| Issue Date | Title | Author(s) |
121 | 2017 | A Top-Down k-Anonymization Implementation for Apache Spark | Sopaoğlu, Uğur; Abul, Osman |
122 | 2014 | Towards Automatic Detection of Child Pornography | Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha ; Memon, Nasir D. |
123 | 2015 | Towards Making Accessible Human-Interaction Proofs More Secure and Usable | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
124 | 2017 | Towards Measuring Uniqueness of Human Voice | Tandoğan, Sinan Erkam; Sencar, Hüsrev Taha ; Tavlı, Bülent |
125 | 2010 | A Tradeoff Balancing Algorithm For Hiding Sensitive Frequent Itemsets | Gökçe, Harun; Abul, Osman |
126 | 2014 | Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing | Uzunay, Yusuf; Bıçakcı, Kemal |
127 | 2013 | Trusting SSL in practice | Selçuk, Ali Aydın |
128 | 2012 | Turkish archive digitization by human computation approach | Gümüş, I.; Abul, Osman |
129 | 2016 | TwinCloud: Secure Cloud Sharing Without Explicit Key Management | Bıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin |
130 | 2013 | Uncovering the impact of minimum-energy routing on lifetime of wireless sensor networks | Söylev, A.; Bıçakcı, Kemal ; Tavlı, Bülent |
131 | 2017 | Undecidable Problems in Malware Analysis | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
132 | Jul-2018 | Usability of authentication mechanisms in secure messaging applications | Akman, Gamze; Selçuk, Ali Aydın |
133 | 2015 | User-Specific Skin Temperature-Aware DVFS for Smartphones | Eğilmez, Begüm; Memik, Gökhan; Öğrenci, Memik Seda; Ergin, Oğuz |
134 | 2011 | Using Content-Aware Bitcells to Reduce Static Energy Dissipation | Koç, Fahrettin; Şimşek, Osman Seçkin; Ergin, Oğuz |
135 | 2015 | Using Value Similarity of Registers for Soft Error Mitigation | Eker, Abulaziz; Ergin, Oğuz |
136 | Sep-2018 | Yazılım Davranışlarının Dinamik Olarak Değiştirilebilmesini Sağlayan Yeni Bir Yaklaşım | Gerede, Çağdaş Evren |