Bilişim Suçları Kapsamında Dijital Deliller (Digital Evidence in the Domain of Cyber Crime) Y Uzunay, M Koçak AB’05 Akademik Bilişim Konferansı, 2005 | 19* | 2005 |
İnternet Üzerinden Çocuk Pornografisi ve Mücadelede Yaşanan Sıkıntılar (Child Pornography on Internet and the Difficulties in Combating) Y Uzunay, M Koçak Turkish Journal of Police Studies 7 (1), 97-116, 2005 | 18* | 2005 |
Could we distinguish child users from adults using keystroke dynamics? Y Uzun, K Bicakci, Y Uzunay arXiv preprint arXiv:1511.05672, 2015 | 15 | 2015 |
Dijital Delil Araştırma Süreci (Digital Evidence Investigation Process) Y Uzunay 2. Polis Bilişim Sempozyumu, 14-15, 2005 | 14* | 2005 |
Is FIDO2 passwordless authentication a hype or for real?: A position paper K Bicakci, Y Uzunay 2022 15th International Conference on Information Security and Cryptography …, 2022 | 13 | 2022 |
SHA: A secure voice activated smart home for quadriplegia patients Y Uzunay, K Bicakci 2007 IEEE International Conference on Bioinformatics and Biomedicine …, 2007 | 11 | 2007 |
How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification K Bicakci, E Altuncu, MS Sahkulubey, HE Kiziloz, Y Uzunay Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 6 | 2018 |
Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs K Bicakci, Y Uzunay International Journal of Electronics and Communication Engineering 2 (6 …, 2008 | 6 | 2008 |
Towards zero trust: the design and implementation of a secure end-point device for remote working K Bicakci, Y Uzunay, M Khan 2021 International Conference on Information Security and Cryptology …, 2021 | 5 | 2021 |
Analysis and evaluation of keystroke dynamics as a feature of contextual authentication K Bicakci, O Salman, Y Uzunay, M Tan 2020 International Conference on Information Security and Cryptology …, 2020 | 5 | 2020 |
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model Y Uzunay, D Incebacak, K Bicakci EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2007 | 5 | 2007 |
Bilişim Suçları Kapsamında Dijital Deliller M Koçak, Y Uzunay Akademik Bilişim Konferansı Bildirisi, 2-4, 2005 | 5 | 2005 |
Bilgisayar Ağlarına Yönelik Adli Bilişim Y Uzunay İzmir Yüksek Teknoloji Enstitüsü Adli Bilişim Çalıştayı. İzmir, 19-20, 2005 | 5 | 2005 |
Dijital Saldırılar, Emniyet Güçleri Açısından Önemi ve Korunma Yolları Y Uzunay Polis Bilimleri Dergisi 5 (2), 131-146, 2003 | 5 | 2003 |
Optimal data backup policies for information systems subject to sudden failure S Tekin, K Bicakci, O Mersin, GN Erdem, A Canbay, Y Uzunay Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023 | 4 | 2023 |
Bilgisayar Ağlarına Yönelik Adli Bilişim (Network Forensics) Y UZUNAY Adli Bilişim Çalıştayı, 2005 | 4 | 2005 |
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing Y Uzunay, K Bicakci 5th International Conference on Intelligent Systems, Modelling and Simulation, 2014 | 3 | 2014 |
UNIDES: an efficient real-time system to detect and block unauthorized Internet access Y Uzunay, K Bicakci 11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005 | 3 | 2005 |
INTERNET ÜZERÍNDEN ÇOCUK PORNOGRAFÌSÌ VE MÜCADELEDE YAÇANAN SIKINTILAR M KOÇAK, Y UZUNAY Polis Bilimleri Dergisi 7 (1), 2005 | 2 | 2005 |
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems A Mahnamfar, K Bicakci, Y Uzunay Computers & Security 139, 103739, 2024 | 1 | 2024 |