A review on cyber security datasets for machine learning algorithms O Yavanoglu, M Aydos 2017 IEEE international conference on big data (big data), 2186-2193, 2017 | 236 | 2017 |
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor M Aydos, T Yanık, CK Koc IEE Proceedings-Communications 148 (5), 273-279, 2001 | 184 | 2001 |
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication M Aydos, B Sunar, CK Koc 2nd International Workshop on Discrete Algorithms and Methods for Mobile …, 1998 | 116 | 1998 |
Catch Them Alive: A Malware Detection Approach through Memory Forensics, Manifold Learning and Computer Vision AS Bozkir, E Tahıllıoğlu, M Aydos, İ Kara Computers & Security 103 (102166), 2021 | 113 | 2021 |
Relay attacks on bluetooth authentication and solutions A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004 | 100 | 2004 |
Assessing risks and threats with layered approach to Internet of Things security M Aydos, Y Vural, A Tekerek Measurement and Control 52 (5-6), 338-353, 2019 | 83 | 2019 |
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition AS Bozkir, M Aydos Computers & Security 95, 101855, 2020 | 82 | 2020 |
The rise of ransomware: Forensic analysis for windows based ransomware attacks I Kara, M Aydos Expert Systems with Applications 190, 116198, 2022 | 79 | 2022 |
Utilization and comparision of convolutional neural networks in malware recognition AS Bozkir, AO Cankaya, M Aydos 2019 27th signal processing and communications applications conference (SIU …, 2019 | 72 | 2019 |
Security testing of web applications: A systematic mapping of the literature M Aydos, Ç Aldan, E Coşkun, A Soydan Journal of King Saud University-Computer and Information Sciences, 2022 | 69 | 2022 |
ERP failure: A systematic mapping of the literature E Coşkun, B Gezici, M Aydos, AK Tarhan, V Garousi Data & Knowledge Engineering 142, 102090, 2022 | 50 | 2022 |
GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings AS Bozkir, FC Dalgic, M Aydos Computers & Security 124, 102964, 2023 | 46 | 2023 |
Phish-iris: A new approach for vision based brand prediction of phishing web pages via compact visual descriptors FC Dalgic, AS Bozkir, M Aydos 2018 2nd international symposium on multidisciplinary studies and innovative …, 2018 | 42 | 2018 |
Static and dynamic analysis of third generation cerber ransomware I Kara, M Aydos 2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018 | 38 | 2018 |
The ghost in the system: technical analysis of remote access trojan İ Kara, M Aydos International Journal on Information Technologies & Security 11 (1), 73-84, 2019 | 37 | 2019 |
Implementing network security protocols based on elliptic curve cryptography M Aydos, E Savas, CK Koc Proceedings of the fourth symposium on computer networks, 130-139, 1999 | 36 | 1999 |
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware I Kara, M Aydos 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication …, 2020 | 22* | 2020 |
Spam/ham e-mail classification using machine learning methods based on bag of words technique E Sahın, M Aydos, F Orhan 2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018 | 22 | 2018 |
Trustworthy scrum: Development of secure software with scrum G Koç, M Aydos 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 10 | 2017 |
Spam e-mail classification by utilizing n-gram features of hyperlink texts AS Bozkir, E Sahin, M Aydos, EA Sezer, F Orhan 2017 IEEE 11th International Conference on Application of Information and …, 2017 | 10 | 2017 |