Makine öğrenmesi ve öznitelik seçim yöntemleriyle saldırı tespiti O Kaynar, H Arslan, Y Görmez, YE Işık Bilişim Teknolojileri Dergisi 11 (2), 175-185, 2018 | 47 | 2018 |
Sakarya üniversitesi web sitesi erişim kayıtlarının web madenciliği ile analizi H Arslan PQDT-Global, 2008 | 37 | 2008 |
End to end invoice processing application based on key fields extraction H Arslan IEEE Access 10, 78398-78413, 2022 | 15 | 2022 |
A multiclass hybrid approach to estimating software vulnerability vectors and severity score H Kekül, B Ergen, H Arslan Journal of Information Security and Applications 63, 103028, 2021 | 15 | 2021 |
Comparison and analysis of software vulnerability databases H KEKÜL, B ERGEN, H ARSLAN International Journal of Engineering and Manufacturing 12 (4), 1, 2022 | 9 | 2022 |
New developer metrics for open source software development challenges: An empirical study of project recommendation systems A Şeker, B Diri, H Arslan Applied Sciences 11 (3), 920, 2021 | 9 | 2021 |
Usability and quality tests in software products to oriented of user experience H Arslan, AG Yüksek, ML Elyakan, Ö Canay The Online Journal of Quality in Higher Education-July 5 (3), 2018 | 9 | 2018 |
Comparison of the effects dimensionalty methods in the training of neuro-fuzzy (ANFIS) classifications AG Yüksek, H Arslan, O Kaynar 2017 International Artificial Intelligence and Data Processing Symposium …, 2017 | 9 | 2017 |
Yüz Tanima Uygulamalarinda Özyüzler Ve Yapay Sinir Ağlarinin Karşilaştirilmasi H Kekül, H Bircan, H Arslan Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi 2 (1 …, 2018 | 8 | 2018 |
A New Vulnerability Reporting Framework for Software Vulnerability Databases H Kekül, B Ergen, H Arslan Int. J. Educ. Manag. Eng 11 (3), 11-19, 2021 | 6 | 2021 |
Open source software development challenges: a systematic literature review on gitHub A Seker, B Diri, H Arslan, MF Amasyalı International Journal of Open Source Software and Processes (IJOSSP) 11 (4 …, 2020 | 6 | 2020 |
Examining of single sign on protocols and a model of business application H Arslan, HD Karkı, AG Yüksek, O Kaynar 2017 25th Signal Processing and Communications Applications Conference (SIU …, 2017 | 6 | 2017 |
Estimating vulnerability metrics with word embedding and multiclass classification methods H Kekül, B Ergen, H Arslan International Journal of Information Security 23 (1), 247-270, 2024 | 4 | 2024 |
Yazılım güvenlik açığı veri tabanları H Kekül, B Ergen, H Arslan Avrupa Bilim ve Teknoloji Dergisi, 1008-1012, 2021 | 4 | 2021 |
Classification of Customer Demands by Using Doc2Vec Feaure Extraction Method H Arslan, O Kaynar, S Şahİn 2019 27th Signal Processing and Communications Applications Conference (SIU …, 2019 | 4 | 2019 |
Blockchain and Security in the IoT Environments: Literature Review H Arslan, H Aslan, HD Karkı, AG Yüksel 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 4 | 2018 |
Comparison of the Web based multimedia protocols for NAT traversal performance H Arslan, S Tüncel, AG Yüksek 2015 23nd Signal Processing and Communications Applications Conference (SIU …, 2015 | 4 | 2015 |
Extensible messaging and presence protocol’s adaptation to business applications H Arslan, S Tüncel, O Gün 5th World Conference on Innovation and Computer Sciences-INSODE-2015, Mayıs, 2015 | 4 | 2015 |
Kurumsal kolektif süreçler için e-posta iletilerinden görev keşfi ve gerçek zamanlı görev yönetim sisteminin geliştirilmesi H Arslan, O Kaynar, AG Yüksek Bilişim Teknolojileri Dergisi 10 (4), 381-388, 2015 | 4 | 2015 |
A novel hybrid model for bluetooth low energy-based indoor localization using machine learning in the internet of things Y Görmez, H Arslan, YE Işık, S Tomaç Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 30 (1), 36-43, 2023 | 3 | 2023 |