Follow
Devrim Ünal
Devrim Ünal
Associate Research Professor at Qatar University
Verified email at qu.edu.qa - Homepage
Title
Cited by
Cited by
Year
Recent advances in the internet-of-medical-things (IoMT) systems security
A Ghubaish, T Salman, M Zolanvari, D Unal, A Al-Ali, R Jain
IEEE Internet of Things Journal 8 (11), 8707-8718, 2020
3172020
Intrusion detection system for healthcare systems using medical and network data: A comparison study
AA Hady, A Ghubaish, T Salman, D Unal, R Jain
IEEE Access 8, 106576-106584, 2020
2202020
Time-series forecasting of Bitcoin prices using high-dimensional features: a machine learning approach
M Mudassir, S Bennbaia, D Unal, M Hammoudeh
Neural computing and applications, 1-15, 2020
2082020
Deep Learning for Detection of Routing Attacks in the Internet of Things
FY Yavuz, D Unal, E Gul
International Journal of Computational Intelligence Systems 12 (1), 39-58, 2018
1852018
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
D Unal, M Hammoudeh, MA Khan, A Abuarqoub, G Epiphaniou, R Hamila
Computers & Security 109, 102393, 2021
1122021
A service-oriented approach for sensing in the Internet of Things: Intelligent transportation systems and privacy use cases
M Hammoudeh, G Epiphaniou, S Belguith, D Unal, B Adebisi, T Baker, ...
IEEE Sensors Journal 21 (14), 15753-15761, 2020
672020
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
612020
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
D Unal, A Al-Ali, FO Catak, M Hammoudeh
Future Generation Computer Systems 125, 433-445, 2021
532021
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
L Gupta, T Salman, A Ghubaish, D Unal, AK Al-Ali, R Jain
Applied Soft Computing 118, 108439, 2022
502022
Mobile authentication secure against man-in-the-middle attacks
K Bicakci, D Unal, N Ascioglu, O Adalier
Procedia Computer Science 34, 323-329, 2014
502014
Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing
IA Elgendy, A Muthanna, M Hammoudeh, H Shaiba, D Unal, M Khayyat
Big Data 9 (4), 265-278, 2021
422021
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
FO Catak, M Kuzlu, E Catak, U Cali, D Unal
Physical Communication 52, 101626, 2022
402022
Exploiting bluetooth vulnerabilities in e-health IoT devices
M Zubair, D Unal, A Al-Ali, A Shikfa
Proceedings of the 3rd international conference on future networks and …, 2019
372019
A cyber-security methodology for a cyber-physical industrial control system testbed
M Noorizadeh, M Shakerpour, N Meskin, D Unal, K Khorasani
IEEE Access 9, 16239-16253, 2021
362021
A formal role-based access control model for security policies in multi-domain mobile networks
D Unal, MU Çaglayan
Computer Networks 57 (1), 330-350, 2013
352013
Detection of botnet attacks against industrial IoT systems by multilayer deep learning approaches
M Mudassir, D Unal, M Hammoudeh, F Azzedin
Wireless Communications and Mobile Computing 2022 (1), 2845446, 2022
312022
Secure Bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system
M Zubair, A Ghubaish, D Unal, A Al-Ali, T Reimann, G Alinier, ...
Sensors 22 (21), 8280, 2022
302022
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
D Unal, S Bennbaia, FO Catak
Cybersecurity and cognitive science, 299-320, 2022
282022
Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications
T Salman, A Ghubaish, D Unal, R Jain
IEEE Networking Letters 1 (1), 1, 2020
202020
Towards robust autonomous driving systems through adversarial test set generation
D Unal, FO Catak, MT Houkan, M Mudassir, M Hammoudeh
ISA transactions 132, 69-79, 2023
122023
The system can't perform the operation now. Try again later.
Articles 1–20