Nazife Baykal
According to our database1,
Nazife Baykal
authored at least 44 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
1
1
1
1
2
4
1
1
1
1
2
1
1
1
1
1
2
1
1
1
1
3
1
3
5
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2020
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm.
J. Netw. Comput. Appl., 2020
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2019
I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains.
Turkish J. Electr. Eng. Comput. Sci., 2019
Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
2018
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
2017
Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense.
CoRR, 2017
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
2016
A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness.
Int. J. Crit. Infrastructure Prot., 2016
CoRR, 2016
Comput. Methods Programs Biomed., 2016
Regulatory approaches for cyber security of critical infrastructures: The case of Turkey.
Comput. Law Secur. Rev., 2016
Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016
2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the Cyber Security and Resiliency Policy Framework, 2014
Scientometrics, 2014
Integration of Federated Medical Systems for Vendor Neutral Image Access in Teleradiology Applications.
Proceedings of the e-Health - For Continuity of Care - Proceedings of MIE2014, the 25th European Medical Informatics Conference, Istanbul, Turkey, August 31, 2014
An infrastructure for efficient reporting workflow in grid based teleradiology architectures using Relation Based Semantic Matching and Integer Linear Programming.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
The analysis of feature selection methods and classification algorithms in permission based Android malware detection.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014
2013
Attack tree based information security risk assessment method integrating enterprise objectives with vulnerabilities.
Int. Arab J. Inf. Technol., 2013
2012
J. Medical Syst., 2012
2011
Proceedings of the Metadata and Semantic Research - 5th International Conference, 2011
2010
Design and evaluation of an ontology based information extraction system for radiological reports.
Comput. Biol. Medicine, 2010
2007
An integrated approach to breast diseases and breast cancer registry and research: BDRS as a web-based multi-institutional model.
Comput. Biol. Medicine, 2007
2006
Evaluation of a Hospital Information System in an International Context: Towards Implementing PB-ISM in Turkey.
Electron. J. Inf. Syst. Dev. Ctries., 2006
2005
2004
EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology.
Proceedings of the MEDINFO 2004, 2004
A New Design of Privilege Management Infrastructure with Binding Signature Semantics.
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication.
Proceedings of the Computer and Information Sciences, 2003
Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the AMIA 2003, 2003
Proceedings of the AMIA 2003, 2003
2002
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002
2000
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000
1999
Neural Process. Lett., 1999
1998
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1998
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1998
1996
Hydips: A Hybrid neural network based diagnostic tool for perinatal surveillance (Perinatal takipte bir hibrit nöron ağına dayanan tanı aracı)
PhD thesis, 1996
Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms.
Comput. Biol. Medicine, 1996