| Issue Date | Title | Author(s) |
141 | 2013 | LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload | Bıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele |
142 | Aug-2016 | Leveraging human computation for pure-text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
143 | 2011 | Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
144 | 2011 | Long Range Correlations Between Nucleotide Triplets | Vitale, D.; Kuruoğlu, E. E.; Abul, Osman |
145 | 2011 | Maximizing lifetime of event-unobservable wireless sensor networks | Bıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem |
146 | Feb-2016 | Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
147 | 2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
148 | 2019 | Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu Devresi | Ergin, Oğuz |
149 | 2019 | Minimization of Testing Costs in Capacity-Constrained Database Migration | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Velasquez, A. |
150 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
151 | 2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
152 | 2016 | Multi-Scale Modularity and Motif Distributional Effect in Metabolic Networks | Gao, Shang; Chen, Alan; Rahmani, Ali; Zeng, Jia; Tan, Mehmet ; Alhajj, Reda; Rokne, Jon; Demetrick, Douglas; Wei, Xiaohui |
153 | 2011 | A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
154 | 2013 | Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
155 | Dec-2019 | Nesnelerin İnternetinin Güvenliğinde İnsan Faktörü | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
156 | 2013 | Network lifetime maximization and localized routing tradeoff in wireless sensor networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
157 | 15-Dec-2016 | Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
158 | 2010 | NoTabNab: Protection against the "tabnabbing attack" | Ünlü, S. A.; Bıçakcı, Kemal |
159 | Jul-2019 | A Novel FPGA-Based High Throughput Accelerator for Binary Search Trees | Melikoğlu, Öykü; Ergin, Oğuz ; Salami, B.; Pavon, J.; Ünsal, O.; Cristal, A. |
160 | 2016 | Object Recognition by Distortion-free Graph Embedding and Random Forest | Demirci, Muhammed Fatih ; Kaçka, Serdar |