Follow
Devrim Ünal
Devrim Ünal
Associate Research Professor at Qatar University
Verified email at qu.edu.qa - Homepage
Title
Cited by
Cited by
Year
Recent advances in the internet-of-medical-things (IoMT) systems security
A Ghubaish, T Salman, M Zolanvari, D Unal, A Al-Ali, R Jain
IEEE Internet of Things Journal 8 (11), 8707-8718, 2020
2052020
Time-series forecasting of Bitcoin prices using high-dimensional features: a machine learning approach
M Mudassir, S Bennbaia, D Unal, M Hammoudeh
Neural computing and applications, 1-15, 2020
1592020
Deep Learning for Detection of Routing Attacks in the Internet of Things
FY Yavuz, D Unal, E Gul
International Journal of Computational Intelligence Systems 12 (1), 39-58, 2018
1552018
Intrusion detection system for healthcare systems using medical and network data: A comparison study
AA Hady, A Ghubaish, T Salman, D Unal, R Jain
IEEE Access 8, 106576-106584, 2020
1362020
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
D Unal, M Hammoudeh, MA Khan, A Abuarqoub, G Epiphaniou, R Hamila
Computers & Security 109, 102393, 2021
732021
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
532020
A service-oriented approach for sensing in the Internet of Things: Intelligent transportation systems and privacy use cases
M Hammoudeh, G Epiphaniou, S Belguith, D Unal, B Adebisi, T Baker, ...
IEEE Sensors Journal 21 (14), 15753-15761, 2020
492020
Mobile authentication secure against man-in-the-middle attacks
K Bicakci, D Unal, N Ascioglu, O Adalier
Procedia Computer Science 34, 323-329, 2014
472014
Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing
IA Elgendy, A Muthanna, M Hammoudeh, H Shaiba, D Unal, M Khayyat
Big Data 9 (4), 265-278, 2021
382021
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
D Unal, A Al-Ali, FO Catak, M Hammoudeh
Future Generation Computer Systems 125, 433-445, 2021
362021
A formal role-based access control model for security policies in multi-domain mobile networks
D Unal, MU Çaglayan
Computer Networks 57 (1), 330-350, 2013
352013
A cyber-security methodology for a cyber-physical industrial control system testbed
M Noorizadeh, M Shakerpour, N Meskin, D Unal, K Khorasani
IEEE Access 9, 16239-16253, 2021
322021
Exploiting bluetooth vulnerabilities in e-health IoT devices
M Zubair, D Unal, A Al-Ali, A Shikfa
Proceedings of the 3rd international conference on future networks and …, 2019
322019
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
FO Catak, M Kuzlu, E Catak, U Cali, D Unal
Physical Communication 52, 101626, 2022
302022
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
L Gupta, T Salman, A Ghubaish, D Unal, AK Al-Ali, R Jain
Applied Soft Computing 118, 108439, 2022
302022
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
D Unal, S Bennbaia, FO Catak
Cybersecurity and Cognitive Science, 299-320, 2022
152022
Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications
T Salman, A Ghubaish, D Unal, R Jain
IEEE Networking Letters 1 (1), 1, 2020
142020
Secure bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system
M Zubair, A Ghubaish, D Unal, A Al-Ali, T Reimann, G Alinier, ...
Sensors 22 (21), 8280, 2022
132022
Detection of botnet attacks against industrial IoT systems by multilayer deep learning approaches
M Mudassir, D Unal, M Hammoudeh, F Azzedin
Wireless Communications and Mobile Computing 2022, 2022
132022
Spatiotemporal model checking of location and mobility related security policy specifications
D Ünal, MU Çağlayan
Turkish Journal of Electrical Engineering and Computer Sciences 21 (1), 144-173, 2013
102013
The system can't perform the operation now. Try again later.
Articles 1–20