A comprehensive review on malware detection approaches ÖA Aslan, R Samet IEEE access 8, 6249-6271, 2020 | 676 | 2020 |
A comprehensive systematic literature review on intrusion detection systems M Ozkan-Okay, R Samet, Ö Aslan, D Gupta IEEE Access 9, 157727-157760, 2021 | 129 | 2021 |
Face recognition-based mobile automatic classroom attendance management system R Samet, M Tanriverdi 2017 International conference on cyberworlds (CW), 253-256, 2017 | 106 | 2017 |
Investigation of possibilities to detect malware using existing tools Ö Aslan, R Samet 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 76 | 2017 |
An analysis of artificial intelligence techniques in surveillance video anomaly detection: A comprehensive survey E Şengönül, R Samet, Q Abu Al-Haija, A Alqahtani, B Alturki, AA Alsulami Applied Sciences 13 (8), 4956, 2023 | 51 | 2023 |
A new approach to the reconstruction of contour lines extracted from topographic maps R Samet, E Hancer Journal of Visual Communication and Image Representation 23 (4), 642-647, 2012 | 48 | 2012 |
Video synopsis: A survey KB Baskurt, R Samet Computer Vision and Image Understanding 181, 26-38, 2019 | 43 | 2019 |
Using a subtractive center behavioral model to detect malware Ö Aslan, R Samet, ÖÖ Tanrıöver Security and Communication Networks 2020 (1), 7501894, 2020 | 35 | 2020 |
Fuzzy rule-based image segmentation technique for rock thin section images R Samet, ŞE Amrahov, AH Ziroğlu 2012 3rd International Conference on Image Processing Theory, Tools and …, 2012 | 34 | 2012 |
Mitigating cyber security attacks by being aware of vulnerabilities and bugs Ö Aslan, R Samet 2017 international conference on cyberworlds (cw), 222-225, 2017 | 31 | 2017 |
An implementation of automatic contour line extraction from scanned digital topographic maps R Samet, INA Askerbeyli, C Varol Appl. Comput. Math 9 (1), 116-127, 2010 | 31 | 2010 |
Web based real-time meteorological data analysis and mapping information system R Samet, S Tural Proceedings of WSEAS Transactions of Information Science. and Applications …, 2010 | 25 | 2010 |
Real-time parallel image processing applications on multicore CPUs with OpenMP and GPGPU with CUDA S Aydin, R Samet, OF Bay The Journal of Supercomputing 74, 2255-2275, 2018 | 22 | 2018 |
Mobil BOTNET İle DDOS Saldırısı E Masum, R Samet Bilişim Teknolojileri Dergisi 11 (2), 111-121, 2018 | 21 | 2018 |
Using interpolation techniques to determine the optimal profile interval in ground-penetrating radar applications R Samet, E Çelik, S Tural, E Şengönül, M Özkan, E Damcı Journal of Applied Geophysics 140, 154-167, 2017 | 21 | 2017 |
Geometrical meta-metamodel for cyber-physical modelling V Mezhuyev, R Samet 2013 international conference on cyberworlds, 89-93, 2013 | 20 | 2013 |
Advanced contour reconnection in scanned topographic maps E Hancer, R Samet 2011 5th International conference on application of information and …, 2011 | 19 | 2011 |
SABADT: hybrid intrusion detection approach for cyber attacks identification in WLAN M Ozkan-Okay, Ö Aslan, R Eryigit, R Samet IEEE Access 9, 157639-157653, 2021 | 18 | 2021 |
Deep learning based classification of military cartridge cases and defect segmentation S Tural, R Samet, S Aydin, M Traore IEEE Access 10, 74961-74976, 2022 | 15 | 2022 |
A new model for secure joining to ZigBee 3.0 networks in the internet of things E Deniz, R Samet 2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018 | 14 | 2018 |