Follow
Murat Aydos
Title
Cited by
Cited by
Year
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
M Aydos, T Yanık, CK Koc
IEE Proceedings-Communications 148 (5), 273-279, 2001
1792001
A review on cyber security datasets for machine learning algorithms
O Yavanoglu, M Aydos
2017 IEEE international conference on big data (big data), 2186-2193, 2017
1652017
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
M Aydos, B Sunar, CK Koc
2nd International Workshop on Discrete Algorithms and Methods for Mobile …, 1998
1171998
Relay attacks on bluetooth authentication and solutions
A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan
Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004
952004
Catch Them Alive: A Malware Detection Approach through Memory Forensics, Manifold Learning and Computer Vision
AS Bozkir, E Tahıllıoğlu, M Aydos, İ Kara
Computers & Security 103 (102166), 2021
782021
The rise of ransomware: Forensic analysis for windows based ransomware attacks
I Kara, M Aydos
Expert Systems with Applications 190, 116198, 2022
612022
Assessing risks and threats with layered approach to Internet of Things security
M Aydos, Y Vural, A Tekerek
Measurement and Control 52 (5-6), 338-353, 2019
612019
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition
AS Bozkir, M Aydos
Computers & Security 95, 101855, 2020
582020
Utilization and comparision of convolutional neural networks in malware recognition
AS Bozkir, AO Cankaya, M Aydos
2019 27th signal processing and communications applications conference (SIU …, 2019
442019
Phish-iris: A new approach for vision based brand prediction of phishing web pages via compact visual descriptors
FC Dalgic, AS Bozkir, M Aydos
2018 2nd international symposium on multidisciplinary studies and innovative …, 2018
362018
Implementing network security protocols based on elliptic curve cryptography
M Aydos, E Savas, CK Koc
Proceedings of the fourth symposium on computer networks, 130-139, 1999
351999
Security testing of web applications: A systematic mapping of the literature
M Aydos, Ç Aldan, E Coşkun, A Soydan
Journal of King Saud University-Computer and Information Sciences, 2022
292022
Static and dynamic analysis of third generation cerber ransomware
I Kara, M Aydos
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
282018
The ghost in the system: technical analysis of remote access trojan
İ Kara, M Aydos
International Journal on Information Technologies & Security 11 (1), 73-84, 2019
252019
ERP failure: A systematic mapping of the literature
E Coşkun, B Gezici, M Aydos, AK Tarhan, V Garousi
Data & Knowledge Engineering 142, 102090, 2022
192022
Spam/ham e-mail classification using machine learning methods based on bag of words technique
E Sahın, M Aydos, F Orhan
2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018
192018
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
I Kara, M Aydos
11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication …, 2020
14*2020
GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings
AS Bozkir, FC Dalgic, M Aydos
Computers & Security 124, 102964, 2023
132023
A New Approach to Utility-Based Privacy Preserving in Data Publishing
Y Vural, M Aydos
2017 IEEE International Conference on Computer and Information Technology …, 2017
92017
Detection and Analysis of Attacks Against Web Services by the SQL Injection Method
K İlker, M AYDOS
2019 3rd International Symposium on Multidisciplinary Studies and Innovative …, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20