Systematic literature review on bootstrapping procedure of FHE schemes ,2024
Post-quantum PAKE over lattices revised: Smaug-T.PAKE for mobile devices ,2026
PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge ,2025
Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets ,2025
İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması ,2019
Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme ,2021
Lattice-based blockchain platform for IoT: Privacy-enhanced application with lattice-based blind signatures ,2026
PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT ,2025
A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems ,2025
Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation ,2025
A Novel Model for E-Book Borrowing Management System ,2018
A Novel IoT-based Health and Tactical Analysis Model with Fog Computing ,2021
Quantum Secure Communication Between Service Provider and SIM ,2022
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports ,2022
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme ,2022
A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security ,2024
Anomaly Detection With API Calls by Using Machine Learning: Systematic Literature Review ,2024
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography ,2018
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form ,2023
Efficient methods to generate cryptographically significant binary diffusion layers ,2017
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT ,2025
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude ,2023
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast ,2024
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems ,2024
Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications ,2024
Anomaly detection system for ADS-B data: Attack vectors and machine learning models ,2025
A Review Of Machine Learning And Deep Learning Models Used For IoT Security ,2021
A Systematic Literature Review on Host-Based Intrusion Detection Systems ,2024
A new hybrid method combining search and direct based construction ideas to generate all 4 x 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields ,2019
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key ,2024
Password authenticated key exchange-based on Kyber for mobile devices ,2024
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ,2022
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
Kuantum Sonrası Güvenli Dijital Kripto Cüzdan ,2024
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol ,2024
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast ,2024
A novel permission-based Android malware detection system using feature selection based on linear regression ,2023
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication ,2023
A new method for vulnerability and risk assessment of IoT ,2023
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form ,2023
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations ,2020
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude ,2023
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports ,2022
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme ,2022
Taxonomy of traffic engineering mechanisms in software-defined networks: a survey ,2022
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey ,2022
Module learning with rounding based key agreement scheme with modified reconciliation ,2022
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security ,2021
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys ,2020
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers ,2022
A new lattice-based authentication scheme for IoT ,2022
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model ,2022
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication ,2022
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ,2022
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks ,2022
Permission-based Android malware analysis by using dimension reduction with PCA and LDA ,2021
Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation ,2021
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection ,2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA ,2021
Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography ,2021
A modified algorithm for peer-to-peer security ,2007
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes ,2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA ,2021
Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi ,2020
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications ,2017
Efficient GeMSS Based Ring Signature Scheme ,2020
NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA ,2020
KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA ,2020
JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES ,2020
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations ,2020
MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU ,2020
Parola Tabanlı SIMSec Protokolü ,2020
IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma ,2019
New Signature Algorithm Based on Concatenated Rank Codes ,2019
A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials ,2019
A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT ,2019
Securty of online Learning ,2005
Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye ,2007
Open Source UTM Alternative ClearOS ,2010
A note on Knapsack Cryptosystems ,2007
qTESLA: Efficient and Post-Quantum Secure Lattice-Based Signature Scheme ,2017
ÜÇ TERİMLİ POLİNOMLAR İÇİN KARATSUBA BENZERİ ÇARPMA YÖNTEMLERİNİN ARAŞTIRILMASI ,2017
Generating binary diffusion layers with maximum high branch numbers and low search complexity ,2016
Sparse polynomial multiplication for lattice based cryptography with small complexity ,2016
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
A New Short Signature Scheme with Random Oracle from Bilinear Pairings ,2011
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity ,2010
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
Efficient interleaved Montgomery modular multiplication for lattice based cryptography ,2014
New methods for public key cryptosystems based on XTR ,2015
Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity ,2012
On the Construction of 20 20 and 24 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions ,2014
A Modified Algorithm for Peer to Peer Security ,2007
On the Polynomial Multiplication in Chebyshev Form ,2012
On the Generalisation of Special Moduli for Faster Interleaved Montgomery Modular Multiplication ,2013
On the Arithmetic Operations over Finite Fields of Characteristic Three with Low Complexity ,2014
Reports
Work Accident Analysis with Machine Learning Techniques - ŞAHİN DURMUŞ ÖZKAN,Şirin Burçe,AKLEYLEK SEDAT,KILIÇ ERDAL
A study on the use of quantum computers, risk assessment and security problems - ARSLAN BİLGEHAN,ÜLKER MEHTAP,SAĞIROĞLU ŞEREF,AKLEYLEK SEDAT
On the Construction of 4x4 Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
A lightweight post-quantum authentication framework for next-generation satellite communication standards - SEYHAN KÜBRA,AKLEYLEK SEDAT,Vazquez Castro Angeles
Adaptive PageRank for systemic risk evaluation in interconnected PNT systems - ARAT FERHAT,AKLEYLEK SEDAT
A New Optimized Implementation of SMAUG-T for Lightweight Devices - Narlı Oğuz,KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT
A survey on security threats and authentication approaches in wireless sensor networks - AKLEYLEK SEDAT,KARAKAYA AYKUT
PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices - Karacan Engin,AKLEYLEK SEDAT,KARAKAYA AYKUT
A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
On the Construction of $4 \times 4$ Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m - KURT PEHLİVANOĞLU MELTEM, DEMİR MEHMET ALİ, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - DEMİR MEHMET ALİ,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
On the design strategies of diffusion layers and key schedule in lightweight block ciphers - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
A SURVEY ON DIGITAL RIGHTS MANAGEMENT - AKLEYLEK SEDAT,SOYSALDI MERYEM,KARHAN ZEHRA,ŞAHİN DURMUŞ ÖZKAN
Comparison of Regression Methods in Permission Based Android Malware Detection - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers - KURT PEHLİVANOĞLU MELTEM, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA, DURU NEVCİHAN
On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2^m - KURT PEHLİVANOĞLU MELTEM, Demir Mehmet Ali, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması - AKLEYLEK SEDAT, SOYSALDI ŞAHİN MERYEM
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography - AKLEYLEK SEDAT,SOYSALDI MERYEM
A Novel Lattice-Based Threshold Ring Signature Scheme - AKLEYLEK SEDAT, SOYSALDI MERYEM
Post-Quantum Cryptography: A Snapshot of Standardization Efforts - AKLEYLEK SEDAT, SEYHAN KÜBRA
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity - SEYHAN KÜBRA, AKLEYLEK SEDAT
Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları - SEYHAN KÜBRA, AKLEYLEK SEDAT
A Lattice-based Group Signature Scheme with Applications in Blockchain - SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
A novel identification scheme for post-quantum secure digital right management - AKLEYLEK SEDAT, SOYSALDI MERYEM
Challenges and Opportunities in Cryptography - AKLEYLEK SEDAT
New results on permission based static analysis for android malware - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
Survey on Implementation of Lattice-based Identification Schemes - Murzaeva Azhar, SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C - Murzaeva Azhar, AKLEYLEK SEDAT
A Systematic Survey on Mobile Internet of Things Security - ARAT FERHAT, AKLEYLEK SEDAT
HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE - SEYHAN KÜBRA, AKLEYLEK SEDAT, KILIÇ ERDAL, ORUÇ YALÇIN
GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda - AKLEYLEK SEDAT, Koyutürk Ramazan, KUTUCU HAKAN
Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network - KURAL OĞUZ EMRE, ŞAHİN DURMUŞ ÖZKAN, AKLEYLEK SEDAT, KILIÇ ERDAL, Ömüral Murat
TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER,AKLEYLEK SEDAT,ÖZÇELİK İBRAHİM
CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND
CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS - AKLEYLEK SEDAT
Support Vector Machines: From Classical Version to Quantum - Decadjevi Gildas, AKLEYLEK SEDAT, Abdiu Gazmor, Halabi Omar
Efficient Implementations of Gauss-Based Sieving Algorithms - SATILMIŞ HAMİ,AKLEYLEK SEDAT
Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography - SATILMIŞ HAMİ,AKLEYLEK SEDAT
An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem - DURGUT RAFET,KUTUCU HAKAN,AKLEYLEK SEDAT
The Third International Conference onProblems of Cybernetics and Informatics - NURIYEV URFAT, EMMUNGİL LEVENT, AKLEYLEK SEDAT
A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale - AKLEYLEK SEDAT, KARAGÖL SERAP, KUTUCU HAKAN, MOHAMMADI RAMIN
TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER, AKLEYLEK SEDAT, ÖZÇELİK İBRAHİM
Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms - AKLEYLEK SEDAT,SATILMIŞ HAMİ
Stocks Prices Prediction with Long Short-term Memory - AKŞEHİR ZİNNET DUYGU,KILIÇ ERDAL,AKLEYLEK SEDAT,Döngül Mesut,Coşkun Burak
A New 3-pass Zero-knowledge Lattice-based Identification Scheme - AKLEYLEK SEDAT,SOYSALDI MERYEM
Permission Weighting Approaches in Permission Based Android Malware Detection - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,KILIÇ ERDAL
New Signature Algorithm Based on Concatenated Rank Codes - Mahdjoubi Roumaissa,AKLEYLEK SEDAT,Kenza Guenda
Efficient GeMSS Based Ring Signature Scheme - Demircioğlu Murat,AKLEYLEK SEDAT,CENK MURAT
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme - Lee Wai Kong,AKLEYLEK SEDAT,Yap Wun She,Goi Bok Min
Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols - AKLEYLEK SEDAT,SEYHAN KÜBRA
Formal Analysis of MaTRU Cryptosystem - AKLEYLEK SEDAT,çevik nurşah
Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları - AKLEYLEK SEDAT,Koyutürk Ramazan
Open Source UTM Alternative ClearOS - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
A note on Knapsack Cryptosystems - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye - EMMUNGİL LEVENT,AKLEYLEK SEDAT,NURIYEV URFAT
Securty of online Learning - NURIYEV URFAT,ÖZARSLAN SÜLEYMAN,AKLEYLEK SEDAT
Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme - AKLEYLEK SEDAT,SEYHAN KÜBRA
A Bayesian Networks Application in Occupational Health and Safety - PEKEL EBRU,AKŞEHİR ZİNNET DUYGU,meto bilal,AKLEYLEK SEDAT,KILIÇ ERDAL
An Automated Vulnerable Website Penetration - Murzaeva Azhar,AKLEYLEK SEDAT
An Overview for the National Cyber Security Strategy - Ataç Cihan,AKLEYLEK SEDAT
GUI Based Ring Signature Scheme - AKLEYLEK SEDAT,Demircioğlu Murat,CENK MURAT
Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era - Lee Wai Kong,Goi Bok Min,Yap Wun She,Wong Denis Chee Keong,AKLEYLEK SEDAT
On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques - AKŞEHİR ZİNNET DUYGU,oruç yalçın,Elibol Ahmet,AKLEYLEK SEDAT,KILIÇ ERDAL
New quantum secure key exchange protocols based on MaTRU - AKLEYLEK SEDAT,Kaya Nurşah
New results on permission based static analysis for Android malware - ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE,AKLEYLEK SEDAT,KILIÇ ERDAL
Modified Arithmetic Circuits for Galois Rings - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,ALKIM ERDEM
The Trend of Business Intelligence Adoption and Maturity - Qushem Umar Bin,Zeki Akram,Abubakar Adamu,AKLEYLEK SEDAT
SİBER GÜVENLİK VE SAVUNMA : PROBLEMLER ÇÖZÜMLER – GRAFİKER
Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II – Grafiker Yayınları
Authentication Technologies for Cloud Technology, IoT, and Big Data – The Institution of Engineering and Technology (The IET)
Proceedings of ISCTURKEY 2016 – Bilgi Güvenliği Derneği
Cryptography and Information Security in the Balkans – Springer
Algoritmalara Giriş – Palme Yayınevi
Handbook of Codes and Sequences with Applications in Communication Computing and Information Security – Chapman and Hall/CRC
Şifrelerin Matematiği Kriptografi – ODTÜ Geliştirme Vakfı Yayıncılık
Improving Information Security Practices through Computational Intelligence – IGI Global
Computer and Information Sciences – Springer
Awards
Yılın Tezi Ödülü – 2012
Misafir Araştırmacı – 2012
Yurtdışı Araştırma – 2012
Yayın Teşvik – 2012
Yayın Teşvik – 2013
COST Action IC1306 School on Cryptographic Attacks katılım bursu – 2014
TÜBİTAK 2242 Yazılım Projeleri Yarışması Sosyal Yaşam ve Eğlence Uygulamaları alanında ikincilik ödülü alan “SMS-PGP Mobil Uygulaması” başlıklı projeye akademik danışmanlık – 2014