Erdal Özdoğan

Erdal Özdoğan
Verified
Erdal verified their affiliation via an institutional email.
Verified
Erdal verified their affiliation via an institutional email.
  • Doctor of Engineering
  • Asst.Professor at Bursa Uludağ Üni̇versi̇tesi̇

About

15
Publications
9,857
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
69
Citations
Current institution
Bursa Uludağ Üni̇versi̇tesi̇
Current position
  • Asst.Professor
Additional affiliations
September 2024 - present
Uludağ University
Position
  • Asst.Prof

Publications

Publications (15)
Chapter
In this book chapter, the focus is on analyzing and evaluating datasets commonly used in Intrusion Detection Systems for IoT security. Given the complex networks formed by interconnected devices, the chapter emphasizes the critical role of effective data analysis and attack detection in enhancing IoT system security. Through a multifaceted examinat...
Article
Full-text available
The COVID-19 pandemic precipitated an abrupt transition from traditional face-to-face instruction to online learning, posing significant challenges in managing course timetabling and ensuring efficient bandwidth utilization. This paper presents the development and implementation of a web-based Decision Support System (DSS) that employs a simulated...
Article
Critical infrastructures encompass the essential systems required to operate various sectors, including energy, water, communication, finance, health, and transportation. The sophistication and organization of attacks on these infrastructures are escalating. A frequently targeted protocol within these critical infrastructures is the Distributed Net...
Article
Full-text available
The Internet of Things (IoT) solutions are demonstrating a significant impact in various sectors. These solutions encompass diverse applications, ranging from machine-to-machine communication to human-to-machine interaction within the same system. Various types of IoT application protocols have been developed to address these needs. While some IoT...
Article
Full-text available
In this study, we comprehensively compare machine learning algorithms in IoT IDS (Internet of Things Intrusion Detection System) systems from various aspects. We evaluate accuracy, precision, and training time. We examine the effects of data preprocessing techniques including normalization, outlier removal, standardization, and regularization on th...
Article
Full-text available
“Infrastructure as Code” technologies are the network automation concept used in configuring network devices, allocating network resources, and deploying developed applications. By using machine-readable codes, various tasks that previously required time and effort can now be done dynamically with infrastructure as code tools. Although Infrastructu...
Article
The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of...
Chapter
Cognitive buildings are structures that aim to produce meaningful results for occupants with the help of technology. To understand the cognitive buildings and harness their potential, it is important to know network technologies such as Internet of Things, cloud computing, fog computing, and edge computing. In this chapter, these key concepts are d...
Conference Paper
Full-text available
The Internet of Things (IoT) is a network of millions of smart devices and sensors connected to a network. These devices are used in smart cities, public transportation, smart grids and power transmission lines. Considering IoT devices as a sensor that can be connected to a computer network, it has been seen that they are under many cyber threats....
Article
Full-text available
Today, solutions developed with the Internet of Things have started to find more and more application areas to make human life easier. Internet of Things solutions, which include many different types of new technologies, will be very useful to use simulation tools before prototyping for the most appropriate technology selection. In this study, IoT-...
Book
Full-text available
Güvenlik kavramı tarih boyunca önemli konularından ve ihtiyaçlarından biri olmuştur. Günümüz teknoloji temelli iletişim yapısında güvenlik ihtiyacı kavramı eskiye kıyasla önemli ölçüde farklılık göstermektedir. Bilişim teknolojilerinin ve özellikle internetin günlük hayatın hemen her alanındaki etkin kullanımının, bu kavramın değişiminde büyük etki...
Article
Full-text available
Nesnelerin İnternetinde, iletişim başarımını etkileyen önemli faktörlerden biri kullanılacak olan mesajlaşma protokolüdür. MQTT, XMPP ve AMQP merkezi yapıda ve sunucu aracılığıyla haberleşen uygulama protokolleridir. DDS ve CoAP ise özellikle gerçek zamanlı uygulamalarda doğrudan iletişim için kullanılan uygulama protokolleridir. Nesnelerin İnterne...
Conference Paper
Full-text available
One of the important factors affecting communication performance in the Internet of Things is the messaging protocol. MQTT, XMPP and AMQP are centralized application protocols that communicate through the server. DDS and CoAP are application protocols that can communicate directly, especially in real-time applications. As the Internet of Things is...
Conference Paper
Full-text available
Eğitici Bilişim Teknolojileri Formatör Öğretmenleri başta olmak üzere, tüm öğretmenlerimize Bilişim Teknolojileri alanında ihtiyaç duyulan eğitimler verilmektedir. Cisco BTT ve CCNA Eğitimlerinin verilmesi için 2006 yılında EĞİTEK –TBV Bölgesel Akademi kuruldu. Merkezi ve Mahalli Hizmet içi Eğitimler aracılığıyla öğretmenlerimize bu eğitimler veril...

Network

Cited By