[HTML][HTML] Detection and mitigation of gps spoofing attacks on phasor measurement units using deep learning

F Almutairy, L Scekic, M Matar, R Elmoudi… - International Journal of …, 2023‏ - Elsevier
The widespread use of Phasor Measurement Units (PMUs) is considered one of the most
important contributions to the quality of power system monitoring. PMUs are digital devices …

Distributed denial of service (DDoS): a history

RR Brooks, L Yu, I Ozcelik, J Oakley… - IEEE Annals of the …, 2021‏ - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet.
They exploit the fact that the Internet lacks centralized access control. Since this vulnerability …

[HTML][HTML] ROSIDS23: Network intrusion detection dataset for robot operating system

E Değirmenci, YS Kırca, İ Özçelik, A Yazıcı - Data in Brief, 2023‏ - Elsevier
The data described herein pertains to the Robotic Systems Security domain. This data in
brief presents the attributes of the ROSIDS23 dataset and its collection process in detail …

Cybersecurity Defence Mechanism Against DDoS Attack with Explainability

AM Mahmood, İ Avcı - Mesopotamian Journal of …, 2024‏ - journals.mesopotamian.press
Application-layer attacks (Layer 7 attacks), a form of distributed denial-of-service (DDoS)
aimed at web servers, have become a significant concern in cybersecurity because of their …

MQTT Security at a Glance

E Atilgan, I Ozcelik, EN Yolacan - … International Conference on …, 2021‏ - ieeexplore.ieee.org
It is possible to talk about the concept of IoT in every environment where there is the Internet
and devices that can connect to the Internet in various ways. An IoT system may include …

Effects of Un targeted Adversarial Attacks on Deep Learning Methods

E Degirmenci, I Ozcelik, A Yazici - 2022 15th International …, 2022‏ - ieeexplore.ieee.org
The increasing connectivity of smart systems opens up new security vulnerabilities. Since
smart systems are used in various sectors such as healthcare, smart cities, and the …

Side-channel security analysis of connected vehicle communications using hidden Markov models

F Sun, RR Brooks, G Comert… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
This paper investigates side-channel vulnerabilities of a wireless communication application
in vehicular environments (DSRC/WAVE) protocol implementation of a traffic intersection …

Software-defined network (sdn) for cloud-based internet of things

C Awasthi, I Sehgal, PK Pal, PK Mishra - … with AI, Big-Data, and IoT, 2022‏ - Springer
Nowadays, the usage of IoT (Internet of Things) devices is rising exponentially. It is predicted
that the number of IoT devices being used will explode in the near future, and thus the data …

An Overview of Machine Learning Based Approaches in DDoS Detection

S Atasever, İ Özçelık, Ş Sağiroğlu - 2020 28th Signal …, 2020‏ - ieeexplore.ieee.org
Many detection approaches have been proposed to address growing threat of Distributed
Denial of Service (DDoS) attacks on the Internet. The attack detection is the initial step in …

Threatlocke: An Anomaly Based Detection Model

JA Heramil, K Dumbrique, MR Mirarza… - 2023 8th …, 2023‏ - ieeexplore.ieee.org
This research paper tests and evaluates the detection rate and efficiency score of the K-
Nearest Neighbors (KNN) algorithm as used in an anomaly-based network attack detection …