Çalışma Alanları
- Mühendislik Temel Alanı
- Bilgisayar Bilimleri ve Mühendisliği
- Bilgi Güvenliği ve Kriptoloji
- Siber Güvenlik
- Kuantum Bilgisayarları
- A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security, 2024
- Kuantum Sonrası Güvenli Dijital Kripto Cüzdan, 2024
- Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol, 2024
- SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast, 2024
- Password authenticated key exchange-based on Kyber for mobile devices, 2024
- A Systematic Literature Review on Host-Based Intrusion Detection Systems, 2024
- A new lattice-based password authenticated key exchange scheme with anonymity and reusable key, 2024
- A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions, 2023
- A novel permission-based Android malware detection system using feature selection based on linear regression, 2023
- MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication, 2023
- Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism, 2023
- A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE, 2023
- A survey of quantum secure group signature schemes: Lattice-based approach, 2023
- A novel Android malware detection system: adaption of filter-based feature selection methods, 2023
- Modified graph-based algorithm to analyze security threats in IoT, 2023
- Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited, 2023
- A new method for vulnerability and risk assessment of IoT, 2023
- On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form, 2023
- A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions, 2023
- On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form, 2023
- Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude, 2023
- Classification of random number generator applications in IoT: A comprehensive taxonomy, 2022
- GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports, 2022
- Efficient Nyberg-Rueppel type of NTRU digital signature algorithm, 2022
- GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports, 2022
- Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme, 2022
- Quantum Secure Communication Between Service Provider and SIM, 2022
- Taxonomy of traffic engineering mechanisms in software-defined networks: a survey, 2022
- Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey, 2022
- Module learning with rounding based key agreement scheme with modified reconciliation, 2022
- LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers, 2022
- A new lattice-based authentication scheme for IoT, 2022
- A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model, 2022
- Security enhancement in cellular networks employing D2D friendly jammer for V2V communication, 2022
- Efficient Nyberg-Rueppel type of NTRU digital signature algorithm, 2022
- Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks, 2022
- Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security, 2021
- Permission-based Android malware analysis by using dimension reduction with PCA and LDA, 2021
- Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation, 2021
- On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection, 2021
- Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA, 2021
- A Novel IoT-based Health and Tactical Analysis Model with Fog Computing, 2021
- Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme, 2021
- A Review Of Machine Learning And Deep Learning Models Used For IoT Security, 2021
- Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography, 2021
- A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes, 2021
- Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA, 2021
- On the automorphisms and isomorphisms of MDS matrices and their efficient implementations, 2020
- A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys, 2020
- Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi, 2020
- Efficient GeMSS Based Ring Signature Scheme, 2020
- NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA, 2020
- KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA, 2020
- JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES, 2020
- On the automorphisms and isomorphisms of MDS matrices and their efficient implementations, 2020
- MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU, 2020
- Parola Tabanlı SIMSec Protokolü, 2020
- A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields, 2019
- İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması, 2019
- IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma, 2019
- New Signature Algorithm Based on Concatenated Rank Codes, 2019
- A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials, 2019
- A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT, 2019
- Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography, 2018
- E-Kitap Ödünç Alma Yönetim Sistemi İçin Yeni Model, 2018
- Efficient methods to generate cryptographically significant binary diffusion layers, 2017
- A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications, 2017
- qTESLA: Efficient and Post-Quantum Secure Lattice-Based Signature Scheme, 2017
- ÜÇ TERİMLİ POLİNOMLAR İÇİN KARATSUBA BENZERİ ÇARPMA YÖNTEMLERİNİN ARAŞTIRILMASI, 2017
- Generating binary diffusion layers with maximum high branch numbers and low search complexity, 2016
- Sparse polynomial multiplication for lattice based cryptography with small complexity, 2016
- New methods for public key cryptosystems based on XTR, 2015
- Efficient interleaved Montgomery modular multiplication for lattice based cryptography, 2014
- On the Construction of 20 20 and 24 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions, 2014
- On the Arithmetic Operations over Finite Fields of Characteristic Three with Low Complexity, 2014
- A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials, 2013
- A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials, 2013
- On the Generalisation of Special Moduli for Faster Interleaved Montgomery Modular Multiplication, 2013
- Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity, 2012
- On the Polynomial Multiplication in Chebyshev Form, 2012
- A New Short Signature Scheme with Random Oracle from Bilinear Pairings, 2011
- Open Source UTM Alternative ClearOS, 2010
- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity, 2010
- A modified algorithm for peer-to-peer security, 2007
- Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye, 2007
- A note on Knapsack Cryptosystems, 2007
- A Modified Algorithm for Peer to Peer Security, 2007
- Securty of online Learning, 2005
- Anomaly Detection with Machine Learning Models Using API Calls, 2024
- Smaug Kem to Smaug-PAKE: A Generic Lattice-Based Password Authenticated Key Exchange, 2024
- QUANTUM SECURE INSTANT MESSAGING: REVISITED, 2022
- A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules, 2024
- Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m, 2021
- Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude, 2022
- End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications,
- A SURVEY ON DIGITAL RIGHTS MANAGEMENT, 2018
- Comparison of Regression Methods in Permission Based Android Malware Detection, 2021
- Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices, 2022
- On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers, 2017
- On the Construction of $$4 \times 4$$ Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$, 2021
- On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2^m, 2022
- On the Construction of $4 \times 4$ Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$, 2022
- Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form, 2018
- On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m, 2022
- Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması, 2018
- End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications, 2022
- Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc),
- QUANTUM SECURE INSTANT MESSAGING: REVISITED, 2022
- Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices, 2022
- On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography, 2017
- A Novel Lattice-Based Threshold Ring Signature Scheme, 2020
- Post-Quantum Cryptography: A Snapshot of Standardization Efforts, 2022
- Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude, 2022
- Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude, 2022
- CODE-BASED CRYPTOSYSTEMS MCNIE REVISITED, 2022
- A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity, 2022
- Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları,
- A Lattice-based Group Signature Scheme with Applications in Blockchain, 2022
- A novel identification scheme for post-quantum secure digital right management, 2017
- Challenges and Opportunities in Cryptography, 2022
- New results on permission based static analysis for android malware, 2018
- Survey on Implementation of Lattice-based Identification Schemes, 2021
- IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C, 2021
- PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices, 2021
- A Systematic Survey on Mobile Internet of Things Security, 2021
- HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE, 2021
- GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda, 2021
- Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network, 2021
- TRCyberLab: An infrastructure for future internet and security studies, 2018
- CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS, 2021
- Support Vector Machines: From Classical Version to Quantum, 2021
- Efficient Implementations of Gauss-Based Sieving Algorithms, 2020
- Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography, 2020
- A survey on security threats and authentication approaches in wireless sensor networks, 2018
- An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem, 2017
- The Third International Conference onProblems of Cybernetics and Informatics, 2010
- A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale, 2017
- TRCyberLab: An infrastructure for future internet and security studies, 2018
- Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms, 2019
- Stocks Prices Prediction with Long Short-term Memory, 2020
- A New 3-pass Zero-knowledge Lattice-based Identification Scheme, 2019
- Permission Weighting Approaches in Permission Based Android Malware Detection, 2019
- New Signature Algorithm Based on Concatenated Rank Codes, 2019
- Efficient GeMSS Based Ring Signature Scheme, 2019
- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme, 2019
- Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols, 2019
- Formal Analysis of MaTRU Cryptosystem, 2019
- Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları, 2019
- Open Source UTM Alternative ClearOS, 2010
- A note on Knapsack Cryptosystems, 2007
- Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye, 2007
- Securty of online Learning, 2005
- Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme, 2018
- A Bayesian Networks Application in Occupational Health and Safety, 2018
- An Automated Vulnerable Website Penetration, 2018
- An Overview for the National Cyber Security Strategy, 2018
- A study on the use of quantum computers, risk assessment and security problems, 2018
- GUI Based Ring Signature Scheme, 2018
- Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era, 2018
- On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques, 2018
- New quantum secure key exchange protocols based on MaTRU, 2018
- New results on permission based static analysis for Android malware, 2018
- Work Accident Analysis with Machine Learning Techniques, 2018
- Modified Arithmetic Circuits for Galois Rings, 2017
- On the design strategies of diffusion layers and key schedule in lightweight block ciphers, 2017
- The Trend of Business Intelligence Adoption and Maturity, 2017
- Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow, 2017
- Kuantum Sonrası Güvenilir Dijital Hak Yönetimi İçin Yeni Kimlik Doğrulama Protokolü, 2017
- Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması, 2017
- Computing Square Roots in Prime Fields via Singular Elliptic Curves, 2017
- Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology, 2017
- Strassen-like 2x2 Matrix Squaring Revisited, 2017
- Strassen-like 2x2 Matrix Squaring Revisited, 2017
- Modified Arithmetic Circuits for Galois Rings, 2017
- An Efficient Lattice Based Signature Scheme with Provably Secure Instantiation, 2016
- A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks, 2016
- Some Results on MDS Matrices, 2016
- Speeding up Number Theoretic Transform Lazy Reductions Explained, 2016
- Efficient Methods for Lattice based Cryptography,
- Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography,
- Post Quantum Cryptography An Introduction,
- Arithmetic Operations in Lattice Based Cryptography, 2015
- Efficient Arithmetic for Lattice Based Cryptography on GPU Using CUDA, 2014
- Data Storage of Electronic Exams, 2015
- Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers, 2007
- Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta, 2011
- Elliptic Curves in Cryptography, 2012
- E imza ve Kayıtlı Elektronik Posta,
- Multiplication in a Galois Ring, 2015
- On the Efficiency of Polynomial Multiplication for Lattice Based Cryptography on GPUs using CUDA, 2015
- Polynomials over Finite Fields and Some Applications in Cryptography,
- Bilgi ve İletişim Güvenliğinde Matematik Kriptografi,
- SMS PGP Şifreli ve e imzalı Mobil SMS Uygulaması,
- SMS Yönlendiren Casus Yazılım Uygulaması,
- Steganography and New Implementation of Steganography,
- Kriptolojideki Gelişmeler,
- Kriptografi ve Siber Güvenlik,
- Atutor Öğrenme İçerik Yönetim Sistemi,
- Groups Used in Diffie Hellman Key Agreement,
- Improving the Security of Open Source Learning Content Management Systems,
- Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Turkey,
- PKI Lite A PKI System with Limited Resources,
- Technical Requirements for Online Education Support,
- Pairing Based Cryptography A Survey,
- Arithmetic on Pairing Friendly Fields,
- Short Signature Scheme from Bilinear Pairings 1,
- Short Signature Scheme from Bilinear Pairings,
- Modified Discrete Fourier Transform for Efficient Polynomial Multiplication,
- Speeding Up Montgomery Modular Multiplication For Prime Fields,
- A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication,
- Open Source UTM Alternative,
- Hermite Polynomial Representation for Finite Fields of Characteristic Three,
- Charlier Polynomial Representation for Finite Fields of Characteristic Three,
- On the Multiplication over Finite Fields of Characteristic Three in Hermite Polynomial Representation,
- Kriptografik Modüllerin Güvenlik Gereksinimleri,
- On the Security Requirements of Cryptographic Modules,
- New classes of permutation polynomials over finite fields of odd characteristic,
- RSA Kriptosisteminin Güvenlik Analizi Üzerine Bir Derleme,
- Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, ISBN: 978-3-031-09753-9, 2023
- Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, ISBN: 978-3-031-09753-9, 2023
- Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, ISBN: 978-3-031-09753-9, 2023
- Handbook of Formal Analysis and Verification in Cryptography, ISBN: 9781003090052, 2023
- Siber Güvenlik ve Savunma Problemler ve Çözümler, ISBN: 978-605-2233-50-4, 2019
- Algoritmalara Giriş (Introduction to Algorithms kitabınının çevirisi), ISBN: 9786053556497, 2017
- A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems, ISBN: 978-3-030-76653-5, 2022
- Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems, ISBN: 978-1-64368-332-4, 2022
- Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler, ISBN: 978-625-417-876-4, 2022
- Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler, ISBN: 978-625-417-876-4, 2022
- Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji, ISBN: 978-625-417-110-9, 2021
- Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, ISBN: 978-605-2233-50-4, 2019
- Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji, ISBN: 978-625-417-110-9, 2021
- PROCEEDINGS OF 14TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY, ISBN: 10.1109/ISCTURKEY53027.2021.9654375, 2021
- Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji, ISBN: 978-625-417-111-6, 2021
- Siber Güvenlik ve Savunma Biyometrik ve Kriptografik Uygulamalar, ISBN: 978-625-439-024-1, 2020
- Authentication Technologies for Cloud Technology, IoT, and Big Data, ISBN: 978-1-78561-556-6, 2019
- SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar, ISBN: 978-625-439-024-1, 2020
- proceedings of the 13th international conference on information security and cryptography, ISBN: 978-0-7381-2506-0, 2020
- PROCEEDINGS OF 13TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY, ISBN: 978-0-7381-2506-0, 2020
- SİBER GÜVENLİK VE SAVUNMA : BİYOMETRİK VE KRİPTOGRAFİK UYGULAMALAR, ISBN: 978-625-439-025-8, 2020
- 12. ULUSLARARASI BİLGİ GÜVENLİĞİ VE KRİPTOLOJİ KONFERANSI BİLDİRİ KİTABI, ISBN: YOK, 2019
- SİBER GÜVENLİK VE SAVUNMA : PROBLEMLER ÇÖZÜMLER, ISBN: 978-605-2233-50-4, 2019
- Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, ISBN: 978-605-2233-50-4, 2019
- Authentication Technologies for Cloud Technology, IoT, and Big Data, ISBN: 978-1-78561-556-6, 2019
- Cryptography and Information Security in the Balkans, ISBN: , 2016
- Algoritmalara Giriş, ISBN: , 2016
- Handbook of Codes and Sequences with Applications in Communication Computing and Information Security, ISBN: , 2017
- Şifrelerin Matematiği Kriptografi, ISBN: 9944344272, 2015
- Şifrelerin Matematiği Kriptografi, ISBN: 0, 2007
- Improving Information Security Practices through Computational Intelligence, ISBN: 9781466694262, 2015
- Computer and Information Sciences, ISBN: , 2010
- Yılın Tezi Ödülü, 2012
- Misafir Araştırmacı, 2012
- Yurtdışı Araştırma, 2012
- Yayın Teşvik, 2012
- Yayın Teşvik, 2013
- COST Action IC1306 School on Cryptographic Attacks katılım bursu, 2014
- TÜBİTAK 2242 Yazılım Projeleri Yarışması Sosyal Yaşam ve Eğlence Uygulamaları alanında ikincilik ödülü alan “SMS-PGP Mobil Uygulaması” başlıklı projeye akademik danışmanlık, 2014
- Yılın Genç Bilim İnsanı, 2011
- Yurt Dışı Doktora Sonrası Araştırma, 2014
- Yayın Teşvik, 2014
- YayınTeşvik, 2014
- Yayın Teşvik, 2015
- Best Paper Award, 2016
- CSAW Applied Research Competition, 2016
- ODTÜ Yılın Tezi Ödülü (Tez Danışmanı), 2017
- En İyi Bildiri Ödülü, 2017
- CSAW MENA Finalist, 2017