02.3. Department of Computer Engineering

Organization name
02.3. Department of Computer Engineering
Director
Parent OrgUnit
City
Ankara
Country
Turkey

OrgUnit's Researchers publications
(Dept/Workgroup Publication)

Refined By:
Author:  Selçuk, Ali Aydın

Results 1-20 of 30 (Search time: 0.002 seconds).

Issue DateTitleAuthor(s)
1Oct-2018An Analysis DRDoS Amplifiers in EuropeErcan, Emre Murat; Selçuk, Ali Aydın 
22021An Analysis of Ethereum Smart Contract VulnerabilitiesUsman T.A.; Selçuk, Ali Aydın ; Ozarslan S.
315-Mar-2014Anonymous trace and revokeAk, Murat; Pehlivanoğlu, Serdar; Selçuk, Ali Aydın 
4Sep-2020Are we secure from bots? Investigating vulnerabilities of botometerTorusdağ, Buğra M.; Kutlu, Mücahid ; Selçuk, Ali Aydın 
5Dec-2015The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based servicesAshouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın 
625-Nov-2016A CRT-based verifiable secret sharing scheme secure against unbounded adversariesErsoy, Oğuzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın ; Anarim, Emin
7Sep-2018Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response ProgramsBalli, Muhammed Fatih; Uludağ, Süleyman; Selçuk, Ali Aydın ; Tavlı, Bülent 
82021Docker Görüntü Güvenliğine Yönelik Bir Yöntem UygulamasıSengul O.; Ozkilicaslan H.; Arda E.; Yavanoglu U.; Dogru I.A.; Selçuk, Ali Aydın 
92021Effectiveness analysis of public rule sets used in snort intrusion detection systemGündoğdu, I.; Selçuk, Ali Aydın ; Özarslan, S.
102022Evaluation of social bot detection modelsTorusdag, M. Bugra; Kutlu, Mucahid ; Selçuk, Ali Aydın 
11Sep-2019Evasion Techniques Efficiency over the IPS/IDS TechnologyKılıç, H.; Katal, N. S.; Selçuk, Ali Aydın 
12Feb-2016Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisitedTezcan, Cihangir; Selçuk, Ali Aydın 
132021In-browser cryptomining for good: An untold storyTekiner E.; Acar A.; Uluagac A.S.; Kirda E.; Selçuk, Ali Aydın 
1415-Mar-2014IND-CCA secure encryption based on a Zheng-Seberry schemeAk, Murat; Hanoymak, Turgut; Selçuk, Ali Aydın 
152018Intractable Problems in Malware Analysis and Practical SolutionsSelçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker
16Dec-2019Nesnelerin İnternetinin Güvenliğinde İnsan FaktörüTok, Mevlüt Serkan; Selçuk, Ali Aydın 
172021A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCEİlter, Murat Burhan; Selçuk, Ali Aydın 
182020Post Connection Attacks in MySQLKaya, Ahmet Selim; Selçuk, Ali Aydın 
192013Preserving location privacy for a group of usersAshouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın 
202022Privacy in blockchain systemsOsmanoglu, Murat; Selçuk, Ali Aydın