SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND TELNET Honeypot M Başer, EY Güven, MA Aydın 2021 6th International Conference on Computer Science and Engineering (UBMK …, 2021 | 23 | 2021 |
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data EY Güven, A Boyaci, MA Aydin Computers & Security 113, 102560, 2022 | 20 | 2022 |
Mirai Botnet Attack Detection in Low-Scale Network Traffic. EY GÜVEN Intelligent Automation & Soft Computing 37 (1), 2023 | 17 | 2023 |
Multiple Classification of Cyber Attacks Using Machine Learning EY Güven, S Gülgün, C Manav, B Bakır, G Gürkaş Aydın Electrica 22 (2), 313-320, 2022 | 6 | 2022 |
ICON: Instagram Profile Classification Using Image and Natural Language Processing Methods EY Güven, A Boyacı, FN Sarıtemur, Z Türk, G Sütçü, ÖC Turna IEEE Transactions on Computational Social Systems 11 (2), 2776-2783, 2023 | 5 | 2023 |
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique M Baçer, EY Güven, MA Aydin Proc.-6th Int. Conf. Comput. Sci. Eng. UBMK 2021, 806-811, 2021 | 5 | 2021 |
Security on Wireless Sensor Network B Yapar, EY Güven, MA Aydın 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 5 | 2019 |
Investigation of the effectiveness of edible oils as solvent in reactive extraction of some hydroxycarboxylic acids and modeling with multiple artificial intelligence models YE Sevindik, A Gök, M Lalikoglu, S Gülgün, EY Guven, Z Gürkaş-Aydın, ... Biomass Conversion and Biorefinery, 1-13, 2023 | 4 | 2023 |
Physical Attack Detection for Smart Objects EY Güven, AY ÇAMURCU 2018 International Conference on Artificial Intelligence and Data Processing …, 2018 | 4 | 2018 |
A survey on backbone attack EY Guven, MY Yagci, A Boyaci, S Yarkan, MA Aydin 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 1-5, 2019 | 3 | 2019 |
Edge Computing Security Application: Kılıç EY Güven, AY Çamurcu 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 3 | 2018 |
Kenar bilişim için siber saldırıları tespit ve önleme yöntemleri EY Güven Fatih Sultan Mehmet Vakıf Üniversitesi, Mühendislik ve Fen Bilimleri Enstitüsü, 2018 | 1 | 2018 |
EKF Based Localization: Integrating IMU and LiDAR Data in the Hilti SLAM Challenge B Bakir, H Bozömeroğlu, EY Güven 2024 9th International Conference on Computer Science and Engineering (UBMK …, 2024 | | 2024 |
Makine Öğrenmesi ile İşletim Sistemi Tarama Saldırısı Tespiti Operating System Scan Attack Detection with Machine Learning R DOĞAN, EY GÜVEN, MA AYDIN Proceedings of the International Conference on All Aspects of Cyber Security …, 2019 | | 2019 |
CRYPTOGRAPHIC ALGORITHM TEST AND PERFORMANCE ANALYSIS IN LOW POWER CAPABILITIES B Tacettin, EY Güven, MY Yağcı, MA Aydın 2018 International Conference on Artificial Intelligence and Data Processing …, 2018 | | 2018 |
Akıllı Nesneler İçin Fiziksel Saldırı Tespiti EY Güven, AY Çamurcu IEEE, 2018 | | 2018 |
Kenar Bilişim Güvenlik Uygulaması: Kılıç EY Güven, AY Çamurcu Institute of Electrical and Electronics Engineers (IEEE), 2018 | | 2018 |
Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software M Başer, EY Güven, MA Aydın Balkan Journal of Electrical and Computer Engineering 12 (4), 337-348, 0 | | |