Mühendislik ve Doğa Bilimleri Fakültesi

Akademik Kadro

Prof. Dr. Sedat Akleylek

Prof. Dr.
Sedat Akleylek

Bilgisayar Bilimleri ve Mühendisliği

Çalışma Alanları

  • Mühendislik Temel Alanı
  • Bilgisayar Bilimleri ve Mühendisliği
  • Bilgi Güvenliği ve Kriptoloji
  • Siber Güvenlik
  • Kuantum Bilgisayarları
  • Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol, 2024
  • SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast, 2024
  • Password authenticated key exchange-based on Kyber for mobile devices, 2024
  • A Systematic Literature Review on Host-Based Intrusion Detection Systems, 2024
  • A new lattice-based password authenticated key exchange scheme with anonymity and reusable key, 2024
  • A novel permission-based Android malware detection system using feature selection based on linear regression, 2023
  • MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication, 2023
  • Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism, 2023
  • A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE, 2023
  • A survey of quantum secure group signature schemes: Lattice-based approach, 2023
  • A novel Android malware detection system: adaption of filter-based feature selection methods, 2023
  • Modified graph-based algorithm to analyze security threats in IoT, 2023
  • Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited, 2023
  • A new method for vulnerability and risk assessment of IoT, 2023
  • On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form, 2023
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions, 2023
  • On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form, 2023
  • Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude, 2023
  • Classification of random number generator applications in IoT: A comprehensive taxonomy, 2022
  • GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports, 2022
  • Efficient Nyberg-Rueppel type of NTRU digital signature algorithm, 2022
  • GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports, 2022
  • Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme, 2022
  • Quantum Secure Communication Between Service Provider and SIM, 2022
  • Taxonomy of traffic engineering mechanisms in software-defined networks: a survey, 2022
  • Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey, 2022
  • Module learning with rounding based key agreement scheme with modified reconciliation, 2022
  • LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers, 2022
  • A new lattice-based authentication scheme for IoT, 2022
  • A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model, 2022
  • Security enhancement in cellular networks employing D2D friendly jammer for V2V communication, 2022
  • Efficient Nyberg-Rueppel type of NTRU digital signature algorithm, 2022
  • Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks, 2022
  • Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security, 2021
  • Permission-based Android malware analysis by using dimension reduction with PCA and LDA, 2021
  • Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation, 2021
  • On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection, 2021
  • Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA, 2021
  • A Novel IoT-based Health and Tactical Analysis Model with Fog Computing, 2021
  • Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme, 2021
  • A Review Of Machine Learning And Deep Learning Models Used For IoT Security, 2021
  • Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography, 2021
  • A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes, 2021
  • Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA, 2021
  • On the automorphisms and isomorphisms of MDS matrices and their efficient implementations, 2020
  • A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys, 2020
  • Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi, 2020
  • Efficient GeMSS Based Ring Signature Scheme, 2020
  • NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA, 2020
  • KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA, 2020
  • JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES, 2020
  • On the automorphisms and isomorphisms of MDS matrices and their efficient implementations, 2020
  • MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU, 2020
  • Parola Tabanlı SIMSec Protokolü, 2020
  • A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields, 2019
  • İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması, 2019
  • IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma, 2019
  • New Signature Algorithm Based on Concatenated Rank Codes, 2019
  • A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials, 2019
  • A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT, 2019
  • Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography, 2018
  • E-Kitap Ödünç Alma Yönetim Sistemi İçin Yeni Model, 2018
  • A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications, 2017
  • qTESLA: Efficient and Post-Quantum Secure Lattice-Based Signature Scheme, 2017
  • ÜÇ TERİMLİ POLİNOMLAR İÇİN KARATSUBA BENZERİ ÇARPMA YÖNTEMLERİNİN ARAŞTIRILMASI, 2017
  • Efficient methods to generate cryptographically significant binary diffusion layers, 2017
  • Generating binary diffusion layers with maximum high branch numbers and low search complexity, 2016
  • Sparse polynomial multiplication for lattice based cryptography with small complexity, 2016
  • New methods for public key cryptosystems based on XTR, 2015
  • Efficient interleaved Montgomery modular multiplication for lattice based cryptography, 2014
  • On the Construction of 20 20 and 24 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions, 2014
  • On the Arithmetic Operations over Finite Fields of Characteristic Three with Low Complexity, 2014
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials, 2013
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials, 2013
  • On the Generalisation of Special Moduli for Faster Interleaved Montgomery Modular Multiplication, 2013
  • Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity, 2012
  • On the Polynomial Multiplication in Chebyshev Form, 2012
  • A New Short Signature Scheme with Random Oracle from Bilinear Pairings, 2011
  • Open Source UTM Alternative ClearOS, 2010
  • Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity, 2010
  • A modified algorithm for peer-to-peer security, 2007
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye, 2007
  • A note on Knapsack Cryptosystems, 2007
  • A Modified Algorithm for Peer to Peer Security, 2007
  • Securty of online Learning, 2005
  • QUANTUM SECURE INSTANT MESSAGING: REVISITED, 2022
  • Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m, 2021
  • Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude, 2022
  • End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications,
  • A SURVEY ON DIGITAL RIGHTS MANAGEMENT, 2018
  • Comparison of Regression Methods in Permission Based Android Malware Detection, 2021
  • Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices, 2022
  • On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers, 2017
  • On the Construction of $$4 \times 4$$ Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$, 2021
  • On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2^m, 2022
  • On the Construction of $4 \times 4$ Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$, 2022
  • Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form, 2018
  • On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m, 2022
  • Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması, 2018
  • End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications, 2022
  • Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc),
  • QUANTUM SECURE INSTANT MESSAGING: REVISITED, 2022
  • Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices, 2022
  • On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography, 2017
  • A Novel Lattice-Based Threshold Ring Signature Scheme, 2020
  • Post-Quantum Cryptography: A Snapshot of Standardization Efforts, 2022
  • Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude, 2022
  • Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude, 2022
  • CODE-BASED CRYPTOSYSTEMS MCNIE REVISITED, 2022
  • A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity, 2022
  • Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları,
  • A Lattice-based Group Signature Scheme with Applications in Blockchain, 2022
  • A novel identification scheme for post-quantum secure digital right management, 2017
  • Challenges and Opportunities in Cryptography, 2022
  • New results on permission based static analysis for android malware, 2018
  • Survey on Implementation of Lattice-based Identification Schemes, 2021
  • IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C, 2021
  • PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices, 2021
  • A Systematic Survey on Mobile Internet of Things Security, 2021
  • HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE, 2021
  • GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda, 2021
  • Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network, 2021
  • TRCyberLab: An infrastructure for future internet and security studies, 2018
  • CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS, 2021
  • Support Vector Machines: From Classical Version to Quantum, 2021
  • Efficient Implementations of Gauss-Based Sieving Algorithms, 2020
  • Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography, 2020
  • A survey on security threats and authentication approaches in wireless sensor networks, 2018
  • An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem, 2017
  • The Third International Conference onProblems of Cybernetics and Informatics, 2010
  • A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale, 2017
  • TRCyberLab: An infrastructure for future internet and security studies, 2018
  • Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms, 2019
  • Stocks Prices Prediction with Long Short-term Memory, 2020
  • A New 3-pass Zero-knowledge Lattice-based Identification Scheme, 2019
  • Permission Weighting Approaches in Permission Based Android Malware Detection, 2019
  • New Signature Algorithm Based on Concatenated Rank Codes, 2019
  • Efficient GeMSS Based Ring Signature Scheme, 2019
  • Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme, 2019
  • Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols, 2019
  • Formal Analysis of MaTRU Cryptosystem, 2019
  • Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları, 2019
  • Open Source UTM Alternative ClearOS, 2010
  • A note on Knapsack Cryptosystems, 2007
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye, 2007
  • Securty of online Learning, 2005
  • Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme, 2018
  • A Bayesian Networks Application in Occupational Health and Safety, 2018
  • An Automated Vulnerable Website Penetration, 2018
  • An Overview for the National Cyber Security Strategy, 2018
  • A study on the use of quantum computers, risk assessment and security problems, 2018
  • GUI Based Ring Signature Scheme, 2018
  • Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era, 2018
  • On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques, 2018
  • New quantum secure key exchange protocols based on MaTRU, 2018
  • New results on permission based static analysis for Android malware, 2018
  • Work Accident Analysis with Machine Learning Techniques, 2018
  • Modified Arithmetic Circuits for Galois Rings, 2017
  • On the design strategies of diffusion layers and key schedule in lightweight block ciphers, 2017
  • The Trend of Business Intelligence Adoption and Maturity, 2017
  • Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow, 2017
  • Kuantum Sonrası Güvenilir Dijital Hak Yönetimi İçin Yeni Kimlik Doğrulama Protokolü, 2017
  • Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması, 2017
  • Computing Square Roots in Prime Fields via Singular Elliptic Curves, 2017
  • Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology, 2017
  • Strassen-like 2x2 Matrix Squaring Revisited, 2017
  • Strassen-like 2x2 Matrix Squaring Revisited, 2017
  • Modified Arithmetic Circuits for Galois Rings, 2017
  • An Efficient Lattice Based Signature Scheme with Provably Secure Instantiation, 2016
  • A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks, 2016
  • Some Results on MDS Matrices, 2016
  • Speeding up Number Theoretic Transform Lazy Reductions Explained, 2016
  • Efficient Methods for Lattice based Cryptography,
  • Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography,
  • Post Quantum Cryptography An Introduction,
  • Arithmetic Operations in Lattice Based Cryptography, 2015
  • Efficient Arithmetic for Lattice Based Cryptography on GPU Using CUDA, 2014
  • Data Storage of Electronic Exams, 2015
  • Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers, 2007
  • Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta, 2011
  • Elliptic Curves in Cryptography, 2012
  • E imza ve Kayıtlı Elektronik Posta,
  • Multiplication in a Galois Ring, 2015
  • On the Efficiency of Polynomial Multiplication for Lattice Based Cryptography on GPUs using CUDA, 2015
  • Polynomials over Finite Fields and Some Applications in Cryptography,
  • Bilgi ve İletişim Güvenliğinde Matematik Kriptografi,
  • SMS PGP Şifreli ve e imzalı Mobil SMS Uygulaması,
  • SMS Yönlendiren Casus Yazılım Uygulaması,
  • Steganography and New Implementation of Steganography,
  • Kriptolojideki Gelişmeler,
  • Kriptografi ve Siber Güvenlik,
  • Atutor Öğrenme İçerik Yönetim Sistemi,
  • Groups Used in Diffie Hellman Key Agreement,
  • Improving the Security of Open Source Learning Content Management Systems,
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Turkey,
  • PKI Lite A PKI System with Limited Resources,
  • Technical Requirements for Online Education Support,
  • Pairing Based Cryptography A Survey,
  • Arithmetic on Pairing Friendly Fields,
  • Short Signature Scheme from Bilinear Pairings 1,
  • Short Signature Scheme from Bilinear Pairings,
  • Modified Discrete Fourier Transform for Efficient Polynomial Multiplication,
  • Speeding Up Montgomery Modular Multiplication For Prime Fields,
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication,
  • Open Source UTM Alternative,
  • Hermite Polynomial Representation for Finite Fields of Characteristic Three,
  • Charlier Polynomial Representation for Finite Fields of Characteristic Three,
  • On the Multiplication over Finite Fields of Characteristic Three in Hermite Polynomial Representation,
  • Kriptografik Modüllerin Güvenlik Gereksinimleri,
  • On the Security Requirements of Cryptographic Modules,
  • New classes of permutation polynomials over finite fields of odd characteristic,
  • RSA Kriptosisteminin Güvenlik Analizi Üzerine Bir Derleme,
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, ISBN: 978-3-031-09753-9, 2023
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, ISBN: 978-3-031-09753-9, 2023
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, ISBN: 978-3-031-09753-9, 2023
  • Handbook of Formal Analysis and Verification in Cryptography, ISBN: 9781003090052, 2023
  • Siber Güvenlik ve Savunma Problemler ve Çözümler, ISBN: 978-605-2233-50-4, 2019
  • Algoritmalara Giriş (Introduction to Algorithms kitabınının çevirisi), ISBN: 9786053556497, 2017
  • A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems, ISBN: 978-3-030-76653-5, 2022
  • Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems, ISBN: 978-1-64368-332-4, 2022
  • Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler, ISBN: 978-625-417-876-4, 2022
  • Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler, ISBN: 978-625-417-876-4, 2022
  • Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji, ISBN: 978-625-417-110-9, 2021
  • Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, ISBN: 978-605-2233-50-4, 2019
  • Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji, ISBN: 978-625-417-110-9, 2021
  • PROCEEDINGS OF 14TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY, ISBN: 10.1109/ISCTURKEY53027.2021.9654375, 2021
  • Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji, ISBN: 978-625-417-111-6, 2021
  • Siber Güvenlik ve Savunma Biyometrik ve Kriptografik Uygulamalar, ISBN: 978-625-439-024-1, 2020
  • Authentication Technologies for Cloud Technology, IoT, and Big Data, ISBN: 978-1-78561-556-6, 2019
  • SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar, ISBN: 978-625-439-024-1, 2020
  • proceedings of the 13th international conference on information security and cryptography, ISBN: 978-0-7381-2506-0, 2020
  • PROCEEDINGS OF 13TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY, ISBN: 978-0-7381-2506-0, 2020
  • SİBER GÜVENLİK VE SAVUNMA : BİYOMETRİK VE KRİPTOGRAFİK UYGULAMALAR, ISBN: 978-625-439-025-8, 2020
  • 12. ULUSLARARASI BİLGİ GÜVENLİĞİ VE KRİPTOLOJİ KONFERANSI BİLDİRİ KİTABI, ISBN: YOK, 2019
  • SİBER GÜVENLİK VE SAVUNMA : PROBLEMLER ÇÖZÜMLER, ISBN: 978-605-2233-50-4, 2019
  • Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, ISBN: 978-605-2233-50-4, 2019
  • Authentication Technologies for Cloud Technology, IoT, and Big Data, ISBN: 978-1-78561-556-6, 2019
  • Cryptography and Information Security in the Balkans, ISBN: , 2016
  • Algoritmalara Giriş, ISBN: , 2016
  • Handbook of Codes and Sequences with Applications in Communication Computing and Information Security, ISBN: , 2017
  • Şifrelerin Matematiği Kriptografi, ISBN: 9944344272, 2015
  • Şifrelerin Matematiği Kriptografi, ISBN: 0, 2007
  • Improving Information Security Practices through Computational Intelligence, ISBN: 9781466694262, 2015
  • Computer and Information Sciences, ISBN: , 2010
  • Yılın Tezi Ödülü, 2012
  • Misafir Araştırmacı, 2012
  • Yurtdışı Araştırma, 2012
  • Yayın Teşvik, 2012
  • Yayın Teşvik, 2013
  • COST Action IC1306 School on Cryptographic Attacks katılım bursu, 2014
  • TÜBİTAK 2242 Yazılım Projeleri Yarışması Sosyal Yaşam ve Eğlence Uygulamaları alanında ikincilik ödülü alan “SMS-PGP Mobil Uygulaması” başlıklı projeye akademik danışmanlık, 2014
  • Yılın Genç Bilim İnsanı, 2011
  • Yurt Dışı Doktora Sonrası Araştırma, 2014
  • Yayın Teşvik, 2014
  • YayınTeşvik, 2014
  • Yayın Teşvik, 2015
  • Best Paper Award, 2016
  • CSAW Applied Research Competition, 2016
  • ODTÜ Yılın Tezi Ödülü (Tez Danışmanı), 2017
  • En İyi Bildiri Ödülü, 2017
  • CSAW MENA Finalist, 2017