| Issue Date | Title | Author(s) |
221 | 2022 | Mors: an Approximate Fault Modelling Framework for Reduced-Voltage Srams | Yüksel, I.E.; Salami, B.; Ergin, Oğuz ; Ünsal, O.S.; Kestelman, A.C. |
222 | 2009 | Motifhider: a Knowledge Hiding Approach To Sequence Masking | Abul, Osman |
223 | 2011 | A Multi-Word Password Proposal (gridword) and Exploring Questions About Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
224 | 2013 | Neighbor Sensor Networks: Increasing Lifetime and Eliminating Partitioning Through Cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
225 | Dec-2019 | Nesnelerin İnternetinin Güvenliğinde İnsan Faktörü | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
226 | 2013 | Network Lifetime Maximization and Localized Routing Tradeoff in Wireless Sensor Networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
227 | 2008 | Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases | Abul, Osman ; Bonchi, Francesco; Nanni, Mirco |
228 | 2021 | A New Milp Model for Matrix Multiplications With Applications To Klein and Prince | İlter, Murat Burhan; Selçuk, Ali Aydın |
229 | 15-Dec-2016 | Noise-Resistant Mechanisms for the Detection of Stealthy Peer-To Botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
230 | 2010 | Notabnab: Protection Against the "tabnabbing Attack" | Ünlü, S. A.; Bıçakcı, Kemal |
231 | Jul-2019 | A Novel Fpga-Based High Throughput Accelerator for Binary Search Trees | Melikoğlu, Öykü; Ergin, Oğuz ; Salami, B.; Pavon, J.; Ünsal, O.; Cristal, A. |
232 | 2016 | Object Recognition by Distortion-Free Graph Embedding and Random Forest | Demirci, Muhammed Fatih ; Kaçka, Serdar |
233 | 2019 | Object recognition based on critical nodes | Boluk, Arda; Demirci, Muhammed Fatih |
234 | Jul-2018 | Opcode Vector: an Efficient Scheme To Detect Soft Errors in Instructions | Martinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco |
235 | Dec-2019 | Open-Tee Is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography | Bıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M. |
236 | 2008 | Optimal Discretization for High-Entropy Graphical Passwords | Bıçakcı, Kemal |
237 | 2013 | Optimal Number of Routing Paths in Multi-Path Routing To Minimize Energy Consumption in Wireless Sensor Networks | İncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın |
238 | 2022 | Patent Search Using Triplet Networks Based Fine-Tuned Scibert | Acikalin, Utku Umur; Kutlu, Mücahid |
239 | 2013 | Pedagogical Analysis and Multifaceted Evaluation of an Engineering Co-Op Program | Uludağ, Süleyman; Demirci, Muhammed Fatih ; Doğdu, Erdoğan; Aydos, Fahri |
240 | 2022 | Pidram: a Holistic End-To Fpga-Based Framework for Processing-In | Olgun, Ataberk; Luna, Juan Gomez; Kanellopoulos, Konstantinos; Salami, Behzad; Hassan, Hasan; Ergin, Oguz ; Mutlu, Onur |