default search action
Yusuf Murat Erten
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c11]Okan Yaman, Tolga Ayav, Yusuf Murat Erten:
A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming. ISDFS 2023: 1-5 - 2022
- [j6]Serhat Caner, Nesli Erdogmus, Yusuf Murat Erten:
Performance analysis and feature selection for network-based intrusion detectionwith deep learning. Turkish J. Electr. Eng. Comput. Sci. 30(3): 629-643 (2022) - 2020
- [j5]Rowanda Daoud Ahmed, Gökhan Dalkiliç, Yusuf Murat Erten:
DGStream: High quality and efficiency stream clustering algorithm. Expert Syst. Appl. 141 (2020) - [c10]Osman Sönmeztürk, Tolga Ayav, Yusuf Murat Erten:
Loyalty Program using Blockchain. Blockchain 2020: 509-516 - [c9]Vahid Khalilpour Akram, Yusuf Murat Erten:
Localized Identification of Malicious Nodes in Wireless Sensor Networks. SIU 2020: 1-4
2010 – 2019
- 2019
- [c8]Didem Genç, Emrah Tomur, Yusuf Murat Erten:
Context-Aware Operation-Based Access Control for Internet of Things Applications. ISNCC 2019: 1-6 - 2016
- [j4]Semra Yilmaz Tastekin, Yusuf Murat Erten, Semih Bilgen:
Accounting for Product Similarity in Software Project Duration Estimation. Int. J. Softw. Eng. Knowl. Eng. 26(1): 63-86 (2016) - 2013
- [c7]Semra Yilmaz Tastekin, Yusuf Murat Erten, Semih Bilgen:
Software Product Complexity Estimation Using Grey Measurement. EUROMICRO-SEAA 2013: 308-312
2000 – 2009
- 2008
- [c6]Süleyman Özarslan, Y. Murat Erten:
Simulation of Agilla middleware on TOSSIM. SimuTools 2008: 66 - 2007
- [c5]Emrah Tomur, Y. Murat Erten:
Tradeoff Analysis and Optimization of Security and Spatial Resolution for Sensor Networks. CISS 2007: 616-620 - [c4]Emrah Tomur, Y. Murat Erten:
Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks. WWIC 2007: 103-114 - 2006
- [j3]Emrah Tomur, Y. Murat Erten:
Application of temporal and spatial role based access control in 802.11 wireless networks. Comput. Secur. 25(6): 452-458 (2006) - [c3]Nadir Gaylani, Yusuf Murat Erten:
Handling NAT traversal and mobility for multimedia traffic. CCNC 2006: 112-116 - [c2]Süheyla Ikiz, Y. Murat Erten:
Throughput Analysis of UDP and VPN Traffic in 802.11g Networks. ISCIS 2006: 474-482 - 2005
- [j2]Y. Murat Erten, Refik Güllü, Haldun Süral, Sinan Neftci:
A Knapsack Model for Bandwidth Management of Prerecorded Multiple MPEG Video Sources. Telecommun. Syst. 28(1): 101-116 (2005) - 2003
- [c1]Hayrettin Genel, Y. Murat Erten:
An End-to-End QoS Control Scheme for Video Transmission over Internet. ISCC 2003: 881-886 - 2000
- [j1]Y. Murat Erten, Refik Güllü, Sinan Neftci:
Cell-loss control in multiplexing of VBR video over ATM networks. Telecommun. Syst. 15(3-4): 405-416 (2000)
1990 – 1999
- 1997
- [b1]Yusuf Murat Erten:
Traffic management of MPEG coded video in ATM networks (ATM ağlarında MPEG standartlarına göre kodlanmış video trafiğinin denetimi). Middle East Technical University, Turkey, 1997
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint