Serif Bahtiyar

Orcid: 0000-0003-0314-2621

According to our database1, Serif Bahtiyar authored at least 28 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Multi-Modal Deep Transfer Learning Framework for Attack Detection in Software-Defined Networks.
IEEE Access, 2023

2022
Data poisoning attacks against machine learning algorithms.
Expert Syst. Appl., 2022

A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Trust Enhanced Security for Routing in SDN.
Proceedings of the 1st International Conference on 6G Networking, 2022

2021
A Textual Clean-Label Backdoor Attack Strategy against Spam Detection.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

OCIDS: An Online CNN-Based Network Intrusion Detection System for DDoS Attacks with IoT Botnets.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2020
Credit Card Fraud Detection with NCA Dimensionality Reduction.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

A Survey on Malware Detection with Deep Learning.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

2019
Blockchain-Based Electronic Voting System for Elections in Turkey.
CoRR, 2019

A multi-dimensional machine learning approach to predict advanced malware.
Comput. Networks, 2019

A deep learning method for fraud detection in financial systems: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2017
A key agreement protocol with partial backward confidentiality.
Comput. Networks, 2017

A secure and efficient group key agreement approach for mobile ad hoc networks.
Ad Hoc Networks, 2017

A Framework for Trust Assessment of Security Systems on Flexible Networks.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Anatomy of targeted attacks with smart malware.
Secur. Commun. Networks, 2016

Adaptive Trust Scenarios for Mobile Security.
Proceedings of the Mobile Web and Intelligent Information Systems, 2016

2015
An improved conference-key agreement protocol for dynamic groups with efficient fault correction.
Secur. Commun. Networks, 2015

System modeling and risk analysis using AADL for critical infrastructure security.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

2014
Trust assessment of security for e-health systems.
Electron. Commer. Res. Appl., 2014

Security Assessment of Payment Systems under PCI DSS Incompatibilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Security similarity based trust in cyber space.
Knowl. Based Syst., 2013

An improved fault-tolerant conference-key agreement protocol with forward secrecy.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

2012
Extracting trust information from security system of a service.
J. Netw. Comput. Appl., 2012

2011
Core-crust modeling approach for formal representation of trust in relation to computer security (Bilgisayar güvenliğinde güvenin çekirdek kabuk modelleme yaklaşımı ile kurallı gösterimi)
PhD thesis, 2011

2010
A Model of Security Information Flow on Entities for Trust Computation.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An architectural approach for assessing system trust based on security policy specifications and security mechanisms.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009


  Loading...