Devrim Unal

Orcid: 0000-0003-3146-3502

According to our database1, Devrim Unal authored at least 27 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System.
Sensors, 2022

Security concerns on machine learning solutions for 6G networks in mmWave beam prediction.
Phys. Commun., 2022

Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach.
Appl. Soft Comput., 2022

2021
BlueTack.
Dataset, January, 2021

Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks.
Wirel. Commun. Mob. Comput., 2021

Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security.
IEEE Internet Things J., 2021

A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption.
Future Gener. Comput. Syst., 2021

Statistical Assessment of Renewable Energy Generation in Optimizing Qatar Green Buildings.
CoRR, 2021

Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things.
Comput. Secur., 2021

Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing.
Big Data, 2021

A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed.
IEEE Access, 2021

Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices.
IEEE Access, 2021

Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

2020
Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications.
IEEE Netw. Lett., 2020

Policy specification and verification for blockchain and smart contracts in 5G networks.
ICT Express, 2020

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study.
IEEE Access, 2020

Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms.
Proceedings of the IEEE International Conference on Informatics, 2020

Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT.
Proceedings of the IEEE International Conference on Informatics, 2020

2019
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

2018
Deep Learning for Detection of Routing Attacks in the Internet of Things.
Int. J. Comput. Intell. Syst., 2018

2014
Mobile Authentication Secure Against Man-In-The-Middle Attacks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks.
Secur. Commun. Networks, 2013

A formal role-based access control model for security policies in multi-domain mobile networks.
Comput. Networks, 2013

2011
FPFM: A formal specification and verification framework for security policies in multi-domain mobile networks (FPFM: Çok etki alanlı gezgin ağlarda güvenlik politikaları betimleme ve doğrulama çerçevesi)
PhD thesis, 2011

2010
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus.
Proceedings of the Computer Network Security, 2010

2006
Theorem proving for modeling and conflict checking of authorization policies.
Proceedings of the International Symposium on Computer Networks, 2006


  Loading...