Erten, Yusuf Murat
Loading...
Profile URL
Name Variants
Erten, Yusuf
Erten, Yusuf M.
Erten, Yusuf Murat
Murat Erten, Y.
Erten, Y. M.
Erten, Murat
Erten, Y. Murat
Erten, YM
Erten, Yusuf M.
Erten, Yusuf Murat
Murat Erten, Y.
Erten, Y. M.
Erten, Murat
Erten, Y. Murat
Erten, YM
Job Title
Email Address
Main Affiliation
03.04. Department of Computer Engineering
Status
Former Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Sustainable Development Goals
1NO POVERTY
0
Research Products
2ZERO HUNGER
0
Research Products
3GOOD HEALTH AND WELL-BEING
0
Research Products
4QUALITY EDUCATION
1
Research Products
5GENDER EQUALITY
0
Research Products
6CLEAN WATER AND SANITATION
0
Research Products
7AFFORDABLE AND CLEAN ENERGY
0
Research Products
8DECENT WORK AND ECONOMIC GROWTH
0
Research Products
9INDUSTRY, INNOVATION AND INFRASTRUCTURE
10
Research Products
10REDUCED INEQUALITIES
0
Research Products
11SUSTAINABLE CITIES AND COMMUNITIES
0
Research Products
12RESPONSIBLE CONSUMPTION AND PRODUCTION
0
Research Products
13CLIMATE ACTION
0
Research Products
14LIFE BELOW WATER
0
Research Products
15LIFE ON LAND
0
Research Products
16PEACE, JUSTICE AND STRONG INSTITUTIONS
0
Research Products
17PARTNERSHIPS FOR THE GOALS
0
Research Products

Documents
34
Citations
184
h-index
6

Documents
22
Citations
73

Scholarly Output
21
Articles
4
Views / Downloads
63747/69046
Supervised MSc Theses
8
Supervised PhD Theses
1
WoS Citation Count
32
Scopus Citation Count
60
Patents
0
Projects
0
WoS Citations per Publication
1.52
Scopus Citations per Publication
2.86
Open Access Source
20
Supervised Theses
9
| Journal | Count |
|---|---|
| 12th Turkish National Software Engineering Symposium, UYMS 2018 | 2 |
| Turkish Journal of Electrical Engineering and Computer Sciences | 2 |
| 2019 International Symposium on Networks, Computers and Communications (ISNCC) | 1 |
| 2020 IEEE International Conference on Blockchain (Blockchain 2020) | 1 |
| 3rd International Informatics and Software Engineering Conference, IISEC 2022 | 1 |
Current Page: 1 / 2
Scopus Quartile Distribution
Competency Cloud

21 results
Scholarly Output Search Results
Now showing 1 - 10 of 21
Doctoral Thesis Location Privacy in Cellular Networks(01. Izmir Institute of Technology, 2022) Yaman, Okan; Ayav, Tolga; Erten, Yusuf Murat; Ayav, Tolga; Erten, Yusuf MuratMany third-party utilities and applications that run on devices used in cellular networks keep track of our location data and share it. This vulnerability affects even the subscribers who use dumbphones. This thesis defines three location tracing attacks which are based on utilizing the background data and compares them with the most relevant known attacks. We have demonstrated that any attacker who knows two associated cells of a subscriber with adequate background data can deduce the intermediate cell IDs. Also, utilizing the Hidden Markov Model (HMM) increases the accuracy of an attack. In this dissertation, we introduced novel accuracy metrics for all the anticipated attacks and exploited these for detailed analysis of the threats in a real-life case, a 5G network. This work demonstrates improvements in the current privacy-preserving methods, including adaptation to 5G, and provides insights into preventing this location privacy breach. Various methods have been proposed to overcome these threats and preserve privacy against possible attacks based on this information. A friendly jamming (FJ) based solution, which offers efficient usage of resources, including computing power and energy, was introduced as a solution for these problems. However, one of the tradeoffs of FJ is its viability. Although some studies try to cope with this challenge, they are complicated and focus on old technologies. We propose a lightweight and flexible FJ scheme to address these challenges. We also demonstrate that our model has the same performance as one of the mentioned studies above in a more straightforward way.Master Thesis A framework for generalized syllogisms(Izmir Institute of Technology, 2018) Çine, Ersin; Erten, Yusuf MuratReasoning is an indispensable action both for natural intelligence and for artificial intelligence. In automated reasoning, relatively expressive logics are used to define and derive complex facts about the real world. Many facts cannot be expressed in inexpressive logics such as syllogistic logic and thus, those logics are naturally ignored for automated reasoning. Despite their inexpressiveness, logics with intuitive propositions can provide two advantages: favorable complexity properties for reasoning tasks, and better correspondence with the natural language statements. Syllogistic logic, the first known formal logic in history, is so intuitive that it is often studied by cognitive scientists in order to understand and model human reasoning. The problem is that its syntax and semantics do not allow for representing much knowledge. Hence, propositions of syllogistic logic should be generalized with useful extensions without sacrificing the advantageous properties much. The aim of this thesis work is to bridge the gap between syllogistic reasoning and automated reasoning via designing the underlying logic and framework for performing time-efficient fully-automated deduction over generalized syllogistic propositions. In this thesis work, we define a practical family of generalized syllogistic logics, reveal the theoretical properties of those logics and their relationships with some other logics, and specify comprehensive frameworks with alternative representations and methods.Conference Object Citation - Scopus: 4Survey: Running and Comparing Stream Clustering Algorithms(CEUR Workshop Proceedings, 2018) Ahmed, Rowanda D.; Dalkılıç, Gökhan; Erten, MuratRecently, clustering data streams have become an incredibly important research area for knowledge discovery as applications produce more and more unstoppable streaming data. In this paper we introduce clustering, streams and data streaming clustering algorithms, as well as discussions of the most important stream clustering algorithms, considering their structure. As an additional contribution of our work and differently from review and survey papers in stream clustering, we offer the practical part of the most known stream clustering algorithms, namely: (i) CluStream; (ii) DenStream; (iii) D-Stream; and (iv) ClusTree, showing their experimental results along with some performance metrics computation of for each, depending on MOA framework.Conference Object Citation - WoS: 2Citation - Scopus: 3Secure Iot Update Using Blockchain(IEEE, 2021) Kaptan, Melike; Tomur, Emrah; Ayav, Tolga; Erten, Yusuf MuratIn this study a platform is devised to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, blockchain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on Inter Planetary File System (IPFS) and send the meta-data and hashes of their software to the blockchain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are the members of the blockchain and the IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data kept on the blockchain, and they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform, gateway update operations are handled as transactions in a second blockchain network which is the clockchain of the gateways. The system was implemented as of the two separate blockchain networks and it has been shown that, despite the calculation overhead of the member devices, by separating the functions between the two blockchain networks a more reliable and secure platform can be achieved.Conference Object Citation - Scopus: 2Deception Through Cloning Against Web Site Attacks(Institute of Electrical and Electronics Engineers Inc., 2021) Arslan,M.; Carikci,B.; Erten,Y.M.In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the attacker to this cloned web page. Intrusion detection system (IDS) is used for detecting the attacks and Docker is used as the virtualization technology to create the cloned web site. While the intruder is connected to the clone, information is gathered on her/his activities. The system is implemented and tested for different attack types, and performance measurements were carried out. The results show that the system implementation for static pages is feasible and the system performance is not significantly affected. © 2021 IEEE.Conference Object Citation - WoS: 1Citation - Scopus: 3Context-Aware Operation-Based Access Control for Internet of Things Applications(Institute of Electrical and Electronics Engineers Inc., 2019) Genç, Didem; Tomur, Emrah; Erten, Yusuf MuratRecently, interest of both the academic and industrial world in Internet of Things (IoT) has been increasing and this trend requires development of new security approaches addressing potential weaknesses in this domain. Despite the presence of many studies directed towards security of IoT applications, they are mostly adoption of current methods to IoT scenarios. Yet, IoT applications are comprised of various kinds of different entities including computers, processes, people and services. Therefore, it is inadequate to detect malicious attempts by using conventional security methods, which apply fixed security policies and do not take interaction of things, that is context information, into account. In this study, by considering new security requirements of next generation IoT applications, we propose a fine-grained, dynamic and easily manageable access control model, which is called context-aware operation-based access control.Master Thesis Blackhole Attacks in Iot Networks(01. Izmir Institute of Technology, 2020) Sokat, Barış; Ayav, Tolga; Erten, Yusuf MuratIoT technologies are very popular today, and they are used in almost every field. Therefore, the number of IoT devices used is increasing day by day. Like every field in computer networks, security is quite important in IoT networks. However, the resource-constrained nature of IoT devices makes the study of security measures for IoT networks very challenging. In the literature research conducted before this thesis study, it was seen that it can perform a wide variety of RPL-based attacks on IoT networks. One of these attacks is the blackhole attack. Although the black hole attack is functionally simple, the damage it causes in the network can be extremely destructive. As far as it is known, in addition to the limited number of studies in this field of attack, the black hole attack used in the studies in this field has also basic features. The basic feature mentioned here is that the attacker node that will perform a black hole attack drops all the packets that come to it. When the attacker node drops all incoming packets, it causes the topology to change in the network, the number of control messages to increase and the attacker node to be isolated from the network in a short time. However, blackhole attack can be combined with different attacks. Therefore, in this thesis, the node that will perform the black hole attack is designed to allow control messages to pass, while dropping all other packets. Here, it is aimed that the attacker node remains on the network for a longer time. As a result, as long as the attacker node is active, it will be able to drop more packets and the number of control messages in the network will be controlled since the topology does not change. With the black hole attack developed as a result of the simulation tests, the number of control messages released in the network was taken under control and it was observed that the attacker node could remain in the network throughout the simulation period. Thus, the effect of different types of black hole attacks on the network that can be developed has been revealed.Master Thesis Context Aware Role Based Access Control Model for Internet of Things Applications(Izmir Institute of Technology, 2018) Genç, Didem; Erten, Yusuf Murat; Tomur, EmrahAs the day goes on, both the academic and industrial studies related with IoT is increasing with the advance of technology, and this progresses require development of new security approaches aiming this domain. Despite the presence of many studies interested in security of IoT applications, they are just the implementation of currently security methods to IoT scenarios. IoT applications contain the interaction of different kinds of vast amount of thing(computer, process, people, service etc.). Therefore it is going to be inadequate and inefficient to try defining the interaction between these things, and providing security through execution of predefined static security policies. By considering these problems, we can conclude that new generation IoT needs an security mechanism which must offer fine-grained and dynamic access control. In the scope of this thesis, we design a context-aware role based access control model that provides dynamism by using attribute based access control model’s attribute function, and fine-granularity with usage of context term, by considering the security needs of IoT domain.Article Citation - WoS: 1Citation - Scopus: 1Accounting for Product Similarity in Software Project Duration Estimation(World Scientific Publishing Co. Pte Ltd, 2016) Taştekin, Semra Yılmaz; Erten, Yusuf Murat; Bilgen, SemihWe extend an existing model proposed for estimating project duration for industrial projects in general, to software intensive systems projects. We show, through nine different cases studies from different sectors, that product similarity, measured in terms of requirements reuse, can be incorporated into that model to improve its applicability in software intensive systems projects.Conference Object Citation - Scopus: 3A Novel Countermeasure for Selective Forwarding Attacks in Iot Networks(IEEE, 2022) Yaman, Okan; Sokat, Barış; Ayav, Tolga; Erten, Yusuf MuratAs the Internet of Things (IoT) devices become more widespread there are rising public concerns about whether or not IoT devices and their services are secure. One of the major threats they face is selective forwarding attacks performed by malicious nodes. Although packets can be lost inherently due to network conditions, malicious nodes, such as those performing blackhole attacks, may deliberately drop some, but not all of them. Therefore, distinguishing these nodes from legitimate ones is not so easy. This study has proposed a lightweight countermeasure to deal with this kind of attack in IoT networks, using the standard IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The mechanism is based on Mobile Trusted Nodes (MTNs). For the given threat model, we showed that our model has robust detection accuracy and brings no additional overhead to the network. © 2022 IEEE.
- «
- 1 (current)
- 2
- 3
- »
