关注
Yusuf UZUNAY
Yusuf UZUNAY
PhD from Middle East Technical University
在 afad.gov.tr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Bilişim Suçları Kapsamında Dijital Deliller (Digital Evidence in the Domain of Cyber Crime)
Y Uzunay, M Koçak
AB’05 Akademik Bilişim Konferansı, 2005
19*2005
İnternet Üzerinden Çocuk Pornografisi ve Mücadelede Yaşanan Sıkıntılar (Child Pornography on Internet and the Difficulties in Combating)
Y Uzunay, M Koçak
Turkish Journal of Police Studies 7 (1), 97-116, 2005
18*2005
Could we distinguish child users from adults using keystroke dynamics?
Y Uzun, K Bicakci, Y Uzunay
arXiv preprint arXiv:1511.05672, 2015
152015
Dijital Delil Araştırma Süreci (Digital Evidence Investigation Process)
Y Uzunay
2. Polis Bilişim Sempozyumu, 14-15, 2005
14*2005
SHA: A secure voice activated smart home for quadriplegia patients
Y Uzunay, K Bicakci
2007 IEEE International Conference on Bioinformatics and Biomedicine …, 2007
112007
Is FIDO2 passwordless authentication a hype or for real?: A position paper
K Bicakci, Y Uzunay
2022 15th International Conference on Information Security and Cryptography …, 2022
102022
How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification
K Bicakci, E Altuncu, MS Sahkulubey, HE Kiziloz, Y Uzunay
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
62018
Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs
K Bicakci, Y Uzunay
International Journal of Electronics and Communication Engineering 2 (6 …, 2008
62008
Analysis and evaluation of keystroke dynamics as a feature of contextual authentication
K Bicakci, O Salman, Y Uzunay, M Tan
2020 International Conference on Information Security and Cryptology …, 2020
52020
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
Y Uzunay, D Incebacak, K Bicakci
EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2007
52007
Bilişim Suçları Kapsamında Dijital Deliller
M Koçak, Y Uzunay
Akademik Bilişim Konferansı Bildirisi, 2-4, 2005
52005
Bilgisayar Ağlarına Yönelik Adli Bilişim
Y Uzunay
İzmir Yüksek Teknoloji Enstitüsü Adli Bilişim Çalıştayı. İzmir, 19-20, 2005
52005
Dijital Saldırılar, Emniyet Güçleri Açısından Önemi ve Korunma Yolları
Y Uzunay
Polis Bilimleri Dergisi 5 (2), 131-146, 2003
52003
Optimal data backup policies for information systems subject to sudden failure
S Tekin, K Bicakci, O Mersin, GN Erdem, A Canbay, Y Uzunay
Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023
42023
Towards zero trust: the design and implementation of a secure end-point device for remote working
K Bicakci, Y Uzunay, M Khan
2021 International Conference on Information Security and Cryptology …, 2021
42021
Bilgisayar Ağlarına Yönelik Adli Bilişim (Network Forensics)
Y UZUNAY
Adli Bilişim Çalıştayı, 2005
42005
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
Y Uzunay, K Bicakci
5th International Conference on Intelligent Systems, Modelling and Simulation, 2014
32014
UNIDES: an efficient real-time system to detect and block unauthorized Internet access
Y Uzunay, K Bicakci
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
32005
INTERNET ÜZERÍNDEN ÇOCUK PORNOGRAFÌSÌ VE MÜCADELEDE YAÇANAN SIKINTILAR
M KOÇAK, Y UZUNAY
Polis Bilimleri Dergisi 7 (1), 2005
22005
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
A Mahnamfar, K Bicakci, Y Uzunay
Computers & Security 139, 103739, 2024
12024
系统目前无法执行此操作,请稍后再试。
文章 1–20