| Issue Date | Title | Author(s) |
201 | 2017 | Konum-tabanlı Servisler için Konum ve Konum Örüntü Mahremiyetinin Sağlanması | Abul, Osman |
202 | 2016 | Konuşma Yoluyla Etkileşilebilen Mobil Yazılımların Geliştirilmesine Yönelik Anotasyon Yönelimli Bir Yazılım Çerçevesi | Gerede, Çağdaş Evren |
203 | 2013 | Lake: a Server-Side Authenticated Key-Establishment With Low Computational Workload | Bıçakcı, Kemal ; Crispo, Bruno; Oligeri, Gabriele |
204 | Aug-2016 | Leveraging Human Computation for Pure-Text Human Interaction Proofs | Bıçakcı, Kemal ; Kızılöz, Hakan Ezgi |
205 | 2011 | Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent |
206 | 2022 | Location-Privacy Preserving Partial Nearby Friends Querying in Urban Areas | Abul, Osman |
207 | 2011 | Long Range Correlations Between Nucleotide Triplets | Vitale, D.; Kuruoğlu, E. E.; Abul, Osman |
208 | 2023 | A Machine Learning Approach for Dyslexia Detection Using Turkish Audio Records | Taş, Tuğberk; Bulbul, Muammed Abdullah; Haşimoğlu, Abas; Meral, Yavuz; Çalışkan, Yasin; Budağova, Günay; Kutlu, Mucahid |
209 | 2012 | Many-To Feature Matching in Object Recognition: a Review of Three Approaches | Shokoufandeh, A.; Keselman, Y.; Demirci, M. F. ; Macrini, D.; Dickinson, S. |
210 | 2008 | Many-To Matching in L(1) Norm | Demirci, Muhammed Fatih |
211 | 2009 | Many-To Matching Under the L 1 Norm | Demirci, Muhammed Fatih ; Osmanlıoğlu, Yusuf |
212 | 2011 | Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks | Bıçakcı, Kemal ; Gültekin, Hakan ; Tavlı, Bülent ; Bağcı, İbrahim Ethem |
213 | Feb-2016 | Maximizing Wireless Sensor Network Lifetime by Communication/Computation Energy Optimization of Non-Repudiation Security Service: Node Level Versus Network Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent ; Gültekin, Hakan ; İncebacak, Davut |
214 | 2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
215 | Apr-2020 | A Microprocessor Protection Architecture Against Hardware Trojans in Memories | Bolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M. |
216 | 2019 | Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu Devresi | Ergin, Oğuz |
217 | 2024 | Milp Modeling of Matrix Multiplication: Cryptanalysis of Klein and Prince | İlter, M.B.; Selçuk, Ali Aydın |
218 | 2023 | Milp-Aided Cryptanalysis of the Future Block Cipher | İlter, M.B. ; Selçuk, Ali Aydın |
219 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
220 | 2020 | Mitigation of H.264 and H.265 Video Compression for Reliable Prnu Estimation | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |