Emin Anarim

Orcid: 0000-0002-3305-7674

According to our database1, Emin Anarim authored at least 109 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Impact of Network Coding on Age of Information.
IEEE Internet Things J., March, 2024

Age of Information in Internet of Things: A Survey.
IEEE Internet Things J., March, 2024

A Novel Scheduling Strategy in Priority-Aware IoT Networks for Age of Information Optimization.
IEEE Commun. Lett., February, 2024

2023
Gender Detection Based on Gait Data: A Deep Learning Approach With Synthetic Data Generation and Continuous Wavelet Transform.
IEEE Access, 2023

Autoencoder and Extreme Value Theory Based Unknown Intrusion Detection System.
Proceedings of the 31st Signal Processing and Communications Applications Conference, 2023

Age of Information Minimizing Dynamic User Pairing in Downlink NOMA Systems.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

Age of Information in Network Coded Multicast Networks.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

The Use of Statistical Features for Low-Rate Denial of Service Attack Detection.
Proceedings of the 2nd International Conference on 6G Networking, 2023

2022
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis.
Int. J. Inf. Sec., 2022

A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network.
Comput. Secur., 2022

A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN.
Comput. Networks, 2022

Network Anomaly Detection with Payload-based Analysis.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

Network Traffic Classification with Flow Based Approach.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

Multi-Phase Traffic Classification Based on Payload.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

Application Based Network Traffic Dataset and SPID Analysis.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

A Comparative Study on the Performance Evaluation of DDoS Attack Detection Methods.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

User Identification on Smartphones with Motion Sensors and Touching Behaviors.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

Payload-Based Network Traffic Analysis for Application Classification and Intrusion Detection.
Proceedings of the 30th European Signal Processing Conference, 2022

2021
Graph-Theoretical Dynamic User Pairing for Downlink NOMA Systems.
IEEE Commun. Lett., 2021

Gender Detection with Smartphone Motion Sensors Using Convolutional Neural Networks.
Proceedings of the 29th Signal Processing and Communications Applications Conference, 2021

Hybrid Architecture for Gender Recognition Using Smartphone Motion Sensors.
Proceedings of the 29th European Signal Processing Conference, 2021

2020
Graph-based fuzzy approach against DDoS attacks.
J. Intell. Fuzzy Syst., 2020

A DDoS attack detection and defense scheme using time-series analysis for SDN.
J. Inf. Secur. Appl., 2020

Homomorphic extensions of CRT-based secret sharing.
Discret. Appl. Math., 2020

Hybrid DDoS Detection Framework Using Matching Pursuit Algorithm.
IEEE Access, 2020

Multigrid Based Sparse Recovery Method for Multidimensional Harmonic Retrieval.
Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020

Istatistiksel Yöntemler ile DDoS Saldırı Tespiti DDoS Detection Using Statistical Methods.
Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020

DDoS Detection Algorithm Based on Fuzzy Logic.
Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020

2019
Session-Based User Authentication via Mouse Dynamics.
Proceedings of the 27th Signal Processing and Communications Applications Conference, 2019

Network Anomaly Detection Using Header Information With Greedy Algorithm.
Proceedings of the 27th Signal Processing and Communications Applications Conference, 2019

DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation.
Proceedings of the 27th Signal Processing and Communications Applications Conference, 2019

Anomaly-Based DDoS Attack Detection by Using Sparse Coding and Frequency Domain.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

Adjustment of Digital Screens to Compensate the Eye Refractive Errors via Deconvolution.
Proceedings of the Ninth International Conference on Image Processing Theory, 2019

Statistical Properties of DDoS Attacks.
Proceedings of the 6th International Conference on Control, 2019

A New Network Anomaly Detection Method Based on Header Information Using Greedy Algorithm.
Proceedings of the 6th International Conference on Control, 2019

2018
Multiresolution alignment for multiple unsynchronized audio sequences using Sequential Monte Carlo samplers.
SoftwareX, 2018

Statistical measures: Promising features for time series based DDoS attack detection.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

Open platform for attack and countermeasure analysis on system security.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

2017
A key agreement protocol with partial backward confidentiality.
Comput. Networks, 2017

A secure and efficient group key agreement approach for mobile ad hoc networks.
Ad Hoc Networks, 2017

Compressed sensing technique for synchronization and channel estimation in OFDMA uplink transmissions.
Proceedings of the 25th European Signal Processing Conference, 2017

Statistical Measures: Promising Features for Time Series Based DDoS Attack Detection.
Proceedings of the IWCIM 2017, 2017

Age group detection using smartphone motion sensors.
Proceedings of the 25th European Signal Processing Conference, 2017

A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A CRT-based verifiable secret sharing scheme secure against unbounded adversaries.
Secur. Commun. Networks, 2016

Compressive sensing based joint frequency offset and channel estimation for OFDM.
EURASIP J. Wirel. Commun. Netw., 2016

Frequency based DDoS attack detection approach using naive Bayes classification.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Comparison of modulation types in pilot-based sparse channel estimation for OFDM.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

DDoS attack detection using matching pursuit algorithm.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

Side channel analysis on android smartphones.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

Model based multiple musical sequence alignment using tempo extraction as preprocessing.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

2015
A Probabilistic Model-Based Approach for Aligning Multiple Audio Sequences.
IEEE ACM Trans. Audio Speech Lang. Process., 2015

An improved conference-key agreement protocol for dynamic groups with efficient fault correction.
Secur. Commun. Networks, 2015

2014
Unbalanced states violates RFID privacy.
J. Intell. Manuf., 2014

Spectrum-Aware Dynamic Frequency Reuse (SADFR) for SON-based OFDM a HetNets.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Query ranking strategies in probabilistic expert systems.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

2013
Auction-Based Throughput Maximization in Cognitive Radio Networks Under Interference Constraint.
Wirel. Pers. Commun., 2013

Location estimation using RSS measurements with unknown path loss exponents.
EURASIP J. Wirel. Commun. Netw., 2013

Frequency characteristics of DoS and DDoS attacks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Effect of DDoS attacks on traffic features.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Model based audio sequence alignment based on deterministic similarity methods.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

An improved fault-tolerant conference-key agreement protocol with forward secrecy.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

SMC samplers for multiresolution audio sequence alignment.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Security analysis of an ultra-lightweight RFID authentication protocol - SLMAP.
Secur. Commun. Networks, 2012

Security flaws in a recent RFID delegation protocol.
Pers. Ubiquitous Comput., 2012

Practical attacks and improvements to an efficient radio frequency identification authentication protocol.
Concurr. Comput. Pract. Exp., 2012

System throughput versus SINR constraint in cognitive radio networks.
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012

2011
Scalability and Security Conflict for RFID Authentication Protocols.
Wirel. Pers. Commun., 2011

A Salient Missing Link in RFID Security Protocols.
EURASIP J. Wirel. Commun. Netw., 2011

Model based multiple audio sequence alignment.
Proceedings of the IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2011

2010
Application of Software Product Line Principles to Multi-Sector Software Development.
Proceedings of the Software Product Lines - 14th International Conference, 2010

Attacks on an Efficient RFID Authentication Protocol.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A new RFID authentication protocol with resistance to server impersonation.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Secure RFID Authentication with Efficient Key-Lookup.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A Note on the Periodicity and the Output Rate of Bit Search Type Generators.
IEEE Trans. Inf. Theory, 2008

Phase dependence mitigation for autocorrelation-based frequency estimation.
Digit. Signal Process., 2008

A Password-Based Key Establishment Protocol with Symmetric Key Cryptography.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
Image Error Concealment Using Watermarking with Subbands for Wireless Channels.
IEEE Commun. Lett., 2007

A combined approach for NLOS mitigation in cellular positioning with TOA measurements.
Proceedings of the 15th European Signal Processing Conference, 2007

2006
Improved Merkle Cryptosystem (IMC).
Proceedings of the Computer and Information Sciences, 2006

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes.
Proceedings of the Computer and Information Sciences, 2006

A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers.
Proceedings of the Computer and Information Sciences, 2006

NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Time-of-arrival estimation under impulsive noise for wireless positioning systems.
Proceedings of the 14th European Signal Processing Conference, 2006

Phase noise mitigation in the autocorrelation estimates with data windowing: The case of two close sinusoids.
Proceedings of the 14th European Signal Processing Conference, 2006

Three-tier satellite multicast security protocol based on ECMQV and IMC methods.
Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006

2005
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks.
Expert Syst. Appl., 2005

Perceptual Audio Hashing Functions.
EURASIP J. Adv. Signal Process., 2005

A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers.
Proceedings of the Computer and Information Sciences, 2005

A modified stream generator for the GSM encryption algorithms A5/1 and A5/2.
Proceedings of the 13th European Signal Processing Conference, 2005

Removal of the phase noise in the autocorrelation estimates with data windowing.
Proceedings of the 13th European Signal Processing Conference, 2005

2002
Subspace-based frequency estimation of sinusoidal signals in alpha-stable noise.
Signal Process., 2002

2001
Motion estimation in the frequency domain using fuzzy c-planes clustering.
IEEE Trans. Image Process., 2001

Permutation Based Design of Orthogonal Block Transforms and Filter Banks.
Multidimens. Syst. Signal Process., 2001

2000
A quadratic motion-based object-oriented video codec.
Signal Process. Image Commun., 2000

Role of prefiltering in unsupervised video segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2000

1998
VQ-adaptive block transform coding of images.
IEEE Trans. Image Process., 1998

1997
An object-oriented video codec based on region growing motion segmentation.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
Multidirectional and multiscale edge detection via M-band wavelet transform.
IEEE Trans. Image Process., 1996

Identification of image and blur parameters in frequency domain using the EM algorithm.
IEEE Trans. Image Process., 1996

Region growing motion segmentation and estimation in object-oriented video coding.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Facial feature extraction using genetic algorithms.
Proceedings of the 8th European Signal Processing Conference, 1996

Matched block transform design techniques.
Proceedings of the 8th European Signal Processing Conference, 1996

1994
Decision based directional edge detector.
Signal Process., 1994

Use of M-band wavelet transform for multidirectional and multiscale edge detection.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
Causal and semicausal AR image model identification using the EM algorithm.
IEEE Trans. Image Process., 1993

Robust detection of tone signals by autoregressive frequency estimation.
Signal Process., 1993

1991
Statistical analysis of Pisarenko type tone frequency estimator.
Signal Process., 1991


  Loading...