Modified graph-based algorithm to analyze security threats in IoT
Ferhat Arat,
Sedat Akleylek
1,244 views · 78 downloads
SDN-IoT: SDN-based efficient clustering scheme for IoT using improved Sailfish optimization algorithm
Ramin Mohammadi,
Sedat Akleylek,
Ali Ghaffari
1,511 views · 157 downloads
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
Kübra Seyhan,
Sedat Akleylek
1,075 views · 185 downloads
A novel IoT-based health and tactical analysis model with fog computing
Aykut Karakaya,
Sedat Akleylek
2,060 views · 940 downloads