| Issue Date | Title | Author(s) |
221 | 2014 | Mobile Authentication Secure Against Man-In Attacks | Bıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay |
222 | 2009 | Modifying the Data-Holding Components of the Microprocessors for Energy Efficiency | Osmanlıoğlu, Yusuf; Hanay, Y. Sinan; Ergin, Oğuz |
223 | 2022 | Mors: an Approximate Fault Modelling Framework for Reduced-Voltage Srams | Yüksel, I.E.; Salami, B.; Ergin, Oğuz ; Ünsal, O.S.; Kestelman, A.C. |
224 | 2009 | Motifhider: a Knowledge Hiding Approach To Sequence Masking | Abul, Osman |
225 | 2011 | A Multi-Word Password Proposal (gridword) and Exploring Questions About Science in Security Research and Usable Security Evaluation | Bıçakcı, Kemal ; van Oorschot, Paul C. |
226 | 2013 | Neighbor Sensor Networks: Increasing Lifetime and Eliminating Partitioning Through Cooperation | Bıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin |
227 | Dec-2019 | Nesnelerin İnternetinin Güvenliğinde İnsan Faktörü | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
228 | 2013 | Network Lifetime Maximization and Localized Routing Tradeoff in Wireless Sensor Networks | Uzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal |
229 | 2008 | Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases | Abul, Osman ; Bonchi, Francesco; Nanni, Mirco |
230 | 2021 | A New Milp Model for Matrix Multiplications With Applications To Klein and Prince | İlter, Murat Burhan; Selçuk, Ali Aydın |
231 | 15-Dec-2016 | Noise-Resistant Mechanisms for the Detection of Stealthy Peer-To Botnets | Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha |
232 | 2010 | Notabnab: Protection Against the "tabnabbing Attack" | Ünlü, S. A.; Bıçakcı, Kemal |
233 | Jul-2019 | A Novel Fpga-Based High Throughput Accelerator for Binary Search Trees | Melikoğlu, Öykü; Ergin, Oğuz ; Salami, B.; Pavon, J.; Ünsal, O.; Cristal, A. |
234 | 2016 | Object Recognition by Distortion-Free Graph Embedding and Random Forest | Demirci, Muhammed Fatih ; Kaçka, Serdar |
235 | 2019 | Object recognition based on critical nodes | Boluk, Arda; Demirci, Muhammed Fatih |
236 | Jul-2018 | Opcode Vector: an Efficient Scheme To Detect Soft Errors in Instructions | Martinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz ; Ottavi, Marco |
237 | Dec-2019 | Open-Tee Is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography | Bıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M. |
238 | 2008 | Optimal Discretization for High-Entropy Graphical Passwords | Bıçakcı, Kemal |
239 | 2013 | Optimal Number of Routing Paths in Multi-Path Routing To Minimize Energy Consumption in Wireless Sensor Networks | İncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın |
240 | 2022 | Patent Search Using Triplet Networks Based Fine-Tuned Scibert | Acikalin, Utku Umur; Kutlu, Mücahid |