A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism E Turan, S Sen, T Ergun IEEE Access, 2024 | 1 | 2024 |
Android Authorship Attribution using Source Code-Based Features E Aydogan, S Sen IEEE Access, 2024 | | 2024 |
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks O Ceviz, P Sadioglu, S Sen, VG Vassilakis arXiv preprint arXiv:2312.04135, 2023 | 1 | 2023 |
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning H Arslan, S Yılmaz, S Sen 2023 International Conference on Smart Applications, Communications and …, 2023 | | 2023 |
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions O Ceviz, P Sadioglu, S Sen arXiv preprint arXiv:2306.14281, 2023 | 3 | 2023 |
A dynamic trust management model for vehicular ad hoc networks M Aslan, S Sen Vehicular Communications 41, 100608, 2023 | 3 | 2023 |
Evolving lightweight intrusion detection systems for RPL-based Internet of Things A Deveci, S Yilmaz, S Sen International Conference on the Applications of Evolutionary Computation …, 2023 | 1 | 2023 |
Exploring placement of intrusion detection systems in rpl-based internet of things S Yilmaz, E Aydogan, S Sen arXiv preprint arXiv:2303.16561, 2023 | 1 | 2023 |
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things C Dogan, S Yilmaz, S Sen arXiv preprint arXiv:2303.16499, 2023 | | 2023 |
Metaheuristic approaches for solving multiobjective optimization problems S Yilmaz, S Sen Comprehensive Metaheuristics, 21-48, 2023 | 2 | 2023 |
Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks AM Gedikli, M Koseoglu, S Sen Computer Networks 215, 109202, 2022 | 8 | 2022 |
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries B Cevik, N Altiparmak, M Aksu, S Sen International Journal of Information Security 21 (5), 1107-1125, 2022 | 1 | 2022 |
Analysis of RPL Objective Functions with Security Perspective. C Dogan, S Yilmaz, S Sen SENSORNETS, 71-80, 2022 | 13 | 2022 |
Analysis of routing attacks in fanets O Ceviz, P Sadioglu, S Sen International Conference on Ad Hoc Networks, 3-17, 2021 | 2 | 2021 |
Android security using nlp techniques: a review S Sen, B Can arXiv preprint arXiv:2107.03072, 2021 | 6 | 2021 |
Load balancing for RPL-based Internet of Things: A review D Pancaroglu, S Sen Ad Hoc Networks 116, 102491, 2021 | 50 | 2021 |
Attention: there is an inconsistency between android permissions and application metadata! H Alecakir, B Can, S Sen International Journal of Information Security, 1-19, 2021 | 12 | 2021 |
A transfer learning approach for securing resource-constrained IoT devices S Yilmaz, E Aydogan, S Sen IEEE Transaction on Information Forensics and Security, 2021 | 37 | 2021 |
Familial classification of android malware using hybrid analysis OFT Cavli, S Sen 2020 International Conference on Information Security and Cryptology …, 2020 | 11 | 2020 |
Discovering inconsistencies between requested permissions and application metadata by using deep learning H Alecakir, M Kabukcu, B Can, S Sen 2020 International Conference on Information Security and Cryptology …, 2020 | 3 | 2020 |