Issue Date | Title | Author(s) |
2016 | Analysis of the Effect of Image Resolution on Automatic Face Gender and Age Classification | Cerit, Betül; Bölük, S. Arda; Demirci, Muhammed Fatih |
2014 | Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing | Uzunay, Yusuf; Bıçakcı, Kemal |
2014 | Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies | Yıldız, Hüseyin Uğur; Bıçakcı, Kemal ; Tavlı, Bülent |
2016 | Efficient Near-duplicate Image Detection with Created Feature Subset | Yıldız, Burak; Demirci, Muhammed Fatih |
2017 | Automatic Image selection from Images with Similar Contents | Bardak, Batuhan ; Demirci, Muhammed Fatih |
2018 | Cifar-10 Image Classification with Convolutional Neural Networks For Embedded Systems | Çalık, Rasim Caner; Demirci, Muhammed Fatih |
2017 | Undecidable Problems in Malware Analysis | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
2018 | A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures | Huseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman |
2015 | Towards Making Accessible Human-Interaction Proofs More Secure and Usable | Kızılöz, Hakan Ezgi; Bıçakcı, Kemal |
2016 | TwinCloud: Secure Cloud Sharing Without Explicit Key Management | Bıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin |
2014 | Towards Automatic Detection of Child Pornography | Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha ; Memon, Nasir D. |
2017 | A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT Systems | Aksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun |
Aug-2017 | Housing Price Dynamics and Bubble Risk: The Case of Turkey | Alp, Dursun Ali ; Coşkun, Yener; Seven, Ünal; Ertuğrul, Hasan Murat |
Mar-2014 | Outsourcing Information Security: Contracting Issues and Security Implications | Cezar, Asunur; Çavuşoğlu, Hüseyin; Raghunathan, Şrinivaşan |
May-2013 | The Configuration and Detection Strategies for Information Security Systems | Öğüt, Hulisi |
Oct-2014 | Do Domestic And International Customers Behave Alike In Online Hotel Booking? | Cezar, Asunur; Öğüt, Hulisi |
Feb-2016 | Analyzing Conversion Rates in Online Hotel Booking: The Role of Customer Reviews, Recommendations and Rank Order in Search Listings | Cezar, Asunur; Öğüt, Hulisi |
Jan-2013 | Factors Affecting Professionals’ Selection in High and Low Value Online Service Procurements | Öğüt, Hulisi |
2017 | Patient’s rights in cross-border healthcare (Directive 2011/24/EU) and how it applies to Turkey as a negotiating candidate country | Ekmekci, Perihan Elif |
Nov-2017 | Flow Cytometric Aldehyde Dehydrogenase (ALDH) Assay Enables a Fast and Accurate Human Umblical Cord Blood Hematopoietic Stem Cell Assessment. | Gencer, Emine Begüm; Yurdakul, Pınar ; Dalva, Klara; Beksaç, Meral |