| Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam Journal of Information Security and Applications 58, 102788, 2021 | 162 | 2021 |
| A novel permission-based Android malware detection system using feature selection based on linear regression DÖ Şahin, OE Kural, S Akleylek, E Kılıç Neural Computing and Applications 35 (7), 4903-4918, 2023 | 119 | 2023 |
| An efficient lattice-based signature scheme with provably secure instantiation S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson International Conference on Cryptology in Africa, 44-60, 2016 | 117 | 2016 |
| A survey on security threats and authentication approaches in wireless sensor networks A Karakaya, S Akleylek 2018 6th international symposium on digital forensic and security (ISDFS), 1-4, 2018 | 94 | 2018 |
| LinRegDroid: Detection of Android malware using multiple linear regression models-based classifiers DÖ Şahın, S Akleylek, E Kiliç Ieee Access 10, 14246-14259, 2022 | 91 | 2022 |
| Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey K Seyhan, TN Nguyen, S Akleylek, K Cengiz Cluster Computing 25 (3), 1729-1748, 2022 | 79 | 2022 |
| A systematic literature review on host-based intrusion detection systems H Satilmiş, S Akleylek, ZY Tok Ieee Access 12, 27237-27266, 2024 | 78 | 2024 |
| A novel Android malware detection system: adaption of filter-based feature selection methods DÖ Şahin, OE Kural, S Akleylek, E Kılıç Journal of Ambient Intelligence and Humanized Computing 14 (2), 1243-1257, 2023 | 51 | 2023 |
| qTESLA N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ... Submission to the NIST Post-Quantum Cryptography Standardization, 2017 | 50 | 2017 |
| New results on permission based static analysis for Android malware DÖ Şahın, OE Kural, S Akleylek, E Kiliç 2018 6th International symposium on digital forensic and security (ISDFS), 1-4, 2018 | 49 | 2018 |
| A study on the use of quantum computers, risk assessment and security problems B Arslan, M Ulker, S Akleylek, S Sagiroglu 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2018 | 48* | 2018 |
| Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography MK Pehlivanoğlu, MT Sakallı, S Akleylek, N Duru, V Rijmen IET Information Security 12 (4), 348-355, 2018 | 44 | 2018 |
| Permission-based Android malware analysis by using dimension reduction with PCA and LDA DÖ Şahin, OE Kural, S Akleylek, E Kılıç Journal of Information Security and Applications 63, 102995, 2021 | 42 | 2021 |
| Attack path detection for IIoT enabled cyber physical systems: Revisited F Arat, S Akleylek Computers & Security 128, 103174, 2023 | 41 | 2023 |
| A survey on security threats and solutions in the age of IoT C Atac, S Akleylek Avrupa Bilim ve Teknoloji Dergisi, 36-42, 2019 | 37 | 2019 |
| Siber Güvenlik ve Savunma Ş Sağıroğlu, M Alkan, S Akleylek Ankara: Grafiker Yayınları, 2018 | 35 | 2018 |
| A novel IoT-based health and tactical analysis model with fog computing A Karakaya, S Akleylek PeerJ Computer Science 7, e342, 2021 | 33 | 2021 |
| Şifrelerin matematiği: kriptografi C Çimen, S Akleylek, E Akyıldız ODTÜ, 2008 | 32 | 2008 |
| Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji S Akleylek, Ş Sagiroglu, Enis, M Karakuş, K Seyhan, BB Kırlar, M Uğuz, ... Nobel Akademik Yayıncılık Eğitim Danışmanlık Tic. Ltd. Şti, 2021 | 31* | 2021 |
| Kriptoloji ve uygulama alanları: açık anahtar altyapısı ve kayıtlı elektronik posta S Akleylek, HM Yıldırım, ZY Tok Akademik Bilişim 11, 2-4, 2011 | 31 | 2011 |