A new distributed anomaly detection approach for log IDS management based on deep learning
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, Vol. 29, No. 5, Ocak 2021, s. 2486-2501, ISSN: 1300-0632
ZAİM ABDÜL HALİM, AYDIN MUHAMMED ALİ, SERTBAŞ AHMET
|
A Novel Feature Selection Method for the Dynamic Security Assessment of Power Systems Based on Multi-Layer Perceptrons
International Journal of Intelligent Systems and Applications in Engineering, Vol. 1, Ocak 2018, ISSN: 2147-6799
BEYRANVAND PEYMAN, KÜÇÜKTEZCAN CAVİT FATİH, GENÇ VEYSEL MURAT İSTEMİHAN, ÇATALTEPE ZEHRA
|
Security of the Turkish Straits in the Black Sea: Impact of the Nato/Eu Enlargements on the Montreux Convention
Karadeniz Araştırmaları, Vol. 21, No. 84, Aralık 2024, s. 1067-1094, ISSN: 2536-5126
KIRVAL LEVENT,ÖZKAN ARDA
|
Proposing the future skill requirements for maritime cyber security
Cognition, Technology & Work, Vol. 26, Nisan 2024, s. 361-374, ISSN: 1435-5558
SÖNER ÖMER,KANDEMİR ÇAĞATAY
|
Detection of Sources Being Used in DDoS Attacks
019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), Vol. 1, No. 1, 21 Haziran 2019, s. 163-168
KHOSROSHAHİ YALDA, ÖZDEMİR ENVER
|
Application of Systems Theoretic Process Analysis and Failure Modes and Effects Analysis to Process Reliability and Occupational Safety and Health in Construction Projects
International Journal of Safety and Security Engineering, Vol. 12, No. 1, Şubat 2022, s. 1-11, ISSN: 2041-9031 (Print); 2041-904X (Online)
BAŞ ESRA
|
Reliability and security of arbiter based physical unclonable function circuits
International Journal of Communication Systems, Vol. 26, No. 6, Haziran 2013, s. 757-769, ISSN: 10745351
TARİGULİYEV ZAUR,ÖRS YALÇIN SIDDIKA BERNA
|
A Textual Clean-Label Backdoor Attack Strategy against Spam Detection
2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh/İNGİLTERE, Vol. 1, 15 Aralık 2021, s. 1-8
YERLİKAYA FAHRİ ANIL, BAHTİYAR ŞERİF
|
Evaluation of Two-vs-One Air Combats Using Hybrid Maneuver-Based Framework and Security Strategy Approach
Havacılık ve Uzay Teknolojileri Dergisi, Vol. 12, No. 1, Ocak 2019, s. 95-107, ISSN: 1304-0448
BAŞPINAR BARIŞ,KOYUNCU EMRE
|
Privacy Policies Tools and Mechanisms of the Future
iNetSec 2009 - Open Research Problems in Network Security, Zürih/İSVİÇRE, Vol. 309, 23 Nisan 2009, s. 125-138, ISSN: 1868-4238
NAESSENS VİNCENT,SANDIKKAYA MEHMET TAHİR,LAPON JORN,VERSLYPE KRİSTOF,VERHAEGHE PİETER,NİGUSSE GİRMA,DE DECKER BART
|
Buckling Analysis of Composite Shells under Compression and Torsional Loads Numerical and Analytical Study
ICMDHS 2014 : XII International Conference on Migration, Development and Human Security; 11/2014, 14 Kasım 2014
AYDIN GÜNEŞ,OSGOUEİ RAZİ KALANTARİ,ÖZTÜRK MURAT EMRE,PARTOVI MERAN AHMAD,TÜFEKCİ EKREM
|
A new dynamic security enhancement method via genetic algorithms integrated with neural network based tools
ELECTRIC POWER SYSTEMS RESEARCH, Vol. 83, No. 1, Şubat 2012, s. 1-8, ISSN: 0378-7796
C FATİH KUCUKTEZCAN,GENÇ VEYSEL MURAT İSTEMİHAN
|
A Survey on Malware Detection with Deep Learning
SIN 2020: 13th International Conference on Security of Information and Networks, İstanbul/TÜRKİYE, Vol. 34, 4 Kasım 2020, s. 1-6
ŞAHİN MUHAMMET, BAHTİYAR ŞERİF
|
Prevention of Risks in Territorial Waters and International Seas: The Case of Piracy and Armed Robbery Threatening International Trade and Security
23rd SRA-E Conference-Analysis and Governance of Risks Beyond Boundaries, İstanbul/TÜRKİYE, 16 Haziran 2014
KIRVAL LEVENT,DURAK ONUR SABRİ
|
Land Based Sources Water Quality and Management
NATO SPS (NFA) 5th Workshop on Sustainable Use and Development of Watersheds for Human Security and Peace, İstanbul/TÜRKİYE, 22 Ekim 2007
VADINEANU ANGHELUTA,RASHLEIGH BRENDA,GÜREL MELİKE,EKDAL ALPASLAN,ALIYEV AMIR,PEREZ RUZAFA ANGEL,TAVŞAN ÇİĞDEM,PREDA ELENA,MASSON ERIC,ANDRULEWICZ EUGENIUSZ,AMANALIEV MARS,FINDIK HECAN NUR,GELDIYEW OTUZBAY,GAMITO SOFIA
|
Design and formal verification of a cloud compliant secure logging mechanism
IET Information Security, Vol. 10, No. 4, Temmuz 2016, s. 203-214, ISSN: 1751-8709
SANDIKKAYA MEHMET TAHİR,OVATMAN TOLGA,HARMANCI ALİ EMRE
|
A Hardware Implementation of RSA
International Conference on Security of Information and Networks (SIN 2007), 8 Mayıs 2007
ALPTEKİN BAYAM KEKLİK,ÖRS YALÇIN SIDDIKA BERNA,ÖRENCİK MEHMET BÜLENT
|
Loop security and tensile properties of polyblend and traditional suture materials
KNEE SURGERY SPORTS TRAUMATOLOGY ARTHROSCOPY, Vol. 19, No. 2, Şubat 2011, s. 296-302, ISSN: 0942-2056
TURKER MEHMET, KİLİCOGLU ONDER, SALDUZ AHMET, BOZDAG ERGUN, SUNBULOGLU EMİN
|
Dynamic security enhancement of power systems using mean-variance mapping optimization
TURKISH JOURNAL OF ELECTRICAL ENGINEERING COMPUTER SCIENCES, Vol. 25, Ocak 2017, s. 3188-3200, ISSN: 13000632
KÜÇÜKTEZCAN CAVİT FATİH,GENÇ VEYSEL MURAT İSTEMİHAN
|
Information-gap decision theory based transient stability constrained optimal power flow considering the uncertainties of wind energy resources
IET Renewable Power Generation, Vol. 14, No. 11, Mayıs 2020, s. 1946-1955, ISSN: 1752-1416
AYVAZ ALİŞAN,GENÇ VEYSEL MURAT İSTEMİHAN
|