Articles
48
All (48)
SCI-E, SSCI, AHCI (22)
SCI-E, SSCI, AHCI, ESCI (32)
ESCI (10)
Scopus (23)
TRDizin (26)
Other Publications (4)
6. The Battle of Chatbot Giants: An Experimental Comparison of ChatGPT and Bard
Uluslararası Mühendislik Araştırma ve Geliştirme Dergisi
, vol.16, no.2, pp.679-691, 2024 (Peer-Reviewed Journal)
11. Detection of Rice Plant Diseases Based on Deep Transfer Learning
Gazi Mühendislik Bilimleri Dergisi
, 2023 (Peer-Reviewed Journal)
16. Malware detection using image-based features and machine learning methods Görüntü tabanli özelliklerden ve makine öǧrenmesi yöntemlerinden faydalanilarak kötücül yazilim tespiti
Journal of the Faculty of Engineering and Architecture of Gazi University
, vol.38, no.3, pp.1781-1792, 2023 (SCI-Expanded)
19. IoT based mobile driver drowsiness detection using deep learning
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY
, vol.37, no.4, pp.1869-1881, 2022 (SCI-Expanded)
21. A new classification method for encrypted internet traffic using machine learning
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES
, vol.29, no.5, pp.2450-2468, 2021 (SCI-Expanded)
23. AppPerm Analyzer: Malware Detection System Based on Android Permissions and Permission Groups
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING
, vol.30, no.3, pp.427-450, 2020 (SCI-Expanded)
24. TWİTTERDA VERİ MADENCİLİĞİ YÖNTEMLERİN KULLANARAK BOT TESPİTİ
International Journal on Mathematic, Engineering and Natural Science
, vol.3, no.11, pp.98-108, 2019 (Peer-Reviewed Journal)
27. Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING
, vol.29, no.2, pp.245-262, 2019 (SCI-Expanded)
28. Permission-Based Malware Detection System for Android Using Machine Learning Techniques
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING
, vol.29, no.1, pp.43-61, 2019 (SCI-Expanded)
31. Makine Öğrenmesi Algoritmalarıyla Android Kötücül Yazılım Uygulamalarının Tespiti
Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi
, vol.22, no.2, pp.1087-1094, 2018 (Peer-Reviewed Journal)
33. Kablosuz Ağlarda Çok Katmanlı Güvenlik ve Performansa Etkisi
Karaelmas Fen ve Mühendislik Dergisi
, vol.8, no.1, pp.126-137, 2018 (Peer-Reviewed Journal)
34. Development of Reserved Reliable Flow Control Algorithm in Mobile Ad Hoc Networks
Gazi Journal of Engineering Sciences
, vol.4, no.3, pp.144-156, 2018 (Peer-Reviewed Journal)
36. Androıd Kötücül Yazılım Tespiti Yaklaşımları
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi
, vol.3, no.2, pp.48-58, 2017 (Peer-Reviewed Journal)
37. Büyük Ölçekli Veri Merkezleri İçin Bulut Bilişim Kullanarak Sunucu Sanallaştırma
Gazi Mühendislik Bilimleri Dergisi
, vol.3, no.1, pp.20-26, 2017 (Peer-Reviewed Journal)
39. Android Mobil Uygulamalar için İzin Karşılaştırma Tabanlı Kötücül Yazılım Tespiti
Politeknik Dergisi
, vol.20, no.1, pp.175-189, 2017 (Peer-Reviewed Journal)
40. Analyzing the Route Cache Timeout Parameter of DSR Protocol in Mobile Ad Hoc Networks
International Journal of Computer and Communication Engineering (IJCCE)
, vol.6, no.1, pp.40-48, 2017 (Peer-Reviewed Journal)
41. Android Kötücül Yazılım Tespit Sistemleri İncelemesi
Duzce University Journal of Science Technology
, vol.5, no.2017, pp.281-298, 2017 (Peer-Reviewed Journal)
42. Permission based detection system for android malware
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY
, vol.32, no.4, pp.1015-1024, 2017 (SCI-Expanded)
43. Mobil Kötücül Yazılımlar ve Güvenlik Çözümleri Üzerine Bir İnceleme
Gazi Üniversitesi Fen Bilimleri Dergisi Part: C Tasarım ve Teknoloji
, vol.4, no.2, pp.49-64, 2016 (Peer-Reviewed Journal)
45. Android Kötücül Yazılım Tespit ve Koruma Sistemleri
Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi
, vol.31, no.1, pp.9-16, 2015 (Peer-Reviewed Journal)
46. DEVELOPMENT OF 3G BASED REMOTE CONTROLLED CAR
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY
, vol.27, no.1, pp.135-142, 2012 (SCI-Expanded)
47. Hareketli Ad-Hoc Ağlarda Bir Hareketlilik YönetimiProtokolü
Politeknik Dergisi
, vol.11, no.4, pp.313-38, 2008 (Peer-Reviewed Journal)
Papers Presented at Peer-Reviewed Scientific Conferences
37
7. Docker Konteyner Teknolojisi Üzerine YapılanGüvenlik Çalışmalarının İncelemesi
12. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, Ankara, Turkey, 16 - 17 October 2019, (Full Text)
9. Categorization of Claims and Complaints from Mavimasa (Bluetable) Social Network Address by Using Machine Learning
3rd International Mediterranean Congress on Natural Sciences, Health Sciences and Engineering (MENSEC III), 18 - 20 June 2019, (Full Text)
10. A Smart Lighting Control System Using Solar Energy in The Scope of Internet of Things
3rd International Symposium on Innovative Approaches in Scientific Studies, Ankara, Turkey, 19 - 21 April 2019, (Full Text)
11. Twıtter’da tweet ve hesap tabanlı spam tespiti
ICAIME 2019- Yapay Zeka ve Uygulamalı Matematik 2019 Uluslararası Konferansı’xx, Antalya, Turkey, 20 - 22 April 2019, vol.1, pp.898-905, (Full Text)
27. Mobil Uygulamaların Sınıflandırılmasında Kullanılan Makine Öğrenmesi Algoritmalarının Güvenirlilik Tespiti
9. ULUSLARARASI BİLGİ GÜVENLİĞİ VE KRİPTOLOJİ KONFERANS, Ankara, Turkey, 25 - 26 October 2016, pp.191-194, (Full Text)
29. Mobil Platformlarda Gizli Ağ Saldırılarının Önlenmesi Ve Mobil Uygulaması
VIII. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı (ISCTurkey2015), Ankara, Turkey, 30 - 31 October 2015, (Full Text)
30. Mobil Cihazlarda Zararlı Yazılım TespitindeKullanılan Statik Analiz Araçları
8. ULUSLARARASI BİLGİ GÜVENLİĞİ VE KRİPTOLOJİ KONFERANS, Ankara, Turkey, 30 - 31 October 2015, (Full Text)
33. Remote Access Cisco CCNA Laboratory
5th World Conference on Educational Sciences(WCES-2013), ROMA, Italy, 6 - 08 February 2013, (Full Text)
37. Genetic Algorithm Based Location Optimization of Emergency Service Units
4th FAE International Symposium, European University of Lefke, 1 - 03 January 2006, (Full Text)
Books
3
1. Tweet and Account Based Spam Detection on Twitter
in: Lecture Notes on Data Engineering and Communications Technologies: Artificial Intelligence andApplied Mathematics in Engineering Problems, D. Jude Hemanth,Utku Kose, Editor, Springer, İSPANYA, pp.898-905, 2020
2. Analysis of MODBUS Protocol Vulnerabilities with ModbusPalSimulator
in: CURRENT ACADEMIC STUDIES IN ENGINEERING SCIENCES-2018, Prof. Dr. Serdar SALMAN, Doç. Dr. Duygu KAVAKDr. Ali KILIÇER, Editor, IVPE, Cetinje, pp.184-202, 2018
3. Mobil Cihazlarda Siber Güvenlik
in: Siber Güvenlik ve Savunma Farkındalık ve Caydırıcılık, Şeref Sağıroğlu, Mustafa Alkan, Editor, Grafiker, Ankara, pp.311-346, 2018
Metrics
Publication (WoS)
47
Publication (Scopus)
44
Citation (WoS)
457
H-Index (WoS)
11
Citation (Scopus)
738
H-Index (Scopus)
14
Citation (Scholar)
1374
H-Index (Scholar)
17
Citation (TrDizin)
12
H-Index (TrDizin)
2
Citation (Sobiad)
14
H-Index (Sobiad)
1
Citation (Sum Other)
16
Project
4
Thesis Advisory
19