| Issue Date | Title | Author(s) |
1 | Oct-2018 | An Analysis DRDoS Amplifiers in Europe | Ercan, Emre Murat; Selçuk, Ali Aydın |
2 | 2018 | Automated generation of attack graphs using NVD | Aksu, M. Uğur; Bıçakcı, Kemal ; Dilek, M. H.; Özbayoğlu, Ahmet Murat ; Tatlı, E. İ. |
3 | 2018 | Cifar-10 Image Classification with Convolutional Neural Networks For Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
4 | Sep-2018 | Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response Programs | Balli, Muhammed Fatih; Uludağ, Süleyman; Selçuk, Ali Aydın ; Tavlı, Bülent |
5 | 2018 | Extracting PRNu noise from H.264 coded videos | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |
6 | 1-Sep-2018 | From location to location pattern privacy in location-based services | Abul, Osman ; Bayrak, Cansın |
7 | 2018 | A Fully Polynomial Time Approximation Scheme for Refutations in Weighted Difference Constraint Systems | Çaşkurlu, Buğra ; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan; Wojciechowski, Piotr |
8 | 2018 | A Fully Unsupervised Framework for Scoring Driving Style | Özgül, Ozan Fırat; Çakır, Mehmet Ulaş; Tan, Mehmet ; Amasyalı, Mehmet Fatih; Hayvacı, Harun Taha |
9 | 2018 | How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification | Bıçakcı, Kemal ; Altuncu, E.; Sahkulubey, M. S.; Kızılöz, H. E.; Uzunay, Y. |
10 | Mar-2018 | The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks | Çiftler, Bekir Sait; Yıldız, Hüseyin Uğur; Tavlı, Bülent ; Bıçakcı, Kemal ; İncebacak, Davut |
11 | 2018 | In Embedded Systems Image Classification with Convolutional Neural Network | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
12 | 2018 | Inferring Political Alignments of Twitter Users A case study on 2017 Turkish constitutional referendum | Yılmaz, Kutlu Emre; Abul, Osman |
13 | 2018 | Intractable Problems in Malware Analysis and Practical Solutions | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
14 | 1-Jul-2018 | On approximating optimal weight “no”-certificates in weighted difference constraint systems | Çaşkurlu, Buğra ; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan |
15 | Jul-2018 | Opcode vector: An efficient scheme to detect soft errors in instructions | Martinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco |
16 | 5-Jul-2018 | Predicting drug activity by image encoded gene expression profiles | Özgül, Ozan Fırat; Bardak, Batuhan ; Tan, Mehmet |
17 | 1-Sep-2018 | Server notaries: A complementary approach to the web PKI trust model | Yüce, Emre; Selçuk, Ali Aydın |
18 | Jul-2018 | SoftMC: Practical DRAM Characterization Using an FPGA-Based Infrastructure | Hassan, Hasan; Vijaykumar, Nandita; Khan, Samira; Ghose, Saugata; Chang, Kevin; Pekhimenko, Gennady; Lee, Donghyuk; Ergin, Oğuz ; Mutlu, Onur |
19 | 2018 | Spectrally robust graph isomorphism | Kolla, A.; Koutis, I.; Madan, V.; Sinop, A. K. |
20 | 2018 | A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |