Murat Aydos
Cited by
Cited by
A review on cyber security datasets for machine learning algorithms
O Yavanoglu, M Aydos
2017 IEEE international conference on big data (big data), 2186-2193, 2017
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
M Aydos, B Sunar, CK Koc
In 2nd International Workshop on Discrete Algorithms and Methods for Mobile …, 1998
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
M Aydos, T Yanık, CK Koc
IEE Proceedings-Communications 148 (5), 273-279, 2001
Relay attacks on bluetooth authentication and solutions
A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan
International Symposium on Computer and Information Sciences, 278-288, 2004
A high-speed ECC-based wireless authentication on an ARM microprocessor
M Aydos, T Yantk, ÇK Koç
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
Implementing network security protocols based on elliptic curve cryptography
M Aydos, E Savas, CK Koc
Proceedings of the fourth symposium on computer networks, 130-139, 1999
Assessing risks and threats with layered approach to Internet of Things security
M Aydos, Y Vural, A Tekerek
Measurement and Control 52 (5-6), 338-353, 2019
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition
AS Bozkir, M Aydos
Computers & Security 95, 101855, 2020
Catch Them Alive: A Malware Detection Approach through Memory Forensics, Manifold Learning and Computer Vision
AS Bozkir, E Tahıllıoğlu, M Aydos, İ Kara
Computers & Security 103 (102166), 2021
Static and dynamic analysis of third generation cerber ransomware
I Kara, M Aydos
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
Phish-iris: A new approach for vision based brand prediction of phishing web pages via compact visual descriptors
FC Dalgic, AS Bozkir, M Aydos
2018 2nd International Symposium on Multidisciplinary Studies and Innovative …, 2018
The ghost in the system: technical analysis of remote access trojan
İ Kara, M Aydos
International Journal on Information Technologies & Security 11 (1), 73-84, 2019
Utilization and comparision of convolutional neural networks in malware recognition
AS Bozkir, AO Cankaya, M Aydos
2019 27th Signal Processing and Communications Applications Conference (SIU …, 2019
Spam/ham e-mail classification using machine learning methods based on bag of words technique
E Sahın, M Aydos, F Orhan
2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
I Kara, M Aydos
11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication …, 2020
A New Approach to Utility-Based Privacy Preserving in Data Publishing
Y Vural, M Aydos
2017 IEEE International Conference on Computer and Information Technology …, 2017
Detection and Analysis of Attacks Against Web Services by the SQL Injection Method
K İlker, M AYDOS
2019 3rd International Symposium on Multidisciplinary Studies and Innovative …, 2019
ρ-Gain: Utility Based Data Publishing Model
Y Vural, M Aydos
Journal of the Faculty of Engineering and Architecture of Gazi University 33 …, 2018
Trustworthy scrum: Development of secure software with scrum
G Koç, M Aydos
2017 International Conference on Computer Science and Engineering (UBMK …, 2017
Spam e-mail classification by utilizing n-gram features of hyperlink texts
AS Bozkir, E Sahin, M Aydos, EA Sezer, F Orhan
2017 IEEE 11th International Conference on Application of Information and …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20