PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge
, 2025
Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets
, 2025
İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması
, 2019
Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme
, 2021
Lattice-based blockchain platform for IoT: Privacy-enhanced application with lattice-based blind signatures
, 2026
PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT
, 2025
Post-quantum PAKE over lattices revised: Smaug-T.PAKE for mobile devices
, 2025
A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems
, 2025
Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation
, 2025
A Novel Model for E-Book Borrowing Management System
, 2018
A Novel IoT-based Health and Tactical Analysis Model with Fog Computing
, 2021
Quantum Secure Communication Between Service Provider and SIM
, 2022
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports
, 2022
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
, 2022
A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security
, 2024
Anomaly Detection With API Calls by Using Machine Learning: Systematic Literature Review
, 2024
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
, 2018
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
, 2023
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
, 2025
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
, 2023
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast
, 2024
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
, 2024
Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications
, 2024
Anomaly detection system for ADS-B data: Attack vectors and machine learning models
, 2025
A Review Of Machine Learning And Deep Learning Models Used For IoT Security
, 2021
A Systematic Literature Review on Host-Based Intrusion Detection Systems
, 2024
A new hybrid method combining search and direct based construction ideas to generate all 4 x 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields
, 2019
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
, 2024
Password authenticated key exchange-based on Kyber for mobile devices
, 2024
Systematic literature review on bootstrapping procedure of FHE schemes
, 2024
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm
, 2022
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
Kuantum Sonrası Güvenli Dijital Kripto Cüzdan
, 2024
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
, 2024
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast
, 2024
A novel permission-based Android malware detection system using feature selection based on linear regression
, 2023
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication
, 2023
A new method for vulnerability and risk assessment of IoT
, 2023
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
, 2023
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
, 2023
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
, 2020
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
, 2023
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports
, 2022
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
, 2022
Taxonomy of traffic engineering mechanisms in software-defined networks: a survey
, 2022
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
, 2022
Module learning with rounding based key agreement scheme with modified reconciliation
, 2022
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
, 2021
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
, 2020
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
, 2022
A new lattice-based authentication scheme for IoT
, 2022
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model
, 2022
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
, 2022
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm
, 2022
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks
, 2022
Permission-based Android malware analysis by using dimension reduction with PCA and LDA
, 2021
Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation
, 2021
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection
, 2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
, 2021
Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
, 2021
A modified algorithm for peer-to-peer security
, 2007
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes
, 2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
, 2021
Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi
, 2020
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications
, 2017