Follow
Yusuf UZUNAY
Yusuf UZUNAY
PhD from Middle East Technical University
Verified email at afad.gov.tr
Title
Cited by
Cited by
Year
Bilişim Suçları Kapsamında Dijital Deliller (Digital Evidence in the Domain of Cyber Crime)
Y Uzunay, M Koçak
AB’05 Akademik Bilişim Konferansı, 2005
19*2005
İnternet Üzerinden Çocuk Pornografisi ve Mücadelede Yaşanan Sıkıntılar (Child Pornography on Internet and the Difficulties in Combating)
Y Uzunay, M Koçak
Turkish Journal of Police Studies 7 (1), 97-116, 2005
18*2005
Could we distinguish child users from adults using keystroke dynamics?
Y Uzun, K Bicakci, Y Uzunay
arXiv preprint arXiv:1511.05672, 2015
152015
Dijital Delil Araştırma Süreci (Digital Evidence Investigation Process)
Y Uzunay
2. Polis Bilişim Sempozyumu, 14-15, 2005
14*2005
Is FIDO2 passwordless authentication a hype or for real?: A position paper
K Bicakci, Y Uzunay
2022 15th International Conference on Information Security and Cryptography …, 2022
132022
SHA: A secure voice activated smart home for quadriplegia patients
Y Uzunay, K Bicakci
2007 IEEE International Conference on Bioinformatics and Biomedicine …, 2007
112007
How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification
K Bicakci, E Altuncu, MS Sahkulubey, HE Kiziloz, Y Uzunay
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
62018
Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs
K Bicakci, Y Uzunay
International Journal of Electronics and Communication Engineering 2 (6 …, 2008
62008
Towards zero trust: the design and implementation of a secure end-point device for remote working
K Bicakci, Y Uzunay, M Khan
2021 International Conference on Information Security and Cryptology …, 2021
52021
Analysis and evaluation of keystroke dynamics as a feature of contextual authentication
K Bicakci, O Salman, Y Uzunay, M Tan
2020 International Conference on Information Security and Cryptology …, 2020
52020
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
Y Uzunay, D Incebacak, K Bicakci
EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2007
52007
Bilişim Suçları Kapsamında Dijital Deliller
M Koçak, Y Uzunay
Akademik Bilişim Konferansı Bildirisi, 2-4, 2005
52005
Bilgisayar Ağlarına Yönelik Adli Bilişim
Y Uzunay
İzmir Yüksek Teknoloji Enstitüsü Adli Bilişim Çalıştayı. İzmir, 19-20, 2005
52005
Dijital Saldırılar, Emniyet Güçleri Açısından Önemi ve Korunma Yolları
Y Uzunay
Polis Bilimleri Dergisi 5 (2), 131-146, 2003
52003
Optimal data backup policies for information systems subject to sudden failure
S Tekin, K Bicakci, O Mersin, GN Erdem, A Canbay, Y Uzunay
Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023
42023
Bilgisayar Ağlarına Yönelik Adli Bilişim (Network Forensics)
Y UZUNAY
Adli Bilişim Çalıştayı, 2005
42005
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
Y Uzunay, K Bicakci
5th International Conference on Intelligent Systems, Modelling and Simulation, 2014
32014
UNIDES: an efficient real-time system to detect and block unauthorized Internet access
Y Uzunay, K Bicakci
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
32005
INTERNET ÜZERÍNDEN ÇOCUK PORNOGRAFÌSÌ VE MÜCADELEDE YAÇANAN SIKINTILAR
M KOÇAK, Y UZUNAY
Polis Bilimleri Dergisi 7 (1), 2005
22005
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
A Mahnamfar, K Bicakci, Y Uzunay
Computers & Security 139, 103739, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20