A Survey of SIP Authentication and Key Agreement Schemes HH Kilinc, T Yanik The IEEE Communications Surveys & Tutorials, 1-19, 2014 | 297 | 2014 |
Evaluating SIP proxy servers based on real performance data T Yanik, HH Kilinc, M Sarioz, SS Erdem 2008 International Symposium on Performance Evaluation of Computer and …, 2008 | 16 | 2008 |
A reputation based trust center model for cyber security HH Kilinc, U Cagal 2016 4th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2016 | 8 | 2016 |
Detecting tcp flood ddos attack by anomaly detection based on machine learning algorithms B Özçam, HH Kilinc, AH Zaim 2021 6th International Conference on Computer Science and Engineering (UBMK …, 2021 | 7 | 2021 |
A Case Study on Fraudulent User Behaviors in the Telecommunication Network. HH Kilinc Electrica 21 (1), 2021 | 6 | 2021 |
Performance evaluation of Id based authentication methods in the SIP protocol HH Kilinc, Y Allaberdiyev, T Yanik 2009 International Conference on Application of Information and …, 2009 | 6 | 2009 |
Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective I Gulatas, HH Kilinc, AH Zaim, MA Aydin IEEE Access 11, 33584-33606, 2023 | 5 | 2023 |
Efficient ID-based authentication and key agreement protocols for the session initiation protocol HH Kilinc, Y Allaberdiyev, T Yanik, SS Erdem Turkish Journal of Electrical Engineering & Computer Sciences 23 (2), 560-579, 2015 | 4 | 2015 |
A benchmark study on the use of webrtc technology for multimedia iot MU Seker, HH Kilinc 2021 6th International Conference on Computer Science and Engineering (UBMK …, 2021 | 2 | 2021 |
Analysis of attack and attackers on VoIP Honeypot environment HH Kilinc, OF Acar 2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018 | 2 | 2018 |
Quality of Experience Prediction for VoIP Calls Using Audio MFCCs and Multilayer Perceptron F Kaledibi, HH Kilinc, CO Sakar 2022 7th International Conference on Computer Science and Engineering (UBMK …, 2022 | 1 | 2022 |
Anomaly Pattern Analysis Based on Machine Learning on Real Telecommunication Data HH Kilinc 2022 7th International Conference on Computer Science and Engineering (UBMK …, 2022 | 1 | 2022 |
Telecom fraud detection with big data analytics DS Terzi, Ş Sağıroğlu, H Kılınç International Journal of Data Science 6 (3), 191-204, 2021 | 1 | 2021 |
Detecting VoIP fuzzing attacks by using a honeypot system HH Kilinc, U Cagal Signal Processing and Communications Applications Conference (SIU), 2017 …, 2017 | 1 | 2017 |
A reputation management model using ID based cryptosystem in overlay networks HH Kilinc 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 1 | 2011 |
Use of Rijndael Block Cipher on J2ME Devices for encryption and hashing SS Erdem, A Uyar, HH Klnc, M Toyran Proceedings of 10th Nordic Workshop on Secure IT-systems, Nordsec, 2005 | 1 | 2005 |
Best Practices for Scaling in Cloud Based Telecommunication Systems E Yakar, HH Kilinc 2023 8th International Conference on Computer Science and Engineering (UBMK …, 2023 | | 2023 |
IoT Malware Detection Based on OPCODE Purification. İ Gülataş, HH Kılınç, MA Aydın, AH Zaim Electrica 23 (3), 2023 | | 2023 |
perfoTrek-Multi Purpose Traffic Generator, Performance Measurement and Monitoring Tool for Communication Applications E Yakar, HH Kilinc 2022 7th International Conference on Computer Science and Engineering (UBMK …, 2022 | | 2022 |
A Use Case on Evaluation of Productivity in Software Development Industry E Aktı, C Balcı, HH Kilinc 2022 7th International Conference on Computer Science and Engineering (UBMK …, 2022 | | 2022 |