| Issue Date | Title | Author(s) |
41 | 2008 | Optimal Discretization for High-Entropy Graphical Passwords | Bıçakcı, Kemal |
42 | 2013 | Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks | İncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın |
43 | 2010 | Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks | Bıçakcı, Kemal ; Tavlı, Bülent |
44 | 2009 | Pushing the limits of one-time signatures | Bıçakcı, Kemal |
45 | 2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
46 | 2013 | Revisiting graphical passwords for augmenting, not replacing, text passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
47 | 2012 | A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset | Uzun, Yasin; Bıçakcı, Kemal |
48 | 2020 | Security Analysis of Mobile Authenticator Applications | Özkan, C.; Bıçakcı, Kemal |
49 | 2007 | SHA: A secure voice activated smart home for quadriplegia patients | Uzunay, Yusuf; Bıçakcı, Kemal |
50 | 2020 | A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
51 | 2012 | A survey of visual sensor network platforms | Tavlı, Bülent ; Bıçakcı, Kemal ; Zilan, Ruken; Barcelo-Ordinas, Jose M. |
52 | 2018 | A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
53 | 2015 | Towards Making Accessible Human-Interaction Proofs More Secure and Usable | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
54 | 2009 | Towards Usable Solutions to Graphical Password Hotspot Problem | Bıçakcı, Kemal ; Atalay, Nart Bedin ; Yüceel, Mustafa; Gürbaşlar, Hakan; Erdeniz, Burak |
55 | 2014 | Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing | Uzunay, Yusuf; Bıçakcı, Kemal |
56 | 2016 | TwinCloud: Secure Cloud Sharing Without Explicit Key Management | Bıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin |
57 | 2013 | Uncovering the impact of minimum-energy routing on lifetime of wireless sensor networks | Söylev, A.; Bıçakcı, Kemal ; Tavlı, Bülent |
58 | Jan-2020 | Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs | Aydın, M. Akif; Bütün, İsmail; Bıçakcı, Kemal ; Baykal, N. |