Ensar Gul
Cited by
Cited by
Deep Learning for Detection of Routing Attacks in the Internet of Things
FY Yavuz, D Ünal, E Gül
İnternational Journal of Computational Intelligence Systems 121 (1), 39-58, 2018
Detection of attack-targeted scans from the Apache HTTP Server access logs
MB Seyyar, FÖ Çatak, E Gül
Applied Computing and Informatics 14 (1), 28-36, 2018
Design and simulation of a fuzzy controller for fed-batch yeast fermentation
N Besli, M Türker, E Gul
Bioprocess Engineering 13, 141-148, 1995
Classification of methamorphic malware with deep learning (LSTM)
AF Yazi, FÖ Çatak, E Gül
2019 27th signal processing and communications applications conference (SIU …, 2019
Tracking Multiple Targets using parallel processing
DP Atherton, E Gul, A Kountzeris, MM Kharbouch
Control Theory and Applications, IEE Proceedings D 137 (4), 225-234, 1990
Preventing Data Poisoning Attacks By Using Generative Models
M Aladag, FO Catak, E Gul
2019 1st International Informatics and Software Engineering Conference (UBMYK), 2019
On the track similarity test in track splitting algorithm
E Gul
IEEE transactions on aerospace and electronic systems 30 (2), 604-606, 1994
Transputer implementation for multiple target tracking
E Gul, DP Atherton
Microprocessors and Microsystems 13 (3), 188-194, 1989
Neural network-based approaches for predicting query response times
EE Yusufoglu, M Ayyildiz, E Gul
2014 International Conference on Data Science and Advanced Analytics (DSAA …, 2014
Target tracking using transputers as parallel processors
DP Atherton, DMA Hussain, E Gul
IFAC Proceedings Volumes 24 (3), 1031-1036, 1991
Comparison of digital audio watermarking techniques for the security of voip communications
FÇ Er, E Gul
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
Using xp in telecommunication software development
E Gul, T Sekerci, AC Yücetürk, Ü Yildirim
2008 The Third International Conference on Software Engineering Advances …, 2008
Incrementing adversarial robustness with autoencoding for machine learning model attacks
S Sivaslıoğlu, FÖ Çatak, E Gül
2019 27th Signal Processing and Communications Applications Conference (SIU …, 2019
Sensor Based Cyber Attack Detections in Critical Infrastructures Using Deep Learning Algorithms
FO Catak, M Yılmaz, E Gul
Computer Science 20 (2), 213-244, 2019
VoIP Integration For Mobile Ride-sharing Application
MB Amasyali, E Gul
VoIP integration for mobile ride-sharing application MB Amasyali, E Gul 2017 …, 2017
Application of fuzzy control to fed-batch yeast fermentation
N Besli, E Gul, M Turker
Computational Intelligence Theory and Applications, 207-216, 1997
Karaca, Muhammet, ve Gül, Ensar. Kritik Altyapılara Yönelik Bilişim Suçları, Türkiye ve AB Uygulamaları
M Karaca, E Gül
Bilişim Hukuku Dergisi 3 3 (1), 1-30, 2021
Network Anomaly Detection With Convolutional Neural Network Based Auto Encoders
B Kızıltaş, E Gül
2020 28th Signal Processing and Communications Applications Conference (SIU …, 2020
A Fuzzy System Model for Task Implementation in Extreme Programming Process
E Gul
Third International Conference on Software, Services and Semantic …, 2011
An investigation of the use of transputers in target tracking
E Gul
University of Sussex, 1989
The system can't perform the operation now. Try again later.
Articles 1–20