| Issue Date | Title | Author(s) |
221 | 2013 | Methods for Identifying Traces of Compression in Audio | Hiçsönmez, Samet; Uzun, Erkam; Sencar, Hüsrev Taha |
222 | Apr-2020 | A Microprocessor Protection Architecture against Hardware Trojans in Memories | Bolat, A.; Cassano, L.; Reviriego, P.; Ergin, Oğuz ; Ottavid, M. |
223 | 2019 | Mikroişlemcilerde Kullanıma Uygun Bir Tek Yön Kaydırmalı Yeniden Adlandırma Tablosu Devresi | Ergin, Oğuz |
224 | 2019 | Minimization of Testing Costs in Capacity-Constrained Database Migration | Subramani, Kiruba Sankaran; Çaşkurlu, Buğra ; Velasquez, A. |
225 | 2010 | Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks | Tavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal |
226 | 2020 | Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation | Altınışık, Enes; Tasdemir, Kasım; Sencar, Hüsrev Taha |
227 | 2014 | Mobile Authentication Secure Against Man-In-The-Middle Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
228 | 2009 | Modifying The Data-Holding Components Of The Microprocessors For Energy Efficiency | Osmanlıoğlu, Yusuf; Hanay, Y. Sinan; Ergin, Oğuz |
229 | 2022 | MoRS: An Approximate Fault Modelling Framework for Reduced-Voltage SRAMs | Yüksel, I.E.; Salami, B.; Ergin, Oğuz ; Ünsal, O.S.; Kestelman, A.C. |
230 | 2009 | MotifHider: A Knowledge Hiding Approach to Sequence Masking | Abul, Osman |
231 | 2016 | Multi-Scale Modularity and Motif Distributional Effect in Metabolic Networks | Gao, Shang; Chen, Alan; Rahmani, Ali; Zeng, Jia; Tan, Mehmet ; Alhajj, Reda; Rokne, Jon; Demetrick, Douglas; Wei, Xiaohui |
232 | 2011 | A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
233 | 2022 | Multilevel memetic hypergraph partitioning with greedy recombination | Acikalin U.U.; Caskurlu B. |
234 | 2013 | Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
235 | Dec-2019 | Nesnelerin İnternetinin Güvenliğinde İnsan Faktörü | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
236 | 2013 | Network lifetime maximization and localized routing tradeoff in wireless sensor networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
17 | 2008 | Never Walk Alone: Uncertainty for anonymity in moving objects databases | Abul, Osman ; Bonchi, Francesco; Nanni, Mirco |
18 | 2021 | A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE | İlter, Murat Burhan; Selçuk, Ali Aydın |
19 | 15-Dec-2016 | Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
20 | 2010 | NoTabNab: Protection against the "tabnabbing attack" | Ünlü, S. A.; Bıçakcı, Kemal |