关注
Sevil Sen
标题
引用次数
年份
A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism
E Turan, S Sen, T Ergun
IEEE Access, 2024
12024
Android Authorship Attribution using Source Code-Based Features
E Aydogan, S Sen
IEEE Access, 2024
2024
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks
O Ceviz, P Sadioglu, S Sen, VG Vassilakis
arXiv preprint arXiv:2312.04135, 2023
12023
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning
H Arslan, S Yılmaz, S Sen
2023 International Conference on Smart Applications, Communications and …, 2023
2023
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions
O Ceviz, P Sadioglu, S Sen
arXiv preprint arXiv:2306.14281, 2023
32023
A dynamic trust management model for vehicular ad hoc networks
M Aslan, S Sen
Vehicular Communications 41, 100608, 2023
32023
Evolving lightweight intrusion detection systems for RPL-based Internet of Things
A Deveci, S Yilmaz, S Sen
International Conference on the Applications of Evolutionary Computation …, 2023
12023
Exploring placement of intrusion detection systems in rpl-based internet of things
S Yilmaz, E Aydogan, S Sen
arXiv preprint arXiv:2303.16561, 2023
12023
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things
C Dogan, S Yilmaz, S Sen
arXiv preprint arXiv:2303.16499, 2023
2023
Metaheuristic approaches for solving multiobjective optimization problems
S Yilmaz, S Sen
Comprehensive Metaheuristics, 21-48, 2023
22023
Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks
AM Gedikli, M Koseoglu, S Sen
Computer Networks 215, 109202, 2022
82022
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
B Cevik, N Altiparmak, M Aksu, S Sen
International Journal of Information Security 21 (5), 1107-1125, 2022
12022
Analysis of RPL Objective Functions with Security Perspective.
C Dogan, S Yilmaz, S Sen
SENSORNETS, 71-80, 2022
132022
Analysis of routing attacks in fanets
O Ceviz, P Sadioglu, S Sen
International Conference on Ad Hoc Networks, 3-17, 2021
22021
Android security using nlp techniques: a review
S Sen, B Can
arXiv preprint arXiv:2107.03072, 2021
62021
Load balancing for RPL-based Internet of Things: A review
D Pancaroglu, S Sen
Ad Hoc Networks 116, 102491, 2021
502021
Attention: there is an inconsistency between android permissions and application metadata!
H Alecakir, B Can, S Sen
International Journal of Information Security, 1-19, 2021
122021
A transfer learning approach for securing resource-constrained IoT devices
S Yilmaz, E Aydogan, S Sen
IEEE Transaction on Information Forensics and Security, 2021
372021
Familial classification of android malware using hybrid analysis
OFT Cavli, S Sen
2020 International Conference on Information Security and Cryptology …, 2020
112020
Discovering inconsistencies between requested permissions and application metadata by using deep learning
H Alecakir, M Kabukcu, B Can, S Sen
2020 International Conference on Information Security and Cryptology …, 2020
32020
系统目前无法执行此操作,请稍后再试。
文章 1–20