Подписаться
Kemal Bıçakcı
Kemal Bıçakcı
Подтвержден адрес электронной почты в домене itu.edu.tr - Главная страница
Название
Процитировано
Процитировано
Год
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
K Bicakci, B Tavli
Computer Standards & Interfaces 31 (5), 931-941, 2009
2312009
A survey of visual sensor network platforms
B Tavli, K Bicakci, R Zilan, JM Barcelo-Ordinas
Multimedia Tools and Applications 60, 689-726, 2012
1912012
A survey of denial-of-service attacks and solutions in the smart grid
A Huseinović, S Mrdović, K Bicakci, S Uludag
IEEE Access 8, 177447-177470, 2020
1072020
A quantitative CVSS-based cyber security risk assessment methodology for IT systems
MU Aksu, MH Dilek, Eİ Tatlı, K Bicakci, HI Dirik, MU Demirezen, T Aykır
2017 International Carnahan Conference on Security Technology (ICCST), 1-8, 2017
932017
Infinite length hash chains and their applications
K Bicakci, N Baykal
Proceedings. Eleventh IEEE International Workshops on Enabling Technologies …, 2002
902002
The future of security in wireless multimedia sensor networks: a position paper
M Guerrero-Zapata, R Zilan, JM Barceló-Ordinas, K Bicakci, B Tavli
Telecommunication Systems 45 (1), 77-91, 2010
882010
The impact of transmission power control strategies on lifetime of wireless sensor networks
H Cotuk, K Bicakci, B Tavli, E Uzun
IEEE Transactions on Computers 63 (11), 2866-2879, 2013
812013
Towards usable solutions to graphical password hotspot problem
K Bicakci, NB Atalay, M Yuceel, H Gurbaslar, B Erdeniz
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
642009
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies
HU Yildiz, K Bicakci, B Tavli, H Gultekin, D Incebacak
Ad Hoc Networks 37, 301-323, 2016
632016
Automated generation of attack graphs using NVD
MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu, E Tatli
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
582018
The impact of one-time energy costs on network lifetime in wireless sensor networks
K Bicakci, H Gultekin, B Tavli
IEEE Communications Letters 13 (12), 905-907, 2009
582009
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks
K Bicakci, B Tavli
Ad Hoc Networks 8 (6), 582-596, 2010
572010
Mobile authentication secure against man-in-the-middle attacks
K Bicakci, D Unal, N Ascioglu, O Adalier
Procedia Computer Science 34, 323-329, 2014
472014
Maximizing lifetime of event-unobservable wireless sensor networks
K Bicakci, H Gultekin, B Tavli, IE Bagci
Computer Standards & Interfaces 33 (4), 401-410, 2011
442011
Server assisted signatures revisited
K Bicakci, N Baykal
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
432004
How to construct optimal one-time signatures
K Bicakci, G Tsudik, B Tung
Computer Networks 43 (3), 339-349, 2003
402003
Lifetime bounds of wireless sensor networks preserving perfect sink unobservability
K Bicakci, IE Bagci, B Tavli
IEEE Communications Letters 15 (2), 205-207, 2011
332011
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
Y Uzun, K Bicakci
Computers & Security 31 (5), 717-726, 2012
312012
SAOTS: A new efficient server assisted signature scheme for pervasive computing
K Bicakci, N Baykal
Security in Pervasive Computing: First International Conference, Boppard …, 2004
302004
One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication
K Bicakci, N Baykal
International Symposium on Computer and Information Sciences, 794-801, 2003
302003
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20