Ebru Celikel Cankaya

According to our database1, Ebru Celikel Cankaya authored at least 27 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reflection of Federal Data Protection Standards on Cloud Governance.
CoRR, 2024

Android Trojan Horse Spyware Attack: A Practical Implementation.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

2021
Digital Image Forensics Using Hexadecimal Image Analysis.
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021

2019
An Intelligent Tool to Facilitate Home Building: U-Design.
Proceedings of the Intelligent Human Systems Integration 2019, 2019

2017
Cybersecurity Management Through Logging Analytics.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2015
A Secure Healthcare System: From Design to Implementation.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

2013
Applying error correction codes to achieve security and dependability.
Comput. Stand. Interfaces, 2013

Analysis of heuristic based access pattern obfuscation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
A Hybrid Web Based Personal Health Record System Shielded with Comprehensive Security.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Chinese Wall Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Bell-LaPadula Confidentiality Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Using alice in CS1: a quantitative experiment.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

2009
A risk management approach to RBAC.
Risk Decis. Anal., 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

2007
Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Smart Card Mediated Mobile Platform for Secure E-Mail Communication.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Parallel performance of DES in ECB mode.
Proceedings of the International Symposium on Computer Networks, 2006

2005
Language Discrimination via PPM Model.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Word-Based Fixed and Flexible List Compression.
Proceedings of the Computer and Information Sciences, 2005

A Cryptographic Approach to Language Identification: PPM.
Proceedings of the ICEIS 2005, 2005

2004
Türkçe metinlerin sıkıştırılması ve modellenmesi (Compression and modelling of Turkish texts)
PhD thesis, 2004

Experiments on A Secure Compression Algorithm.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Investigating the Effects of Recency and Size of Training Text on Author Recognition Problem.
Proceedings of the Computer and Information Sciences, 2004

Improving the Compression Performance of Turkish Text with PoS Tags.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

A Preprocessor Adding Security to and Improving the Performances of Arithmetic and Huffman Codings.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
A Security Embedded Text Compression Algorithm.
Proceedings of the Computer and Information Sciences, 2003


  Loading...