default search action
Ibrahim Alper Dogru
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Hamdullah Karamollaoglu, Ibrahim Alper Dogru, Ibrahim Yücedag:
An Efficient Deep Learningbased Intrusion Detection System for Internet of Things Networks with Hybrid Feature Reduction and Data Balancing Techniques. Inf. Technol. Control. 53(1): 243-261 (2024) - [c7]Seyma Nur Sönmez, Ibrahim Alper Dogru, Ismail Atacak, Kazim Kiliç:
Human activity recognition using CNN-BiLSTM-LightGBM hybrid model. SIU 2024: 1-4 - 2023
- [j11]Ismail Atacak, Oguzhan Çitlak, Ibrahim Alper Dogru:
Application of interval type-2 fuzzy logic and type-1 fuzzy logic-based approaches to social networks for spam detection with combined feature capabilities. PeerJ Comput. Sci. 9: e1316 (2023) - 2022
- [j10]Ismail Atacak, Kazim Kiliç, Ibrahim Alper Dogru:
Android malware detection using hybrid ANFIS architecture with low computational cost convolutional layers. PeerJ Comput. Sci. 8: e1092 (2022) - 2021
- [j9]Mesut Ugurlu, Ibrahim Alper Dogru, Recep Sinan Arslan:
A new classification method for encrypted internet traffic using machine learning. Turkish J. Electr. Eng. Comput. Sci. 29(5): 2450-2468 (2021) - [j8]Göksel Uçtu, Mustafa Alkan, Ibrahim Alper Dogru, Murat Dörterler:
A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls. Future Gener. Comput. Syst. 124: 56-67 (2021) - [c6]Abdullah Emre Çelik, Ibrahim Alper Dogru, Göksel Uçtu:
Automatic Generation of Different Malware. SIU 2021: 1-4 - 2020
- [j7]Sumeyye Bayrakdar, Ibrahim Yücedag, Mehmet Simsek, Ibrahim Alper Dogru:
Semantic analysis on social networks: A survey. Int. J. Commun. Syst. 33(11) (2020) - [j6]Ibrahim Alper Dogru, Murat Önder:
AppPerm Analyzer: Malware Detection System Based on Android Permissions and Permission Groups. Int. J. Softw. Eng. Knowl. Eng. 30(3): 427-450 (2020)
2010 – 2019
- 2019
- [j5]Recep Sinan Arslan, Ibrahim Alper Dogru, Necaattin Barisçi:
Permission-Based Malware Detection System for Android Using Machine Learning Techniques. Int. J. Softw. Eng. Knowl. Eng. 29(1): 43-61 (2019) - [j4]Oktay Yildiz, Ibrahim Alper Dogru:
Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm. Int. J. Softw. Eng. Knowl. Eng. 29(2): 245-262 (2019) - [j3]Oguzhan Çitlak, Murat Dörterler, Ibrahim Alper Dogru:
A survey on detecting spam accounts on Twitter network. Soc. Netw. Anal. Min. 9(1): 35:1-35:13 (2019) - 2018
- [j2]Abdullah Talha Kabakus, Ibrahim Alper Dogru:
An in-depth analysis of Android malware using hybrid techniques. Digit. Investig. 24: 25-33 (2018) - [c5]Anil Utku, Ibrahim Alper Dogru, M. Ali Akcayol:
Decision tree based android malware detection system. SIU 2018: 1-4 - [c4]Anil Utku, Ibrahim Alper Dogru, M. Ali Akcayol:
Permission based android malware detection with multilayer perceptron. SIU 2018: 1-4 - 2017
- [c3]Hamdullah Karamollaoglu, Ibrahim Alper Dogru, Anil Utku:
Identification of shares containing offensive charge in social media. SIU 2017: 1-4 - [c2]Anil Utku, Ibrahim Alper Dogru:
Malware detection system based on machine learning methods for Android operating systems. SIU 2017: 1-4 - 2015
- [j1]Abdullah Talha Kabakus, Ibrahim Alper Dogru, Aydin Çetin:
APK Auditor: Permission-based Android malware detection system. Digit. Investig. 13: 1-14 (2015) - 2012
- [b1]Ibrahim Alper Dogru:
Gezgin tasarsız ağlarda tahsisli güvenilir akış denetimi algoritması geliştirilmesi ve uygulaması (Development and applicaton of reservation based reliable flow control in mobile ad hoc networks). Gazi University, Turkey, 2012
2000 – 2009
- 2008
- [c1]Ibrahim Alper Dogru, Mehmet Simsek, Sinan Toklu, Oktay Yildiz, M. Ali Akcayol:
Rule-Based Mobility Management Routing for Mobile Ad Hoc Networks. ICWN 2008: 175-179
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint