Murat Aydos
Title
Cited by
Cited by
Year
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
M Aydos, B Sunar, CK Koc
In 2nd International Workshop on Discrete Algorithms and Methods for Mobile …, 1998
1121998
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
M Aydos, T Yanık, CK Koc
IEE Proceedings-Communications 148 (5), 273-279, 2001
1102001
Relay attacks on bluetooth authentication and solutions
A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan
International Symposium on Computer and Information Sciences, 278-288, 2004
782004
A high-speed ECC-based wireless authentication on an ARM microprocessor
M Aydos, T Yantk, ÇK Koç
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
682000
A review on cyber security datasets for machine learning algorithms
O Yavanoglu, M Aydos
2017 IEEE International Conference on Big Data (Big Data), 2186-2193, 2017
582017
Implementing network security protocols based on elliptic curve cryptography
M Aydos, E Savas, CK Koc
Proceedings of the fourth symposium on computer networks, 130-139, 1999
351999
Phish-iris: A new approach for vision based brand prediction of phishing web pages via compact visual descriptors
FC Dalgic, AS Bozkir, M Aydos
2018 2nd International Symposium on Multidisciplinary Studies and Innovative …, 2018
152018
Assessing risks and threats with layered approach to Internet of Things security
M Aydos, Y Vural, A Tekerek
Measurement and Control 52 (5-6), 338-353, 2019
142019
Static and dynamic analysis of third generation cerber ransomware
I Kara, M Aydos
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
142018
The ghost in the system: technical analysis of remote access trojan
İ Kara, M Aydos
International Journal on Information Technologies & Security 11 (1), 73-84, 2019
122019
Spam/ham e-mail classification using machine learning methods based on bag of words technique
E Sahın, M Aydos, F Orhan
2018 26th Signal Processing and Communications Applications Conference (SIU …, 2018
82018
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition
AS Bozkir, M Aydos
Computers & Security 95, 101855, 2020
52020
Efficient wireless security protocols based on elliptic curve cryptography
M Aydos
52000
ρ-Gain: Utility Based Data Publishing Model
Y Vural, M Aydos
Journal of the Faculty of Engineering and Architecture of Gazi University 33 …, 2018
42018
A New Approach to Utility-Based Privacy Preserving in Data Publishing
Y Vural, M Aydos
2017 IEEE International Conference on Computer and Information Technology …, 2017
42017
Detection and Analysis of Attacks Against Web Services by the SQL Injection Method
K İlker, M AYDOS
2019 3rd International Symposium on Multidisciplinary Studies and Innovative …, 2019
32019
Utilization and comparision of convolutional neural networks in malware recognition
AS Bozkir, AO Cankaya, M Aydos
2019 27th Signal Processing and Communications Applications Conference (SIU …, 2019
32019
Brand recognition of phishing web pages via global image descriptors
E EROĞLU, AS Bozkir, M Aydos
Avrupa Bilim ve Teknoloji Dergisi, 436-443, 2019
32019
Trustworthy scrum: Development of secure software with scrum
G Koç, M Aydos
2017 International Conference on Computer Science and Engineering (UBMK …, 2017
32017
Local image descriptor based phishing Web page recognition as an open-set problem
AS Bozkir, M Aydos
Avrupa Bilim ve Teknoloji Dergisi, 444-451, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20