Murat Aydos
Title
Cited by
Cited by
Year
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
M Aydos, T Yanık, CK Koc
IEE Proceedings-Communications 148 (5), 273-279, 2001
1072001
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
M Aydos, B Sunar, CK Koc
In 2nd International Workshop on Discrete Algorithms and Methods for Mobile …, 1998
1071998
Relay attacks on bluetooth authentication and solutions
A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan
International Symposium on Computer and Information Sciences, 278-288, 2004
762004
A high-speed ECC-based wireless authentication on an ARM microprocessor
M Aydos, T Yantk, ÇK Koç
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
632000
A review on cyber security datasets for machine learning algorithms
O Yavanoglu, M Aydos
2017 IEEE International Conference on Big Data (Big Data), 2186-2193, 2017
422017
Implementing network security protocols based on elliptic curve cryptography
M Aydos, E Savas, CK Koc
Proceedings of the fourth symposium on computer networks, 130-139, 1999
341999
Phish-iris: A new approach for vision based brand prediction of phishing web pages via compact visual descriptors
FC Dalgic, AS Bozkir, M Aydos
2018 2nd International Symposium on Multidisciplinary Studies and Innovative …, 2018
122018
The ghost in the system: technical analysis of remote access trojan
İ Kara, M Aydos
International Journal on Information Technologies & Security 11 (1), 2019
102019
Static and dynamic analysis of third generation cerber ransomware
I Kara, M Aydos
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
82018
Assessing risks and threats with layered approach to Internet of Things security
M Aydos, Y Vural, A Tekerek
Measurement and Control 52 (5-6), 338-353, 2019
72019
Spam/ham e-mail classification using machine learning methods based on bag of words technique
E Sahın, M Aydos, F Orhan
2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018
52018
ρ-Gain: Utility Based Data Publishing Model
Y Vural, M Aydos
Journal of the Faculty of Engineering and Architecture of Gazi University 33 …, 2018
42018
A New Approach to Utility-Based Privacy Preserving in Data Publishing
Y Vural, M Aydos
2017 IEEE International Conference on Computer and Information Technology …, 2017
42017
Efficient wireless security protocols based on elliptic curve cryptography
M Aydos
42000
LogoSENSE: A Companion HOG based Logo Detection Scheme for Phishing Web Page and E-mail Brand Recognition
AS Bozkir, M Aydos
Computers & Security, 101855, 2020
22020
Brand Recognition of Phishing Web Pages via Global Image Descriptors
E Eroğlu, AS Bozkır, M Aydos
Avrupa Bilim ve Teknoloji Dergisi, 436-443, 2019
22019
Local Image Descriptor Based Phishing Web Page Recognition as an Open-Set Problem
AS Bozkır, M Aydos
Avrupa Bilim ve Teknoloji Dergisi, 444-451, 2019
22019
Trustworthy scrum: Development of secure software with scrum
G Koç, M Aydos
2017 International Conference on Computer Science and Engineering (UBMK …, 2017
22017
Detection and Analysis of Attacks Against Web Services by the SQL Injection Method
K İlker, M AYDOS
2019 3rd International Symposium on Multidisciplinary Studies and Innovative …, 2019
12019
Utilization and Comparision of Convolutional Neural Networks in Malware Recognition
AS Bozkir, AO Cankaya, M Aydos
2019 27th Signal Processing and Communications Applications Conference (SIU …, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20