RİSK DEĞERLENDİRME KARAR MATRİSİ YÖNTEMİ KULLANARAK ÖRNEK BİR RİSK DEĞERLENDİRME RAPORUNUN OLUŞTURULMASI B ÇELİKTAŞ, Ü Nafiz The Journal of Academic Social Science Studies 1 (65), 483-504, 2024 | 17 | 2024 |
Siber güvenlik kavramının gelişimi ve türkiye özelinde bir değerlendirme B Çeliktaş Sosyal Bilimler Enstitüsü, 2016 | 16 | 2016 |
A higher-level security scheme for key access on cloud computing B Celiktas, I Celikbilek, E Ozdemir IEEE Access 9, 107347-107359, 2021 | 13 | 2021 |
The ransomware detection and prevention tool design by using signature and anomaly based detection methods B Çeliktaş Bilişim Enstitüsü, 2018 | 11 | 2018 |
Güncel Siber Güvenlik Tehditleri: Fidye Yazılımlar S Çelik, B Çeliktaş CyberPolitik Journal 3 (5), 105-132, 2018 | 6 | 2018 |
Man in the middle (MiTM) attack detection tool design B Celiktas, MS Tok, N Unlu International Journal Of Engineering Sciences & Research Technology 7 (8 …, 2018 | 5 | 2018 |
An inner product space-based hierarchical key assignment scheme for access control B Celiktas, E Ozdemır, S Guzey Authorea Preprints, 2023 | 4 | 2023 |
Muddywater apt group and a methodology proposal for macro malware analysis MS Tok, B Celiktas Bilişim Teknolojileri Dergisi 12 (3), 253-263, 2019 | 4 | 2019 |
A Higher Level Security Protocol for Cloud Computing B Celiktas, İ Çelikbilek, E Özdemir 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 3 | 2019 |
A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency I Celikbilek, B Celiktas, E Ozdemir IEEE Access, 2024 | 1 | 2024 |
GÜNCEL SİBER GÜVENLİK TEHDİTLERİ: FİDYE YAZILIMLAR S ÇELİK, B ÇELİKTAŞ Cyberpolitik Journal 2 (4), 296-323, 2017 | 1 | 2017 |
ÜLKELERİN SİBER GÜVENLİK GÜCÜ SIRALAMASI VE DÜNYA SİYASETİNDEKİ ÖNEMİ B ÇELİKTAŞ, Ü Nafiz The Journal of Academic Social Science Studies 3 (67), 469-488, 2024 | | 2024 |
Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing I Celikbilek, B Celiktas, E Ozdemir 2024 28th International Conference on Information Technology (IT), 1-5, 2024 | | 2024 |
Pros and Cons of Key Escrow Agreements in Cloud R Abou, B Celiktas | | 2023 |
CYBER SECURITY POWER RANKING BY COUNTRY AND ITS IMPORTANCE ON WORLD POLITICS NU Baris Celiktas The Journal of Academic Social Science Studies (JASSS) 67 (Spring III 2018 …, 2018 | | 2018 |
ISTANBUL TECHNICAL UNIVERSITY★ INFORMATICS INSTITUTE B ÇELİKTAŞ | | 2018 |
An anti-ransomware tool design by using behavioral and static analysis methods EK Baris Celiktas, Nafiz UNLU International Journal of Scientific Research in Computer Science and …, 2018 | | 2018 |
RİSK DEĞERLENDİRME KARAR MATRİSİ YÖNTEMİ KULLANARAK ÖRNEK BİR RİSK DEĞERLENDİRME RAPORUNUN OLUŞTURULMASI-CREATING A EXEMPLARY RISK ASSESMENT REPORT BY USING RISK ASSESSMENT … NU Baris Celiktas The Journal of Academic Social Science Studies (JASSS) 65 (Spring I 2018 …, 2018 | | 2018 |
THE IMPORTANCE OF WELL-PREPARED CYBER RISK INSURANCE AND OPEN SOURCE INTELLIGENCE (OSINT) B CELIKTAS, MS TOK, N UNLU | | 2018 |
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY MAN IN THE MIDDLE (MITM) ATTACK DETECTION TOOL DESIGN B Celiktas, TOK Mevlut Serkan, U Nafiz | | |