A quantitative CVSS-based cyber security risk assessment methodology for IT systems MU Aksu, MH Dilek, Eİ Tatlı, K Bicakci, HI Dirik, MU Demirezen, T Aykır 2017 International Carnahan Conference on Security Technology (ICCST), 1-8, 2017 | 114 | 2017 |
Cracking more Password Hashes with Patterns E Tatli Information Forensics and Security, IEEE Transactions on 10 (8), 1656 - 1665, 2015 | 90 | 2015 |
Automated generation of attack graphs using NVD MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu, E Tatli Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 65 | 2018 |
Detecting cybersecurity events from noisy short text S Yagcioglu, MS Seyfioglu, B Citamak, B Bardak, S Guldamlasioglu, ... arXiv preprint arXiv:1904.05054, 2019 | 27 | 2019 |
Security challenges of location-aware mobile business EI Tatly, D Stegemann, S Lucks Second IEEE International Workshop on Mobile Commerce and Services, 84-95, 2005 | 26 | 2005 |
Context data model for privacy EI Tatlı PRIME Project Standardization Workshop, Zürich, 2006 | 21 | 2006 |
WIVET—benchmarking coverage qualities of web crawlers Eİ Tatli, B Urgun The Computer Journal 60 (4), 555-572, 2017 | 14 | 2017 |
Analysis of HTTP Security Headers in Turkey E Kısa, Eİ Tatlı 9th International Information Security and Cryptography Conference (ISCTurkey16), 2016 | 12* | 2016 |
Issues on designing a cryptographic compiler S Lucks, N Schmoigl, EI Tatlı Gesellschaft für Informatik eV, 2005 | 12* | 2005 |
Privacy in Danger: Let’s google your privacy EI Tatli IFIP International Summer School on the Future of Identity in the …, 2007 | 9 | 2007 |
Google reveals cryptographic secrets EI Tatlı Kryptowochenende, Kloster Bronbach, 2006 | 9 | 2006 |
Mobile identity management revisited EI Tatli, S Lucks Electronic Notes in Theoretical Computer Science 244, 125-137, 2009 | 8 | 2009 |
The Past and Future of Mobile Malwares MO Topgül, Eİ Tatli The 7th International Conference on Information Security and Cryptology …, 2014 | 7 | 2014 |
Extending P3P/Appel for Friend Finder EI Tatli 2007 International Conference on Mobile Data Management, 243-247, 2007 | 6 | 2007 |
Dynamic mobile anonymity with mixing EI Tatli, D Stegemann, S Lucks Technical reports 6, 2006 | 6 | 2006 |
Security in context-aware mobile business applications (PhD Thesis) EI Tatli Universität Mannheim, 2008 | 5* | 2008 |
Security Analysis of Medical Devices within Wireless Body Area Networks and Mobile Health Applications A DEMİR, Eİ TATLI Bilişim Teknolojileri Dergisi 11 (1), 1-8, 2018 | 3 | 2018 |
Abused android permissions by advertising networks M Ogul, S Baktir, EI Tatli 2014 International Conference on IT Convergence and Security (ICITCS), 1-4, 2014 | 3 | 2014 |
Developer-oriented web security by integrating secure SDLC into IDEs Eİ TATLI Sakarya University Journal of Computer and Information Sciences 1 (1), 36-44, 2018 | 2 | 2018 |
Password Replacement Patterns EI Tatli, E Seker CoDIT 2018 - The 5th edition in the series of IEEE International Conference …, 2018 | 2 | 2018 |