ULUSAL BİLGİ VE İLETİŞİM GÜVENLİĞİ REHBERİ: IoT GÜVENLİĞİ İÇİN BİR UYGULAMA ÖRNEĞİ
Fen Bilimleri Dergisi, Vol. 21, No. 42, Ocak 2022, ISSN: 1305-7820
ZAİM ABDÜL HALİM, MUTTALİP TULGAR, AYDIN MUHAMMED ALİ
|
Extracting trust information from security system of a service
Journal of Network and Computer Applications, Vol. 35, No. 1, Ocak 2012, s. 480-490, ISSN: 10848045
BAHTİYAR ŞERİF,ÇAĞLAYAN MEHMET UFUK
|
Diffusion and Adoption of Information Security Management StandardsAcross Countries and Industries
Journal of Global Information Technology Management, Vol. 17, No. 4, Aralık 2014, ISSN: 1097-198X
TUNÇALP DENİZ
|
Dinamik Kimlik Dğrulamalı Mobil Ödeme Sistemi
7th International Conference on Information Security and Cyptology, 17 Ekim 2014
BAHTİYAR ŞERİF
|
GEOGRAPHIC INFORMATION SYSTEMS BASED TACTICAL DATA MANAGEMENT WITH MIXED REALITY FOR REGIONAL SECURITY SYSTEMS
Lisansüstü Eğitim Enstitüsü, İstanbul Teknik Üniversitesi, 2022
FATİH KESKİN
|
Analysis of information security frameworks for small and medium-sized enterprises (SMEs): Investigation of attacks and mitigation proposals
Lisansüstü Eğitim Enstitüsü, İstanbul Teknik Üniversitesi, 2024
GİZEMNUR TAŞKIN
|
Information-gap decision theory based transient stability constrained optimal power flow considering the uncertainties of wind energy resources
IET Renewable Power Generation, Vol. 14, No. 11, Mayıs 2020, s. 1946-1955, ISSN: 1752-1416
AYVAZ ALİŞAN,GENÇ VEYSEL MURAT İSTEMİHAN
|
A Model of Security Information Flow on Entities for Trust Computation
10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford/İNGİLTERE, 29 Haziran 2010, s. 803-808
BAHTİYAR ŞERİF,CİHAN MURAT,ÇAĞLAYAN MEHMET UFUK
|
An Improved Fault-Tolerant Conference-Key Protocol with Forward Secrecy
ACM The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray/TÜRKİYE, 26 Kasım 2013, s. 306-310
ERMİŞ ORHAN,BAHTİYAR ŞERİF,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK
|
Ship s Ballast Water and Marine Pollution
Integration of Information for Environmental Security, NATO Science for Peace and Security Series C: Envinronmental Security, 19 Kasım 2007, s. 467-477
SATIR TANZER
|
Credit Card Fraud Detection with NCA Dimensionality Reduction
SIN 2020: 13th International Conference on Security of Information and Networks, İstanbul/TÜRKİYE, Vol. 18, 4 Kasım 2020, s. 1-7
YÜKSEL BEYAZIT BESTAMİ, BAHTİYAR ŞERİF, YILMAZER AYŞE
|
A Survey on Malware Detection with Deep Learning
SIN 2020: 13th International Conference on Security of Information and Networks, İstanbul/TÜRKİYE, Vol. 34, 4 Kasım 2020, s. 1-6
ŞAHİN MUHAMMET, BAHTİYAR ŞERİF
|
Adaptive Trust Scenarios for Mobile Security
The 13th International Conference on Mobile Web and Intelligent Information Systems, MobiWis2016, Viyana/AVUSTURYA, 22 Ağustos 2016
BAHTİYAR ŞERİF,ERMİŞ ORHAN,ÇAĞLAYAN MEHMET UFUK
|
Design and formal verification of a cloud compliant secure logging mechanism
IET Information Security, Stevenage/İNGİLTERE, Vol. 10, No. 4, Temmuz 2016, s. 203-214, ISSN: 1751-8709
SANDIKKAYA MEHMET TAHİR,OVATMAN TOLGA,HARMANCI ALİ EMRE
|
Security Information Propagation on Entities for Trust Assessment
4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM2010, Morioka/JAPONYA, 14 Haziran 2010
BAHTİYAR ŞERİF,CİHAN MURAT,ÇAĞLAYAN MEHMET UFUK
|
An Architectural Approach for Assessing System Trust Based on Security Policy Specifications and Security Mechanisms
ACM 2nd International Conference on Security of Information and Networks, SIN’09, Gazi Magosa/KUZEY KIBRIS TÜRK CUMHURİYETİ, 6 Ekim 2009, s. 71-74
BAHTİYAR ŞERİF,CİHAN MURAT,ÇAĞLAYAN MEHMET UFUK
|
A Hardware Implementation of RSA
International Conference on Security of Information and Networks (SIN 2007), 8 Mayıs 2007
ALPTEKİN BAYAM KEKLİK,ÖRS YALÇIN SIDDIKA BERNA,ÖRENCİK MEHMET BÜLENT
|
Hardware Implementation of Elliptic Curve Cryptosystem over GF p m
International Conference on Security of Information and Networks (SIN 2007), 8 Mayıs 2007
YAVUZ İLKER,ÖRS YALÇIN SIDDIKA BERNA
|
3 D Face Recognition Using Local Appearance Based Models
IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, Eylül 2007, s. 630-636, ISSN: 1556-6013
EKENEL HAZIM KEMAL,GAO HUA,STİEFELHAGEN RAİNER
|
A UML profile for role based access control
Proceedings of the 2nd international conference on Security of information and networks - SIN '09, 6 Ekim 2009
CİRİT ÇAĞDAŞ,BUZLUCA FEZA
|