Erten, Yusuf Murat

Loading...
Name Variants
Erten, Yusuf
Erten, Yusuf M.
Erten, Yusuf Murat
Murat Erten, Y.
Erten, Y. M.
Erten, Murat
Erten, Y. Murat
Erten, YM
Job Title
Email Address
Main Affiliation
03.04. Department of Computer Engineering
Status
Former Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
0
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
0
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
1
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
0
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
0
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
10
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
0
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
0
Research Products
CLIMATE ACTION13
CLIMATE ACTION
0
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
0
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
0
Research Products
Documents

34

Citations

184

h-index

6

Documents

22

Citations

73

Scholarly Output

21

Articles

4

Views / Downloads

63747/69046

Supervised MSc Theses

8

Supervised PhD Theses

1

WoS Citation Count

32

Scopus Citation Count

60

Patents

0

Projects

0

WoS Citations per Publication

1.52

Scopus Citations per Publication

2.86

Open Access Source

20

Supervised Theses

9

JournalCount
12th Turkish National Software Engineering Symposium, UYMS 20182
Turkish Journal of Electrical Engineering and Computer Sciences2
2019 International Symposium on Networks, Computers and Communications (ISNCC)1
2020 IEEE International Conference on Blockchain (Blockchain 2020)1
3rd International Informatics and Software Engineering Conference, IISEC 20221
Current Page: 1 / 2

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 21
  • Doctoral Thesis
    Location Privacy in Cellular Networks
    (01. Izmir Institute of Technology, 2022) Yaman, Okan; Ayav, Tolga; Erten, Yusuf Murat; Ayav, Tolga; Erten, Yusuf Murat
    Many third-party utilities and applications that run on devices used in cellular networks keep track of our location data and share it. This vulnerability affects even the subscribers who use dumbphones. This thesis defines three location tracing attacks which are based on utilizing the background data and compares them with the most relevant known attacks. We have demonstrated that any attacker who knows two associated cells of a subscriber with adequate background data can deduce the intermediate cell IDs. Also, utilizing the Hidden Markov Model (HMM) increases the accuracy of an attack. In this dissertation, we introduced novel accuracy metrics for all the anticipated attacks and exploited these for detailed analysis of the threats in a real-life case, a 5G network. This work demonstrates improvements in the current privacy-preserving methods, including adaptation to 5G, and provides insights into preventing this location privacy breach. Various methods have been proposed to overcome these threats and preserve privacy against possible attacks based on this information. A friendly jamming (FJ) based solution, which offers efficient usage of resources, including computing power and energy, was introduced as a solution for these problems. However, one of the tradeoffs of FJ is its viability. Although some studies try to cope with this challenge, they are complicated and focus on old technologies. We propose a lightweight and flexible FJ scheme to address these challenges. We also demonstrate that our model has the same performance as one of the mentioned studies above in a more straightforward way.
  • Master Thesis
    A framework for generalized syllogisms
    (Izmir Institute of Technology, 2018) Çine, Ersin; Erten, Yusuf Murat
    Reasoning is an indispensable action both for natural intelligence and for artificial intelligence. In automated reasoning, relatively expressive logics are used to define and derive complex facts about the real world. Many facts cannot be expressed in inexpressive logics such as syllogistic logic and thus, those logics are naturally ignored for automated reasoning. Despite their inexpressiveness, logics with intuitive propositions can provide two advantages: favorable complexity properties for reasoning tasks, and better correspondence with the natural language statements. Syllogistic logic, the first known formal logic in history, is so intuitive that it is often studied by cognitive scientists in order to understand and model human reasoning. The problem is that its syntax and semantics do not allow for representing much knowledge. Hence, propositions of syllogistic logic should be generalized with useful extensions without sacrificing the advantageous properties much. The aim of this thesis work is to bridge the gap between syllogistic reasoning and automated reasoning via designing the underlying logic and framework for performing time-efficient fully-automated deduction over generalized syllogistic propositions. In this thesis work, we define a practical family of generalized syllogistic logics, reveal the theoretical properties of those logics and their relationships with some other logics, and specify comprehensive frameworks with alternative representations and methods.
  • Conference Object
    Citation - Scopus: 4
    Survey: Running and Comparing Stream Clustering Algorithms
    (CEUR Workshop Proceedings, 2018) Ahmed, Rowanda D.; Dalkılıç, Gökhan; Erten, Murat
    Recently, clustering data streams have become an incredibly important research area for knowledge discovery as applications produce more and more unstoppable streaming data. In this paper we introduce clustering, streams and data streaming clustering algorithms, as well as discussions of the most important stream clustering algorithms, considering their structure. As an additional contribution of our work and differently from review and survey papers in stream clustering, we offer the practical part of the most known stream clustering algorithms, namely: (i) CluStream; (ii) DenStream; (iii) D-Stream; and (iv) ClusTree, showing their experimental results along with some performance metrics computation of for each, depending on MOA framework.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 3
    Secure Iot Update Using Blockchain
    (IEEE, 2021) Kaptan, Melike; Tomur, Emrah; Ayav, Tolga; Erten, Yusuf Murat
    In this study a platform is devised to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, blockchain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on Inter Planetary File System (IPFS) and send the meta-data and hashes of their software to the blockchain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are the members of the blockchain and the IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data kept on the blockchain, and they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform, gateway update operations are handled as transactions in a second blockchain network which is the clockchain of the gateways. The system was implemented as of the two separate blockchain networks and it has been shown that, despite the calculation overhead of the member devices, by separating the functions between the two blockchain networks a more reliable and secure platform can be achieved.
  • Conference Object
    Citation - Scopus: 2
    Deception Through Cloning Against Web Site Attacks
    (Institute of Electrical and Electronics Engineers Inc., 2021) Arslan,M.; Carikci,B.; Erten,Y.M.
    In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the attacker to this cloned web page. Intrusion detection system (IDS) is used for detecting the attacks and Docker is used as the virtualization technology to create the cloned web site. While the intruder is connected to the clone, information is gathered on her/his activities. The system is implemented and tested for different attack types, and performance measurements were carried out. The results show that the system implementation for static pages is feasible and the system performance is not significantly affected. © 2021 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 3
    Context-Aware Operation-Based Access Control for Internet of Things Applications
    (Institute of Electrical and Electronics Engineers Inc., 2019) Genç, Didem; Tomur, Emrah; Erten, Yusuf Murat
    Recently, interest of both the academic and industrial world in Internet of Things (IoT) has been increasing and this trend requires development of new security approaches addressing potential weaknesses in this domain. Despite the presence of many studies directed towards security of IoT applications, they are mostly adoption of current methods to IoT scenarios. Yet, IoT applications are comprised of various kinds of different entities including computers, processes, people and services. Therefore, it is inadequate to detect malicious attempts by using conventional security methods, which apply fixed security policies and do not take interaction of things, that is context information, into account. In this study, by considering new security requirements of next generation IoT applications, we propose a fine-grained, dynamic and easily manageable access control model, which is called context-aware operation-based access control.
  • Master Thesis
    Blackhole Attacks in Iot Networks
    (01. Izmir Institute of Technology, 2020) Sokat, Barış; Ayav, Tolga; Erten, Yusuf Murat
    IoT technologies are very popular today, and they are used in almost every field. Therefore, the number of IoT devices used is increasing day by day. Like every field in computer networks, security is quite important in IoT networks. However, the resource-constrained nature of IoT devices makes the study of security measures for IoT networks very challenging. In the literature research conducted before this thesis study, it was seen that it can perform a wide variety of RPL-based attacks on IoT networks. One of these attacks is the blackhole attack. Although the black hole attack is functionally simple, the damage it causes in the network can be extremely destructive. As far as it is known, in addition to the limited number of studies in this field of attack, the black hole attack used in the studies in this field has also basic features. The basic feature mentioned here is that the attacker node that will perform a black hole attack drops all the packets that come to it. When the attacker node drops all incoming packets, it causes the topology to change in the network, the number of control messages to increase and the attacker node to be isolated from the network in a short time. However, blackhole attack can be combined with different attacks. Therefore, in this thesis, the node that will perform the black hole attack is designed to allow control messages to pass, while dropping all other packets. Here, it is aimed that the attacker node remains on the network for a longer time. As a result, as long as the attacker node is active, it will be able to drop more packets and the number of control messages in the network will be controlled since the topology does not change. With the black hole attack developed as a result of the simulation tests, the number of control messages released in the network was taken under control and it was observed that the attacker node could remain in the network throughout the simulation period. Thus, the effect of different types of black hole attacks on the network that can be developed has been revealed.
  • Master Thesis
    Context Aware Role Based Access Control Model for Internet of Things Applications
    (Izmir Institute of Technology, 2018) Genç, Didem; Erten, Yusuf Murat; Tomur, Emrah
    As the day goes on, both the academic and industrial studies related with IoT is increasing with the advance of technology, and this progresses require development of new security approaches aiming this domain. Despite the presence of many studies interested in security of IoT applications, they are just the implementation of currently security methods to IoT scenarios. IoT applications contain the interaction of different kinds of vast amount of thing(computer, process, people, service etc.). Therefore it is going to be inadequate and inefficient to try defining the interaction between these things, and providing security through execution of predefined static security policies. By considering these problems, we can conclude that new generation IoT needs an security mechanism which must offer fine-grained and dynamic access control. In the scope of this thesis, we design a context-aware role based access control model that provides dynamism by using attribute based access control model’s attribute function, and fine-granularity with usage of context term, by considering the security needs of IoT domain.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Accounting for Product Similarity in Software Project Duration Estimation
    (World Scientific Publishing Co. Pte Ltd, 2016) Taştekin, Semra Yılmaz; Erten, Yusuf Murat; Bilgen, Semih
    We extend an existing model proposed for estimating project duration for industrial projects in general, to software intensive systems projects. We show, through nine different cases studies from different sectors, that product similarity, measured in terms of requirements reuse, can be incorporated into that model to improve its applicability in software intensive systems projects.
  • Conference Object
    Citation - Scopus: 3
    A Novel Countermeasure for Selective Forwarding Attacks in Iot Networks
    (IEEE, 2022) Yaman, Okan; Sokat, Barış; Ayav, Tolga; Erten, Yusuf Murat
    As the Internet of Things (IoT) devices become more widespread there are rising public concerns about whether or not IoT devices and their services are secure. One of the major threats they face is selective forwarding attacks performed by malicious nodes. Although packets can be lost inherently due to network conditions, malicious nodes, such as those performing blackhole attacks, may deliberately drop some, but not all of them. Therefore, distinguishing these nodes from legitimate ones is not so easy. This study has proposed a lightweight countermeasure to deal with this kind of attack in IoT networks, using the standard IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The mechanism is based on Mobile Trusted Nodes (MTNs). For the given threat model, we showed that our model has robust detection accuracy and brings no additional overhead to the network. © 2022 IEEE.