关注
Kemal Bıçakcı
标题
引用次数
引用次数
年份
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
K Bicakci, B Tavli
Computer Standards & Interfaces 31 (5), 931-941, 2009
2302009
A survey of visual sensor network platforms
B Tavli, K Bicakci, R Zilan, JM Barcelo-Ordinas
Multimedia Tools and Applications 60, 689-726, 2012
1912012
A survey of denial-of-service attacks and solutions in the smart grid
A Huseinović, S Mrdović, K Bicakci, S Uludag
IEEE Access 8, 177447-177470, 2020
1232020
A quantitative CVSS-based cyber security risk assessment methodology for IT systems
MU Aksu, MH Dilek, Eİ Tatlı, K Bicakci, HI Dirik, MU Demirezen, T Aykır
2017 International Carnahan Conference on Security Technology (ICCST), 1-8, 2017
1012017
Infinite length hash chains and their applications
K Bicakci, N Baykal
Proceedings. Eleventh IEEE International Workshops on Enabling Technologies …, 2002
912002
The future of security in wireless multimedia sensor networks: a position paper
M Guerrero-Zapata, R Zilan, JM Barceló-Ordinas, K Bicakci, B Tavli
Telecommunication Systems 45 (1), 77-91, 2010
872010
The impact of transmission power control strategies on lifetime of wireless sensor networks
H Cotuk, K Bicakci, B Tavli, E Uzun
IEEE Transactions on Computers 63 (11), 2866-2879, 2013
802013
Towards usable solutions to graphical password hotspot problem
K Bicakci, NB Atalay, M Yuceel, H Gurbaslar, B Erdeniz
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
672009
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies
HU Yildiz, K Bicakci, B Tavli, H Gultekin, D Incebacak
Ad Hoc Networks 37, 301-323, 2016
652016
Automated generation of attack graphs using NVD
MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu, E Tatli
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
582018
The impact of one-time energy costs on network lifetime in wireless sensor networks
K Bicakci, H Gultekin, B Tavli
IEEE Communications Letters 13 (12), 905-907, 2009
582009
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks
K Bicakci, B Tavli
Ad Hoc Networks 8 (6), 582-596, 2010
562010
Mobile authentication secure against man-in-the-middle attacks
K Bicakci, D Unal, N Ascioglu, O Adalier
Procedia Computer Science 34, 323-329, 2014
482014
Server assisted signatures revisited
K Bicakci, N Baykal
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
452004
Maximizing lifetime of event-unobservable wireless sensor networks
K Bicakci, H Gultekin, B Tavli, IE Bagci
Computer Standards & Interfaces 33 (4), 401-410, 2011
432011
How to construct optimal one-time signatures
K Bicakci, G Tsudik, B Tung
Computer Networks 43 (3), 339-349, 2003
392003
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
Y Uzun, K Bicakci
Computers & Security 31 (5), 717-726, 2012
312012
Lifetime bounds of wireless sensor networks preserving perfect sink unobservability
K Bicakci, IE Bagci, B Tavli
IEEE Communications Letters 15 (2), 205-207, 2011
312011
One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication
K Bicakci, N Baykal
International Symposium on Computer and Information Sciences, 794-801, 2003
302003
Graphical passwords as browser extension: Implementation and usability study
K Bicakci, M Yuceel, B Erdeniz, H Gurbaslar, NB Atalay
IFIP International Conference on Trust Management, 15-29, 2009
292009
系统目前无法执行此操作,请稍后再试。
文章 1–20