关注
Sevil Sen
标题
引用次数
年份
" Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications
AI Aysan, S Sen
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
122015
A central intrusion detection system for rpl-based industrial internet of things
E Aydogan, S Yilmaz, S Sen, I Butun, S Forsström, M Gidlund
2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019
512019
A cross-layer intrusion detection system for RPL-based Internet of Things
E Canbalaban, S Sen
Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad …, 2020
312020
A dynamic trust management model for vehicular ad hoc networks
M Aslan, S Sen
Vehicular Communications 41, 100608, 2023
42023
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
S Şen, JA Clark
Proceedings of the second ACM conference on Wireless network security, 95-102, 2009
492009
A lightweight threshold-based improvement on dsdv
R Abri, S Sen
Ad Hoc Networks: 5th International ICST Conference, ADHOCNETS 2013 …, 2014
42014
A new approach for detection of insider attacks
S Şen
2013 21st Signal Processing and Communications Applications Conference (SIU …, 2013
2013
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks
O Ceviz, P Sadioglu, S Sen, VG Vassilakis
arXiv preprint arXiv:2312.04135, 2023
22023
A novel multi-featured metric for adaptive routing in mobile ad hoc networks
S Hasdemir, S Yilmaz, S Sen
Applied Intelligence 49, 2823-2841, 2019
72019
A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism
E Turan, S Sen, T Ergun
IEEE Access, 2024
22024
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
F Sakiz, S Sen
Ad Hoc Networks 61, 33-50, 2017
4652017
A survey of intrusion detection systems using evolutionary computation
S Sen
Bio-inspired computation in telecommunications, 73-94, 2015
462015
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions
O Ceviz, P Sadioglu, S Sen
arXiv preprint arXiv:2306.14281, 2023
62023
A transfer learning approach for securing resource-constrained IoT devices
S Yilmaz, E Aydogan, S Sen
IEEE Transaction on Information Forensics and Security, 2021
402021
An analysis of the current state of security in the Internet of Things
D Pancaroglu, S Sen
International Conference on Cyber Security and Computer Science (ICONCS’18 …, 2018
42018
An ensemble learning approach to mobile malware detection
HB Ozkan, E Aydogan, S Sen
Hacettepe University, Department of Computer Engineering, 2014
62014
Analysis of adversarial attacks against traditional spam filters
H Ozkan, S Sen, C Burcu
Processings of International Conference on All Aspects of Cyber Security, 2019
42019
Analysis of dynamic code updating in Android with security perspective
AI Aysan, F Sakiz, S Sen
IET Information Security 13 (3), 269-277, 2019
112019
Analysis of machine learning methods on malware detection
E Aydoğan, S Şen
2014 22nd Signal Processing and Communications Applications Conference (SIU …, 2014
22014
Analysis of routing attacks in fanets
O Ceviz, P Sadioglu, S Sen
International Conference on Ad Hoc Networks, 3-17, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20