Vulnerability prediction from source code using machine learning Z Bilgin, MA Ersoy, EU Soykan, E Tomur, P Çomak, L Karaçay IEEE Access 8, 150672-150684, 2020 | 92 | 2020 |
A layered security architecture for corporate 802.11 wireless networks YM Erten, E Tomur 2004 Symposium on Wireless Telecommunications, 123-128, 2004 | 57 | 2004 |
Differentially private deep learning for load forecasting on smart grid EU Soykan, Z Bilgin, MA Ersoy, E Tomur 2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019 | 34 | 2019 |
A practical NFC relay attack on mobile devices using card emulation mode D Çavdar, E Tomur 2015 38th International Convention on Information and Communication …, 2015 | 25 | 2015 |
Application of temporal and spatial role based access control in 802.11 wireless networks E Tomur, YM Erten computers & security 25 (6), 452-458, 2006 | 20 | 2006 |
A network-based positioning method to locate false base stations L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ... IEEE Access 9, 111368-111382, 2021 | 16 | 2021 |
A survey and guideline on privacy enhancing technologies for collaborative machine learning EU Soykan, L Karacay, F Karakoc, E Tomur IEEE Access 10, 97495-97519, 2022 | 14 | 2022 |
CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission system J Abdella, M Özuysal, E Tomur Security and Communication Networks 9 (18), 5977-5995, 2016 | 14 | 2016 |
A privacy-preserving scheme for smart grid using trusted execution environment M Akgün, EU Soykan, G Soykan IEEE Access 11, 9182-9196, 2023 | 11 | 2023 |
Pervasive artificial intelligence in next generation wireless: The Hexa-X project perspective F Miltiadis, L Vasiliki, M Jafar, M Mattia, EU Soykan, B Tamas, R Nandana, ... Proc. 1st Int. Workshop Artif. Intell. Beyond 5G 6G Wireless Netw.(AIG) Co …, 2022 | 9* | 2022 |
Statistical appliance inference in the smart grid by machine learning Z Bilgin, E Tomur, MA Ersoy, EU Soykan 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio …, 2019 | 9 | 2019 |
On the security of 6G use cases: Threat Analysis of'All-Senses Meeting' Z Laaroussi, EU Soykan, M Liljenstam, U Gülen, L Karaçay, E Tomur 2022 IEEE 19th annual consumer communications & networking conference (CCNC …, 2022 | 8 | 2022 |
A wireless secure remote access architecture implementing role based access control: WiSeR E Tomur, R Deregozu, T Genc Proceedings of the World Academy of Science, Engineering and Technology, 2006 | 8 | 2006 |
SoK: Investigation of security and functional safety in industrial IoT E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 7 | 2021 |
Security and service quality analysis for cluster-based wireless sensor networks E Tomur, YM Erten Wired/Wireless Internet Communications: 5th International Conference, WWIC …, 2007 | 6 | 2007 |
Context-aware operation-based access control for internet of things applications D Genç, E Tomur, YM Erten 2019 International Symposium on Networks, Computers and Communications …, 2019 | 5 | 2019 |
Context-aware authentication with dynamic credentials using electricity consumption data E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ... The Computer Journal 65 (10), 2631-2640, 2022 | 4 | 2022 |
A paradigm for safe adaptation of collaborating robots E Cioroaica, B Buhnova, E Tomur Proceedings of the 17th Symposium on Software Engineering for Adaptive and …, 2022 | 4 | 2022 |
Geographical information systems participating into the pervasive computing N Akçit, E Tomur, MO Karslıoğlu GEOProcessing 2014, The Sixth International Conference on Advanced …, 2014 | 4 | 2014 |
A taxonomic survey of model extraction attacks D Genç, M Özuysal, E Tomur 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | 3 | 2023 |