Publications & Works

Articles 27
All (27)
SCI-E, SSCI, AHCI (25)
SCI-E, SSCI, AHCI, ESCI (26)
ESCI (1)
Scopus (25)
TRDizin (1)

21. Improved server assisted signatures

COMPUTER NETWORKS , vol.47, no.3, pp.351-366, 2005 (SCI-Expanded, Scopus) identifier identifier
Papers Presented at Peer-Reviewed Scientific Conferences 28

1. An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined

International Conference on Computing, Networking and Communications (ICNC), Hawaii, United States Of America, 18 - 21 February 2019, pp.658-662, (Full Text) Sustainable Development identifier identifier

2. Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance

22nd International Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 18 - 21 February 2019, pp.222-229 Sustainable Development identifier identifier

3. DDoS Attack Modeling and Detection Using SMO

16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, 18 - 21 December 2017, pp.432-436 identifier identifier

4. Binary Classification Performance Measures/Metrics: A Comprehensive Visualized Roadmap to Gain New Insights

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5 - 08 October 2017, pp.821-826, (Full Text) identifier

5. Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts

5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania, 26 - 28 April 2017 identifier

6. On Differential Factors

11. INTERNATIONAL CONFERENCE ON INFORMATION SECURITY, 25 October 2016, (Full Text)

7. Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited

5th International Workshop on Lightweight Cryptography for Security and Privacy (LightSec), Cappadocia, Turkey, 20 - 21 September 2016, vol.10098, pp.18-32, (Full Text) identifier identifier

8. Feature Extraction and Classification Phishing Websites Based on URL

IEEE Conference Communications and Network Security CNS, Florence, Italy, 28 - 30 September 2015, pp.769-770, (Full Text) identifier

9. The Analysis of Feature Selection Methods and Classification Algorithms in Permission Based Android Malware Detection

IEEE Symposium on Computational Intelligence in Cyber Security, Florida, United States Of America, 9 - 12 December 2014, pp.81-88 Sustainable Development identifier

10. An Infrastructure for Efficient Reporting Workflow in Grid Based Teleradiology Architectures Using Relation Based Semantic Matching and Integer Linear Programming

Federated Conference on Computer Science and Information Systems (FedCSIS), Warszawa, Poland, 7 - 10 September 2014, vol.2, pp.241-245 Sustainable Development identifier

11. Integration of Federated Medical Systems for Vendor Neutral Image Access in Teleradiology Applications

25th European Medical Informatics Conference (MIE), İstanbul, Turkey, 31 August - 03 September 2014, vol.205, pp.538-542, (Full Text) identifier identifier identifier

12. Turkey's Approaches on Cyber Security Policy Framework

NATO Advanced Research Workshop (ARW) on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Macedonia, 10 - 12 June 2013, vol.38, pp.82-98, (Full Text) Sustainable Development identifier

13. The Need of a Semantic Layer between UMLS and Biomedical Information Systems

Metadata and Semantic Research: 5th International Conference, İzmir, Turkey, 12 - 14 October 2011, pp.163-169, (Full Text)

14. Homomorphic RSA Tallying and Its Randomization for e-Voting

6th International Conference on e-Government, Cape-Town, South Africa, 30 September - 01 October 2010, pp.160-167, (Full Text) identifier

15. Voter Verifiable and Single Transferable Electronic Voting for Elections with Electoral Barriers

9th European Conference on e-Government, London, Canada, 29 - 30 June 2009, pp.703-710 identifier

16. Evaluating learning management systems: Hexagonal e-learning assessment model (HELAM)

5th European and Mediterranean Conference on Information Systems, EMCIS 2008, Dubai, United Arab Emirates, 25 - 26 May 2008, (Full Text) identifier

17. Assessing hospital information systems processes: A validation of prise information systems success model in healthcare

14th Americas Conference on Information Systems, AMCIS 2008, Toronto, Canada, 14 - 17 August 2008, vol.6, pp.3956-3967 identifier

18. EVEREST: An efficient method for verification of digital signatures in real-time teleradiology

11th World Congress on Medical Informatics, San-Francisco, Costa Rica, 7 - 11 September 2004, vol.107, pp.1241-1245 identifier

19. Server assisted signatures revisited

TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 23 - 27 February 2004, vol.2964, pp.143-156, (Full Text)

20. Optimization of an online course with web usage mining

IASTED International Conference on Artificial Intelligence and Applications, Innsbruck, Austria, 16 - 18 February 2004, pp.21-25 identifier identifier

21. A GIS system for ambulatory transportation

2nd IASTED International Conference on Biomedical Engineering, Innsbruck, Austria, 16 - 18 February 2004, pp.431-435, (Full Text) Sustainable Development identifier identifier

22. Design and performance evaluation of a flexible and efficient server assisted signature protocol

8th IEEE International Symposium on Computers and Communication (ISCC 2003), Antalya, Turkey, 30 June - 03 July 2003, pp.1239-1244 identifier identifier

23. Infinite length hash chains and their applications

11th IEEE International Workshop on Enabling Technologies - Infrastructure for Collaborative Enterprises (WET ICE 2002), Pennsylvania, United States Of America, 10 - 12 June 2002, pp.57-61, (Full Text) identifier identifier

24. Wireless and mobile security

5th International Conference on Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies (KES 2001), Osaka, Japan, 6 - 08 September 2001, vol.69, pp.1282-1286, (Full Text) identifier

25. Resilient backpropagation for RBF networks

4th International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, Brighton, United Kingdom, 30 - 31 August 2000, pp.624-627 identifier

26. An experimental comparison of symbolic and neural learning algorithms

2nd International Conference on Knowledge-Based Intelligent Electronic Systems (KES 98), Adelaide, Australia, 21 - 23 April 1998, pp.306-315 identifier

27. Tagged potential field extension to self organizing feature maps

2nd International Conference on Knowledge-Based Intelligent Electronic Systems (KES 98), Adelaide, Australia, 21 - 23 April 1998, pp.292-298 identifier

28. Step down logistic regression for feature selection

International Conference on Applied Statistical in Medical Sciences, Ankara, Turkey, 01 August 1997, vol.4, pp.121-131, (Full Text) identifier
Metrics

Publication

55

Publication (WoS)

49

Publication (Scopus)

34

Citation (WoS)

426

H-Index (WoS)

12

Citation (Scopus)

490

H-Index (Scopus)

14

Citation (Scholar)

1124

H-Index (Scholar)

19

Project

4

Intellectual Property

1

Thesis Advisory

68

Open Access

52
UN Sustainable Development Goals