[go: up one dir, main page]

Follow
Sedat Akleylek
Title
Cited by
Cited by
Year
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam
Journal of Information Security and Applications 58, 102788, 2021
1622021
A novel permission-based Android malware detection system using feature selection based on linear regression
DÖ Şahin, OE Kural, S Akleylek, E Kılıç
Neural Computing and Applications 35 (7), 4903-4918, 2023
1192023
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
International Conference on Cryptology in Africa, 44-60, 2016
1172016
A survey on security threats and authentication approaches in wireless sensor networks
A Karakaya, S Akleylek
2018 6th international symposium on digital forensic and security (ISDFS), 1-4, 2018
942018
LinRegDroid: Detection of Android malware using multiple linear regression models-based classifiers
DÖ Şahın, S Akleylek, E Kiliç
Ieee Access 10, 14246-14259, 2022
912022
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
K Seyhan, TN Nguyen, S Akleylek, K Cengiz
Cluster Computing 25 (3), 1729-1748, 2022
792022
A systematic literature review on host-based intrusion detection systems
H Satilmiş, S Akleylek, ZY Tok
Ieee Access 12, 27237-27266, 2024
782024
A novel Android malware detection system: adaption of filter-based feature selection methods
DÖ Şahin, OE Kural, S Akleylek, E Kılıç
Journal of Ambient Intelligence and Humanized Computing 14 (2), 1243-1257, 2023
512023
qTESLA
N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ...
Submission to the NIST Post-Quantum Cryptography Standardization, 2017
502017
New results on permission based static analysis for Android malware
DÖ Şahın, OE Kural, S Akleylek, E Kiliç
2018 6th International symposium on digital forensic and security (ISDFS), 1-4, 2018
492018
A study on the use of quantum computers, risk assessment and security problems
B Arslan, M Ulker, S Akleylek, S Sagiroglu
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2018
48*2018
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
MK Pehlivanoğlu, MT Sakallı, S Akleylek, N Duru, V Rijmen
IET Information Security 12 (4), 348-355, 2018
442018
Permission-based Android malware analysis by using dimension reduction with PCA and LDA
DÖ Şahin, OE Kural, S Akleylek, E Kılıç
Journal of Information Security and Applications 63, 102995, 2021
422021
Attack path detection for IIoT enabled cyber physical systems: Revisited
F Arat, S Akleylek
Computers & Security 128, 103174, 2023
412023
A survey on security threats and solutions in the age of IoT
C Atac, S Akleylek
Avrupa Bilim ve Teknoloji Dergisi, 36-42, 2019
372019
Siber Güvenlik ve Savunma
Ş Sağıroğlu, M Alkan, S Akleylek
Ankara: Grafiker Yayınları, 2018
352018
A novel IoT-based health and tactical analysis model with fog computing
A Karakaya, S Akleylek
PeerJ Computer Science 7, e342, 2021
332021
Şifrelerin matematiği: kriptografi
C Çimen, S Akleylek, E Akyıldız
ODTÜ, 2008
322008
Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji
S Akleylek, Ş Sagiroglu, Enis, M Karakuş, K Seyhan, BB Kırlar, M Uğuz, ...
Nobel Akademik Yayıncılık Eğitim Danışmanlık Tic. Ltd. Şti, 2021
31*2021
Kriptoloji ve uygulama alanları: açık anahtar altyapısı ve kayıtlı elektronik posta
S Akleylek, HM Yıldırım, ZY Tok
Akademik Bilişim 11, 2-4, 2011
312011
The system can't perform the operation now. Try again later.
Articles 1–20