Data poisoning attacks against machine learning algorithms FA Yerlikaya, Ş Bahtiyar Expert Systems with Applications 208, 118101, 2022 | 71 | 2022 |
Blockchain-based electronic voting system for elections in Turkey R Bulut, A Kantarcı, S Keskin, Ş Bahtiyar 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 67 | 2019 |
Trust assessment of security for e-health systems Ş Bahtiyar, MU Çağlayan Electronic Commerce Research and Applications 13 (3), 164–177, 2014 | 60 | 2014 |
Extracting trust information from security system of a service Ş Bahtiyar, MU Çağlayan Journal of Network and Computer Applications 35 (1), 480-490, 2012 | 47 | 2012 |
A multi-dimensional machine learning approach to predict advanced malware Ş Bahtiyar, MB Yaman, CY Altıniğne Computer networks 160, 118-129, 2019 | 38 | 2019 |
A secure and efficient group key agreement approach for mobile ad hoc networks O Ermiş, Ş Bahtiyar, E Anarım, MU Çağlayan Ad Hoc Networks 67, 24-39, 2017 | 26 | 2017 |
A survey on malware detection with deep learning M Sahin, S Bahtiyar 13th international conference on security of information and networks, 1-6, 2020 | 25 | 2020 |
A survey: Security and privacy in 5G vehicular networks ET Sağlam, Ş Bahtiyar 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 22 | 2019 |
Security and privacy in the smart home: A survey of issues and mitigation strategies MK Kuyucu, Ş Bahtiyar, G İnce 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 20 | 2019 |
A key agreement protocol with partial backward confidentiality O Ermiş, Ş Bahtiyar, E Anarım, MU Çağlayan Computer Networks 129, 159-177, 2017 | 18 | 2017 |
Anatomy of targeted attacks with smart malware Ş Bahtiyar Security and Communication Networks 9 (18), 6215-6226, 2016 | 17 | 2016 |
Security analysis of computer networks: Key concepts and methodologies G Gür, Ş Bahtiyar, F Alagöz Modeling and Simulation of Computer Networks 30, 861-898, 2015 | 17 | 2015 |
BioWallet: A Biometric Digital Wallet E Benli, I Engin, C Giousouf, MA Ulak, S Bahtiyar The Twelfth International Conference on Systems, 2017 | 14 | 2017 |
A model of security information flow on entities for trust computation S Bahtiyar, M Cihan, MU Çağlayan 2010 10th IEEE International Conference on Computer and Information …, 2010 | 14 | 2010 |
A multi-factor authentication framework for secure access to blockchain S Şahan, AF Ekici, Ş Bahtiyar Proceedings of the 2019 5th international conference on computer and …, 2019 | 12 | 2019 |
Sosyal Ağlarda Güvenlik G Erdoğan, Ş Bahtiyar Akademik Bilişim2014, 2014 | 12 | 2014 |
Security assessment of payment systems under pci dss incompatibilities Ş Bahtiyar, G Gür, L Altay ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 11 | 2014 |
Machine learning based side channel selection for time-driven cache attacks on aes B Sönmez, AA Sarıkaya, Ş Bahtiyar 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 9 | 2019 |
Medikal Bilgi Sistemlerinde Güvenlik, Mahremiyet ve Kimlik Doğrulama CE Aladağ, E Kurtarangil, Ş Bahtiyar Akademik Bilişim2014, 2014 | 9 | 2014 |
Security similarity based trust in cyber space Ş Bahtiyar, MU Çağlayan Knowledge-Based Systems 52, 290-301, 2013 | 9 | 2013 |