Issue Date | Title | Author(s) |
2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
2014 | The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks | Cotuk, Hüseyin; Tavlı, Bülent ; Bıçakcı, Kemal ; Akgün, Mehmet Burak |
2015 | charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
2017 | Comparison of Three Different CNN Architectures for Age Classification | Aydoğdu, Mehmet Fatih; Çelik, Vakkas; Demirci, Muhammed Fatih |
2016 | Distance Measure Functions with Enhanced Skeletal Points for 2D and 3D | Şirin, Yahya; Demirci, Muhammed Fatih |
2018 | How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification | Bıçakcı, Kemal ; Altuncu, E.; Sahkulubey, M. S.; Kızılöz, H. E.; Uzunay, Y. |
2015 | Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs | Uludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent |
2018 | Automated generation of attack graphs using NVD | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
2016 | Analysis of the Effect of Image Resolution on Automatic Face Gender and Age Classification | Cerit, Betül; Bölük, S. Arda; Demirci, Muhammed Fatih |
2014 | Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing | Uzunay, Yusuf; Bıçakcı, Kemal |
2014 | Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
2016 | Efficient Near-duplicate Image Detection with Created Feature Subset | Yıldız, Burak; Demirci, Muhammed Fatih |
2017 | Automatic Image selection from Images with Similar Contents | Bardak, Batuhan ; Demirci, Muhammed Fatih |
2018 | Cifar-10 Image Classification with Convolutional Neural Networks For Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
2017 | Undecidable Problems in Malware Analysis | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
2018 | A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
2015 | Towards Making Accessible Human-Interaction Proofs More Secure and Usable | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
2016 | TwinCloud: Secure Cloud Sharing Without Explicit Key Management | Bıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin |
2014 | Towards Automatic Detection of Child Pornography | Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha ; Memon, Nasir D. |
2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |