Yayınlar & Eserler

SCI, SSCI ve AHCI İndekslerine Giren Dergilerde Yayınlanan Makaleler

Diğer Dergilerde Yayınlanan Makaleler

Hakemli Kongre / Sempozyum Bildiri Kitaplarında Yer Alan Yayınlar

Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs

10th Annual Computing and Communication Workshop and Conference (CCWC), California, Amerika Birleşik Devletleri, 6 - 08 Ocak 2020, ss.774-779 identifier identifier

Extending Attribute-Based Access Control Model with Authentication Information for Internet of Things

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 Aralık 2020, ss.48-55 identifier identifier

Security Analysis of Mobile Authenticator Applications

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 Aralık 2020, ss.18-30 identifier identifier

Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 Aralık 2020, ss.11-17 identifier identifier

Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography

1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (IEEE TPS-ISA), Los-Angeles, Şili, 12 - 14 Aralık 2019, ss.177-183 identifier identifier

How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification

21st International Information Security Conference (ISC), Guildford, Birleşik Krallık, 9 - 12 Eylül 2018, cilt.11060, ss.85-98 identifier identifier

Automated Generation of Attack Graphs Using NVD

8th ACM Conference on Data and Application Security and Privacy (CODASPY), Arizona, Amerika Birleşik Devletleri, 19 - 21 Mart 2018, ss.135-142 identifier identifier

A quantitative CVSS-based cyber security risk assessment methodology for IT systems

2017 International Carnahan Conference on Security Technology, ICCST 2017, Madrid, İspanya, 23 - 26 Ekim 2017, cilt.2017-October, ss.1-8 identifier

TwinCloud: Secure Cloud Sharing Without Explicit Key Management

IEEE Conference on Communications and Network Security (CNS), Pennsylvania, Amerika Birleşik Devletleri, 17 - 19 Ekim 2016, ss.581-585 identifier

Towards Making Accessible Human-Interaction Proofs More Secure and Usable

IEEE Symposium on Computers and Communication (ISCC), Larnaka, Kıbrıs (Gkry), 6 - 09 Temmuz 2015, ss.607-612 identifier

charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication

International Conference on Passwords (PASSWORDS), Trondheim, Norveç, 8 - 10 Aralık 2014, cilt.9393, ss.74-86 identifier identifier

The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks

IEEE Wireless Communications and Networking Conference (WCNC), İstanbul, Türkiye, 6 - 09 Nisan 2014, ss.2787-2792 Sürdürülebilir Kalkınma identifier identifier

Mobile authentication secure against man-in-the-middle attacks

2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014, Oxford, Birleşik Krallık, 7 - 10 Nisan 2014, ss.273-276 identifier

Mobile Authentication Secure Against Man-In-The-Middle Attacks

11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), Niagara Falls, Kanada, 17 - 20 Ağustos 2014, cilt.34, ss.323-329 identifier identifier

Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies

2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks, WiSNet 2014, Newport Beach, CA, Amerika Birleşik Devletleri, 19 - 22 Ocak 2014, ss.49-51 Sürdürülebilir Kalkınma identifier

Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing

5th International Conference on Intelligent Systems, Modelling and Simulation (ISMS), Langkawi, Malezya, 27 - 29 Ocak 2014, ss.534-539 identifier identifier

Revisiting graphical passwords for augmenting, not replacing, text passwords

29th Annual Computer Security Applications Conference, ACSAC 2013, New Orleans, LA, Amerika Birleşik Devletleri, 9 - 13 Aralık 2013, ss.119-128 identifier

The Impact of Link Unidirectionality and Reverse Path Length on Wireless Sensor Network Lifetime

IEEE International Conference on Communications (ICC), Budapest, Macaristan, 9 - 13 Haziran 2013, ss.1795-1796 identifier identifier

Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks

9th IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), Cambridge, Kanada, 21 - 23 Mayıs 2013, ss.436-441 identifier identifier

Mobility Helps Energy Balancing in Wireless Networks

IEEE Military Communications Conference, California, Amerika Birleşik Devletleri, 18 - 20 Kasım 2013, ss.293-298 Sürdürülebilir Kalkınma identifier identifier

Energy cost of mitigating physical attacks in wireless sensor networks

2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012, İstanbul, Türkiye, 7 - 10 Mayıs 2012 identifier

Exploration and field study of a password manager using icon-based passwords

15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Avustralya, 28 Şubat - 04 Mart 2011, cilt.7126 LNCS, ss.104-118 identifier

A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation

2011 New Security Paradigms Workshop, NSPW'11, Marin County, CA, Amerika Birleşik Devletleri, 12 - 15 Eylül 2011, ss.25-36 Creative Commons License identifier

Johnny in Internet café: User study and exploration of password autocomplete in web browsers

7th ACM Workshop on Digital Identity Management, DIM'11 - Co-located with 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, Amerika Birleşik Devletleri, 21 Ekim 2011, ss.33-42 Sürdürülebilir Kalkınma identifier

NoTabNab: Protection against the "tabnabbing attack"

2010 Fall General Meeting and eCrime Researchers Summit, eCrime 2010, Dallas, TX, Amerika Birleşik Devletleri, 18 - 20 Ekim 2010 identifier

Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks

UKSim 4th European Modelling Symposium on Computer Modelling and Simulation, EMS2010, Pisa, İtalya, 17 - 19 Kasım 2010, ss.414-419 identifier

Towards usable solutions to graphical password hotspot problem

2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, WA, Amerika Birleşik Devletleri, 20 - 24 Temmuz 2009, cilt.2, ss.318-323 identifier

Pushing the limits of one-time signatures

2nd International Conference on Security of Information and Networks, SIN'09, Famagusta, Kıbrıs (Gkry), 6 - 10 Ekim 2009, ss.249-257 identifier

Graphical passwords as browser extension: Implementation and usability study

3rd IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2009, Indiana, Amerika Birleşik Devletleri, 15 - 19 Haziran 2009, cilt.300, ss.15-29 Creative Commons License identifier

Optimal discretization for high-entropy graphical passwords

2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008, İstanbul, Türkiye, 27 - 29 Ekim 2008 Creative Commons License identifier

SHA: A secure voice activated smart home for quadriplegia patients

IEEE International Conference on Bioinformatics and Biomedicine, California, Amerika Birleşik Devletleri, 2 - 04 Kasım 2007, ss.151-152 Sürdürülebilir Kalkınma identifier identifier

Security for the mythical air-dropped sensor network

11th IEEE Symposium on Computers and Communications, ISCC 2006, Cagliari, İtalya, 26 - 29 Haziran 2006, ss.41-47 identifier

One-time sensors: A novel concept to mitigate node-capture attacks

Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005, Visegrad, Macaristan, 13 - 14 Temmuz 2005, cilt.3813 LNCS, ss.80-90 identifier

UNIDES: An efficient real-time system to detect and block unauthorized Internet access

11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005, Fukuoka, Japonya, 20 - 22 Temmuz 2005, cilt.2, ss.245-249 identifier

A cost-efficient counter-intrusion scheme for one-time sensor networks

2005 Intelligent Sensors, Sensor Networks and Information Processing Conference, Melbourne, Avustralya, 5 - 08 Aralık 2005, cilt.2005, ss.45-50 Sürdürülebilir Kalkınma identifier

How to incorporate revocation status information into the trust metrics for public-key certification

20th Annual ACM Symposium on Applied Computing, Santa Fe, NM, Amerika Birleşik Devletleri, 13 - 17 Mart 2005, cilt.2, ss.1594-1598 identifier

Counting abuses using flexible off-line credentials

10th Australasian Conference on Information Security and Privacy, ACISP 2005, Brisbane, Avustralya, 4 - 06 Temmuz 2005, cilt.3574, ss.548-559 identifier

Design and performance evaluation of a flexible and efficient server assisted signature protocol

8th IEEE International Symposium on Computers and Communication (ISCC 2003), Antalya, Türkiye, 30 Haziran - 03 Temmuz 2003, ss.1239-1244 identifier identifier

Infinite length hash chains and their applications

11th IEEE International Workshop on Enabling Technologies - Infrastructure for Collaborative Enterprises (WET ICE 2002), Pennsylvania, Amerika Birleşik Devletleri, 10 - 12 Haziran 2002, ss.57-61 identifier identifier

Metrikler

Yayın

85

Atıf (WoS)

543

H-İndeks (WoS)

12

Atıf (Scopus)

904

H-İndeks (Scopus)

16

Proje

1

Açık Erişim

8
BM Sürdürülebilir Kalkınma Amaçları