Securing Security Dismantling Security
Critical Security Studies Conference, Koç University, Istanbul/TÜRKİYE, 1 Haziran 2007
ÇALKIVİK EMİNE ASLI
|
ULUSAL BİLGİ VE İLETİŞİM GÜVENLİĞİ REHBERİ: IoT GÜVENLİĞİ İÇİN BİR UYGULAMA ÖRNEĞİ
Fen Bilimleri Dergisi, Vol. 21, No. 42, Ocak 2022, ISSN: 1305-7820
ZAİM ABDÜL HALİM, MUTTALİP TULGAR, AYDIN MUHAMMED ALİ
|
Ship s Ballast Water and Marine Pollution
Integration of Information for Environmental Security, NATO Science for Peace and Security Series C: Envinronmental Security, 19 Kasım 2007, s. 467-477
SATIR TANZER
|
Secure E-Commerce Scheme
IEEE ACCESS, Vol. 10, Ocak 2022, s. 12, ISSN: 2169-3536
CEBECİ SENA EFSUN, NARİ KÜBRA, ÖZDEMİR ENVER
|
Implementation of a Web-based Service for Mobile Application Risk Assessment
Turkish Journal of Electrical Engineering and Computer Sciences, Vol. 25, No. 2, Ocak 2017, s. 976-994, ISSN: 1300-0632
YÜKSEL ASIM SİNAN,YÜKSEL MEHMET ERKAN,SERTBAŞ AHMET,ZAİM ABDÜL HALİM
|
Analysis of HIRLAM NWP model during an air pollution episode in Istanbul in 2009 Air Pollution Modeling and its Application XXI NATO Science for Peace and Security Series C Environmental Security
2011, Springer Netherlands
TOROS HÜSEYİN,GERTİE GEERTSEMA,GERARD CATS,İNCECİK SELAHATTİN
|
An Architectural Approach for Assessing System Trust Based on Security Policy Specifications and Security Mechanisms
ACM 2nd International Conference on Security of Information and Networks, SIN’09, Gazi Magosa/KUZEY KIBRIS TÜRK CUMHURİYETİ, 6 Ekim 2009, s. 71-74
BAHTİYAR ŞERİF,CİHAN MURAT,ÇAĞLAYAN MEHMET UFUK
|
Cyber Security: General Perspectives on Cyber Security Security Studies
2023, lexington
BOLAT PELİN, KAYİŞOĞLU GİZEM
|
A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs
IEEE ACCESS, Vol. 13, Ocak 2025, s. 37703-37723, ISSN: 2169-3536
ÇETİNTAV IŞIL,SANDIKKAYA MEHMET TAHİR
|
Exploring cyber security threats and security models in cross-border paperless maritime trade system
Computers & Security, Vol. 157, No. 104604, Ekim 2025, s. 1-7, ISSN: 0167-4048
KAYİŞOĞLU GİZEM,DÜZENLİ EMRE,BOLAT PELİN,BONNDARENKO ALEKSEİ
|
A Transboundary Threat in Environmental Security: Nuclear Damage
Energy Infrastructure: Security, Environment and Social Conflict Workshop, İstanbul/TÜRKİYE, 27 Haziran 2016
ÖZKAN ARDA
|
Exploring cyber security threats and security models in cross-border paperless maritime trade system
Computers and Security, Vol. 157, No. 104604, Ekim 2025, s. 1-7, ISSN: 0167-4048
KAYİŞOĞLU GİZEM,DÜZENLİ EMRE,BOLAT PELİN,BONDARENKO ALEKSEİ
|
Understanding planetary security: A post-humanist paradigm in approaching energy security and climate crisis
Sosyal Bilimler Enstitüsü, İstanbul Teknik Üniversitesi, 2020
ÖZGENUR AKTAN
|
Determining maritime cyber security dynamics on the perspective of marine insurance and development of maritime cyber security risk management tool
Lisansüstü Eğitim Enstitüsü, İstanbul Teknik Üniversitesi, 2023
GİZEM KAYİŞOĞLU
|
Two factor authentication security
Bilişim Enstitüsü, İstanbul Teknik Üniversitesi, 2024
SÜMEYRA KUMBASAR
|
A Software Development for Physical Protection System Design and Analysis for Nuclear Security
International conference on Nuclear Security Shaping the Future, Viyana/AVUSTURYA, 20 Mayıs 2024
ŞENTÜRK LÜLE SENEM,AKDEMİR MAHSUM
|
A Hybrid Trust-Modeling Approach for IoT Security
Electrica, Vol. 20, No. 1, Şubat 2020, s. 86-96, ISSN: 2619-9831
BAHTİYAR ŞERİF
|
Enhanced physical layer security by OFDM signal transmission in fractional Fourier domains
2015 23th Signal Processing and Communications Applications Conference (SIU), Malatya/TÜRKİYE, 16 Mayıs 2015, s. 1881-1884
ÇATAK EVREN,ATA LÜTFİYE DURAK,MANTAR HACI ALİ
|
International Security through Further Modernity A Theoretical Approach to Inland and Maritime Security
Journal of Maritime Law and Commerce, Baltimore-Maryland/AMERİKA BİRLEŞİK DEVLETLERİ, Vol. 42, No. 1, Ocak 2011, s. 101-115, ISSN: 0022-2410
KIRVAL LEVENT
|
Extracting trust information from security system of a service
Journal of Network and Computer Applications, Vol. 35, No. 1, Ocak 2012, s. 480-490, ISSN: 10848045
BAHTİYAR ŞERİF,ÇAĞLAYAN MEHMET UFUK
|