- Cryptography and Data Security
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Cryptography and Residue Arithmetic
- Quantum Computing Algorithms and Architecture
- graph theory and CDMA systems
- Anomaly Detection Techniques and Applications
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Smart Grid Security and Resilience
- Quantum Information and Cryptography
- Complexity and Algorithms in Graphs
- Advanced Steganography and Watermarking Techniques
- DNA and Biological Computing
- Privacy-Preserving Technologies in Data
- Quantum-Dot Cellular Automata
- Software Testing and Debugging Techniques
- Software-Defined Networks and 5G
- Cloud Data Security Solutions
University of Tartu
2023-2025
Istinye University
2024-2025
Ondokuz Mayıs University
2015-2024
ORCID
2022
Samsun University
2021
Middle East Technical University
2006-2020
Sakarya University
2018
Universiti Tunku Abdul Rahman
2018
Trakya University
2017
Technical University of Darmstadt
2015
In this study, a framework for Android malware detection based on permissions is presented. This uses multiple linear regression methods. Application permissions, which are one of the most critical building blocks in security operating system, extracted through static analysis, and analyzes applications carried out with machine learning techniques. Based techniques, two classifiers proposed permission-based detection. These compared four different datasets basic techniques such as support...
Wireless sensor networks (WSN) are in which data obtained by observing the environment a large number of sensors deployed specific area sent securely to other or centers network. These have abilities being not connected central node, self-managing and healing, network topology, multi-way routing, preserving integrity confidentiality data, robust. Today's ongoing work: designing that resistant harsh weather conditions, reducing energy consumption, low-cost with high capacities, making flow...
This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. Specifically, the study focuses on assessing BukaGini’s effectiveness within domain intrusion detection systems (IDS). Recognizing need for improved interaction analysis methodologies IDS, this research aims investigate BukaGini context. is evaluated across four diverse datasets commonly used IDS research: NSLKDD...
Channel estimation poses a main challenge in intelligent reflecting surface (IRS)-assisted millimeter wave (mmWave) multi-user multiple-input multiple-output (MIMO) systems due to the substantial number of antennas at base station (BS) and passive reflective elements within IRS lacking sufficient signal processing capabilities. This article addresses this by proposing channel technique for IRS-assisted mmWave MIMO systems. The problem is normally taken as compressed sensing (CS) problem,...
Uncrewed Aerial Vehicles (UAVs) are frequently utilized in several domains such as transportation, distribution, monitoring, and aviation. A significant security vulnerability is the Global Positioning System (GPS) Spoofing attack, wherein assailant deceives GPS receiver by transmitting counterfeit signals, thereby gaining control of UAV. This can result UAV being captured or, certain instances, destroyed. Numerous strategies have been presented to identify signals. Although there notable...
Mobile devices' hardware have been enhancing day by day. With this development, mobile phones are supporting many programs and everyone takes advantage of them. Nevertheless, malware applications increasing more so that people can come across lots problems. Android is a operating system the most used on smart phones. Because it open source, has target attackers. security related to permissions allowed users applications. There studies permission based detection. In study, analyzed. Unlike...
This paper focuses on the vulnerabilities of ADS-B, one avionics systems, and countermeasures taken against these proposed in literature. Anomaly detection methods based machine learning deep algorithms among ADS-B are analyzed detail. The advantages disadvantages using an anomaly system data investigated. Thanks to advances last decade, it has become more appropriate use systems detect anomalies systems. To best our knowledge, this is first survey focused studies that for security. In...
In this paper, we propose a novel authenticated key exchange scheme based on the Bi-GISIS problem for post-quantum world. The security of proposed is hardness assumption problem. reusable property provided in random oracle model by using bilateral pasteurization method. To obtain an scheme, use implicit authentication steps. analysis presented Bellare-Rogaway model, where weak perfect forward secrecy provided. We also give perspective to
In sports competitions, depending on the conditions such as excitement, stress, fatigue, etc. during match, negative situations disability or loss of life may occur for players and spectators. Therefore, it is extremely important to constantly check their health. addition, some strategic analyzes are made match. According results these analyzes, technical team affects course Effects can have positive sometimes results. this article, fog computing an Internet Things (IoT) based architecture...