| Issue Date | Title | Author(s) |
1 | 2018 | Automated generation of attack graphs using NVD | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
2 | 2015 | charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication | Bıçakcı, Kemal ; Satiev, Tashtanbek |
3 | 2014 | Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
4 | 2013 | Effects of Handshake Hop Length of Unidirectional Links on the Lifetime of Wireless Sensor Networks | Batmaz, Anıl Ufuk; Tavlı, Bülent ; İncebacak, Davut; Bıçakcı, Kemal |
5 | 2012 | Energy cost of mitigating physical attacks in wireless sensor networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
6 | 2012 | Exploration and field study of a password manager using icon-based passwords | Bıçakcı, Kemal ; Atalay, N. B.; Yüceel, M.; Van, Oorschot P. C. |
7 | Feb-2019 | A First Look at the Usability of OpenVAS Vulnerability Scanner | Aksu, M. Uğur; Altuncu, Enes; Bıçakcı, Kemal |
8 | 2018 | How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification | Bıçakcı, Kemal ; Altuncu, E.; Sahkulubey, M. S.; Kızılöz, H. E.; Uzunay, Y. |
9 | 2014 | The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks | Cotuk, Hüseyin; Tavlı, Bülent ; Bıçakcı, Kemal ; Akgün, Mehmet Burak |
10 | 2013 | The Impact of Link Unidirectionality and Reverse Path Length on Wireless Sensor Network Lifetime | Batmaz, Anıl Ufuk; Tavlı, Bülent ; İncebacak, Davut; Bıçakcı, Kemal |
11 | 2010 | Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
12 | 2011 | Johnny in Internet café: User study and exploration of password autocomplete in web browsers | Bıçakcı, Kemal ; Atalay, N. B.; Kızılöz H. E. |
13 | 2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
14 | 2011 | A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
15 | 2013 | Network lifetime maximization and localized routing tradeoff in wireless sensor networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
16 | 2010 | NoTabNab: Protection against the "tabnabbing attack" | Ünlü, S. A.; Bıçakcı, Kemal |
17 | Dec-2019 | Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptography | Bıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M. |
18 | 2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
19 | 2013 | Revisiting graphical passwords for augmenting, not replacing, text passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
20 | 2018 | A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |