Publications & Works

Articles Published in Journals That Entered SCI, SSCI and AHCI Indexes

A simulation environment for cybersecurity attack analysis based on network traffic logs

MODELING AND SIMULATION OF COMPLEX COMMUNICATION NETWORKS, vol.18, pp.55-79, 2019 (Journal Indexed in SCI) identifier

I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, vol.27, no.5, pp.3713-3728, 2019 (Journal Indexed in SCI) identifier identifier

A window-based time series feature extraction method

COMPUTERS IN BIOLOGY AND MEDICINE, vol.89, pp.466-486, 2017 (Journal Indexed in SCI) Creative Commons License identifier identifier identifier

A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, vol.15, pp.47-59, 2016 (Journal Indexed in SCI) identifier identifier

Regulatory approaches for cyber security of critical infrastructures: The case of Turkey

COMPUTER LAW & SECURITY REVIEW, vol.32, no.3, pp.526-539, 2016 (Journal Indexed in SSCI) identifier identifier

A novel approach to optimize workflow in grid-based teleradiology applications

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, vol.123, pp.159-169, 2016 (Journal Indexed in SCI) identifier identifier identifier

Policymaking to preserve privacy in disclosure of public health data: a suggested framework

JOURNAL OF MEDICAL ETHICS, vol.41, no.3, pp.263-267, 2015 (Journal Indexed in SCI) identifier identifier identifier

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, vol.10, no.3, pp.297-304, 2013 (Journal Indexed in SCI) identifier

A Knowledge Based Search Tool for Performance Measures in Health Care Systems

JOURNAL OF MEDICAL SYSTEMS, vol.36, no.1, pp.201-221, 2012 (Journal Indexed in SCI) identifier identifier identifier

METADATA MANAGEMENT AND SEMANTICS IN MICROARRAY REPOSITORIES

BALKAN JOURNAL OF MEDICAL GENETICS, vol.14, no.2, pp.49-63, 2011 (Journal Indexed in SCI) Creative Commons License identifier identifier

MedicoPort: A medical search engine for all

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, vol.86, no.1, pp.73-86, 2007 (Journal Indexed in SCI) identifier identifier identifier

Improved server assisted signatures

COMPUTER NETWORKS, vol.47, no.3, pp.351-366, 2005 (Journal Indexed in SCI) identifier identifier

Server assisted signatures revisited

TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, vol.2964, pp.143-156, 2004 (Journal Indexed in SCI) identifier identifier

SAOTS: A new efficient server assisted signature scheme for pervasive computing

SECURITY IN PERVASIVE COMPUTING, vol.2802, pp.187-200, 2004 (Journal Indexed in SCI) identifier identifier

Health Informatics

BIOMATERIALS: FROM MOLECULES TO ENGINEERED TISSUES, vol.553, pp.337-358, 2004 (Journal Indexed in SCI) identifier identifier

A new design of privilege management infrastructure with binding signature semantics

PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, vol.3093, pp.306-313, 2004 (Journal Indexed in SCI) identifier identifier

One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication

COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, vol.2869, pp.794-801, 2003 (Journal Indexed in SCI) identifier identifier

INTERPRETATION OF DOPPLER BLOOD-FLOW VELOCITY WAVE-FORMS USING NEURAL NETWORKS

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, pp.865-869, 1994 (Journal Indexed in SCI) identifier

Articles Published in Other Journals

Evaluating learning management systems: Adoption of hexagonal e-learning assessment model in higher education

Transforming Government: People, Process and Policy, vol.3, no.2, pp.111-130, 2009 (Journal Indexed in ESCI) identifier identifier

Refereed Congress / Symposium Publications in Proceedings

An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined

International Conference on Computing, Networking and Communications (ICNC), Hawaii, United States Of America, 18 - 21 February 2019, pp.658-662 identifier identifier

Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance

22nd International Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 18 - 21 February 2019, pp.222-229 identifier identifier

DDoS Attack Modeling and Detection Using SMO

16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, 18 - 21 December 2017, pp.432-436 identifier identifier

Binary Classification Performance Measures/Metrics: A Comprehensive Visualized Roadmap to Gain New Insights

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5 - 08 October 2017, pp.821-826 identifier

Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts

5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania, 26 - 28 April 2017 identifier

On Differential Factors

11. INTERNATIONAL CONFERENCE ON INFORMATION SECURITY, 25 October 2016

Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited

5th International Workshop on Lightweight Cryptography for Security and Privacy (LightSec), Cappadocia, Turkey, 20 - 21 September 2016, vol.10098, pp.18-32 identifier identifier

Feature Extraction and Classification Phishing Websites Based on URL

IEEE Conference Communications and Network Security CNS, Florence, Italy, 28 - 30 September 2015, pp.769-770 identifier

The Analysis of Feature Selection Methods and Classification Algorithms in Permission Based Android Malware Detection

IEEE Symposium on Computational Intelligence in Cyber Security, Florida, United States Of America, 9 - 12 December 2014, pp.81-88 identifier

An Infrastructure for Efficient Reporting Workflow in Grid Based Teleradiology Architectures Using Relation Based Semantic Matching and Integer Linear Programming

Federated Conference on Computer Science and Information Systems (FedCSIS), Warszawa, Poland, 7 - 10 September 2014, vol.2, pp.241-245 identifier

Integration of Federated Medical Systems for Vendor Neutral Image Access in Teleradiology Applications

25th European Medical Informatics Conference (MIE), İstanbul, Turkey, 31 August - 03 September 2014, vol.205, pp.538-542 identifier identifier identifier

Turkey's Approaches on Cyber Security Policy Framework

NATO Advanced Research Workshop (ARW) on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Macedonia, 10 - 12 June 2013, vol.38, pp.82-98 identifier

The Need of a Semantic Layer between UMLS and Biomedical Information Systems

Metadata and Semantic Research: 5th International Conference, İzmir, Turkey, 12 - 14 October 2011, pp.163-169

Homomorphic RSA Tallying and Its Randomization for e-Voting

6th International Conference on e-Government, Cape-Town, South Africa, 30 September - 01 October 2010, pp.160-167 identifier

Voter Verifiable and Single Transferable Electronic Voting for Elections with Electoral Barriers

9th European Conference on e-Government, London, Canada, 29 - 30 June 2009, pp.703-710 identifier

Evaluating learning management systems: Hexagonal e-learning assessment model (HELAM)

5th European and Mediterranean Conference on Information Systems, EMCIS 2008, Dubai, United Arab Emirates, 25 - 26 May 2008 identifier

Assessing hospital information systems processes: A validation of prise information systems success model in healthcare

14th Americas Conference on Information Systems, AMCIS 2008, Toronto, Canada, 14 - 17 August 2008, vol.6, pp.3956-3967 identifier

EVEREST: An efficient method for verification of digital signatures in real-time teleradiology

11th World Congress on Medical Informatics, San-Francisco, Costa Rica, 7 - 11 September 2004, vol.107, pp.1241-1245 identifier

Server assisted signatures revisited

TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 23 - 27 February 2004, vol.2964, pp.143-156

Optimization of an online course with web usage mining

IASTED International Conference on Artificial Intelligence and Applications, Innsbruck, Austria, 16 - 18 February 2004, pp.21-25 identifier identifier

A GIS system for ambulatory transportation

2nd IASTED International Conference on Biomedical Engineering, Innsbruck, Austria, 16 - 18 February 2004, pp.431-435 identifier identifier

Design and performance evaluation of a flexible and efficient server assisted signature protocol

8th IEEE International Symposium on Computers and Communication (ISCC 2003), Antalya, Turkey, 30 June - 03 July 2003, pp.1239-1244 identifier identifier

Infinite length hash chains and their applications

11th IEEE International Workshop on Enabling Technologies - Infrastructure for Collaborative Enterprises (WET ICE 2002), Pennsylvania, United States Of America, 10 - 12 June 2002, pp.57-61 identifier identifier

Wireless and mobile security

5th International Conference on Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies (KES 2001), Osaka, Japan, 6 - 08 September 2001, vol.69, pp.1282-1286 identifier

Resilient backpropagation for RBF networks

4th International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, Brighton, United Kingdom, 30 - 31 August 2000, pp.624-627 identifier

An experimental comparison of symbolic and neural learning algorithms

2nd International Conference on Knowledge-Based Intelligent Electronic Systems (KES 98), Adelaide, Australia, 21 - 23 April 1998, pp.306-315 identifier

Tagged potential field extension to self organizing feature maps

2nd International Conference on Knowledge-Based Intelligent Electronic Systems (KES 98), Adelaide, Australia, 21 - 23 April 1998, pp.292-298 identifier

Step down logistic regression for feature selection

International Conference on Applied Statistical in Medical Sciences, Ankara, Turkey, 01 August 1997, vol.4, pp.121-131 identifier