (M.S. in IAS) - "Critical Issues in VoIP Usage in the Enterprise", Graduated Summer 2015
  • Ugochukwu Onochie (M.S. in IAS) - "An Exploration and Evaluation of Low-Cost SIEM Solutions for PCI-DSS Compliance: A Case Study", Graduated Summer 2015
  • Ferdiansyah Mastjik (M.S. in IAS) - "Detecting Same Family Malware with Pattern Matching Algorithms" - Graduated Spring 2015 - Works as a Big Data Solution Deployment Lead at Petrolink, Houston, TX
  • Victor Garcia (M.S. in DF) - "Forensic Investigation of 3D Printers" - Graduated Spring 2015 - Works as IT Security Admisinistrator at Sam Houston State University, Huntsville, TX
  • Abner Mendoza (M.S. in IAS) - "Browstex: A Tool to Extract Browser Storage Artifacts for Forensic Analysis" - Graduated in Summer 2013 - Ph.D. student at Texas A&M, College Station, TX
  • Divya Penmetsa (M.S. in CS) - "Differentiating the Accuracy Problems in a Dataset" - Graduated in Spring 2013 - Works as Developer at Cerner, Wichita, KS
  • Sairam Hari (M.S. in CS) - "A Hybrid Approach for Detection of Near Duplicates in Web Pages" - Graduated in Fall 2012 - Works as Senior Java Developer at Deloitte, Camp Hill, PA
  • Garrett Calpouzos (M.S. in DF) - "VoIP Steganography Utilizing the Internet Low Bit-Rate Codec" - Graduated in Summer 2012 - Works as Ethical Haccer Trainer at WhiteHat Security, Houston, TX
  • Alejandro Villegas (M.S. in IAS) - "CVOIP-FRU: Comprehensive VoIP Forensics Report Utility" - Graduated in Spring 2012 - Works as Security Program Manager at Microsoft, Redmond, WA
  • Kishore Shimikeri (M.S. in CS) - "Parts Based Image Recognition Model- Finding Waldo" - Graduated in Spring 2011 - Works as Lead Front End Engineer at Scripps Networks, Baltimore, MD
  • Sandeep Naidu (M.S. in CS) - "Generating a Panoramic View with Using SIFT and RanSac" - Graduated in Fall 2010 - Works as Data Validation Analyst II at ICON plc, Houston, TX
  • Revathi Kanna (M.S. in CS) - "Content based Information Retrieval using CMD" - Graduated in Fall 2010 - Works as Checkpoint Security Analyst at Walgreens, Chicago, IL
  • Henry Neumann (M.S. in CS) - "Real-Time Quality of Service Monitoring for Information Quality Products" - Graduated in Spring 2010 - Works as Network Administrator at Man Diesel & Turbo, Houston, TX