" Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications AI Aysan, S Sen 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 12 | 2015 |
A central intrusion detection system for rpl-based industrial internet of things E Aydogan, S Yilmaz, S Sen, I Butun, S Forsström, M Gidlund 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019 | 51 | 2019 |
A cross-layer intrusion detection system for RPL-based Internet of Things E Canbalaban, S Sen Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad …, 2020 | 31 | 2020 |
A dynamic trust management model for vehicular ad hoc networks M Aslan, S Sen Vehicular Communications 41, 100608, 2023 | 4 | 2023 |
A grammatical evolution approach to intrusion detection on mobile ad hoc networks S Şen, JA Clark Proceedings of the second ACM conference on Wireless network security, 95-102, 2009 | 49 | 2009 |
A lightweight threshold-based improvement on dsdv R Abri, S Sen Ad Hoc Networks: 5th International ICST Conference, ADHOCNETS 2013 …, 2014 | 4 | 2014 |
A new approach for detection of insider attacks S Şen 2013 21st Signal Processing and Communications Applications Conference (SIU …, 2013 | | 2013 |
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks O Ceviz, P Sadioglu, S Sen, VG Vassilakis arXiv preprint arXiv:2312.04135, 2023 | 2 | 2023 |
A novel multi-featured metric for adaptive routing in mobile ad hoc networks S Hasdemir, S Yilmaz, S Sen Applied Intelligence 49, 2823-2841, 2019 | 7 | 2019 |
A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism E Turan, S Sen, T Ergun IEEE Access, 2024 | 2 | 2024 |
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV F Sakiz, S Sen Ad Hoc Networks 61, 33-50, 2017 | 465 | 2017 |
A survey of intrusion detection systems using evolutionary computation S Sen Bio-inspired computation in telecommunications, 73-94, 2015 | 46 | 2015 |
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions O Ceviz, P Sadioglu, S Sen arXiv preprint arXiv:2306.14281, 2023 | 6 | 2023 |
A transfer learning approach for securing resource-constrained IoT devices S Yilmaz, E Aydogan, S Sen IEEE Transaction on Information Forensics and Security, 2021 | 40 | 2021 |
An analysis of the current state of security in the Internet of Things D Pancaroglu, S Sen International Conference on Cyber Security and Computer Science (ICONCS’18 …, 2018 | 4 | 2018 |
An ensemble learning approach to mobile malware detection HB Ozkan, E Aydogan, S Sen Hacettepe University, Department of Computer Engineering, 2014 | 6 | 2014 |
Analysis of adversarial attacks against traditional spam filters H Ozkan, S Sen, C Burcu Processings of International Conference on All Aspects of Cyber Security, 2019 | 4 | 2019 |
Analysis of dynamic code updating in Android with security perspective AI Aysan, F Sakiz, S Sen IET Information Security 13 (3), 269-277, 2019 | 11 | 2019 |
Analysis of machine learning methods on malware detection E Aydoğan, S Şen 2014 22nd Signal Processing and Communications Applications Conference (SIU …, 2014 | 2 | 2014 |
Analysis of routing attacks in fanets O Ceviz, P Sadioglu, S Sen International Conference on Ad Hoc Networks, 3-17, 2021 | 2 | 2021 |