Yayınlar & Eserler

SCI, SSCI ve AHCI İndekslerine Giren Dergilerde Yayınlanan Makaleler

I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, cilt.27, ss.3713-3728, 2019 (SCI İndekslerine Giren Dergi) identifier identifier

A simulation environment for cybersecurity attack analysis based on network traffic logs

MODELING AND SIMULATION OF COMPLEX COMMUNICATION NETWORKS, cilt.18, ss.55-79, 2019 (SCI İndekslerine Giren Dergi) identifier

A window-based time series feature extraction method

COMPUTERS IN BIOLOGY AND MEDICINE, cilt.89, ss.466-486, 2017 (SCI İndekslerine Giren Dergi) Creative Commons License identifier identifier identifier

A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, cilt.15, ss.47-59, 2016 (SCI İndekslerine Giren Dergi) identifier identifier

Regulatory approaches for cyber security of critical infrastructures: The case of Turkey

COMPUTER LAW & SECURITY REVIEW, cilt.32, ss.526-539, 2016 (SSCI İndekslerine Giren Dergi) identifier identifier

A novel approach to optimize workflow in grid-based teleradiology applications

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, cilt.123, ss.159-169, 2016 (SCI İndekslerine Giren Dergi) identifier identifier identifier

Policymaking to preserve privacy in disclosure of public health data: a suggested framework

JOURNAL OF MEDICAL ETHICS, cilt.41, ss.263-267, 2015 (SCI İndekslerine Giren Dergi) identifier identifier identifier

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, cilt.10, ss.297-304, 2013 (SCI İndekslerine Giren Dergi) identifier

A Knowledge Based Search Tool for Performance Measures in Health Care Systems

JOURNAL OF MEDICAL SYSTEMS, cilt.36, ss.201-221, 2012 (SCI İndekslerine Giren Dergi) identifier identifier identifier

METADATA MANAGEMENT AND SEMANTICS IN MICROARRAY REPOSITORIES

BALKAN JOURNAL OF MEDICAL GENETICS, cilt.14, ss.49-63, 2011 (SCI İndekslerine Giren Dergi) Creative Commons License identifier identifier

Design and evaluation of an ontology based information extraction system for radiological reports

COMPUTERS IN BIOLOGY AND MEDICINE, cilt.40, ss.900-911, 2010 (SCI İndekslerine Giren Dergi) Creative Commons License identifier identifier identifier

MedicoPort: A medical search engine for all

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, cilt.86, ss.73-86, 2007 (SCI İndekslerine Giren Dergi) identifier identifier identifier

Improved server assisted signatures

COMPUTER NETWORKS, cilt.47, ss.351-366, 2005 (SCI İndekslerine Giren Dergi) identifier identifier

Health Informatics

BIOMATERIALS: FROM MOLECULES TO ENGINEERED TISSUES, cilt.553, ss.337-358, 2004 (SCI İndekslerine Giren Dergi) identifier identifier

A new design of privilege management infrastructure with binding signature semantics

PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, cilt.3093, ss.306-313, 2004 (SCI İndekslerine Giren Dergi) identifier identifier

SAOTS: A new efficient server assisted signature scheme for pervasive computing

SECURITY IN PERVASIVE COMPUTING, cilt.2802, ss.187-200, 2004 (SCI İndekslerine Giren Dergi) identifier identifier

Server assisted signatures revisited

TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, cilt.2964, ss.143-156, 2004 (SCI İndekslerine Giren Dergi) identifier identifier

One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication

COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, cilt.2869, ss.794-801, 2003 (SCI İndekslerine Giren Dergi) identifier identifier

INTERPRETATION OF DOPPLER BLOOD-FLOW VELOCITY WAVE-FORMS USING NEURAL NETWORKS

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, ss.865-869, 1994 (SCI İndekslerine Giren Dergi) identifier

Diğer Dergilerde Yayınlanan Makaleler

Evaluating learning management systems: Adoption of hexagonal e-learning assessment model in higher education

Transforming Government: People, Process and Policy, cilt.3, ss.111-130, 2009 (Diğer Kurumların Hakemli Dergileri) identifier

Hakemli Kongre / Sempozyum Bildiri Kitaplarında Yer Alan Yayınlar

Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance

22nd International Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, Fransa, 18 - 21 Şubat 2019, ss.222-229 identifier identifier

An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined

International Conference on Computing, Networking and Communications (ICNC), Hawaii, Amerika Birleşik Devletleri, 18 - 21 Şubat 2019, ss.658-662 identifier identifier

DDoS Attack Modeling and Detection Using SMO

16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Meksika, 18 - 21 Aralık 2017, ss.432-436 identifier identifier

Binary Classification Performance Measures/Metrics: A Comprehensive Visualized Roadmap to Gain New Insights

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.821-826 identifier

Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts

5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romanya, 26 - 28 Nisan 2017 identifier

Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited

5th International Workshop on Lightweight Cryptography for Security and Privacy (LightSec), Cappadocia, Türkiye, 20 - 21 Eylül 2016, cilt.10098, ss.18-32 identifier identifier

Feature Extraction and Classification Phishing Websites Based on URL

IEEE Conference Communications and Network Security CNS, Florence, İtalya, 28 - 30 Eylül 2015, ss.769-770 identifier

The Analysis of Feature Selection Methods and Classification Algorithms in Permission Based Android Malware Detection

IEEE Symposium on Computational Intelligence in Cyber Security, Florida, Amerika Birleşik Devletleri, 9 - 12 Aralık 2014, ss.81-88 identifier

An Infrastructure for Efficient Reporting Workflow in Grid Based Teleradiology Architectures Using Relation Based Semantic Matching and Integer Linear Programming

Federated Conference on Computer Science and Information Systems (FedCSIS), Warszawa, Polonya, 7 - 10 Eylül 2014, cilt.2, ss.241-245 identifier

Integration of Federated Medical Systems for Vendor Neutral Image Access in Teleradiology Applications

25th European Medical Informatics Conference (MIE), İstanbul, Türkiye, 31 Ağustos - 03 Eylül 2014, cilt.205, ss.538-542 identifier identifier identifier

Turkey's Approaches on Cyber Security Policy Framework

NATO Advanced Research Workshop (ARW) on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Makedonya, 10 - 12 Haziran 2013, cilt.38, ss.82-98 identifier

Homomorphic RSA Tallying and Its Randomization for e-Voting

6th International Conference on e-Government, Cape-Town, Güney Afrika, 30 Eylül - 01 Ekim 2010, ss.160-167 identifier

Voter Verifiable and Single Transferable Electronic Voting for Elections with Electoral Barriers

9th European Conference on e-Government, London, Kanada, 29 - 30 Haziran 2009, ss.703-710 identifier

Evaluating learning management systems: Hexagonal e-learning assessment model (HELAM)

5th European and Mediterranean Conference on Information Systems, EMCIS 2008, Dubai, Birleşik Arap Emirlikleri, 25 - 26 Mayıs 2008 identifier

Assessing hospital information systems processes: A validation of prise information systems success model in healthcare

14th Americas Conference on Information Systems, AMCIS 2008, Toronto, Kanada, 14 - 17 Ağustos 2008, cilt.6, ss.3956-3967 identifier

EVEREST: An efficient method for verification of digital signatures in real-time teleradiology

11th World Congress on Medical Informatics, San-Francisco, Kostarika, 7 - 11 Eylül 2004, cilt.107, ss.1241-1245 identifier

A GIS system for ambulatory transportation

2nd IASTED International Conference on Biomedical Engineering, Innsbruck, Avusturya, 16 - 18 Şubat 2004, ss.431-435 identifier identifier

Optimization of an online course with web usage mining

IASTED International Conference on Artificial Intelligence and Applications, Innsbruck, Avusturya, 16 - 18 Şubat 2004, ss.21-25 identifier identifier

Design and performance evaluation of a flexible and efficient server assisted signature protocol

8th IEEE International Symposium on Computers and Communication (ISCC 2003), Antalya, Türkiye, 30 Haziran - 03 Temmuz 2003, ss.1239-1244 identifier identifier

Infinite length hash chains and their applications

11th IEEE International Workshop on Enabling Technologies - Infrastructure for Collaborative Enterprises (WET ICE 2002), Pennsylvania, Amerika Birleşik Devletleri, 10 - 12 Haziran 2002, ss.57-61 identifier identifier

Wireless and mobile security

5th International Conference on Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies (KES 2001), Osaka, Japonya, 6 - 08 Eylül 2001, cilt.69, ss.1282-1286 identifier

Resilient backpropagation for RBF networks

4th International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, Brighton, İngiltere, 30 - 31 Ağustos 2000, ss.624-627 identifier

Tagged potential field extension to self organizing feature maps

2nd International Conference on Knowledge-Based Intelligent Electronic Systems (KES 98), Adelaide, Avustralya, 21 - 23 Nisan 1998, ss.292-298 identifier

An experimental comparison of symbolic and neural learning algorithms

2nd International Conference on Knowledge-Based Intelligent Electronic Systems (KES 98), Adelaide, Avustralya, 21 - 23 Nisan 1998, ss.306-315 identifier

Step down logistic regression for feature selection

International Conference on Applied Statistical in Medical Sciences, Ankara, Türkiye, 01 Ağustos 1997, cilt.4, ss.121-131 identifier