|  |  | 
  |  | IoT-based Smart Home Security System with Machine Learning Models | 
  |  |  | 
  |  | Blockchain-based IoT security solutions for IDS research centers | 
  |  |  | 
  |  | A Novel Cyber Security Model Using Deep Transfer Learning | 
  |  |  | 
  |  | A Comprehensive Survey On Machine Learning-Based Intrusion Detection System for Vehicular Area Network Architectures | 
  |  |  | 
  |  | A novel deep learning-based intrusion detection system for IoT DDoS security | 
  |  |  | 
  |  | Design and Performance Analysis of a SPECK-Based Lightweight Hash Function | 
  |  |  | 
  |  | A COMPREHENSIVE SURVEY ON MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEM FOR VEHICULAR AREA NETWORK ARCHITECTURES | 
  |  |  | 
  |  | 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos | 
  |  |  | 
  |  | A survey on communication protocols and performance evaluations for Internet of Things | 
  |  |  | 
  |  | A survey on communication protocols and performance evaluations for Internet of Things | 
  |  |  | 
  |  | A survey on communication protocols and performance evaluations for Internet of Things | 
  |  |  | 
  |  | A new DDoS attacks intrusion detection model based on deep learning for cybersecurity | 
  |  |  | 
  |  | A new DDoS attacks intrusion detection model based on deep learning for cybersecurity | 
  |  |  | 
  |  | S-Box-based video stenography application of variable-order fractional hopfield neural network (VFHNN) | 
  |  |  | 
  |  | Handwritten Digit Recognition With Machine Learning Algorithms | 
  |  |  | 
  |  | 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos | 
  |  |  | 
  |  | A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks | 
  |  |  | 
  |  | Performance Evaluation of Lightweight Encryption Algorithms for IoT-Based Applications | 
  |  |  | 
  |  | Performance Evaluation of Lightweight Encryption Algorithms for IoT-Based Applications | 
  |  |  | 
  |  | Performance Evaluation of Lightweight Encryption Algorithms for IoT-Based Applications | 
  |  |  | 
  |  | A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks | 
  |  |  | 
  |  | A new approach to design S-box generation algorithm based on genetic algorithm | 
  |  |  | 
  |  | A Novel Hypogenetic Chaotic Jerk System: Modeling, Circuit Implementation, and Its Application | 
  |  |  | 
  |  | A Simple Chaotic Flow with Hyperbolic Sinusoidal Function and Its Application to Voice Encryption | 
  |  |  | 
  |  | An exponential jerk system, its fractional-order form with dynamical analysis and engineering application | 
  |  |  | 
  |  | CoAP and Its Performance Evaluation | 
  |  |  | 
  |  | Anormal Trafik Tespiti için Veri Madenciliği Algoritmalarının Performans Analizi | 
  |  |  | 
  |  | A New Finance Chaotic System, its Electronic Circuit Realization, Passivity based Synchronization and an Application to Voice Encryption | 
  |  |  | 
  |  | A new hybrid approach for intrusion detection using machine learningmethods | 
  |  |  | 
  |  | A Novel Chaotic System With Boomerang-Shaped Equilibrium, Its Circuit Implementation and Application to Sound Encryption | 
  |  |  | 
  |  | S-Box Based Image Encryption Application Using a Chaotic System without Equilibrium | 
  |  |  | 
  |  | A novel parallel image encryption algorithm based on chaos | 
  |  |  | 
  |  | A new chaotic system with hidden attractor and its engineering applications: analog circuit realization and image encryption | 
  |  |  | 
  |  | A new 4-D chaotic hyperjerk system, its synchronization, circuit design and applications in RNG, image encryption and chaos-based steganography | 
  |  |  | 
  |  | A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application | 
  |  |  | 
  |  | A Chaotic System with Infinite Number of Equilibria Located on an Exponential Curve and Its Chaos-Based Engineering Application | 
  |  |  | 
  |  | An Exponential Jerk System: Circuit Realization, Fractional Order and Time Delayed Form with Dynamical Analysis and Its Engineering Application | 
  |  |  | 
  |  | A novel hybrid encryption algorithm based on chaos and S-AES algorithm | 
  |  |  | 
  |  | A New Chaotic System with Multiple Attractors: Dynamic Analysis, Circuit Realization and S-Box Design | 
  |  |  | 
  |  | New class of chaotic systems with equilibrium points like a three-leaved clover | 
  |  |  | 
  |  | A new three-dimensional chaotic system with a cloud-shaped curve of equilibrium points, its circuit implementation and sound encryption | 
  |  |  | 
  |  | A new chaotic system with hidden attractor and its engineering applications: analog circuit realization and image encryption | 
  |  |  | 
  |  | A Novel Chaotic System With Boomerang-Shaped Equilibrium, Its Circuit Implementation and Application to Sound Encryption | 
  |  |  | 
  |  | A new hyperchaotic temperature fluctuations model, its circuit simulation, FPGA implementation and an application to image encryption | 
  |  |  | 
  |  | The design and implementation of hybrid RSA algorithm using a novel chaos based RNG | 
  |  |  | 
  |  | Secure image encryption algorithm design using a novel chaos based S-Box | 
  |  |  | 
  |  | ENHANCED SECURE DATA TRANSFER FOR WSN USING CHAOTIC-BASED ENCRYPTION | 
  |  |  | 
  |  | A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system | 
  |  |  | 
  |  | A novel chaos-based encryption algorithm over TCP data packet for secure communication | 
  |  |  | 
  |  | A novel defect prediction method for web pages using k-means plus | 
  |  |  | 
  |  | A MATLAB and.NET based Windows Application for controller design using Genetic algorithm | 
  |  |  | 
  |  | Sürekli Zamanlı Otonom Kaotik Devre Tasarımı Ve Sinyal Gizleme Uygulaması | 
  |  |  | 
  |  | BELLEK YÖNETİMİNDE SAYFA DEĞİŞİM ALGORİTMALARININPERFORMANS ANALİZİ | 
  |  |  | 
  |  | A Voice Controlled Web based FTP Tool | 
  |  |  | 
  |  | Ns-3 ağ simülatöründe, kuyruk yönetim algoritmalarının performans analizi | 
  |  |  | 
  |  | NS-2 ve NS-3 Ağ Simülatörlerinin Ölçeklenebilirlik Analizi ve Karşılaştırma | 
  |  |  | 
  |  | A new approach to design S-Box generation algorithm based on genetic algorithm | 
   
İletişim
unalc@sakarya.edu.tr0264 2956980