Sevil Sen
Hacettepe Üniversitesi
H-index: 19
Asia-Turkey
Top articles of Sevil Sen
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism | IEEE Access | Erhan Turan Sevil Sen Tamer Ergun | 2024/4/29 |
Android Authorship Attribution using Source Code-Based Features | IEEE Access | Emre Aydogan Sevil Sen | 2024/1/9 |
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things | arXiv preprint arXiv:2303.16499 | Cansu Dogan Selim Yilmaz Sevil Sen | 2023/3/29 |
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning | Halil Arslan Selim Yılmaz Sevil Sen | 2023/7/25 | |
Metaheuristic approaches for solving multiobjective optimization problems | Selim Yilmaz Sevil Sen | 2023/1/1 | |
A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions | arXiv preprint arXiv:2306.14281 | Ozlem Ceviz Pinar Sadioglu Sevil Sen | 2023/6/25 |
A dynamic trust management model for vehicular ad hoc networks | Vehicular Communications | Mehmet Aslan Sevil Sen | 2023/6/1 |
Evolving lightweight intrusion detection systems for RPL-based Internet of Things | Ali Deveci Selim Yilmaz Sevil Sen | 2023/4/9 | |
Exploring placement of intrusion detection systems in rpl-based internet of things | arXiv preprint arXiv:2303.16561 | Selim Yilmaz Emre Aydogan Sevil Sen | 2023/3/29 |
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks | arXiv preprint arXiv:2312.04135 | Ozlem Ceviz Pinar Sadioglu Sevil Sen Vassilios G Vassilakis | 2023/12/7 |
Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks | Computer Networks | Ahmet Melih Gedikli Mehmet Koseoglu Sevil Sen | 2022/10/9 |
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries | International Journal of Information Security | Beyza Cevik Nur Altiparmak Murat Aksu Sevil Sen | 2022/10 |
Analysis of RPL Objective Functions with Security Perspective. | Cansu Dogan Selim Yilmaz Sevil Sen | 2022/2 | |
Analysis of routing attacks in fanets | Ozlem Ceviz Pinar Sadioglu Sevil Sen | 2021/11/24 | |
Android security using nlp techniques: a review | Sevil Sen Burcu Can | 2021/7/7 | |
Load balancing for RPL-based Internet of Things: A review | Doruk Pancaroglu Sevil Sen | 2021/5/1 | |
Attention: there is an inconsistency between android permissions and application metadata! | International Journal of Information Security | Huseyin Alecakir Burcu Can Sevil Sen | 2021/1/1 |
A transfer learning approach for securing resource-constrained IoT devices | IEEE Transactions on Information Forensics and Security | Selim Yılmaz Emre Aydogan Sevil Sen | 2021/7/9 |
Discovering inconsistencies between requested permissions and application metadata by using deep learning | Huseyin Alecakir Muhammet Kabukcu Burcu Can Sevil Sen | 2020/12/3 | |
Classification with the electric fish optimization algorithm | Selim Yılmaz Sevil Sen | 2020/10/5 |