Deceiving entropy based DoS detection I Özçelik, R Brooks Signal Processing, Sensor/Information Fusion, and Target Recognition XXIII, 2014 | 95 | 2014 |
Stealthy domain generation algorithms Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ... IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017 | 81 | 2017 |
Cusum-entropy: an efficient method for DDoS attack detection I Ozcelik, RR Brooks 2016 4th International Istanbul Smart Grid Congress and Fair (ICSG), 1-5, 2016 | 35 | 2016 |
Distributed denial of service (DDoS): a history RR Brooks, L Yu, I Ozcelik, J Oakley, N Tusing IEEE Annals of the History of Computing 44 (2), 44-54, 2021 | 25 | 2021 |
An overview of cryptographic accumulators I Ozcelik, S Medury, J Broaddus, A Skjellum arXiv preprint arXiv:2103.04330, 2021 | 23 | 2021 |
DoS Detection is Easier Now I Ozcelik, RR Fu, Yu, Brooks The Second GENI Research and Educational Experiment Workshop (GREE2013), 2013 | 18 | 2013 |
Distributed Denial of Service Attacks: Real-world Detection and Mitigation I Ozcelik, R Brooks Chapman and Hall/CRC, 2020 | 17 | 2020 |
Siber Terör ve DDoS S Atasever, İ Özçelik, Ş Sağıroğlu Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi 23 (1), 238-244, 2019 | 16 | 2019 |
MQTT Security at a Glance E Atilgan, I Ozcelik, EN Yolacan 2021 International Conference on Information Security and Cryptology …, 2021 | 8 | 2021 |
Dos attack detection and mitigation I Ozcelik Clemson University, 2015 | 8 | 2015 |
Cryptorevocate: A cryptographic accumulator based distributed certificate revocation list I Ozcelik, A Skjellum 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 7 | 2021 |
An Overview of Machine Learning Based Approaches in DDoS Detection S Atasever, İ Özçelık, Ş Sağiroğlu 2020 28th Signal Processing and Communications Applications Conference (SIU …, 2020 | 4 | 2020 |
TRCyberLab: An infrastructure for future internet and security studies I Ozcelik, S Akleylek, I Ozcelik 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018 | 4 | 2018 |
Noise tolerant symbolic learning of markov models of tunneled protocols H Bhanu, J Schwier, R Craven, I Ozcelik, C Griffin, RR Brooks 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 4 | 2011 |
Effects of Un targeted Adversarial Attacks on Deep Learning Methods E Degirmenci, I Ozcelik, A Yazici 2022 15th International Conference on Information Security and Cryptography …, 2022 | 3 | 2022 |
Kulımcak (Malatya) Yöresi Fluorit Yataklarının Genel Özellikleri ve Zenginleştirilmesi A Yamık, Y Kibici, İ Özçelik, N Güneş | 3 | 1995 |
ROSIDS23: Network intrusion detection dataset for robot operating system E Değirmenci, YS Kırca, İ Özçelik, A Yazıcı Data in Brief 51, 109739, 2023 | 1 | 2023 |
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion J Oakley, C Worley, L Yu, RR Brooks, İ Özçelik, A Skjellum, JS Obeid Digital threats: research and practice 4 (2), 1-20, 2023 | 1 | 2023 |
Capen: Cryptographic accumulator based privacy preserving exposure notification I Ozcelik 2021 9th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2021 | 1 | 2021 |
DDoS research: testing RR Brooks, İ Özçelik Distributed Denial of Service Attacks, 93-106, 2020 | 1 | 2020 |