Deep Learning for Detection of Routing Attacks in the Internet of Things FY Yavuz, D Ünal, E Gül İnternational Journal of Computational Intelligence Systems 121 (1), 39-58, 2018 | 176 | 2018 |
Detection of attack-targeted scans from the Apache HTTP Server access logs MB Seyyar, FÖ Çatak, E Gül Applied Computing and Informatics 14 (1), 28-36, 2018 | 68 | 2018 |
Classification of methamorphic malware with deep learning (LSTM) AF Yazi, FÖ Çatak, E Gül 2019 27th signal processing and communications applications conference (SIU …, 2019 | 28 | 2019 |
Design and simulation of a fuzzy controller for fed-batch yeast fermentation N Besli, M Türker, E Gul Bioprocess Engineering 13, 141-148, 1995 | 28 | 1995 |
Tracking Multiple Targets using parallel processing DP Atherton, E Gul, A Kountzeris, MM Kharbouch Control Theory and Applications, IEE Proceedings D 137 (4), 225-234, 1990 | 26 | 1990 |
Preventing Data Poisoning Attacks By Using Generative Models M Aladag, FO Catak, E Gul 2019 1st International Informatics and Software Engineering Conference (UBMYK), 2019 | 24 | 2019 |
On the track similarity test in track splitting algorithm E Gul IEEE transactions on aerospace and electronic systems 30 (2), 604-606, 1994 | 13 | 1994 |
Transputer implementation for multiple target tracking E Gul, DP Atherton Microprocessors and Microsystems 13 (3), 188-194, 1989 | 12 | 1989 |
Neural network-based approaches for predicting query response times EE Yusufoglu, M Ayyildiz, E Gul 2014 International Conference on Data Science and Advanced Analytics (DSAA …, 2014 | 7 | 2014 |
Target tracking using transputers as parallel processors DP Atherton, DMA Hussain, E Gul IFAC Proceedings Volumes 24 (3), 1031-1036, 1991 | 7 | 1991 |
Comparison of digital audio watermarking techniques for the security of voip communications FÇ Er, E Gul 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 6 | 2011 |
Using xp in telecommunication software development E Gul, T Sekerci, AC Yücetürk, Ü Yildirim 2008 The Third International Conference on Software Engineering Advances …, 2008 | 5 | 2008 |
Incrementing adversarial robustness with autoencoding for machine learning model attacks S Sivaslıoğlu, FÖ Çatak, E Gül 2019 27th Signal Processing and Communications Applications Conference (SIU …, 2019 | 4 | 2019 |
Sensor Based Cyber Attack Detections in Critical Infrastructures Using Deep Learning Algorithms FO Catak, M Yılmaz, E Gul Computer Science 20 (2), 213-244, 2019 | 4 | 2019 |
Karaca, Muhammet, ve Gül, Ensar. Kritik Altyapılara Yönelik Bilişim Suçları, Türkiye ve AB Uygulamaları M Karaca, E Gül Bilişim Hukuku Dergisi 3 3 (1), 1-30, 2021 | 3* | 2021 |
Network Anomaly Detection With Convolutional Neural Network Based Auto Encoders B Kızıltaş, E Gül 2020 28th Signal Processing and Communications Applications Conference (SIU …, 2020 | 3 | 2020 |
VoIP Integration For Mobile Ride-sharing Application MB Amasyali, E Gul VoIP integration for mobile ride-sharing application MB Amasyali, E Gul 2017 …, 2017 | 3 | 2017 |
Application of fuzzy control to fed-batch yeast fermentation N Besli, E Gul, M Turker Computational Intelligence Theory and Applications, 207-216, 1997 | 3 | 1997 |
A Fuzzy System Model for Task Implementation in Extreme Programming Process E Gul Third International Conference on Software, Services and Semantic …, 2011 | 1 | 2011 |
An investigation of the use of transputers in target tracking E Gul University of Sussex, 1989 | 1 | 1989 |