Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels
2022 ACM Workshop on Wireless Security and Machine Learning (WiSeML), SAN ANTONIO/AMERİKA BİRLEŞİK DEVLETLERİ, 19 Mayıs 2022, s. 3-8
CÖMERT CEREN, KULHANDJIAN MICHEL, GÜL ÖMER MELİH, TOUAZI AZZEDINE, ELLEMENT CLIFF, KANTARCI BURAK, D'AMOURS CLAUDE
|
Deep learning-based framework for real-time transient stability prediction under stealthy data integrity attacks
ELECTRIC POWER SYSTEMS RESEARCH, Vol. 221, Ocak 2023, s. 12, ISSN: 0378-7796
KESİCİ MERT, MOHAMMADPOURFARD MOSTAFA, AYGÜL KEMAL, GENÇ VEYSEL MURAT İSTEMİHAN
|
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users
SECURITY AND COMMUNICATION NETWORKS, No. null, Kasım 2018, ISSN: 1939-0114
YEŞİLTEPE MİRSAT,KURULAY MUHAMMET
|
Denizel Siber Güvenlikte Yapay Zekâ Ve Makine Öğrenmesi: Türkiye Örneği Türkiye'nin Deniz Hukuku ve Güvenliği
Ankara/TÜRKİYE, 2023, s. 285-310, Seçkin Yayıncılık
KAYİŞOĞLU GİZEM, DÜZENLİ EMRE, BOLAT PELİN
|
A Wideband Dipole Antenna Design for Through-the-Wall Imaging on Security Applications
2023 17th European Conference on Antennas and Propagation (EuCAP), 26 Mart 2023
JOOF SULAYMAN, DOĞU SEMİH, ÇELİK FEZA TUGAY, KARAÇUHA KAMİL
|
A statistical framework for audio watermark detection and decoding
Int. Conference on Multimedia Content Representation, Classification and Security, Vol. 4105, 11 Eylül 2006, s. 241-248, ISSN: 0302-9743
GÜNSEL BİLGE, ÜLKER YENER, KIRBIZ ŞİMŞEK SERAP
|
A Wideband Dipole Antenna Design for Through-the-Wall Imaging on Security Applications
2023 17th European Conference on Antennas and Propagation (EuCAP), 26 Mart 2023
JOOF SULAYMAN,DOĞU SEMİH,ÇELİK FEZA TURGAY,KARAÇUHA KAMİL
|
A Novel Feature Selection Method for the Dynamic Security Assessment of Power Systems Based on Multi-Layer Perceptrons
International Journal of Intelligent Systems and Applications in Engineering, Vol. 1, Ocak 2018, ISSN: 2147-6799
BEYRANVAND PEYMAN, KÜÇÜKTEZCAN CAVİT FATİH, GENÇ VEYSEL MURAT İSTEMİHAN, ÇATALTEPE ZEHRA
|
Metasurface Manipulation Attacks: Potential Security Threats of RIS-Aided 6G Communications
IEEE Communications Magazine, Vol. 61, No. 1, Ocak 2023, s. 24-30, ISSN: 0163-6804
ALAKOCA HAKAN, NAMDAR MUSTAFA, ALDIRMAZ ÇOLAK SULTAN, BAŞARAN MEHMET, BAŞGÜMÜŞ ARİF, DURAK ATA LÜTFİYE, YANIKÖMEROĞLU HALİM
|
Physical layer security improvement of NOMA-based UAV-aided terrestrial networks via cooperative user selection (In Turkish)
30th Signal Processing and Communication Applications Conf., SİU'22, Karabük/TÜRKİYE, 15 Mayıs 2022
BÜYÜKŞAR AYŞE BETÜL, CAN MEHMET, ALTUNBAŞ İBRAHİM
|
Comparative evaluation of different classification techniques for masquerade attack detection
International Journal of Information and Computer Security, Vol. 13, No. 2, Nisan 2020, ISSN: 1744-1765
ZAİM ABDÜL HALİM, AKBULUT AKHAN, ELMASRİ WİSAM
|
Prediction of the Electricity Consumption of Turkey by Using Machine Learning Methods
INTERNATIONAL CONGRESS OF ENERGY ECONOMY AND SECURITY (ENSCON, 2018), İstanbul/TÜRKİYE, 21 Nisan 2018
BAŞAKIN EYYUP ENSAR, SARI SALİM SERCAN, EKMEKCİOĞLU ÖMER
|
Meteorological Risk Assessment for Ships with Fuzzy Logic Designer
ICMSSL 2020 : 22nd International Conference on Maritime Safety and Security Law, 5 Kasım 2020, s. 143-146, ISSN: 1307-6892
KARACA İSMAİL, SARAÇOĞLU RIDVAN, SÖNER ÖMER
|
Dynamic security enhancement of power systems using mean-variance mapping optimization
TURKISH JOURNAL OF ELECTRICAL ENGINEERING COMPUTER SCIENCES, Vol. 25, Ocak 2017, s. 3188-3200, ISSN: 13000632
KÜÇÜKTEZCAN CAVİT FATİH,GENÇ VEYSEL MURAT İSTEMİHAN
|
Modelling of Maritime Cyber Security Education and Training
Pedagogika-Pedagogy, Vol. 95, No. 6, Ağustos 2023, s. 64-78, ISSN: 0861-3982
KAYİŞOĞLU GİZEM, BOLAT PELİN, DÜZENLİ EMRE
|
Maritime Security: Law and Order in the Seas Security Studies: Classic to Post-Modern Approaches
Lanham-Maryland/AMERİKA BİRLEŞİK DEVLETLERİ, 2023, s. 215-241, Lexington Books
KIRVAL LEVENT, ILGIN SEZER
|
Security mechanisms and their performance impacts on wireless local areanetworks
ISCN '06: Proceedings of the 7th International Symposium on ComputerNetworks, No. null, 2 Şubat 2006, s. 123-127
GURKAS G. ZEYNEP , ZAİM A. HALİM , ALİ AYDİN M.
|
A new distributed anomaly detection approach for log IDS management based on deep learning
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, Vol. 29, No. 5, Ocak 2021, s. 2486-2501, ISSN: 1300-0632
ZAİM ABDÜL HALİM, AYDIN MUHAMMED ALİ, SERTBAŞ AHMET
|
A Design Of An Integrated Cloud-based Intrusion Detection System With Third Party Cloud Service
OPEN COMPUTER SCIENCE, Vol. 11, No. 1, Haziran 2021, s. 365-379, ISSN: 2299-1093
ZAİM ABDÜL HALİM, AKBULUT AKHAN, AYDIN MUHAMMED ALİ
|
Deep Learning Approaches for Predictive Masquerade Detection
Security and Communication Networks, Vol. 2018, Ağustos 2018, s. 1-24, ISSN: 1939-0114
ELMASRY WİSAM,AKBULUT AKHAN,ZAİM ABDÜL HALİM
|