| Issue Date | Title | Author(s) |
21 | Nov-2014 | The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks | Cotuk, Hüseyin; Bıçakcı, Kemal ; Tavlı, Bülent ; Uzun, Erkam |
22 | 2010 | Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks | İncebacak, Davut; Bıçakcı, Kemal ; Tavlı, Bülent |
23 | 2011 | Johnny in Internet café: User study and exploration of password autocomplete in web browsers | Bıçakcı, Kemal ; Atalay, N. B.; Kızılöz H. E. |
24 | 2013 | LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload | Bıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele |
25 | Aug-2016 | Leveraging human computation for pure-text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
26 | 2011 | Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
27 | 2011 | Maximizing lifetime of event-unobservable wireless sensor networks | Bıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem |
28 | Feb-2016 | Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
29 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
30 | 2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
31 | 2011 | A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
32 | 2013 | Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
33 | 2013 | Network lifetime maximization and localized routing tradeoff in wireless sensor networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
34 | 2010 | NoTabNab: Protection against the "tabnabbing attack" | Ünlü, S. A.; Bıçakcı, Kemal |
35 | Dec-2019 | Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptography | Bıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M. |
36 | 2013 | Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks | İncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın |
37 | 2010 | Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks | Bıçakcı, Kemal ; Tavlı, Bülent |
38 | 2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
39 | 2013 | Revisiting graphical passwords for augmenting, not replacing, text passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
40 | 2012 | A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset | Uzun, Yasin; Bıçakcı, Kemal |