Login / Signup
Devrim Unal
ORCID
Publication Activity (10 Years)
Years Active: 2006-2024
Publications (10 Years): 25
Top Topics
Healthcare Systems
Malware Detection
Machine Learning
Recent Advances
Top Venues
CoRR
ICFNDS
IEEE Access
ICIoT
</>
Publications
</>
Faria Nawshin
,
Radwa Gad
,
Devrim Unal
,
Abdulla Khalid Al-Ali
,
Ponnuthurai N. Suganthan
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey.
Comput. Electr. Eng.
117 (2024)
Zina Chkirbene
,
Ala Gouissem
,
Ridha Hamila
,
Devrim Unal
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies.
CoRR
(2024)
Faria Nawshin
,
Devrim Unal
,
Mohammad Hammoudeh
,
Ponnuthurai N. Suganthan
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks.
Ad Hoc Networks
161 (2024)
Faria Nawshin
,
Romain Arnal
,
Devrim Unal
,
Ponnuthurai N. Suganthan
,
Lionel Touseau
Assessing the Effect of Model Poisoning Attacks on Federated Learning in Android Malware Detection.
AICCONF
(2024)
Zina Chkirbene
,
Ridha Hamila
,
Devrim Unal
,
Moncef Gabbouj
,
Mounir Hamdi
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring.
IEEE Open J. Commun. Soc.
5 (2024)
Ali Ghubaish
,
Tara Salman
,
Maede Zolanvari
,
Devrim Unal
,
Abdulla K. Al-Ali
,
Raj Jain
Recent Advances in the Internet of Medical Things (IoMT) Systems Security.
CoRR
(2023)
Ferhat Özgür Çatak
,
Murat Kuzlu
,
Evren Çatak
,
Umit Cali
,
Devrim Unal
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction.
Phys. Commun.
52 (2022)
Mohammed Zubair
,
Ali Ghubaish
,
Devrim Unal
,
Abdulla K. Al-Ali
,
Thomas Reimann
,
Guillaume Alinier
,
Mohammad Hammoudeh
,
Junaid Qadir
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System.
Sensors
22 (21) (2022)
Lav Gupta
,
Tara Salman
,
Ali Ghubaish
,
Devrim Unal
,
Abdulla Khalid Al-Ali
,
Raj Jain
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach.
Appl. Soft Comput.
118 (2022)
Zebo Yang
,
Ali Ghubaish
,
Devrim Unal
,
Raj Jain
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks.
Wirel. Commun. Mob. Comput.
2021 (2021)
Ibrahim A. Elgendy
,
Ammar Muthanna
,
Mohammad Hammoudeh
,
Hadil Shaiba
,
Devrim Unal
,
Mashael Khayyat
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing.
Big Data
9 (4) (2021)
Devrim Unal
,
Mohammad Hammoudeh
,
Muhammad Asif Khan
,
Abdelrahman Abuarqoub
,
Gregory Epiphaniou
,
Ridha Hamila
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things.
Comput. Secur.
109 (2021)
Devrim Unal
,
Abdulla K. Al-Ali
,
Ferhat Özgür Çatak
,
Mohammad Hammoudeh
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption.
Future Gener. Comput. Syst.
125 (2021)
Mohammad Hammoudeh
,
Bamidele Adebisi
,
Devrim Unal
,
Abdelkader Laouid
Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts.
ICFNDS
(2021)
Ali Ghubaish
,
Tara Salman
,
Maede Zolanvari
,
Devrim Unal
,
Abdulla K. Al-Ali
,
Raj Jain
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security.
IEEE Internet Things J.
8 (11) (2021)
Mohammad Noorizadeh
,
Mohammad Shakerpour
,
Nader Meskin
,
Devrim Unal
,
Khashayar Khorasani
A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed.
IEEE Access
9 (2021)
Ula Hijawi
,
Devrim Unal
,
Ridha Hamila
,
Adel Gastli
,
Omar Ellabban
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices.
IEEE Access
9 (2021)
Sara Zainaa
,
Shima Sadaf
,
Ansaruddin Kunjuc
,
Mohammad Meraj
,
Devrim Unal
,
Farid Touati
Statistical Assessment of Renewable Energy Generation in Optimizing Qatar Green Buildings.
CoRR
(2021)
Mahima Aggarwal
,
Mohammed Zubair
,
Devrim Unal
,
Abdulla K. Al-Ali
,
Thomas Reimann
,
Guillaume Alinier
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System.
ICFNDS
(2021)
Ula Hijawi
,
Adel Gastli
,
Ridha Hamila
,
Omar Ellabban
,
Devrim Unal
Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT.
ICIoT
(2020)
Anar A. Hady
,
Ali Ghubaish
,
Tara Salman
,
Devrim Unal
,
Raj Jain
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study.
IEEE Access
8 (2020)
Devrim Unal
,
Mohammad Hammoudeh
,
Mehmet Sabir Kiraz
Policy specification and verification for blockchain and smart contracts in 5G networks.
ICT Express
6 (1) (2020)
Tara Salman
,
Ali Ghubaish
,
Devrim Unal
,
Raj Jain
Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications.
IEEE Netw. Lett.
2 (4) (2020)
Ula Hijawi
,
Devrim Unal
,
Ridha Hamila
,
Adel Gastli
,
Omar Ellabban
Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms.
ICIoT
(2020)
Mohammed Zubair
,
Devrim Unal
,
Abdulla K. Al-Ali
,
Abdullatif Shikfa
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
ICFNDS
(2019)
Kemal Bicakci
,
Devrim Unal
,
Nadir Ascioglu
,
Oktay Adalier
Mobile Authentication Secure against Man-in-the-Middle Attacks.
MobileCloud
(2014)
Kemal Bicakci
,
Devrim Unal
,
Nadir Ascioglu
,
Oktay Adalier
Mobile Authentication Secure Against Man-In-The-Middle Attacks.
FNC/MobiSPC
(2014)
Devrim Unal
,
Mehmet Ufuk Çaglayan
A formal role-based access control model for security policies in multi-domain mobile networks.
Comput. Networks
57 (1) (2013)
Devrim Unal
,
M. Ufuk Çaglayan
XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks.
Secur. Commun. Networks
6 (12) (2013)
Devrim Unal
,
Ozan Akar
,
M. Ufuk Çaglayan
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus.
MMM-ACNS
(2010)
Devrim Unal
,
M. Ufuk Çaglayan
Theorem proving for modeling and conflict checking of authorization policies.
ISCN
(2006)