A secure authentication scheme framework for mobile-sinks used in the internet of drones applications YK Ever Computer Communications 155, 143-149, 2020 | 115 | 2020 |
Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks F Al-Turjman, YK Ever, E Ever, HX Nguyen, DB David IEEE Access 5, 24617-24631, 2017 | 95 | 2017 |
Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks YK Ever IEEE systems journal 13 (1), 456-467, 2018 | 84 | 2018 |
Using simplified swarm optimization on path planning for intelligent mobile robot YK Ever Procedia computer science 120, 83-90, 2017 | 37 | 2017 |
Classification analysis of intrusion detection on NSL-KDD using machine learning algorithms YK Ever, B Sekeroglu, K Dimililer International Conference on Mobile Web and Intelligent Information Systems …, 2019 | 36 | 2019 |
Intelligent eye tumour detection system K Dimililer, YK Ever, H Ratemi Procedia Computer Science 102, 325-332, 2016 | 36 | 2016 |
Machine learning for expert systems in data analysis ET Ogidan, K Dimililer, YK Ever 2018 2nd International Symposium on Multidisciplinary Studies and Innovative …, 2018 | 33 | 2018 |
Comparison of machine learning techniques for prediction problems Y Kirsal Ever, K Dimililer, B Sekeroglu Web, Artificial Intelligence and Network Applications: Proceedings of the …, 2019 | 32 | 2019 |
Tumor detection on CT lung images using image enhancement K Dimililer, B Ugur, YK Ever The Online Journal of Science and Technology 7 (1), 133-138, 2017 | 32 | 2017 |
Critical analysis of security and privacy challenges for the Internet of drones: A survey GS Ilgi, YK Ever Drones in smart-cities, 207-214, 2020 | 30 | 2020 |
ILTDS: Intelligent lung tumor detection system on ct images K Dimililer, YK Ever, B Ugur Intelligent Systems Technologies and Applications 2016, 225-235, 2016 | 23 | 2016 |
Intelligent systems technologies and applications 2016 JMC Rodriguez, S Mitra, SM Thampi, ES El-Alfy Springer, 2016 | 22 | 2016 |
The effectiveness of a new classification system in higher education as a new e-learning tool Y Kirsal Ever, K Dimililer Quality & Quantity 52 (Suppl 1), 573-582, 2018 | 21 | 2018 |
Comparative evaluation and comprehensive analysis of machine learning models for regression problems B Sekeroglu, YK Ever, K Dimililer, F Al-Turjman Data Intelligence 4 (3), 620-652, 2022 | 13 | 2022 |
Vehicle detection and tracking using machine learning techniques K Dimililer, YK Ever, SM Mustafa International Conference on Theory and Application of Soft Computing …, 2019 | 13 | 2019 |
Lung lesion segmentation using gaussian filter and discrete wavelet transform K Dimililer, A Hesri, YK Ever ITM Web of Conferences 11, 01018, 2017 | 13 | 2017 |
Further improvements to the kerberos timed authentication protocol Y Kirsal, O Gemikonakli Novel Algorithms and Techniques in Telecommunications, Automation and …, 2008 | 13 | 2008 |
Analytical modelling and performability analysis for cloud computing using queuing system Y Kirsal, YK Ever, L Mostarda, O Gemikonakli 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015 | 12 | 2015 |
Design and simulation of global model for carbon emission reduction using IoT and artificial intelligence K Alpan, K Tuncal, C Ozkan, B Sekeroglu, YK Ever Procedia Computer Science 204, 627-634, 2022 | 9 | 2022 |
Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal Y Kirsal, O Gemikonakli 2008 7th IEEE International Conference on Cybernetic Intelligent Systems, 1-6, 2008 | 9 | 2008 |