SEARCH RESULTS

20 of 29 results are displayed

Search









Search by Years

Custom Date Selection

A Textual Clean-Label Backdoor Attack Strategy against Spam Detection
2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh/İNGİLTERE, Vol. 1, 15 Aralık 2021, s. 1-8
YERLİKAYA FAHRİ ANIL, BAHTİYAR ŞERİF
Şerif Bahtiyar Full Text Proceedings Paper
Adaptive Trust Scenarios for Mobile Security
The 13th International Conference on Mobile Web and Intelligent Information Systems, MobiWis2016, Viyana/AVUSTURYA, 22 Ağustos 2016
BAHTİYAR ŞERİF,ERMİŞ ORHAN,ÇAĞLAYAN MEHMET UFUK
Şerif Bahtiyar Full Text Proceedings Paper
OCIDS: An Online CNN-Based Network Intrusion Detection System for DDoS Attacks with IoT Botnets
2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh/İNGİLTERE, Vol. 1, 15 Aralık 2021, s. 1-8
AYDIN ERİM, BAHTİYAR ŞERİF
Şerif Bahtiyar Full Text Proceedings Paper
Security Information Propagation on Entities for Trust Assessment
4th IFIP WG 11.11 International Conference on Trust Management, IFIPTM2010, Morioka/JAPONYA, 14 Haziran 2010
BAHTİYAR ŞERİF,CİHAN MURAT,ÇAĞLAYAN MEHMET UFUK
Şerif Bahtiyar Full Text Proceedings Paper
A Survey on Malware Detection with Deep Learning
SIN 2020: 13th International Conference on Security of Information and Networks, İstanbul/TÜRKİYE, Vol. 34, 4 Kasım 2020, s. 1-6
ŞAHİN MUHAMMET, BAHTİYAR ŞERİF
Şerif Bahtiyar Full Text Proceedings Paper GüvenlikDerin Öğrenme
An Architectural Approach for Assessing System Trust Based on Security Policy Specifications and Security Mechanisms
ACM 2nd International Conference on Security of Information and Networks, SIN’09, Gazi Magosa/KUZEY KIBRIS TÜRK CUMHURİYETİ, 6 Ekim 2009, s. 71-74
BAHTİYAR ŞERİF,CİHAN MURAT,ÇAĞLAYAN MEHMET UFUK
Şerif Bahtiyar Abstract Proceedings Paper
A UML profile for role based access control
Proceedings of the 2nd international conference on Security of information and networks - SIN '09, 6 Ekim 2009
CİRİT ÇAĞDAŞ,BUZLUCA FEZA
Feza Buzluca Full Text Proceedings Paper
Comparative evaluation of different classification techniques for masquerade attack detection
International Journal of Information and Computer Security, Vol. 13, No. 2, Nisan 2020, ISSN: 1744-1765
ZAİM ABDÜL HALİM, AKBULUT AKHAN, ELMASRİ WİSAM
Design and formal verification of a cloud compliant secure logging mechanism
IET Information Security, Stevenage/İNGİLTERE, Vol. 10, No. 4, Temmuz 2016, s. 203-214, ISSN: 1751-8709
SANDIKKAYA MEHMET TAHİR,OVATMAN TOLGA,HARMANCI ALİ EMRE
Tolga Ovatman Article

CONTACT INFORMATIONS

İstanbul Teknik Üniversitesi Rectorate Building , İTÜ Ayazağa Campus, Maslak-Sarıyer / İstanbul , Phone: +90 212 285 3930