Follow
Pinar Comak
Pinar Comak
Ericsson Research Security
Verified email at ericsson.com
Title
Cited by
Cited by
Year
Vulnerability prediction from source code using machine learning
Z Bilgin, MA Ersoy, EU Soykan, E Tomur, P Çomak, L Karaçay
IEEE Access 8, 150672-150684, 2020
922020
A network-based positioning method to locate false base stations
L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ...
IEEE Access 9, 111368-111382, 2021
162021
SoK: Investigation of security and functional safety in industrial IoT
E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
72021
Context-aware authentication with dynamic credentials using electricity consumption data
E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ...
The Computer Journal 65 (10), 2631-2640, 2022
42022
A Security-Friendly Privacy Solution for Federated Learning.
F Karakoç, L Karaçay, P Çomak, U Gülen, R Fuladi, EU Soykan
AI6G@ WCCI, 2022
32022
New cubic self-dual codes of length 54, 60 and 66
P Çomak, JL Kim, F Özbudak
Applicable Algebra in Engineering, Communication and Computing 29, 303-312, 2018
32018
On the parity of power permutations
P Çomak, F Özbudak
IEEE Access 9, 106806-106812, 2021
22021
Methods of evaluating source code using numeric array representations of source code elements
Z Bilgin, EU Soykan, MA Ersoy, E Tomur, P Comak, L Karacay
US Patent App. 17/797,747, 2023
12023
A security-friendly privacy-preserving solution for federated learning
F Karakoç, L Karaçay, P Comak De Cnudde, U Gülen, R Fuladi, ...
Computer Communications, 2023
12023
Profiling developers to predict vulnerable code changes
T Coskun, R Halepmollasi, K Hanifi, RF Fouladi, PC De Cnudde, A Tosun
Proceedings of the 18th International Conference on Predictive Models and …, 2022
12022
Method and System for Data Access Authorization Via a Data Collection Coordination Function
P Comak, C Jost, F Karakoc, U Mattsson, Z Fu
US Patent App. 18/259,926, 2024
2024
Secure data collection in fifth generation system (5gs)
Z Fu, P Comak, U Mattsson, MBP Marcos
US Patent App. 18/266,295, 2024
2024
Handling a request to initiate a call
Z Bilgin, F Karakoc, E Tomur, EU Soykan, L Karacay, MA Ersoy, P Comak
US Patent App. 18/018,643, 2023
2023
Mathematical countermeasures against implementationattacks
P Çomak
Uygulamalı Matematik Enstitüsü, 2020
2020
Network Coding, Side Channel Attacks, and Finite Field Arithmetics
F Özbudak, K Otal, K Kaytanci, D Çenesiz
2018
ARC İNŞAALARI VE WEİERSTASS NOKTALARININ KODLAMA TEORİSİNE VE KRİPTOGRAFİYE UYGULAMALARI
K Otal, L Aybak, F Özbudak, P Çomak, A Sınak
2017
Boole Fonksiyonlara Matematiksel Bakış, Kodlama Teorisi, Sonlu Cisimler Üzerinde Cebirsel Eğriler
F Özbudak, K Otal, E Tekin, P Çomak
2017
Yan Kanal Analizi, Aritmetik Karmaşıklık, Alt Uzay Kodlar, Diziler ve Boole Fonksiyonlar
F Özbudak, E Tekin, A Sınak, M Cenk, P Çomak
2016
SOME NEW QUASI-CYCLIC SELF-DUAL CODES
P Çomak, JL Kim, F Özbudak
2016
BOOLE FONKSİYONLARI, KODLAMA TEORİSİ VE KRİPTOGRAFİ
F Özbudak, C Tezcan, P Çomak, E Tekin, M Cenk
2015
The system can't perform the operation now. Try again later.
Articles 1–20