Security for the internet of things: a survey of existing mechanisms, protocols and open research issues S Görmüş, H Aydın, G Ulutaş Journal of the Faculty of Engineering and Architecture of Gazi University 33 …, 2018 | 69 | 2018 |
Nesnelerin interneti teknolojisi için güvenlik: Var olan mekanizmalar, protokoller ve yaşanılan zorlukların araştırılması S Görmüş, H Aydın, G Ulutaş Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi 33 (4), 1247-1272, 2018 | 20 | 2018 |
A new routing objective function for ietf 6tisch protocol B Aydın, S Görmüş, H Aydın, S Külcü 2022 30th Signal Processing and Communications Applications Conference (SIU …, 2022 | 12 | 2022 |
A Distributed User Authentication Mechanism for IETF 6TiSCH Protocol H AYDIN, S GÖRMÜŞ, Y Jin 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018 | 11 | 2018 |
Q-Learning Algorithm Inspired Objective Function Optimization For IETF 6TiSCH Networks T Bekar, S Görmüş, B Aydın, H Aydın 2023 International Conference on Smart Applications, Communications and …, 2023 | 8 | 2023 |
Lightweight three-factor sensor and user authentication for rpl-based 6tisch networks H Aydin, B Aydin, S Gormus IEEE Sensors Journal, 2024 | 4 | 2024 |
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks B Aydin, Hakan and Gormus, Sedat and Aydin IEEE Access 12 (10.1109/ACCESS.2024.3420746), 90952-90970, 2024 | 3 | 2024 |
Energy Efficient Communication Protocol For 6TiSCH Networks S Alizadeh, H Aydın 2019 Seventh International Conference on Digital Information Processing and …, 2019 | 2 | 2019 |
IETF 6TiSCH protokolü için dağıtık kullanıcı kimlik doğrulama mekanizması H Aydin Fen Bilimleri Enstitüsü, 2018 | 2 | 2018 |
Medical image segmentation with edge based level sets: Mobile client-server application H Aydın, B Dizdaroğlu 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 2 | 2017 |
A DIS Attack Resistant Algorithm for RPL Routing Protocol in 6TiSCH Networks H Aydın, B Aydın 2024 32nd Signal Processing and Communications Applications Conference (SIU …, 2024 | 1 | 2024 |
Resource Management in Distributed 6TiSCH Networks P Dehghan, H Aydın, S Görmüş 2020 5th International Conference on Computer Science and Engineering (UBMK …, 2020 | 1 | 2020 |
A new user authentication mechanism for IETF 6TiSCH protocol H AYDIN, S GÖRMÜŞ 2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018 | 1 | 2018 |
Resilient 6TiSCH IoT Network Joining: Detecting and Mitigating Malicious Proxy Nodes BG Sedat Aydin, Hakan and Aydin 2024 17th International Conference on Information Security and Cryptology …, 2024 | | 2024 |
Advanced Detection and Prevention of Sinkhole Attacks in 6TiSCH Networks H Aydin, B Aydin, S Gormus | | 2024 |
A Security Mechanism Against Man in the Middle Attack in 6TiSCH Networks B Aydın, H Aydın, S Görmüş 2024 32nd Signal Processing and Communications Applications Conference (SIU …, 2024 | | 2024 |
Detection of RPL-based Routing Attacks Using Machine Learning Algorithms SGEM Burak Aydın, Hakan Aydın Dicle University Journal of Engineering 15 (4), 783 - 796, 2024 | | 2024 |
Yazılım Tanımlı IoT Ağlarında Kimlik Doğrulama H Aydin, P Dehghan, C Tugrul Poster Sunumu, 2020 | | 2020 |
An Energy Efficient and Lightweight Cryptographic User Authentication Scheme for 6Tisch Networks H Aydin, I Bozkurt 2020 28th Signal Processing and Communications Applications Conference (SIU), 2020 | | 2020 |
6TiSCH Protokolü İçin Enerji Etkin Kimlik Doğrulama Mekanizması H Aydın, S Görmüş Ereğli International Science and Academic Congress Proceedings Book 1, 84-93, 2019 | | 2019 |