| Issue Date | Title | Author(s) |
141 | Feb-2016 | Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
142 | 2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
143 | 2019 | Minimization of Testing Costs in Capacity-Constrained Database Migration | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Velasquez, A. |
144 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
145 | 2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
146 | 2016 | Multi-Scale Modularity and Motif Distributional Effect in Metabolic Networks | Gao, Shang; Chen, Alan; Rahmani, Ali; Zeng, Jia; Tan, Mehmet ; Alhajj, Reda; Rokne, Jon; Demetrick, Douglas; Wei, Xiaohui |
147 | 2011 | A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
148 | 2013 | Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
149 | 2013 | Network lifetime maximization and localized routing tradeoff in wireless sensor networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
150 | 15-Dec-2016 | Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
151 | 2010 | NoTabNab: Protection against the "tabnabbing attack" | Ünlü, S. A.; Bıçakcı, Kemal |
152 | Jul-2019 | A Novel FPGA-Based High Throughput Accelerator for Binary Search Trees | Melikoğlu, Öykü; Ergin, Oğuz ; Salami, B.; Pavon, J.; Ünsal, O.; Cristal, A. |
153 | 2016 | Object Recognition by Distortion-free Graph Embedding and Random Forest | Demirci, Muhammed Fatih ; Kaçka, Serdar |
154 | 2019 | Object recognition based on critical nodes | Boluk, Arda; Demirci, Muhammed Fatih |
155 | 1-Jul-2018 | On approximating optimal weight “no”-certificates in weighted difference constraint systems | Çaşkurlu, Buğra ; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan |
156 | 2019 | On Hedonic Games with Common Ranking Property | Çaşkurlu, Buğra ; Kızılkaya, Fatih Erdem |
157 | 2014 | On Partial Vertex Cover and Budgeted Maximum Coverage Problems in Bipartite Graphs | Çaşkurlu, Buğra ; Mkrtchyan, V.; Parekh, O; Subramani, Kiruba Sankaran |
158 | Jul-2018 | Opcode vector: An efficient scheme to detect soft errors in instructions | Martinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco |
159 | Dec-2019 | Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptography | Bıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M. |
160 | 2013 | Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks | İncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın |