Yayınlar & Eserler

Makaleler 81
Tümü (81)
SCI-E, SSCI, AHCI (55)
SCI-E, SSCI, AHCI, ESCI (56)
ESCI (1)
Scopus (57)
TRDizin (14)
Diğer Yayınlar (12)
Hakemli Bilimsel Toplantılarda Yayımlanmış Bildiriler 97

1. QUANTUM SECURE INSTANT MESSAGING: REVISITED

INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Baku, Azerbaycan, 25 - 26 Kasım 2022, (Tam Metin Bildiri)

2. Post-Quantum Cryptography: A Snapshot of Standardization Efforts

Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems, NATO Science for Peace and Security Series, Azerbaycan, 5 - 09 Eylül 2022, ss.90-99, (Tam Metin Bildiri)

3. End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications

International Conference on Science, Engineering Management and Information Technology, Ankara, Türkiye, 8 - 09 Eylül 2022, (Tam Metin Bildiri)

4. Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc)

Intermediate and Advanced Course on Post-Quantum Cryptography, Baku, Azerbaycan, 5 - 10 Eylül 2022, (Tam Metin Bildiri)

5. End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications

International Conference on Science, Engineering Management and Information Technology, Ankara, Türkiye, 08 Eylül 2022, (Tam Metin Bildiri)

6. A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity

Applications of Computer Algebra – ACA 2022, İstanbul, Türkiye, 15 - 19 Ağustos 2022, (Tam Metin Bildiri)

7. A Lattice-based Group Signature Scheme with Applications in Blockchain

Applications of Computer Algebra - ACA 2022, Türkiye, 15 - 19 Ağustos 2022, (Özet Bildiri)

8. CODE-BASED CRYPTOSYSTEMS MCNIE REVISITED

Applications of Computer Algebra (ACA), SCALE, GEBZE, Türkiye, 15 Ağustos 2022, (Özet Bildiri)

9. Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları

3. Kuantum Sonrası Kriptografi Çalıştayı, Türkiye, 29 - 30 Mart 2022, (Tam Metin Bildiri)

10. On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m

ICNDA 2022 International Conference on Nonlinear Dynamics and Applications, Majitar, Hindistan, 9 - 12 Mart 2022, (Tam Metin Bildiri)

11. Challenges and Opportunities in Cryptography

The 6th International Conference of Reliable Information and Communication Technology, Suudi Arabistan, 22 - 23 Aralık 2021, (Özet Bildiri)

12. On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2m

International Conference on Nonlinear Dynamics and Applications, ICNDA 2022, Virtual, Online, 9 - 11 Mart 2022, ss.587-595, (Tam Metin Bildiri) identifier

13. Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude

34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022, Pennsylvania, Amerika Birleşik Devletleri, 1 - 10 Temmuz 2022, ss.382-387, (Tam Metin Bildiri) Creative Commons License identifier

15. Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude

2022 International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols, FAVPQC 2022, Madrid, İspanya, 24 Ekim 2022, cilt.3280, ss.16-31, (Tam Metin Bildiri) identifier

16. IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C

INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Baku, Azerbaycan, 29 Ekim 2021, ss.81-84, (Tam Metin Bildiri)

17. CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS

International Conference on INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Baku, Azerbaycan, 22 Ekim 2021, ss.9-12, (Tam Metin Bildiri)

18. HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE

INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Azerbaycan, 29 Ekim 2021, ss.112-114, (Tam Metin Bildiri)

20. On the Construction of $$4 \times 4$$ Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$

Proceedings of the Seventh International Conference on Mathematics and Computing ICMC 2021, 02 Mart 2021, (Tam Metin Bildiri)

21. Survey on Implementation of Lattice-based Identification Schemes

4th International Students Science Congress, İzmir, Türkiye, 15 Ocak 2021, ss.194-206, (Tam Metin Bildiri)

22. Support Vector Machines: From Classical Version to Quantum

4th International Students Science Congress, İzmir, Türkiye, 15 Ocak 2021, ss.207-216, (Tam Metin Bildiri)

23. GPU implementation of quantum secure ABC cryptosystem on CUDA

2nd International Workshop on Intelligent Information Technologies and Systems of Information Security, IntellTSIS 2021, Khmelnytskyi, Ukrayna, 24 - 26 Mart 2021, cilt.2853, ss.309-316, (Tam Metin Bildiri) identifier

24. Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neura Network

6th International Conference on Computer Science and Engineering, UBMK 2021, Ankara, Türkiye, 15 - 17 Eylül 2021, ss.731-734, (Tam Metin Bildiri) identifier

25. Keystroke Dynamics Based Authentication System

6th International Conference on Computer Science and Engineering, UBMK 2021, Ankara, Türkiye, 15 - 17 Eylül 2021, ss.644-649, (Tam Metin Bildiri) identifier

26. DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2 - 03 Aralık 2021, ss.111-115, (Tam Metin Bildiri) identifier

27. A Systematic Survey on Mobile Internet of Things Security

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2 - 03 Aralık 2021, ss.116-120, (Tam Metin Bildiri) identifier

28. A Brief Review on Deep Learning Based Software Vulnerability Detection

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2 - 03 Aralık 2021, ss.143-148, (Tam Metin Bildiri) identifier

29. PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices

9th International Symposium on Digital Forensics and Security (ISDFS), Elazığ, Türkiye, 28 - 29 Haziran 2021, (Tam Metin Bildiri) identifier identifier

30. Efficient Implementations of Gauss-Based Sieving Algorithms Gauss Tabanli Eleme Algoritmalarinin Verimli Uygulamalari

28th Signal Processing and Communications Applications Conference, SIU 2020, Gaziantep, Türkiye, 5 - 07 Ekim 2020, (Tam Metin Bildiri) identifier

31. Stocks Prices Prediction with Long Short-term Memory

5th International Conference on Internet of Things, Big Data and Security (IoTBDS), Prague, Çek Cumhuriyeti, 7 - 09 Mayıs 2020, ss.221-226, (Tam Metin Bildiri) identifier

32. Efficient Implementations of Gauss-Based Sieving Algorithms

28th Signal Processing and Communications Applications Conference (SIU), ELECTR NETWORK, 5 - 07 Ekim 2020, (Tam Metin Bildiri) identifier identifier

33. Comparison of Regression Methods in Permission Based Android Malware Detection

28th Signal Processing and Communications Applications Conference (SIU), ELECTR NETWORK, 5 - 07 Ekim 2020, (Tam Metin Bildiri) identifier identifier

34. Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 Aralık 2020, ss.75-79, (Tam Metin Bildiri) identifier

35. A Novel Lattice-Based Threshold Ring Signature Scheme

5th International Conference on Computer Science and Engineering (UBMK), Diyarbakır, Türkiye, 9 - 11 Eylül 2020, ss.219-223, (Tam Metin Bildiri) identifier

36. Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları

12th International Conference on Information Security and Cryptology, Ankara, Türkiye, 16 - 17 Ekim 2019, ss.24-29, (Tam Metin Bildiri)

37. New Signature Algorithm Based on Concatenated Rank Codes

Second International Workshop on Cryptography and its Applications, Oran, Cezayir, 18 - 19 Haziran 2019, ss.221-224, (Tam Metin Bildiri)

38. Efficient GeMSS Based Ring Signature Scheme

The Second International Workshop on Cryptography and its Applications – 2’IWCA’19, Oran, Cezayir, 18 - 19 Haziran 2019, (Tam Metin Bildiri)

39. Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.91-96, (Tam Metin Bildiri) identifier identifier

40. Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme

15th International Conference on Information Security Practice and Experience (ISPEC), Kuala-Lumpur, Malezya, 26 - 28 Kasım 2019, cilt.11879, ss.41-55, (Tam Metin Bildiri) identifier identifier

41. Permission Weighting Approaches in Permission Based Android Malware Detection

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.134-139, (Tam Metin Bildiri) identifier identifier

42. Formal Analysis of MaTRU Cryptosystem

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.403-408, (Tam Metin Bildiri) identifier identifier

43. Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.372-377, (Tam Metin Bildiri) identifier identifier

44. A New 3-pass Zero-knowledge Lattice-based Identification Scheme

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.409-413, (Tam Metin Bildiri) identifier identifier

45. Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme

İnformasiya təhlükəsizliyinin aktual multidissiplinar elmi-praktiki problemləri IV respublika konfransının materialları, 14 Aralık 2018, (Tam Metin Bildiri)

46. A Bayesian Networks Application in Occupational Health and Safety

International Conference on Computer Science and Engineering, 20 - 23 Eylül 2018, (Tam Metin Bildiri) identifier identifier

47. Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması

SAVTEK 2018, 9. SAVUNMA TEKNOLOJİLERİ KONGRESİ, 27 Haziran 2018, (Tam Metin Bildiri)

48. GUI Based Ring Signature Scheme

18th Central European Conference on Cryptology (CECC 2018), Smolenice, Slovakya, 6 - 08 Haziran 2018, ss.1-3, (Tam Metin Bildiri)

49. A SURVEY ON DIGITAL RIGHTS MANAGEMENT

4th International Conference on Engineering and Natural Sciences (ICENS 2018), Kiev, Ukrayna, 2 - 06 Mayıs 2018, ss.260, (Özet Bildiri)

50. An Overview for the National Cyber Security Strategy

International Conference on Advanced Technologies, Computer Engineering and Science (ICATCES 2018), Karabük, Türkiye, 11 - 13 Mayıs 2018, ss.603-609, (Tam Metin Bildiri)

51. An Automated Vulnerable Website Penetration

International Conference on Advanced Technologies, Computer Engineering and Science (ICATCES 2018), Karabük, Türkiye, 11 - 13 Mayıs 2018, ss.297-301, (Tam Metin Bildiri)

52. A study on the use of quantum computers, risk assessment and security problems

6th International Symposium on Digital Forensic and Security, ISDFS 2018, Antalya, Türkiye, 22 - 25 Mart 2018, cilt.2018-January, ss.1-6, (Tam Metin Bildiri) identifier

53. On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques

2nd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Kizilcahamam, Türkiye, 19 - 21 Ekim 2018, ss.649-654, (Tam Metin Bildiri) identifier identifier

54. TRCyberLab: An Infrastructure for Future Internet and Security Studies

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.431-435, (Tam Metin Bildiri) identifier identifier

55. Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form

International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Türkiye, 3 - 04 Aralık 2018, ss.81-86, (Tam Metin Bildiri) identifier

56. Fast NTRU Encryption in GPU for Secure IoP Communication in Post-quantum Era

IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou, Çin, 7 - 11 Kasım 2018, ss.1923-1928, (Tam Metin Bildiri) identifier identifier

57. A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.359-362, (Tam Metin Bildiri) identifier identifier

58. New Quantum Secure Key Exchange Protocols Based on MaTRU

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.260-264, (Tam Metin Bildiri) identifier identifier

59. Work Accident Analysis with Machine Learning Techniques

3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosna-Hersek, 20 - 23 Eylül 2018, ss.215-219, (Tam Metin Bildiri) identifier identifier

60. A Bayesian Network Application in Occupational Health and Safety

3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosna-Hersek, 20 - 23 Eylül 2018, ss.239-243, (Tam Metin Bildiri) identifier identifier

61. New Results on Permission Based Static Analysis for Android Malware

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.340-343, (Tam Metin Bildiri) identifier identifier

62. Computing Square Roots in Prime Fields via Singular Elliptic Curves

The Third International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering (AMINSE 2017), 6 - 09 Aralık 2017, (Özet Bildiri)

63. Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow

The 3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, Tiflis, Gürcistan, 6 - 09 Aralık 2017, cilt.3, ss.68, (Özet Bildiri)

64. On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography

3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, 6 - 09 Aralık 2017, cilt.3, ss.70-73, (Özet Bildiri)

65. A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale

8 th International Advanced Technologies Sympoium, Elazığ, Türkiye, 19 - 22 Ekim 2017, ss.3733-3738, (Tam Metin Bildiri)

66. Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması

10th International Conference on Information Security and Cryptology, 20 - 21 Ekim 2017, cilt.10, ss.1-7, (Tam Metin Bildiri)

67. Kuantum Sonrası Güvenilir Dijital Hak Yönetimi İçin Yeni Kimlik Doğrulama Protokolü

2nd International Conference on Computer Science and Engineering (UBMK’17), 5 - 08 Ekim 2017, ss.322-327, (Tam Metin Bildiri) identifier

68. An artificial bee colony algorithm for solving the weapon target assignment problem

7th International Conference on Information Communication and Management, ICICM 2017, Moscow, Rusya, 28 - 30 Ağustos 2017, cilt.Part F131202, ss.28-31, (Tam Metin Bildiri) identifier

69. Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology

International Conference on Theoretical and Application Problems of Mathematics, 25 - 26 Mayıs 2017, cilt.1, ss.21, (Özet Bildiri)

70. Modified Arithmetic Circuits for Galois Rings

3rd International Conference on Engineering and Natural Sciences (ICENS 2017), Budapest, Macaristan, 3 - 07 Mayıs 2017, ss.327, (Özet Bildiri)

71. Strassen-like 2x2 Matrix Squaring Revisited

3rd International Conference on Engineering and Natural Sciences (ICENS 2017), Budapest, Macaristan, 3 - 07 Mayıs 2017, ss.421, (Özet Bildiri)

72. A Novel Identicication Scheme for Post-Quantum Secure Digital Right Management

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.322-327, (Tam Metin Bildiri) identifier identifier

73. On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.456-461, (Tam Metin Bildiri) identifier identifier

74. The Trend of Business Intelligence Adoption and Maturity

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.532-537, (Tam Metin Bildiri) identifier identifier

75. Some Results on MDS Matrices

9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.35, (Tam Metin Bildiri)

76. Speeding up Number Theoretic Transform Lazy Reductions Explained

9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.9, ss.115-119, (Tam Metin Bildiri)

77. A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks

International Conference on Computer Science and Engineering, Türkiye, 20 - 23 Ekim 2016, cilt.75, (Tam Metin Bildiri)

78. Efficient Methods for Lattice based Cryptography

The 5th International Workshop on Cryptography and its Applications - IWCA’ 2016, Cezayir, 26 - 27 Nisan 2016

79. Post Quantum Cryptography An Introduction

3rd INTERNATIONAL CONFERENCE ON CONVERGENCE TECHNOLOGY MANAGEMENT (CTM-2016), Hindistan, 1 - 02 Nisan 2016

80. Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography

3rd International Conference on “Converging Technologies & Management (CTM-2016), Hindistan, 1 - 02 Nisan 2016, (Özet Bildiri)

81. An efficient lattice-based signature scheme with provably secure instantiation

8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, Fes, Fas, 13 - 15 Nisan 2016, cilt.9646, ss.44-60, (Tam Metin Bildiri) identifier

82. On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA

2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015, Koper, Slovenya, 3 - 04 Eylül 2015, cilt.9540, ss.155-168, (Tam Metin Bildiri) identifier

83. Arithmetic Operations in Lattice Based Cryptography

International Scientific Conference of Students and Young Scientists Theoretical and Applied Aspects of Cybernetics, Kiev, Ukrayna, 23 - 27 Kasım 2015, (Özet Bildiri)

84. Data Storage of Electronic Exams

Proceedings of 8th International Conference on Information Security and Cryptology (ISCTURKEY 2015), Ankara, Türkiye, 30 - 31 Ekim 2015, (Tam Metin Bildiri)

85. Multiplication in a Galois Ring

7th International Workshop on Signal Design and Its Applications in Communications (IWSDA), Bengaluru, Hindistan, 13 - 19 Eylül 2015, ss.28-32, (Tam Metin Bildiri) identifier

86. Efficient Arithmetic for Lattice Based Cryptography on GPU Using CUDA

IEEE 22nd Signal Processing and Communications Applications Conference, Trabzon, Türkiye, 23 - 25 Nisan 2014, ss.854-857, (Tam Metin Bildiri) identifier

87. EFFICIENT ARITHMETIC FOR LATTICE-BASED CRYPTOGRAPHY ON GPU USING THE CUDA PLATFORM

22nd IEEE Signal Processing and Communications Applications Conference (SIU), Trabzon, Türkiye, 23 - 25 Nisan 2014, ss.854-857, (Tam Metin Bildiri) identifier identifier

88. Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta

Akademik Bilişim 2011, Malatya, Türkiye, 2 - 04 Şubat 2011, ss.723-728, (Tam Metin Bildiri)

89. Polynomial multiplication over binary fields using charlier polynomial representation with low space complexity

11th International Conference on Cryptology in India, INDOCRYPT 2010, Hyderabad, Hindistan, 12 - 15 Aralık 2010, cilt.6498 LNCS, ss.227-237, (Tam Metin Bildiri) identifier

90. Faster Montgomery modular multiplication without pre-computational phase for some classes of finite fields

25th International Symposium on Computer and Information Sciences, ISCIS 2010, London, İngiltere, 22 - 24 Eylül 2010, cilt.62 LNEE, ss.405-408, (Tam Metin Bildiri) identifier

91. Open Source UTM Alternative ClearOS

Proceeding of the third International Conference “Problems of Cybernetics and Informatics, 08 Eylül 2010, (Tam Metin Bildiri)

92. The Third International Conference onProblems of Cybernetics and Informatics

Problems of Cybernetics and Informatics, PCI’ 2010, Baku, Azerbaycan, 08 Eylül 2010, ss.211-212, (Tam Metin Bildiri)

93. Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers

Information Security and Cryptology Conference, 13 - 15 Aralık 2007, ss.157-163, (Tam Metin Bildiri)

94. A note on Knapsack Cryptosystems

International scientific conference “Information Technologies and Telecommunications in Education and Science, 06 Ekim 2007, (Tam Metin Bildiri)

95. Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye

Proceeding of the 3-th International conference on Information Technologies and Telecommunication (IT T C 2007), 06 Ekim 2007, (Tam Metin Bildiri)

96. Steganography and new implementation of steganography Steganografi ve steganografinin yeni bir uygulamasi

IEEE 13th Signal Processing and Communications Applications Conference, SIU 2005, Kayseri, Türkiye, 16 - 18 Mayıs 2005, cilt.2005, ss.64-67, (Tam Metin Bildiri) identifier

97. Securty of online Learning

International scientific conference “Information Technologies and Telecommunications in Education and Science” (IT T ES’2005), 22 Mayıs 2005, (Tam Metin Bildiri)
Kitaplar 24

2. On the Android Malware Detection System Based on Deep Learning

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, D. Jude Hemanth , Utku Kose , Junzo Watada , Bogdan Patrut, Editör, Springer Cham, ss.453-466, 2023

3. Collecting Health Information with LoRa Technology

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.429-439, 2023

4. A New Hybrid Method for Indoor Positioning

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.441-451, 2023

6. Havacılık Sistemlerinde Siber Güvenlik

Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., ss.293-324, 2022

7. A Review of Resource Allocation and Management Methods in IoT

A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems, Pardeep Kumar, Ahmed Jabbar Obaid, Korhan Cengiz, Ashish Khanna, Valentina Emilia Balas, Editör, Springer, Cham, ss.409-429, 2022

9. Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji

NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, 2021

10. Kuantum Bilgisayar Çağında Kriptosistemlere Bir Bakış

Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji, Sağıroğlu, Şeref, Akleylek, Sedat, Editör, Nobel, Ankara, ss.239-275, 2021

11. Kafes Tabanlı Grup İmzalama Şemalarının Özellikleri Ve Değerlendirilmesi

Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji, Sağıroğlu Şeref, Akleylek Sedat, Editör, Nobel Akademik Yayıncılık Eğitim Danışmanlık Ltdi. Şti., Ankara, ss.491-541, 2021

12. SİBER GÜVENLİK VE SAVUNMA : BİYOMETRİK VE KRİPTOGRAFİK UYGULAMALAR

NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, 2020

15. Sis Bilişimi ve Uygulamalarında Veri Güvenliği

Siber Güvenlik ve Savunma Biyometrik ve Kriptografik Uygulamalar, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, ss.1-28, 2020

16. Kafes Tabanlı Kriptografide Kullanılan Zor Problemlerin Kriptanalizi ve Yazılım Kütüphaneleri

SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, ss.233-256, 2020

19. Kuantum Bilgisayarlar Sonrası Güvenilir Kafes Tabanlı Kriptosistem Temellerine Giriş

Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, Prof. Dr. Şeref Sağıroğlu, Mustafa Şenol, Editör, Grafiker Yayınları, ss.171-209, 2019

20. Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT

Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.181-207, 2019

21. Kuantum Bilgisayarlar ile Kriptoanaliz ve Kuantum Sonrası Güvenilir Kripto Sistemleri

Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, Prof. Dr. Şeref Sağıroğlu, Mustafa Şenol, Editör, Grafiker Yayınları, Ankara, ss.137-168, 2019

22. Lightweight Block Ciphers with Applications in IoT

Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.153-180, 2019
Metrikler

Yayın

204

Yayın (WoS)

83

Yayın (Scopus)

100

Atıf (WoS)

392

H-İndeks (WoS)

10

Atıf (Scopus)

702

H-İndeks (Scopus)

13

Atıf (Scholar)

210

H-İndeks (Scholar)

6

Atıf (TrDizin)

16

H-İndeks (TrDizin)

2

Atıf (Sobiad)

7

H-İndeks (Sobiad)

1

Atıf (Diğer Toplam)

46

Proje

29

Fikri Mülkiyet

3

Tez Danışmanlığı

13

Açık Erişim

15