High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor M Aydos, T Yanık, CK Koc IEE Proceedings-Communications 148 (5), 273-279, 2001 | 180 | 2001 |
A review on cyber security datasets for machine learning algorithms O Yavanoglu, M Aydos 2017 IEEE international conference on big data (big data), 2186-2193, 2017 | 178 | 2017 |
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication M Aydos, B Sunar, CK Koc 2nd International Workshop on Discrete Algorithms and Methods for Mobile …, 1998 | 116 | 1998 |
Relay attacks on bluetooth authentication and solutions A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004 | 96 | 2004 |
Catch Them Alive: A Malware Detection Approach through Memory Forensics, Manifold Learning and Computer Vision AS Bozkir, E Tahıllıoğlu, M Aydos, İ Kara Computers & Security 103 (102166), 2021 | 88 | 2021 |
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition AS Bozkir, M Aydos Computers & Security 95, 101855, 2020 | 65 | 2020 |
Assessing risks and threats with layered approach to Internet of Things security M Aydos, Y Vural, A Tekerek Measurement and Control 52 (5-6), 338-353, 2019 | 65 | 2019 |
The rise of ransomware: Forensic analysis for windows based ransomware attacks I Kara, M Aydos Expert Systems with Applications 190, 116198, 2022 | 63 | 2022 |
Utilization and comparision of convolutional neural networks in malware recognition AS Bozkir, AO Cankaya, M Aydos 2019 27th signal processing and communications applications conference (SIU …, 2019 | 50 | 2019 |
Security testing of web applications: A systematic mapping of the literature M Aydos, Ç Aldan, E Coşkun, A Soydan Journal of King Saud University-Computer and Information Sciences, 2022 | 40 | 2022 |
Phish-iris: A new approach for vision based brand prediction of phishing web pages via compact visual descriptors FC Dalgic, AS Bozkir, M Aydos 2018 2nd international symposium on multidisciplinary studies and innovative …, 2018 | 39 | 2018 |
Implementing network security protocols based on elliptic curve cryptography M Aydos, E Savas, CK Koc Proceedings of the fourth symposium on computer networks, 130-139, 1999 | 36 | 1999 |
Static and dynamic analysis of third generation cerber ransomware I Kara, M Aydos 2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018 | 30 | 2018 |
The ghost in the system: technical analysis of remote access trojan İ Kara, M Aydos International Journal on Information Technologies & Security 11 (1), 73-84, 2019 | 28 | 2019 |
ERP failure: A systematic mapping of the literature E Coşkun, B Gezici, M Aydos, AK Tarhan, V Garousi Data & Knowledge Engineering 142, 102090, 2022 | 23 | 2022 |
Spam/ham e-mail classification using machine learning methods based on bag of words technique E Sahın, M Aydos, F Orhan 2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018 | 20 | 2018 |
GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings AS Bozkir, FC Dalgic, M Aydos Computers & Security 124, 102964, 2023 | 18 | 2023 |
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware I Kara, M Aydos 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication …, 2020 | 14* | 2020 |
Trustworthy scrum: Development of secure software with scrum G Koç, M Aydos 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 10 | 2017 |
Detection and Analysis of Attacks Against Web Services by the SQL Injection Method K İlker, M AYDOS 2019 3rd International Symposium on Multidisciplinary Studies and Innovative …, 2019 | 8 | 2019 |