A Novel Model for E-Book Borrowing Management System
, 2018
A Novel IoT-based Health and Tactical Analysis Model with Fog Computing
, 2021
Quantum Secure Communication Between Service Provider and SIM
, 2022
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports
, 2022
Lattice-based blockchain platform for IoT: Privacy-enhanced application with lattice-based blind signatures
, 2025
PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge
, 2025
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems
, 2025
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
, 2022
A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security
, 2024
Anomaly Detection With API Calls by Using Machine Learning: Systematic Literature Review
, 2024
Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation
, 2025
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
, 2018
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
, 2023
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
, 2025
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
, 2023
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast
, 2024
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
, 2024
Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications
, 2024
Anomaly detection system for ADS-B data: Attack vectors and machine learning models
, 2025
Development of Various Stacking Ensemble Based HIDS Using ADFA Datasets
, 2025
A Review Of Machine Learning And Deep Learning Models Used For IoT Security
, 2021
A Systematic Literature Review on Host-Based Intrusion Detection Systems
, 2024
PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT
, 2025
A new hybrid method combining search and direct based construction ideas to generate all 4 x 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields
, 2019
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
, 2024
Password authenticated key exchange-based on Kyber for mobile devices
, 2024
Systematic literature review on bootstrapping procedure of FHE schemes
, 2024
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm
, 2022
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
Kuantum Sonrası Güvenli Dijital Kripto Cüzdan
, 2024
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
, 2024
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast
, 2024
A novel permission-based Android malware detection system using feature selection based on linear regression
, 2023
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication
, 2023
A new method for vulnerability and risk assessment of IoT
, 2023
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
, 2023
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
, 2020
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
, 2023
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports
, 2022
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
, 2022
Taxonomy of traffic engineering mechanisms in software-defined networks: a survey
, 2022
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
, 2022
Module learning with rounding based key agreement scheme with modified reconciliation
, 2022
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
, 2021
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
, 2020
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
, 2022
A new lattice-based authentication scheme for IoT
, 2022
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model
, 2022
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
, 2022
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm
, 2022
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks
, 2022
Permission-based Android malware analysis by using dimension reduction with PCA and LDA
, 2021
Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation
, 2021
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection
, 2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
, 2021
Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme
, 2021
İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması
, 2019
Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
, 2021
A modified algorithm for peer-to-peer security
, 2007
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes
, 2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
, 2021
Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi
, 2020
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications
, 2017
Generating binary diffusion layers with maximum high branch numbers and low search complexity
, 2016
Sparse polynomial multiplication for lattice based cryptography with small complexity
, 2016
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
, 2013
A New Short Signature Scheme with Random Oracle from Bilinear Pairings
, 2011
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
, 2010
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
, 2013
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
, 2013
Efficient interleaved Montgomery modular multiplication for lattice based cryptography
, 2014
New methods for public key cryptosystems based on XTR
, 2015
Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity
, 2012
On the Construction of 20 20 and 24 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions
, 2014
A Modified Algorithm for Peer to Peer Security
, 2007
On the Polynomial Multiplication in Chebyshev Form
, 2012
On the Generalisation of Special Moduli for Faster Interleaved Montgomery Modular Multiplication
, 2013
On the Arithmetic Operations over Finite Fields of Characteristic Three with Low Complexity
, 2014
Reports
A survey on security threats and authentication approaches in wireless sensor networks - AKLEYLEK SEDAT,KARAKAYA AYKUT
PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices - Karacan Engin,AKLEYLEK SEDAT,KARAKAYA AYKUT
A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
On the Construction of $4 \times 4$ Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m - KURT PEHLİVANOĞLU MELTEM, DEMİR MEHMET ALİ, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - DEMİR MEHMET ALİ,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
On the design strategies of diffusion layers and key schedule in lightweight block ciphers - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
A SURVEY ON DIGITAL RIGHTS MANAGEMENT - AKLEYLEK SEDAT,SOYSALDI MERYEM,KARHAN ZEHRA,ŞAHİN DURMUŞ ÖZKAN
Comparison of Regression Methods in Permission Based Android Malware Detection - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers - KURT PEHLİVANOĞLU MELTEM, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA, DURU NEVCİHAN
On the Construction of $$4 \times 4$$ Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2^m - KURT PEHLİVANOĞLU MELTEM, Demir Mehmet Ali, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması - AKLEYLEK SEDAT, SOYSALDI ŞAHİN MERYEM
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography - AKLEYLEK SEDAT,SOYSALDI MERYEM
A Novel Lattice-Based Threshold Ring Signature Scheme - AKLEYLEK SEDAT, SOYSALDI MERYEM
Post-Quantum Cryptography: A Snapshot of Standardization Efforts - AKLEYLEK SEDAT, SEYHAN KÜBRA
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity - SEYHAN KÜBRA, AKLEYLEK SEDAT
Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları - SEYHAN KÜBRA, AKLEYLEK SEDAT
A Lattice-based Group Signature Scheme with Applications in Blockchain - SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
A novel identification scheme for post-quantum secure digital right management - AKLEYLEK SEDAT, SOYSALDI MERYEM
Challenges and Opportunities in Cryptography - AKLEYLEK SEDAT
New results on permission based static analysis for android malware - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
Survey on Implementation of Lattice-based Identification Schemes - Murzaeva Azhar, SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C - Murzaeva Azhar, AKLEYLEK SEDAT
A Systematic Survey on Mobile Internet of Things Security - ARAT FERHAT, AKLEYLEK SEDAT
HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE - SEYHAN KÜBRA, AKLEYLEK SEDAT, KILIÇ ERDAL, ORUÇ YALÇIN
GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda - AKLEYLEK SEDAT, Koyutürk Ramazan, KUTUCU HAKAN
Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network - KURAL OĞUZ EMRE, ŞAHİN DURMUŞ ÖZKAN, AKLEYLEK SEDAT, KILIÇ ERDAL, Ömüral Murat
TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER,AKLEYLEK SEDAT,ÖZÇELİK İBRAHİM
CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND
CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS - AKLEYLEK SEDAT
Support Vector Machines: From Classical Version to Quantum - Decadjevi Gildas, AKLEYLEK SEDAT, Abdiu Gazmor, Halabi Omar
Efficient Implementations of Gauss-Based Sieving Algorithms - SATILMIŞ HAMİ,AKLEYLEK SEDAT
Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography - SATILMIŞ HAMİ,AKLEYLEK SEDAT
An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem - DURGUT RAFET,KUTUCU HAKAN,AKLEYLEK SEDAT
The Third International Conference onProblems of Cybernetics and Informatics - NURIYEV URFAT, EMMUNGİL LEVENT, AKLEYLEK SEDAT
A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale - AKLEYLEK SEDAT, KARAGÖL SERAP, KUTUCU HAKAN, MOHAMMADI RAMIN
TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER, AKLEYLEK SEDAT, ÖZÇELİK İBRAHİM
Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms - AKLEYLEK SEDAT,SATILMIŞ HAMİ
Stocks Prices Prediction with Long Short-term Memory - AKŞEHİR ZİNNET DUYGU,KILIÇ ERDAL,AKLEYLEK SEDAT,Döngül Mesut,Coşkun Burak
A New 3-pass Zero-knowledge Lattice-based Identification Scheme - AKLEYLEK SEDAT,SOYSALDI MERYEM
Permission Weighting Approaches in Permission Based Android Malware Detection - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,KILIÇ ERDAL
New Signature Algorithm Based on Concatenated Rank Codes - Mahdjoubi Roumaissa,AKLEYLEK SEDAT,Kenza Guenda
Efficient GeMSS Based Ring Signature Scheme - Demircioğlu Murat,AKLEYLEK SEDAT,CENK MURAT
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme - Lee Wai Kong,AKLEYLEK SEDAT,Yap Wun She,Goi Bok Min
Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols - AKLEYLEK SEDAT,SEYHAN KÜBRA
Formal Analysis of MaTRU Cryptosystem - AKLEYLEK SEDAT,çevik nurşah
Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları - AKLEYLEK SEDAT,Koyutürk Ramazan
Open Source UTM Alternative ClearOS - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
A note on Knapsack Cryptosystems - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye - EMMUNGİL LEVENT,AKLEYLEK SEDAT,NURIYEV URFAT
Securty of online Learning - NURIYEV URFAT,ÖZARSLAN SÜLEYMAN,AKLEYLEK SEDAT
Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme - AKLEYLEK SEDAT,SEYHAN KÜBRA
A Bayesian Networks Application in Occupational Health and Safety - PEKEL EBRU,AKŞEHİR ZİNNET DUYGU,meto bilal,AKLEYLEK SEDAT,KILIÇ ERDAL
An Automated Vulnerable Website Penetration - Murzaeva Azhar,AKLEYLEK SEDAT
An Overview for the National Cyber Security Strategy - Ataç Cihan,AKLEYLEK SEDAT
A study on the use of quantum computers, risk assessment and security problems - ARSLAN BİLGEHAN,ÜLKER MEHTAP,AKLEYLEK SEDAT,SAĞIROĞLU ŞEREF
GUI Based Ring Signature Scheme - AKLEYLEK SEDAT,Demircioğlu Murat,CENK MURAT
Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era - Lee Wai Kong,Goi Bok Min,Yap Wun She,Wong Denis Chee Keong,AKLEYLEK SEDAT
On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques - AKŞEHİR ZİNNET DUYGU,oruç yalçın,Elibol Ahmet,AKLEYLEK SEDAT,KILIÇ ERDAL
New quantum secure key exchange protocols based on MaTRU - AKLEYLEK SEDAT,Kaya Nurşah
New results on permission based static analysis for Android malware - ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE,AKLEYLEK SEDAT,KILIÇ ERDAL
Work Accident Analysis with Machine Learning Techniques - ŞAHİN DURMUŞ ÖZKAN,Şirin Burçe,AKLEYLEK SEDAT,KILIÇ ERDAL
Modified Arithmetic Circuits for Galois Rings - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,ALKIM ERDEM
The Trend of Business Intelligence Adoption and Maturity - Qushem Umar Bin,Zeki Akram,Abubakar Adamu,AKLEYLEK SEDAT
SİBER GÜVENLİK VE SAVUNMA : PROBLEMLER ÇÖZÜMLER – GRAFİKER
Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II – Grafiker Yayınları
Authentication Technologies for Cloud Technology, IoT, and Big Data – The Institution of Engineering and Technology (The IET)
Proceedings of ISCTURKEY 2016 – Bilgi Güvenliği Derneği
Cryptography and Information Security in the Balkans – Springer
Algoritmalara Giriş – Palme Yayınevi
Handbook of Codes and Sequences with Applications in Communication Computing and Information Security – Chapman and Hall/CRC
Şifrelerin Matematiği Kriptografi – ODTÜ Geliştirme Vakfı Yayıncılık
Improving Information Security Practices through Computational Intelligence – IGI Global
Computer and Information Sciences – Springer
Awards
Yılın Tezi Ödülü – 2012
Misafir Araştırmacı – 2012
Yurtdışı Araştırma – 2012
Yayın Teşvik – 2012
Yayın Teşvik – 2013
COST Action IC1306 School on Cryptographic Attacks katılım bursu – 2014
TÜBİTAK 2242 Yazılım Projeleri Yarışması Sosyal Yaşam ve Eğlence Uygulamaları alanında ikincilik ödülü alan “SMS-PGP Mobil Uygulaması” başlıklı projeye akademik danışmanlık – 2014