A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing F Thabit, O Can, S Alhomdy, GH Al-Gaphari, S Jagtap International Journal of intelligent networks 3, 16-30, 2022 | 41 | 2022 |
Personalizable ontology based access control Ö Can, O Bursa, M Ünalır Gazi University Journal of Science 23 (4), 465-474, 2010 | 26 | 2010 |
Kurumsal ağ ve sistem güvenliği politikalarının önemi ve bir durum çalışması Ö Can, M Akbaş TÜBAV Bilim Dergisi 7 (2), 16-31, 2014 | 22 | 2014 |
Comparing relational and ontological triple stores in healthcare domain O Can, E Sezer, O Bursa, MO Unalir Entropy 19 (1), 30, 2017 | 21 | 2017 |
Cryptography Algorithms for Enhancing IoT Security F Thabit, O Can, AO Aljahdali, GH Al-Gaphari, HA Alkhzaimi Internet of Things, 100759, 2023 | 20* | 2023 |
Improving privacy in health care with an ontology‐based provenance management system O Can, D Yilmazer Expert Systems 37 (1), e12427, 2020 | 17 | 2020 |
Nesnelerin İnterneti ve Güvenli Bir Sağlık Bilgi Modeli Önerisi Ö Can, E Sezer, O Bursa, MO Ünalır 4th International Symposium on Innovative Technologies in Engineering and …, 2016 | 14 | 2016 |
An ontology based approach for host intrusion detection systems O Can, MO Unalir, E Sezer, O Bursa, B Erdogdu Metadata and Semantic Research: 11th International Conference, MTSR 2017 …, 2017 | 13 | 2017 |
A novel approach to provenance management for privacy preservation O Can, D Yilmazer Journal of Information Science 46 (2), 147-160, 2020 | 12 | 2020 |
Ontoloji Tabanlı Erişim Denetimi. Ö Can, MO Ünalir Pamukkale University Journal of Engineering Sciences 16 (2), 2010 | 12 | 2010 |
Personalised anonymity for microdata release O Can IET Information Security 12 (4), 341-347, 2018 | 11 | 2018 |
A semantic model for personal consent management O Can Metadata and Semantics Research: 7th Research Conference, MTSR 2013 …, 2013 | 11 | 2013 |
Metamodeling approach to preference management in the semantic web D Tapucu, O Can, O Bursa, MO Unalir IAAA, M-PREF2008 USA, 116-123, 2008 | 11 | 2008 |
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms F Thabit, O Can, RUZ Wani, MA Qasem, SB Thorat, HA Alkhzaimi Concurrency and Computation: Practice and Experience, e7691, 2023 | 10 | 2023 |
Using FOAF for interoperable and privacy protected healthcare information systems O Bursa, E Sezer, O Can, MO Unalir Metadata and Semantics Research: 8th Research Conference, MTSR 2014 …, 2014 | 9 | 2014 |
A privacy-aware semantic model for provenance management O Can, D Yilmazer Metadata and Semantics Research: 8th Research Conference, MTSR 2014 …, 2014 | 9 | 2014 |
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing O Can, F Thabit, AO Aljahdali, S Al-Homdy, HA Alkhzaimi Cybernetics and Systems, 1-35, 2023 | 8 | 2023 |
Extending FOAF and relationship ontologies with consent ontology E Olca, Ö Can 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 8 | 2018 |
Personalized Vaccination Using Ontology Based Profiling O Can, E Sezer, O Bursa, MO Unalir Metadata and Semantics Research: 7th Research Conference, MTSR 2013 …, 2013 | 8 | 2013 |
Ontology based access control Ö CAN, MO ÜNALIR | 8 | 2010 |