default search action
Devrim Unal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Faria Nawshin, Devrim Unal, Mohammad Hammoudeh, Ponnuthurai N. Suganthan:
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Networks 161: 103523 (2024) - [j18]Faria Nawshin, Radwa Gad, Devrim Unal, Abdulla Khalid Al-Ali, Ponnuthurai N. Suganthan:
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey. Comput. Electr. Eng. 117: 109233 (2024) - [j17]Zina Chkirbene, Ridha Hamila, Devrim Unal, Moncef Gabbouj, Mounir Hamdi:
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring. IEEE Open J. Commun. Soc. 5: 3824-3838 (2024) - [c10]Faria Nawshin, Romain Arnal, Devrim Unal, Ponnuthurai N. Suganthan, Lionel Touseau:
Assessing the Effect of Model Poisoning Attacks on Federated Learning in Android Malware Detection. AICCONF 2024: 147-154 - [i3]Zina Chkirbene, Ala Gouissem, Ridha Hamila, Devrim Unal:
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies. CoRR abs/2407.01576 (2024) - 2023
- [i2]Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla K. Al-Ali, Raj Jain:
Recent Advances in the Internet of Medical Things (IoMT) Systems Security. CoRR abs/2302.04439 (2023) - 2022
- [j16]Lav Gupta, Tara Salman, Ali Ghubaish, Devrim Unal, Abdulla Khalid Al-Ali, Raj Jain:
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach. Appl. Soft Comput. 118: 108439 (2022) - [j15]Ferhat Özgür Çatak, Murat Kuzlu, Evren Çatak, Umit Cali, Devrim Unal:
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction. Phys. Commun. 52: 101626 (2022) - [j14]Mohammed Zubair, Ali Ghubaish, Devrim Unal, Abdulla K. Al-Ali, Thomas Reimann, Guillaume Alinier, Mohammad Hammoudeh, Junaid Qadir:
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System. Sensors 22(21): 8280 (2022) - 2021
- [j13]Ula Hijawi, Devrim Unal, Ridha Hamila, Adel Gastli, Omar Ellabban:
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices. IEEE Access 9: 5640-5650 (2021) - [j12]Mohammad Noorizadeh, Mohammad Shakerpour, Nader Meskin, Devrim Unal, Khashayar Khorasani:
A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed. IEEE Access 9: 16239-16253 (2021) - [j11]Ibrahim A. Elgendy, Ammar Muthanna, Mohammad Hammoudeh, Hadil Shaiba, Devrim Unal, Mashael Khayyat:
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing. Big Data 9(4): 265-278 (2021) - [j10]Devrim Unal, Mohammad Hammoudeh, Muhammad Asif Khan, Abdelrahman Abuarqoub, Gregory Epiphaniou, Ridha Hamila:
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Comput. Secur. 109: 102393 (2021) - [j9]Devrim Unal, Abdulla K. Al-Ali, Ferhat Özgür Çatak, Mohammad Hammoudeh:
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Gener. Comput. Syst. 125: 433-445 (2021) - [j8]Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla K. Al-Ali, Raj Jain:
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security. IEEE Internet Things J. 8(11): 8707-8718 (2021) - [j7]Zebo Yang, Ali Ghubaish, Devrim Unal, Raj Jain:
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks. Wirel. Commun. Mob. Comput. 2021: 8870222:1-8870222:13 (2021) - [c9]Mahima Aggarwal, Mohammed Zubair, Devrim Unal, Abdulla K. Al-Ali, Thomas Reimann, Guillaume Alinier:
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System. ICFNDS 2021: 58-63 - [c8]Mohammad Hammoudeh, Bamidele Adebisi, Devrim Unal, Abdelkader Laouid:
Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts. ICFNDS 2021: 299-304 - [d1]Devrim Unal:
BlueTack. IEEE DataPort, 2021 - [i1]Sara Zainaa, Shima Sadaf, Ansaruddin Kunjuc, Mohammad Meraj, Devrim Unal, Farid Touati:
Statistical Assessment of Renewable Energy Generation in Optimizing Qatar Green Buildings. CoRR abs/2103.07881 (2021) - 2020
- [j6]Anar A. Hady, Ali Ghubaish, Tara Salman, Devrim Unal, Raj Jain:
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study. IEEE Access 8: 106576-106584 (2020) - [j5]Devrim Unal, Mohammad Hammoudeh, Mehmet Sabir Kiraz:
Policy specification and verification for blockchain and smart contracts in 5G networks. ICT Express 6(1): 43-47 (2020) - [j4]Tara Salman, Ali Ghubaish, Devrim Unal, Raj Jain:
Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications. IEEE Netw. Lett. 2(4): 207-211 (2020) - [c7]Ula Hijawi, Devrim Unal, Ridha Hamila, Adel Gastli, Omar Ellabban:
Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms. ICIoT 2020: 225-230 - [c6]Ula Hijawi, Adel Gastli, Ridha Hamila, Omar Ellabban, Devrim Unal:
Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT. ICIoT 2020: 415-421
2010 – 2019
- 2019
- [c5]Mohammed Zubair, Devrim Unal, Abdulla K. Al-Ali, Abdullatif Shikfa:
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. ICFNDS 2019: 10:1-10:7 - 2018
- [j3]Furkan Yusuf Yavuz, Devrim Ünal, Ensar Gül:
Deep Learning for Detection of Routing Attacks in the Internet of Things. Int. J. Comput. Intell. Syst. 12(1): 39-58 (2018) - 2014
- [c4]Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier:
Mobile Authentication Secure Against Man-In-The-Middle Attacks. FNC/MobiSPC 2014: 323-329 - [c3]Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier:
Mobile Authentication Secure against Man-in-the-Middle Attacks. MobileCloud 2014: 273-276 - 2013
- [j2]Devrim Unal, Mehmet Ufuk Çaglayan:
A formal role-based access control model for security policies in multi-domain mobile networks. Comput. Networks 57(1): 330-350 (2013) - [j1]Devrim Unal, M. Ufuk Çaglayan:
XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks. Secur. Commun. Networks 6(12): 1420-1444 (2013) - 2011
- [b1]Devrim Ünal:
FPFM: A formal specification and verification framework for security policies in multi-domain mobile networks (FPFM: Çok etki alanlı gezgin ağlarda güvenlik politikaları betimleme ve doğrulama çerçevesi). Boğaziçi University, Turkey, 2011 - 2010
- [c2]Devrim Unal, Ozan Akar, M. Ufuk Çaglayan:
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus. MMM-ACNS 2010: 155-168
2000 – 2009
- 2006
- [c1]Devrim Unal, M. Ufuk Çaglayan:
Theorem proving for modeling and conflict checking of authorization policies. ISCN 2006: 146-151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 01:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint