Takip et
Yusuf UZUNAY
Yusuf UZUNAY
PhD from Middle East Technical University
afad.gov.tr üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Bilişim Suçları Kapsamında Dijital Deliller (Digital Evidence in the Domain of Cyber Crime)
Y Uzunay, M Koçak
AB’05 Akademik Bilişim Konferansı, 2005
17*2005
İnternet Üzerinden Çocuk Pornografisi ve Mücadelede Yaşanan Sıkıntılar (Child Pornography on Internet and the Difficulties in Combating)
Y Uzunay, M Koçak
Turkish Journal of Police Studies 7 (1), 97-116, 2005
17*2005
Could we distinguish child users from adults using keystroke dynamics?
Y Uzun, K Bicakci, Y Uzunay
arXiv preprint arXiv:1511.05672, 2015
152015
Dijital Delil Araştırma Süreci (Digital Evidence Investigation Process)
Y Uzunay
2. Polis Bilişim Sempozyumu, 14-15, 2005
13*2005
SHA: A secure voice activated smart home for quadriplegia patients
Y Uzunay, K Bicakci
2007 IEEE International Conference on Bioinformatics and Biomedicine …, 2007
122007
Is FIDO2 passwordless authentication a hype or for real?: A position paper
K Bicakci, Y Uzunay
2022 15th International Conference on Information Security and Cryptography …, 2022
72022
How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification
K Bicakci, E Altuncu, MS Sahkulubey, HE Kiziloz, Y Uzunay
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
62018
Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs
K Bicakci, Y Uzunay
International Journal of Electronics and Communication Engineering 2 (6 …, 2008
62008
Analysis and evaluation of keystroke dynamics as a feature of contextual authentication
K Bicakci, O Salman, Y Uzunay, M Tan
2020 International Conference on Information Security and Cryptology …, 2020
52020
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
A Blyth, I Sutherland, Y Uzunay, D Incebacak, K Bicakci
EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2007
52007
Bilgisayar Ağlarına Yönelik Adli Bilişim
Y Uzunay
İzmir Yüksek Teknoloji Enstitüsü Adli Bilişim Çalıştayı. İzmir, 19-20, 2005
52005
Optimal data backup policies for information systems subject to sudden failure
S Tekin, K Bicakci, O Mersin, GN Erdem, A Canbay, Y Uzunay
Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023
42023
Towards zero trust: the design and implementation of a secure end-point device for remote working
K Bicakci, Y Uzunay, M Khan
2021 International Conference on Information Security and Cryptology …, 2021
42021
Bilgisayar Ağlarına Yönelik Adli Bilişim (Network Forensics)
Y UZUNAY
Adli Bilişim Çalıştayı, 2005
42005
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
Y Uzunay, K Bicakci
5th International Conference on Intelligent Systems, Modelling and Simulation, 2014
32014
UNIDES: an efficient real-time system to detect and block unauthorized Internet access
Y Uzunay, K Bicakci
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
32005
Dijital Saldırılar, Emniyet Güçleri Açısından Önemi ve Korunma Yolları
Y Uzunay
Polis Bilimleri Dergisi 5 (2), 131-146, 2003
32003
Trust-in-the-middle: towards establishing trustworthiness of authentication proxies using trusted computing
Y Uzunay, K Bicakci
arXiv preprint arXiv:1511.05682, 2015
12015
Design and implementation of an unauthorized internet access blocking system validating the source information in internet access logs
Y Uzunay
Middle East Technical University, 2006
12006
INTERNET ÜZERÍNDEN ÇOCUK PORNOGRAFÌSÌ VE MÜCADELEDE YAÇANAN SIKINTILAR
M KOÇAK, Y UZUNAY
Polis Bilimleri Dergisi 7 (1), 2005
12005
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20