default search action
M. Ali Aydin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Mehmet Fatih Yuce, Mehmet Ali Ertürk, Muhammed Ali Aydin:
Misbehavior detection with spatio-temporal graph neural networks. Comput. Electr. Eng. 116: 109198 (2024) - [j23]M. Talha Buyukakkaslar, Mehmet Ali Ertürk, Muhammed Ali Aydin:
A Review on Radar-Based Human Detection Techniques. Sensors 24(17): 5709 (2024) - [c24]Gani Sanlioz, Mustafa Kara, Muhammed Ali Aydin:
Security and Performance Evaluation in Peer- To-Peer VoIP Communication. BlackSeaCom 2024: 340-343 - 2023
- [j22]Ibrahim Gulatas, H. Hakan Kilinc, Abdul Halim Zaim, M. Ali Aydin:
Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective. IEEE Access 11: 33584-33606 (2023) - [j21]Hakan Aydin, Gulsum Zeynep Gurkas Aydin, Ahmet Sertbas, Muhammed Ali Aydin:
Internet of things security: A multi-agent-based defense system design. Comput. Electr. Eng. 111(Part B): 108961 (2023) - [j20]Gokhan Ozogur, Mehmet Ali Ertürk, Gulsum Zeynep Gurkas Aydin, Muhammed Ali Aydin:
Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost. Comput. J. 66(9): 2317-2328 (2023) - [j19]Mustafa Kara, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Hüseyin Balik:
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. Comput. Commun. 198: 247-261 (2023) - [j18]Hasan Ali Eris, Mehmet Ali Ertürk, Muhammed Ali Aydin:
A Framework for Personalized Human Activity Recognition. Int. J. Pattern Recognit. Artif. Intell. 37(10): 2356016:1-2356016:28 (2023) - [c23]Fidan Bozkurt, Mustafa Kara, Muhammed Ali Aydin, Hasan Hüseyin Balik:
Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks. IDAACS 2023: 400-407 - 2022
- [j17]Akhan Akbulut, Feray Gungor, Ela Tarakci, Muhammed Ali Aydin, Abdul Halim Zaim, Cagatay Catal:
Identification of phantom movements with an ensemble learning approach. Comput. Biol. Medicine 150: 106132 (2022) - [j16]Ebu Yusuf Güven, Ali Boyaci, Muhammed Ali Aydin:
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data. Comput. Secur. 113: 102560 (2022) - [j15]Dogukan Aksu, Muhammed Ali Aydin:
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach. Comput. Secur. 118: 102717 (2022) - [j14]Hakan Aydin, Zeynep Orman, Muhammed Ali Aydin:
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. Comput. Secur. 118: 102725 (2022) - [c22]Zeynep Inel Özkiper, Zeynep Turgut, Tülin Atmaca, Muhammed Ali Aydin:
Fingerprint Liveness Detection Using Deep Learning. FiCloud 2022: 129-135 - [c21]Sabit Çakir, Ahmet Sertbas, Muhammed Ali Aydin:
Machine Learning-Based Security Test Model and Evaluation for SIP-Based DoS Attacks. INISTA 2022: 1-5 - [i2]A. Huzeyfe Demir, Berke Yavas, Mehmet Yazici, Dogukan Aksu, M. Ali Aydin:
Object Detection and Tracking with Autonomous UAV. CoRR abs/2206.12941 (2022) - 2021
- [j13]Muhammed Ali Aydin, Baybars Karabekir, Abdül Halim Zaim:
Energy Efficient Clustering-Based Mobile Routing Algorithm on WSNs. IEEE Access 9: 89593-89601 (2021) - [j12]Murat Koca, Muhammed Ali Aydin, Ahmet Sertbas, Abdül Halim Zaim:
A new distributed anomaly detection approach for log IDS management based on deep learning. Turkish J. Electr. Eng. Comput. Sci. 29(5): 2486-2501 (2021) - [j11]Merve Kanmaz, Muhammed Ali Aydin, Ahmet Sertbas:
A New Geometric Data Perturbation Method for Data Anonymization Based on Random Number Generators. J. Web Eng. 20(6) (2021) - 2020
- [j10]Öznur Sengel, Muhammed Ali Aydin, Ahmet Sertbas:
An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns. IEEE Access 8: 160158-160176 (2020)
2010 – 2019
- 2019
- [j9]Zeynep Turgut, Serpil Üstebay, Muhammed Ali Aydin, Gulsum Zeynep Gurkas Aydin, Ahmet Sertbas:
Performance analysis of machine learning and deep learning classification methods for indoor localization in Internet of things environment. Trans. Emerg. Telecommun. Technol. 30(9) (2019) - [j8]Mehmet Ali Ertürk, Muhammed Ali Aydin, M. Talha Buyukakkaslar, Hayrettin Evirgen:
A Survey on LoRaWAN Architecture, Protocol and Technologies. Future Internet 11(10): 216 (2019) - [j7]Mehmet Ali Ertürk, Luca Vollero, Muhammed Ali Aydin:
Development of software-based vendor independent WLAN controller. Int. J. Mob. Commun. 17(5): 537-559 (2019) - [j6]Erchin Serpedin, Ali Riza Ekti, Ali Boyaci, Muhammad Ali Imran, Muhammed Ali Aydin, Serhan Yarkan:
The advances of fronthaul and backhaul communication for 5G and beyond. Phys. Commun. 36 (2019) - [c20]Dogukan Aksu, M. Ali Aydin:
A Survey of IoT Architectural Reference Models. SSD 2019: 413-417 - [c19]Sükrü Okul, Dogukan Aksu, Muhammed Ali Aydin:
Applications of Deep Learning and Big Data Technologies. SSD 2019: 550-553 - [c18]Serpil Ustebay, Zeynep Turgut, M. Ali Aydin:
Cyber Attack Detection by Using Neural Network Approaches: Shallow Neural Network, Deep Neural Network and AutoEncoder. CN 2019: 144-155 - [c17]Serpil Üstebay, Zeynep Turgut, Özgür Can Turna, M. Ali Aydin, Tülin Berber Atmaca:
Analysis of Device-Free and Device Dependent Signal Filtering Approaches for Indoor Localization Based on Earth's Magnetic Field System. DCSMart 2019: 1-13 - [c16]Özgür Alaca, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin:
A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector. ISDFS 2019: 1-6 - [c15]Ebu Yusuf Güven, Mehmet Yavuz Yagci, Ali Boyaci, Serhan Yarkan, Muhammed Ali Aydin:
A Survey on Backbone Attack. ISDFS 2019: 1-5 - [i1]Sertap Kamçi, Dogukan Aksu, Muhammed Ali Aydin:
Lane Detection For Prototype Autonomous Vehicle. CoRR abs/1912.05220 (2019) - 2018
- [j5]Can Eyupoglu, Muhammed Ali Aydin, Abdül Halim Zaim, Ahmet Sertbas:
An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques. Entropy 20(5): 373 (2018) - [j4]Mehmet Ali Ertürk, Luca Vollero, Muhammed Ali Aydin:
Optimal joint load balancing and EDCA configuration of IEEE 802.11 wireless hotspots. Int. J. Commun. Syst. 31(2) (2018) - [c14]Dogukan Aksu, Serpil Üstebay, Muhammed Ali Aydin, Tülin Atmaca:
Intrusion Detection with Comparative Analysis of Supervised Learning Techniques and Fisher Score Feature Selection Algorithm. ISCIS 2018: 141-149 - 2017
- [c13]Serpil Ustebay, M. Ali Aydin, Ahmet Sertbas, Tülin Atmaca:
A Comparative Analysis of N-Nearest Neighbors (N3) and Binned Nearest Neighbors (BNN) Algorithms for Indoor Localization. CN 2017: 81-90 - [c12]Serpil Ustebay, Züleyha Yiner, M. Ali Aydin, Ahmet Sertbas, Tülin Atmaca:
An Approach for Evaluating Performance of Magnetic-Field Based Indoor Positioning Systems: Neural Network. CN 2017: 412-421 - [c11]M. Talha Buyukakkaslar, Mehmet Ali Ertürk, Muhammed Ali Aydin, Luca Vollero:
LoRaWAN as an e-Health Communication Technology. COMPSAC (2) 2017: 310-313 - [c10]Mehmet Fatih Ozturk, Muhammed Ali Aydin, Ahmet Sertbas:
NFC technology based secure virtual cash shopping architecture design. SIU 2017: 1-4 - 2016
- [c9]Murat Gul, Muhammed Ali Aydin:
Exploits in information security. SIU 2016: 1729-1732 - 2015
- [j3]Özgür Can Turna, Muhammed Ali Aydin, Abdül Halim Zaim, Tülin Atmaca:
A new dynamic bandwidth allocation algorithm based on online-offline mode for EPON. Opt. Switch. Netw. 15: 29-43 (2015) - [c8]Özgür Can Turna, Muhammed Ali Aydin, Tülin Atmaca:
A Dynamic Energy Efficient Optical Line Terminal Design for Optical Access Network. CN 2015: 260-269 - 2014
- [c7]Mehmet Ali Ertürk, Luca Vollero, Muhammed Ali Aydin, Özgür Can Turna, Massimo Bernaschi:
A framework for modeling and implementing QoS-aware load balancing solutions in WiFi hotspots. ISWCS 2014: 33-38 - 2012
- [c6]Özgür Can Turna, M. Ali Aydin, Abdül Halim Zaim, Tülin Atmaca:
Half cycling dynamic bandwidth allocation with prediction on EPON. ISCC 2012: 898-902 - 2011
- [c5]Özgür Can Turna, M. Ali Aydin, Tülin Atmaca, Abdül Halim Zaim, Tuan-Dung Nguyen:
Traffic characterization study on EPON upstream channel. IWCMC 2011: 1601-1606 - 2010
- [j2]M. Ali Aydin, Tülin Atmaca, Özgür Can Turna, Abdül Halim Zaim, Thaere Eido:
A performance comparison of OPS with variable-size packets and OBS. Opt. Switch. Netw. 7(2): 85-94 (2010)
2000 – 2009
- 2009
- [b1]Muhammed Ali Aydin:
Optik çoğuşma anahtarlamalı sistemlerin analizi (Analysis of optical burst switching systems). İstanbul University, Turkey, 2009 - [j1]M. Ali Aydin, Abdül Halim Zaim, K. Gökhan Ceylan:
A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3): 517-526 (2009) - [c4]M. Ali Aydin, Tülin Atmaca, Özgür Can Turna, Abdül Halim Zaim, Thaere Eido:
Regulative Wavelength Grouping Approach for QoS in OBS Networks. AICT 2009: 254-260 - [c3]M. Ali Aydin, Tülin Atmaca, Özgür Can Turna, Abdül Halim Zaim:
Performance Study of New OBS Channel Scheduling Algorithms in a Multiservice Network. ICNS 2009: 242-248 - 2008
- [c2]M. Ali Aydin, Tülin Atmaca, Abdül Halim Zaim, Özgür Can Turna, Viet Hung Nguyen:
Performance Study of OBS Reservation Protocols. AICT 2008: 428-433 - 2006
- [c1]Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin:
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. ISCN 2006: 123-127
Coauthor Index
aka: Tülin Berber Atmaca
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint