default search action
Gökhan Dalkiliç
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Özlem Seker, Gökhan Dalkiliç, Umut Can Çabuk:
MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications. Sensors 23(12): 5674 (2023) - 2022
- [j16]Cem Kösemen, Gökhan Dalkiliç, Safak Öksüzer:
Performance analysis of lightweight Internet of things devices on blockchain networks. Turkish J. Electr. Eng. Comput. Sci. 30(2): 328-343 (2022) - [j15]Hakan Altas, Gökhan Dalkiliç, Umut Can Çabuk:
Data immutability and event management via blockchain in the Internet of things. Turkish J. Electr. Eng. Comput. Sci. 30(2): 451-468 (2022) - 2021
- [j14]Umut Can Çabuk, Gökhan Dalkiliç, Orhan Dagdeviren:
CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks. IEEE Access 9: 78400-78414 (2021) - 2020
- [j13]Ömer Aydin, Gökhan Dalkiliç, Cem Kösemen:
A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish J. Electr. Eng. Comput. Sci. 28(5): 3036-3051 (2020) - [j12]Rowanda Daoud Ahmed, Gökhan Dalkiliç, Yusuf Murat Erten:
DGStream: High quality and efficiency stream clustering algorithm. Expert Syst. Appl. 141 (2020)
2010 – 2019
- 2019
- [j11]Kerim Yildirim, Gökhan Dalkiliç, Nevcihan Duru:
Formally analyzed m-coupon protocol with confirmation code (MCWCC). Turkish J. Electr. Eng. Comput. Sci. 27(1): 484-498 (2019) - [j10]Alaauldin Ibrahim, Gökhan Dalkiliç:
Review of different classes of RFID authentication protocols. Wirel. Networks 25(3): 961-974 (2019) - 2018
- [j9]Necati Demir, Gökhan Dalkiliç:
Modified stacking ensemble approach to detect network intrusion. Turkish J. Electr. Eng. Comput. Sci. 26(1): 418-433 (2018) - [j8]Cem Kösemen, Gökhan Dalkiliç, Ömer Aydin:
Genetic programming-based pseudorandom number generator for wireless identification and sensing platform. Turkish J. Electr. Eng. Comput. Sci. 26(5): 2500-2511 (2018) - 2017
- [j7]Gökhan Dalkiliç, Devrim Sipahi:
Spam filtering with sender authentication network. Comput. Commun. 98: 72-79 (2017) - [j6]Umut Can Çabuk, Ömer Aydin, Gökhan Dalkiliç:
A random number generator for lightweight authentication protocols: xorshiftR+. Turkish J. Electr. Eng. Comput. Sci. 25: 4818-4828 (2017) - [j5]Suat Secgin, Gökhan Dalkiliç:
A decision support system using demographic issues: a case study in turkey. Int. Arab J. Inf. Technol. 14(3): 393-401 (2017) - [j4]Alaauldin Ibrahim, Gökhan Dalkiliç:
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP. J. Sensors 2017: 2367312:1-2367312:10 (2017) - [c16]Cem Kösemen, Gökhan Dalkiliç:
Designing a Random Number Generator for Secure Communication with WISP. ICCDA 2017: 289-292 - [c15]Ozlem Yerlikaya, Gökhan Dalkiliç:
Security of message queue telemetry transport protocol. SIU 2017: 1-4 - 2016
- [c14]Umut Can Çabuk, Rune Hylsberg Jacobsen, Gökhan Dalkiliç:
ARTMoS: An RFID tag mobility scheme with IPv6 and DNS. INISTA 2016: 1-5 - 2015
- [j3]Mehmet Suleyman Unluturk, Mehmet Hilal Özcanhan, Gökhan Dalkiliç:
Improving communication among nurses and patients. Comput. Methods Programs Biomed. 120(2): 102-112 (2015) - [j2]Devrim Sipahi, Gökhan Dalkiliç, Mehmet Hilal Özcanhan:
Detecting spam through their Sender Policy Framework records. Secur. Commun. Networks 8(18): 3555-3563 (2015) - 2014
- [j1]Mehmet Hilal Özcanhan, Gökhan Dalkiliç, Semih Utku:
Cryptographically Supported NFC Tags in Medication for Better Inpatient Safety. J. Medical Syst. 38(8): 61 (2014) - 2013
- [c13]Mehmet Hilal Özcanhan, Gökhan Dalkiliç, Semih Utku:
Is NFC a Better Option Instead of EPC Gen-2 in Safe Medication of Inpatients. RFIDSec 2013: 19-33 - 2012
- [c12]Mehmet Hilal Özcanhan, Gökhan Dalkiliç, Mesut Can Gürle:
An Ultra-Light PRNG for RFID Tags. ISCIS 2012: 231-238 - [c11]Bakytbek Eshmurzaev, Gökhan Dalkiliç:
Analysis of EAP-FAST protocol. ITI 2012: 417-422 - [c10]Devrim Sipahi, Gökhan Dalkiliç:
Determination of SPF records for the intention of sending spam. SIU 2012: 1-4 - 2010
- [c9]Farzad Kiani, Gökhan Dalkiliç:
Password Renewal Enhancement for Dynamic Authentication in Wireless Sensor Networks. CICSyN 2010: 143-146
2000 – 2009
- 2009
- [c8]Ezgi Mert, Gökhan Dalkiliç:
Word sense disambiguation for Turkish. ISCIS 2009: 205-210 - [c7]Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan:
A simple yet effective spam blocking method. SIN 2009: 179-185 - 2005
- [c6]Ebru Celikel, Mehmet Emin Dalkiliç, Gökhan Dalkiliç:
Word-Based Fixed and Flexible List Compression. ISCIS 2005: 780-790 - 2004
- [b1]Gökhan Dalkiliç:
Applying and comparing smoothing techniques to contemporary printed Turkish (Güncel basılı Türkçe\'ye düzeltme tekniklerinin uygulanması ve karşılaştırılması). Dokuz Eylül University, Turkey, 2004 - [c5]Gökhan Dalkiliç, Yalçin Çebi:
Zipf's Law and Mandelbrot's Constants for Turkish Language Using Turkish Corpus (TurCo). ADVIS 2004: 273-282 - [c4]Yalçin Çebi, Gökhan Dalkiliç:
Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCo. ITCC (2) 2004: 236-240 - [c3]Gökhan Dalkiliç, Yalçin Çebi:
Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCo. ITCC (2) 2004: 319- - 2002
- [c2]Mehmet Emin Dalkiliç, Gökhan Dalkiliç:
On the Cryptographic Patterns and Frequencies in Turkish Language. ADVIS 2002: 144-153 - [c1]Gökhan Dalkiliç, Yalçin Çebi:
A 300 MB Turkish Corpus and Word Analysis. ADVIS 2002: 205-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint