Makaleler
17
Tümü (17)
SCI-E, SSCI, AHCI (17)
SCI-E, SSCI, AHCI, ESCI (17)
Scopus (16)
4. Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
, cilt.21, sa.5, ss.1107-1125, 2022 (SCI-Expanded, Scopus)
5. Attention: there is an inconsistency between android permissions and application metadata!
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
, cilt.20, sa.6, ss.797-815, 2021 (SCI-Expanded, Scopus)
7. A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
, cilt.16, ss.4405-4418, 2021 (SCI-Expanded, Scopus)
11. Coevolution of Mobile Malware and Anti-Malware
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
, cilt.13, sa.10, ss.2563-2574, 2018 (SCI-Expanded, Scopus)
15. Using instance-weighted naive Bayes for adapting concept drift in masquerade detection
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
, cilt.13, sa.6, ss.583-590, 2014 (SCI-Expanded, Scopus)
Hakemli Bilimsel Toplantılarda Yayımlanmış Bildiriler
24
6. An Analysis of the Current State of Security in the Internet of Things
International Conference on Cyber Security and Computer Science, 18 - 20 Ekim 2018, (Tam Metin Bildiri)
18. A New Approach for Detection of Insider Threats
IEEE 21 Sinyal İşleme ve İletişim Uygulamaları Kurultayı, Türkiye, 23 Nisan 2013, (Tam Metin Bildiri)
20. Feature Selection for Detection of Ad Hoc Flooding Attacks
NeCom, 14 - 16 Temmuz 2012, (Tam Metin Bildiri)
