| Issue Date | Title | Author(s) |
1 | 2018 | Automated generation of attack graphs using NVD | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
2 | 2015 | charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
3 | Dec-2017 | A Closer Look at Pure-Text Human-Interaction Proofs | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
4 | 2014 | Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
5 | 2012 | Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
6 | 2013 | Effects of Handshake Hop Length of Unidirectional Links on the Lifetime of Wireless Sensor Networks | Batmaz, Anıl Ufuk; Tavlı, Bülent ; İncebacak, Davut; Bıçakcı, Kemal |
7 | Jan-2015 | Effects of node mobility on energy balancing in wireless networks | Pala, Zeydin; Bıçakcı, Kemal ; Turk, Mustafa |
8 | 2012 | Energy cost of mitigating physical attacks in wireless sensor networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
9 | 2012 | Erişilebilir ve kullanışlı insan-etkileşim ispatı: Ucuz iş gücü çözüm olabilir mi? | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
10 | Mar-2015 | Evaluating energy cost of route diversity for security in wireless sensor networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
11 | 2012 | Exploration and field study of a password manager using icon-based passwords | Bıçakcı, Kemal ; Atalay, N. B.; Yüceel, M.; Van, Oorschot P. C. |
12 | Feb-2019 | A First Look at the Usability of OpenVAS Vulnerability Scanner | Aksu, M. Uğur; Altuncu, Enes; Bıçakcı, Kemal |
13 | 2010 | The future of security in Wireless Multimedia Sensor Networks | Guerrero-Zapata, Manel; Zilan, Ruken; Barcelo-Ordinas, Jose M.; Bıçakcı, Kemal ; Tavlı, Bülent |
14 | 2010 | Güvenli ve kullanışlı resim-şifre yöntemlerinin tasarlanması ve gerçekleştirilmesi [Diğer] | Kara, Orhun; Bıçakcı, Kemal ; Atalay, Nart Bedin |
15 | 2018 | How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification | Bıçakcı, Kemal ; Altuncu, E.; Sahkulubey, M. S.; Kızılöz, H. E.; Uzunay, Y. |
16 | 2014 | The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks | Cotuk, Hüseyin; Tavlı, Bülent ; Bıçakcı, Kemal ; Akgün, Mehmet Burak |
17 | Mar-2018 | The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks | Çiftler, Bekir Sait; Yıldız, Hüseyin Uğur; Tavlı, Bülent ; Bıçakcı, Kemal ; İncebacak, Davut |
18 | 2011 | Impact of Limiting Number of Links on the Lifetime of Wireless Sensor Networks | Tavlı, Bülent ; Akgün, Mehmet Burak ; Bıçakcı, Kemal |
19 | 2013 | The Impact of Link Unidirectionality and Reverse Path Length on Wireless Sensor Network Lifetime | Batmaz, Anıl Ufuk; Tavlı, Bülent ; İncebacak, Davut; Bıçakcı, Kemal |
20 | Nov-2014 | The impact of scalable routing on lifetime of smart grid communication networks | Uzun, Erkam; Tavlı, Bülent ; Bıçakcı, Kemal ; İncebacak, Davut |