| Issue Date | Title | Author(s) |
261 | 2017 | A Quantitative Cvss-Based Cyber Security Risk Assessment Methodology for It Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
262 | 2023 | Re-Think Before You Share: a Comprehensive Study on Prioritizing Check-Worthy Claims | Kartal, Yavuz Selim; Kutlu, Mücahid |
263 | 2015 | Recent Advances in Counter Prnu Based Source Attribution and Beyond | Karakucuk, Ahmet; Dirik, Ahmet E.; Sencar, Hüsrev Taha ; Memon, Nasir D. |
264 | 2009 | Reducing Parity Generation Latency Through Input Value Aware Circuits | Osmanlıoğlu, Yusuf; Koçberber, Y. Onur; Ergin, Oğuz |
265 | 2009 | Reducing Soft Errors Through Operand Width Aware Policies | Ergin, Oğuz ; Ünsal, Osman S.; vera, Xavier; Gonzalez, Antonio |
266 | 2010 | Reducing the Energy Dissipation of the Issue Queue by Exploiting Narrow Immediate Operands | Kaynak, İlknur Cansu; Koçberber, Yusuf Onur; Ergin, Oğuz |
267 | 2015 | Refbss: Reference Based Similarity Search in Biological Network Databases | Söylev, Arda; Abul, Osman |
268 | 2008 | Refueling: Preventing wire degradation due to electromigration | Abella, Jaume; Vera, Xavier; Ünsal, Osman S.; Ergin, Oğuz ; Gonzalez, Antonio; Tschanz, James W.; Kartal, Yavuz Selim |
269 | 2009 | The Representation and Matching of Images Using Top Points | Demirci, Muhammed Fatih ; Platel, Bram; Shokoufandeh, Ali; Florack, Luc L. M. J.; Dickinson, Sven J. |
270 | 2013 | Retrieving 2D shapes using caterpillar decomposition | Demirci, Muhammed Fatih |
271 | 2013 | Revisiting Graphical Passwords for Augmenting, Not Replacing, Text Passwords | Akpulat M.; Bıçakcı, Kemal ; Cil U. |
272 | 2015 | Rsfq Tabanlı Entegre Devre Tasarım Aracı ve Aritmetik Mantık Birimi Geliştirilmesi | Ergin, Oğuz ; Bozbey, Ali ; Tunç, Celal Alp; Çelik, M. Eren; Özer, Murat; Üşenmez, Kübra; Tükel, Yiğit |
273 | 2012 | Sawlnet: Sensitivity Aware Location Cloaking on Road-Networks | Silvestri, C.; Yiğitoğlu, E.; Damiani, M. L.; Abul, O. |
274 | 2013 | Sayısal Seslerden Adli Kanıt Toplama | Avcıbaş, İsmail; Sencar, Hüsrev Taha |
275 | 2013 | Seam-Carving Based Anonymization Against Image & Video Source Attribution | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
276 | 2012 | A Second Look at the Performance of Neural Networks for Keystroke Dynamics Using a Publicly Available Dataset | Uzun, Yasin; Bıçakcı, Kemal |
277 | 2020 | Security Analysis of Mobile Authenticator Applications | Özkan, C.; Bıçakcı, Kemal |
278 | 2010 | Sensitive Knowledge Hiding Application | Gökçe H.; Abul, O. |
279 | Mar-2015 | Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing | Bayram, Sevinç; Sencar, Hüsrev Taha ; Memon, Nasir |
280 | 1-Sep-2018 | Server Notaries: a Complementary Approach To the Web Pki Trust Model | Yüce, Emre; Selçuk, Ali Aydın |