关注
Emrah Tomur
Emrah Tomur
Adjunct Faculty at Computer Engineering, Izmir Institute of Technology
在 iyte.edu.tr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Vulnerability prediction from source code using machine learning
Z Bilgin, MA Ersoy, EU Soykan, E Tomur, P Çomak, L Karaçay
IEEE Access 8, 150672-150684, 2020
922020
A layered security architecture for corporate 802.11 wireless networks
YM Erten, E Tomur
2004 Symposium on Wireless Telecommunications, 123-128, 2004
572004
Differentially private deep learning for load forecasting on smart grid
EU Soykan, Z Bilgin, MA Ersoy, E Tomur
2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019
342019
A practical NFC relay attack on mobile devices using card emulation mode
D Çavdar, E Tomur
2015 38th International Convention on Information and Communication …, 2015
252015
Application of temporal and spatial role based access control in 802.11 wireless networks
E Tomur, YM Erten
computers & security 25 (6), 452-458, 2006
202006
A network-based positioning method to locate false base stations
L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ...
IEEE Access 9, 111368-111382, 2021
162021
A survey and guideline on privacy enhancing technologies for collaborative machine learning
EU Soykan, L Karacay, F Karakoc, E Tomur
IEEE Access 10, 97495-97519, 2022
142022
CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission system
J Abdella, M Özuysal, E Tomur
Security and Communication Networks 9 (18), 5977-5995, 2016
142016
A privacy-preserving scheme for smart grid using trusted execution environment
M Akgün, EU Soykan, G Soykan
IEEE Access 11, 9182-9196, 2023
112023
Pervasive artificial intelligence in next generation wireless: The Hexa-X project perspective
F Miltiadis, L Vasiliki, M Jafar, M Mattia, EU Soykan, B Tamas, R Nandana, ...
Proc. 1st Int. Workshop Artif. Intell. Beyond 5G 6G Wireless Netw.(AIG) Co …, 2022
9*2022
Statistical appliance inference in the smart grid by machine learning
Z Bilgin, E Tomur, MA Ersoy, EU Soykan
2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio …, 2019
92019
On the security of 6G use cases: Threat Analysis of'All-Senses Meeting'
Z Laaroussi, EU Soykan, M Liljenstam, U Gülen, L Karaçay, E Tomur
2022 IEEE 19th annual consumer communications & networking conference (CCNC …, 2022
82022
A wireless secure remote access architecture implementing role based access control: WiSeR
E Tomur, R Deregozu, T Genc
Proceedings of the World Academy of Science, Engineering and Technology, 2006
82006
SoK: Investigation of security and functional safety in industrial IoT
E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
72021
Security and service quality analysis for cluster-based wireless sensor networks
E Tomur, YM Erten
Wired/Wireless Internet Communications: 5th International Conference, WWIC …, 2007
62007
Context-aware operation-based access control for internet of things applications
D Genç, E Tomur, YM Erten
2019 International Symposium on Networks, Computers and Communications …, 2019
52019
Context-aware authentication with dynamic credentials using electricity consumption data
E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ...
The Computer Journal 65 (10), 2631-2640, 2022
42022
A paradigm for safe adaptation of collaborating robots
E Cioroaica, B Buhnova, E Tomur
Proceedings of the 17th Symposium on Software Engineering for Adaptive and …, 2022
42022
Geographical information systems participating into the pervasive computing
N Akçit, E Tomur, MO Karslıoğlu
GEOProcessing 2014, The Sixth International Conference on Advanced …, 2014
42014
A taxonomic survey of model extraction attacks
D Genç, M Özuysal, E Tomur
2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20