About
15
Publications
9,857
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
69
Citations
Introduction
Current institution
Additional affiliations
September 2024 - present
Uludağ University
Position
- Asst.Prof
Publications
Publications (15)
In this book chapter, the focus is on analyzing and evaluating datasets commonly used in Intrusion Detection Systems for IoT security. Given the complex networks formed by interconnected devices, the chapter emphasizes the critical role of effective data analysis and attack detection in enhancing IoT system security. Through a multifaceted examinat...
The COVID-19 pandemic precipitated an abrupt transition from traditional face-to-face instruction to online learning, posing significant challenges in managing course timetabling and ensuring efficient bandwidth utilization. This paper presents the development and implementation of a web-based Decision Support System (DSS) that employs a simulated...
Critical infrastructures encompass the essential systems required to operate various sectors, including energy, water, communication, finance, health, and transportation. The sophistication and organization of attacks on these infrastructures are escalating. A frequently targeted protocol within these critical infrastructures is the Distributed Net...
The Internet of Things (IoT) solutions are demonstrating a significant impact in various sectors. These solutions encompass diverse applications, ranging from machine-to-machine communication to human-to-machine interaction within the same system. Various types of IoT application protocols have been developed to address these needs. While some IoT...
In this study, we comprehensively compare machine learning algorithms in IoT IDS (Internet of Things Intrusion Detection System) systems from various aspects. We evaluate accuracy, precision, and training time. We examine the effects of data preprocessing techniques including normalization, outlier removal, standardization, and regularization on th...
“Infrastructure as Code” technologies are the network automation concept used in configuring network devices, allocating network resources, and deploying developed applications. By using machine-readable codes, various tasks that previously required time and effort can now be done dynamically with infrastructure as code tools. Although Infrastructu...
The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of...
Cognitive buildings are structures that aim to produce meaningful results for occupants with the help of technology. To understand the cognitive buildings and harness their potential, it is important to know network technologies such as Internet of Things, cloud computing, fog computing, and edge computing. In this chapter, these key concepts are d...
The Internet of Things (IoT) is a network of millions of smart devices and sensors connected to a network. These devices are used in smart cities, public transportation, smart grids and power transmission lines. Considering IoT devices as a sensor that can be connected to a computer network, it has been seen that they are under many cyber threats....
Today, solutions developed with the Internet of Things have started to find more and more application areas to make human life easier. Internet of Things solutions, which include many different types of new technologies, will be very useful to use simulation tools before prototyping for the most appropriate technology selection. In this study, IoT-...
Güvenlik kavramı tarih boyunca önemli konularından ve ihtiyaçlarından biri olmuştur. Günümüz teknoloji temelli iletişim yapısında güvenlik ihtiyacı kavramı eskiye kıyasla önemli ölçüde farklılık göstermektedir. Bilişim teknolojilerinin ve özellikle internetin günlük hayatın hemen her alanındaki etkin kullanımının, bu kavramın değişiminde büyük etki...
Nesnelerin İnternetinde, iletişim başarımını etkileyen önemli faktörlerden biri
kullanılacak olan mesajlaşma protokolüdür. MQTT, XMPP ve AMQP merkezi yapıda
ve sunucu aracılığıyla haberleşen uygulama protokolleridir. DDS ve CoAP ise
özellikle gerçek zamanlı uygulamalarda doğrudan iletişim için kullanılan uygulama
protokolleridir. Nesnelerin İnterne...
One of the important factors affecting communication performance in the Internet of Things is the messaging protocol. MQTT, XMPP and AMQP are centralized application protocols that communicate through the server. DDS and CoAP are application protocols that can communicate directly, especially in real-time applications. As the Internet of Things is...
Eğitici Bilişim Teknolojileri Formatör Öğretmenleri başta olmak üzere, tüm öğretmenlerimize
Bilişim Teknolojileri alanında ihtiyaç duyulan eğitimler verilmektedir. Cisco BTT ve CCNA Eğitimlerinin verilmesi için 2006 yılında EĞİTEK –TBV Bölgesel Akademi kuruldu. Merkezi ve Mahalli
Hizmet içi Eğitimler aracılığıyla öğretmenlerimize bu eğitimler veril...