default search action
Mustafa Aydin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Mustafa Aydin, Nazim I. Mahmudov:
Relative controllability of nonlinear delayed multi-agent systems. Int. J. Control 97(2): 348-357 (2024) - [j6]Mustafa Aydin, Nazim I. Mahmudov:
The Sequential Conformable Langevin-Type Differential Equations and Their Applications to the RLC Electric Circuit Problems. J. Appl. Math. 2024: 3680383:1-3680383:14 (2024) - [j5]Ahmet Topal, Mustafa Aydin:
A couple of novel image enhancement methods depending on the Prabhakar fractional approaches. Signal Image Video Process. 18(12): 9241-9256 (2024) - 2022
- [b1]Mustafa Aydin:
Sahte internet sitelerinin URL özellikleri temelinde tespit edilmesi amacıyla özellik seçme metotlarının ve öğrenme algoritmalarının analizi (Analysis of feature selection methods and learning algorithms for phishing websites detection based on URL). İstanbul University, Turkey, 2022 - [j4]Mustafa Aydin:
A multilevel modeling approach to investigating factors impacting computer and information literacy: ICILS Korea and Finland sample. Educ. Inf. Technol. 27(2): 1675-1703 (2022) - 2021
- [j3]Firat Hardalaç, Mustafa Aydin, Ugurhan Kutbay, Kubilay Ayturan, Anil Akyel, Atika Çaglar, Bo Hai, Fatih Mert:
Classification of neonatal jaundice in mobile application with noninvasive image processing methods. Turkish J. Electr. Eng. Comput. Sci. 29(4): 2116-2126 (2021) - [j2]Mustafa Aydin:
Does the digital divide matter? Factors and conditions that promote ICT literacy. Telematics Informatics 58: 101536 (2021) - [c7]Faik Kerem Örs, Mustafa Aydin, Aysu Bogatarkan, Albert Levi:
Scalable Wi-Fi Intrusion Detection for IoT Systems. NTMS 2021: 1-6 - 2020
- [c6]Mustafa Aydin, Ismail Butun, Kemal Bicakci, Nazife Baykal:
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs. CCWC 2020: 774-779
2010 – 2019
- 2016
- [j1]Mustafa Aydin, Firat Hardalaç, Berkan Ural, Serhat Karap:
Neonatal Jaundice Detection System. J. Medical Syst. 40(7): 166:1-166:11 (2016) - [c5]Mustafa Aydin, Jeremy L. Jacob:
Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model. EISIC 2016: 45-51 - 2015
- [c4]Mustafa Aydin, Nazife Baykal:
Feature extraction and classification phishing websites based on URL. CNS 2015: 769-770 - [c3]Mustafa Aydin, Jeremy L. Jacob:
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems. EISIC 2015: 53-60 - [i1]Selma Dilek, Hüseyin Çakir, Mustafa Aydin:
Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. CoRR abs/1502.03552 (2015) - 2014
- [c2]Mustafa Aydin, Jeremy Jacob:
Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors. CLOSER 2014: 604-609 - 2013
- [c1]Mustafa Aydin, Jeremy Jacob:
A comparison of major issues for the development of forensics in cloud computing. ICITST 2013: 77-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint