2024
Reflection of Federal Data Protection Standards on Cloud Governance.
CoRR, 2024
Android Trojan Horse Spyware Attack: A Practical Implementation.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
2021
Digital Image Forensics Using Hexadecimal Image Analysis.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021
2019
An Intelligent Tool to Facilitate Home Building: U-Design.
Proceedings of the Intelligent Human Systems Integration 2019, 2019
2017
Cybersecurity Management Through Logging Analytics.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
2015
A Secure Healthcare System: From Design to Implementation.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015
2013
Applying error correction codes to achieve security and dependability.
Comput. Stand. Interfaces, 2013
Analysis of heuristic based access pattern obfuscation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
2012
A Hybrid Web Based Personal Health Record System Shielded with Comprehensive Security.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Bell-LaPadula Confidentiality Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Using alice in CS1: a quantitative experiment.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010
2009
A risk management approach to RBAC.
Risk Decis. Anal., 2009
Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
2007
Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
A Smart Card Mediated Mobile Platform for Secure E-Mail Communication.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
2006
Parallel performance of DES in ECB mode.
Proceedings of the International Symposium on Computer Networks, 2006
2005
Language Discrimination via PPM Model.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Word-Based Fixed and Flexible List Compression.
Proceedings of the Computer and Information Sciences, 2005
A Cryptographic Approach to Language Identification: PPM.
Proceedings of the ICEIS 2005, 2005
2004
Türkçe metinlerin sıkıştırılması ve modellenmesi (Compression and modelling of Turkish texts)
PhD thesis, 2004
Experiments on A Secure Compression Algorithm.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Investigating the Effects of Recency and Size of Training Text on Author Recognition Problem.
Proceedings of the Computer and Information Sciences, 2004
Improving the Compression Performance of Turkish Text with PoS Tags.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004
A Preprocessor Adding Security to and Improving the Performances of Arithmetic and Huffman Codings.
Proceedings of the Advances in Information Systems, Third International Conference, 2004
2003
A Security Embedded Text Compression Algorithm.
Proceedings of the Computer and Information Sciences, 2003