Crime analysis based on association rules using apriori algorithm M Sevri, H Karacan, MA Akcayol International Journal of Information and Electronics Engineering 7 (3), 99-102, 2017 | 11 | 2017 |
Suç Analizinde Veri Madenciliği Teknikleri Ve Makine Öğrenmesi Algoritmalarının Kullanılması M Orakcı, B Ciylan, İ Kök, M Sevri | 4 | 2019 |
Deep learning based web application security M SEVRİ, H KARACAN | 2 | 2019 |
Türkiye de Siber Güvenlik Eğitiminin Durumu M SEVRİ, N TOPALOĞLU | 2 | 2016 |
A Novel Data Augmentation Technique and Deep Learning Model for Web Application Security H Karacan, M Sevri IEEE ACCESS 9, 150781 - 150797, 2021 | 1 | 2021 |
Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security M Sevri, H Karacan Ksii Transactions on Internet and Information Systems 16 (2), 632-657, 2022 | | 2022 |
Using Data Mining Techniques and Machine Learning Algorithms in Crime Analysis M ÇELEBİ, B CİYLAN, İ KÖK, M SEVRİ | | |
WEB ATAKLARININ MAKİNA ÖĞRENME ALGORİTMALARI İLE SINIFLANDIRILMASI BİR UYGULAMA ÖRNEĞİ M SEVRİ, N TOPALOĞLU | | |
SON BİLGİSAYAR KORSANLIĞI EĞİLİMİ FİDYE ZARARLI YAZILIMI VE MUHTEMEL GELECEĞİ M SEVRİ, N TOPALOĞLU | | |
An Infrastructure Model to Detect and Prevent Web Attacks M SEVRİ, N TOPALOĞLU | | |
Deep Learning Based Web Application Security”, 2nd International Conference on Advanced Technologies M SEVRİ, H KARACAN | | |
MEB WEB SİTESİ KULLANILABİLİRLİK VE PERFORMANS ANALİZİ M SEVRİ, S HAKYEMEZ | | |
Üstün Yetenekli/Zekalı Öğrencilerin Belirlenmesinde Veri Madenciliği Algoritmalarının Kullanılması ve Sınıflandırma Modellerinin Performans Karşılaştırması M SEVRİ, H KARACAN | | |
Spy Attacks and Protection Methods in Android Smart Phones M KOŞAN, M SEVRİ, H KARACAN | | |
Applying Deep Learning to Cybersecurity Field and Its Advantages M SEVRİ, M KOŞAN, H KARACAN | | |
Bidirectional LSTM Based Intrusion Detection System for Web Applications. M SEVRİ, H KARACAN | | |
Blockchain Technology and Its Use as a Notarial System M SEVRİ, ALİ KOCATEPE, H KARACAN, E ARI | | |
Utilizing Linear Feedback Shift Registers for Selective-Random Memory Addressing ALİ KOCATEPE, M SEVRİ, H KARACAN | | |
Comparison of Classification Algorithms used in Intrusion Detection Systems MA Koşan, M Sevri, H Karacan Co-chair, 124, 0 | | |
Secure Multiparty Computation and Blockchain-Smart Contract Based Election System M Sevri, MA Koşan, H Karacan Co-chair, 126, 0 | | |