02.3. Department of Computer Engineering
Organization name
02.3. Department of Computer Engineering
Director
Parent OrgUnit
City
Ankara
Country
Turkey
OrgUnit's Researchers publications
(Dept/Workgroup Publication)
Results 1-20 of 30 (Search time: 0.009 seconds).
Issue Date | Title | Author(s) | |
---|---|---|---|
1 | Oct-2018 | An Analysis DRDoS Amplifiers in Europe | Ercan, Emre Murat; Selçuk, Ali Aydın |
2 | 2021 | An Analysis of Ethereum Smart Contract Vulnerabilities | Usman T.A.; Selçuk, Ali Aydın ; Ozarslan S. |
3 | 15-Mar-2014 | Anonymous trace and revoke | Ak, Murat; Pehlivanoğlu, Serdar; Selçuk, Ali Aydın |
4 | Sep-2020 | Are we secure from bots? Investigating vulnerabilities of botometer | Torusdağ, Buğra M.; Kutlu, Mücahid ; Selçuk, Ali Aydın |
5 | Dec-2015 | The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
6 | 25-Nov-2016 | A CRT-based verifiable secret sharing scheme secure against unbounded adversaries | Ersoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin |
7 | Sep-2018 | Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response Programs | Balli, Muhammed Fatih; Uludağ, Süleyman; Selçuk, Ali Aydın ; Tavlı, Bülent |
8 | 2021 | Docker Görüntü Güvenliğine Yönelik Bir Yöntem Uygulaması | Sengul O.; Ozkilicaslan H.; Arda E.; Yavanoglu U.; Dogru I.A.; Selçuk, Ali Aydın |
9 | 2021 | Effectiveness analysis of public rule sets used in snort intrusion detection system | Gündoğdu, I.; Selçuk, Ali Aydın ; Özarslan, S. |
10 | 2022 | Evaluation of social bot detection models | Torusdag, M. Bugra; Kutlu, Mucahid ; Selçuk, Ali Aydın |
11 | Sep-2019 | Evasion Techniques Efficiency over the IPS/IDS Technology | Kılıç, H.; Katal, N. S.; Selçuk, Ali Aydın |
12 | Feb-2016 | Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited | Tezcan, Cihangir; Selçuk, Ali Aydın |
13 | 2021 | In-browser cryptomining for good: An untold story | Tekiner E.; Acar A.; Uluagac A.S.; Kirda E.; Selçuk, Ali Aydın |
14 | 15-Mar-2014 | IND-CCA secure encryption based on a Zheng-Seberry scheme | Ak, Murat; Hanoymak, Turgut; Selçuk, Ali Aydın |
15 | 2018 | Intractable Problems in Malware Analysis and Practical Solutions | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
16 | Dec-2019 | Nesnelerin İnternetinin Güvenliğinde İnsan Faktörü | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
17 | 2021 | A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE | İlter, Murat Burhan; Selçuk, Ali Aydın |
18 | 2020 | Post Connection Attacks in MySQL | Kaya, Ahmet Selim; Selçuk, Ali Aydın |
19 | 2013 | Preserving location privacy for a group of users | Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın |
20 | 2022 | Privacy in blockchain systems | Osmanoglu, Murat; Selçuk, Ali Aydın |