Showing results 60 to 72 of 72
< previous
Issue Date | Title | Author(s) |
2012 | A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset | Uzun, Yasin; Bıçakcı, Kemal |
2020 | Security Analysis of Mobile Authenticator Applications | Özkan, C.; Bıçakcı, Kemal |
2007 | SHA: A secure voice activated smart home for quadriplegia patients | Uzunay, Yusuf; Bıçakcı, Kemal |
2020 | A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
2012 | A survey of visual sensor network platforms | Tavlı, Bülent ; Bıçakcı, Kemal ; Zilan, Ruken; Barcelo-Ordinas, Jose M. |
2018 | A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
2015 | Towards Making Accessible Human-Interaction Proofs More Secure and Usable | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
2009 | Towards Usable Solutions to Graphical Password Hotspot Problem | Bıçakcı, Kemal ; Atalay, Nart Bedin ; Yüceel, Mustafa; Gürbaşlar, Hakan; Erdeniz, Burak |
2014 | Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing | Uzunay, Yusuf; Bıçakcı, Kemal |
2016 | TwinCloud: Secure Cloud Sharing Without Explicit Key Management | Bıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin |
2013 | Uncovering the impact of minimum-energy routing on lifetime of wireless sensor networks | Söylev, A.; Bıçakcı, Kemal ; Tavlı, Bülent |
Jan-2020 | Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs | Aydın, M. Akif; Bütün, İsmail; Bıçakcı, Kemal ; Baykal, N. |
2017 | Yüksek performanslı bitcoin madenciliği için SHA256 özet algoritmasının eniyilenmesi | Balcısoy, Erşen |