Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems., and . Comput. Intell. Neurosci., (2016)Traditional and Hybrid Access Control Models: A Detailed Survey., , , , , , , and . Secur. Commun. Networks, (2022)Blockchain Technology The Future of Cybersecurity., , , , , and . ACIT, page 1-5. IEEE, (2023)LSB Image Steganography Based on Blocks Matrix Determinant Method., and . KSII Trans. Internet Inf. Syst., 13 (7): 3778-3793 (2019)Enhancing Localization Efficiency and Accuracy in Wireless Sensor Networks., , , , , and . Sensors, 23 (5): 2796 (March 2023)An Energy-Efficient Mobility-Based Cluster Head Selection for Lifetime Enhancement of Wireless Sensor Networks., , , , and . IEEE Access, (2020)BHCNet: Neural Network-Based Brain Hemorrhage Classification Using Head CT Scan., , , , , , and . IEEE Access, (2021)Developing novel techniques for spatial domain LSB image steganography (Spatıal domain LSB görüntü steganografisi için yeniteknikler geliştirme). Kadir Has University, Turkey, (2019)Securing Internet of Drones With Identity-Based Proxy Signcryption., , , , , , and . IEEE Access, (2021)Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching., , , , and . KSII Trans. Internet Inf. Syst., 15 (3): 1051-1077 (2021)