Diffusion and Adoption of Information Security Management StandardsAcross Countries and Industries
Journal of Global Information Technology Management, Vol. 17, No. 4, Aralık 2014, ISSN: 1097-198X
TUNÇALP DENİZ
|
A Recommendation Model for Social Resource Sharing Systems Based on Tripartite Graph Clustering
2011 European Intelligence and Security Informatics Conference, 12 Eylül 2011
ÜSTÜNBAŞ YONCA,ÖĞÜDÜCÜ ŞULE
|
Brushing Against the Grain Dismantling Security
International Studies Association Annual Convention, San Francisco/AMERİKA BİRLEŞİK DEVLETLERİ, 26 Mart 2008
ÇALKIVİK EMİNE ASLI
|
Beyond a Politics of Life
Dismantling Security Conference, University of Cambridge, Londra/İNGİLTERE, 14 Haziran 2012
ÇALKIVİK EMİNE ASLI
|
Standards, security privacy issues about radio frequency identification (RFID)
RFID Eurasia, 3 Eylül 2007
KORKMAZ EVŞEN,ÜSTÜNDAĞ ALP
|
Parylene based Uncooled Thermomechanical Array
SPIE Defense, Security, and Sensing, 13 Nisan 2009
FERHANOĞLU ONUR,TOY MUHAMMED FATİH,ÜREY HAKAN
|
Dinamik Kimlik Dğrulamalı Mobil Ödeme Sistemi
7th International Conference on Information Security and Cyptology, 17 Ekim 2014
BAHTİYAR ŞERİF
|
Evaluatıng Cyber Securıty Awareness In Marıtıme Domaın
International Conference on Science and Technology-ICONST, Prizren/KOSOVA, 5 Eylül 2018
BOLAT PELİN, KAYİŞOĞLU GİZEM, UYGUR SELEN
|
Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms Wireless Security and Cryptography Specifications and Implementations
2007, CRC Press
ÖRS YALÇIN SIDDIKA BERNA,PRENEEL BART,VERBAUWHEDE INGRİD
|
Power-Analysis Attack onan ASIC AES implementation Embedded Cryptographic Hardware Design and Security
2005, Nova Science Publishers
ÖRS YALÇIN SIDDIKA BERNA,GÜRKAYNAK FRANK KAĞAN,OSWALD ELİSABETH,PRENEEL BART
|
Digest: A Biometric Authentication Protocol in Wireless Sensor Network Wireless Mesh Networks - Security, Architectures and Protocols
2019, InTech Open
BABAMIR SADAT FAEZEH,KIRCI MÜRVET
|
Contextualizing Global Security: The Case of Turkey Handbook of Global Security Policy
2014, s. 426-445, Wiley-Blackwell
ÇALKIVİK EMİNE ASLI
|
Improved physical layer security of visible light communications with focused light emitters
Optics Communications, Vol. 485, Ocak 2021, ISSN: 0030-4018
ÇİRKİNOĞLU OZAN, FERHANOĞLU ONUR, KARABULUT KURT GÜNEŞ ZEYNEP
|
Security and Biometrics
KBEI-2015 IEEE 2nd International Conference on Knowledge-Based Engineering and Innovation, TAHRAN/İRAN, 5 Ekim 2015
GÜNEŞ ECE OLCAY
|
Determining Maritime Cyber Security Dynamics and
Development of Maritime Cyber Risk Check List for Ships
The International Association of Maritime Universities (IAMU) Student Session, Poti/GÜRCİSTAN, 20 Kasım 2022, s. 20-27
KAYİŞOĞLU GİZEM, BOLAT PELİN, TAM KİMBERLY
|
MC-MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection
Security and Communication Networks, Vol. 2023, Aralık 2023, ISSN: 1939-0114
MOARREF NAZANİN,SANDIKKAYA MEHMET TAHİR
|
ECDIS Cyber Security Dynamics Analysis based on the Fuzzy-FUCOM Method
Transactions on Maritime Science, Vol. 13, Şubat 2024, ISSN: 1848-3305
KAYİŞOĞLU GİZEM,GÜNEŞ BÜNYAMİN,BOLAT PELİN
|
grid security assesment in the context of future energy planning
INTERNATIONAL GRADUATE RESEARCH SYMPOSIUM - IGRS’24, İstanbul/TÜRKİYE, 8 Mayıs 2024
KIZILKAYA MEHMET ALİ,CANSIZ AHMET
|
Governance and Security: From a Maritime Perspective Security Studies: Classic to Post-Modern Approaches
2023, s. 399-424, Lexington Books
TAVACIOĞLU LEYLA, GÖKMEN İNAN NESLİHAN, ESKİ ÖZGE
|
Risk sensitivity analysis of AIS cyber security through maritime cyber regulatory frameworks
Applied Ocean Research, Vol. 142, Ocak 2024, ISSN: 0141-1187
SÖNER ÖMER,KAYİŞOĞLU GİZEM,TAM KİMBERLY,BOLAT PELİN
|