Follow
Kemal Bıšakcı
Title
Cited by
Cited by
Year
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
K Bicakci, B Tavli
Computer Standards & Interfaces 31 (5), 931-941, 2009
2062009
A survey of visual sensor network platforms
B Tavli, K Bicakci, R Zilan, JM Barcelo-Ordinas
Multimedia Tools and Applications 60 (3), 689-726, 2012
1782012
Infinite length hash chains and their applications
K Bicakci, N Baykal
Proceedings. Eleventh IEEE International Workshops on Enabling Technologiesá…, 2002
922002
The future of security in wireless multimedia sensor networks
M Guerrero-Zapata, R Zilan, JM Barcelˇ-Ordinas, K Bicakci, B Tavli
Telecommunication Systems 45 (1), 77-91, 2010
832010
The impact of transmission power control strategies on lifetime of wireless sensor networks
H Cotuk, K Bicakci, B Tavli, E Uzun
IEEE Transactions on Computers 63 (11), 2866-2879, 2013
762013
Towards usable solutions to graphical password hotspot problem
K Bicakci, NB Atalay, M Yuceel, H Gurbaslar, B Erdeniz
2009 33rd Annual IEEE International Computer Software and Applicationsá…, 2009
582009
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks
K Bicakci, B Tavli
Ad Hoc Networks 8 (6), 582-596, 2010
562010
The impact of one-time energy costs on network lifetime in wireless sensor networks
K Bicakci, H Gultekin, B Tavli
IEEE Communications Letters 13 (12), 905-907, 2009
552009
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies
HU Yildiz, K Bicakci, B Tavli, H Gultekin, D Incebacak
Ad Hoc Networks 37, 301-323, 2016
542016
A quantitative CVSS-based cyber security risk assessment methodology for IT systems
MU Aksu, MH Dilek, Eİ Tatlı, K Bicakci, HI Dirik, MU Demirezen, T Aykır
2017 International Carnahan Conference on Security Technology (ICCST), 1-8, 2017
442017
Mobile authentication secure against man-in-the-middle attacks
K Bicakci, D Unal, N Ascioglu, O Adalier
Procedia Computer Science 34, 323-329, 2014
432014
Maximizing lifetime of event-unobservable wireless sensor networks
K Bicakci, H Gultekin, B Tavli, IE Bagci
Computer Standards & Interfaces 33 (4), 401-410, 2011
422011
Server assisted signatures revisited
K Bicakci, N Baykal
Cryptographers’ Track at the RSA Conference, 143-156, 2004
402004
How to construct optimal one-time signatures
K Bicakci, G Tsudik, B Tung
Computer Networks 43 (3), 339-349, 2003
402003
Lifetime bounds of wireless sensor networks preserving perfect sink unobservability
K Bicakci, IE Bagci, B Tavli
IEEE Communications Letters 15 (2), 205-207, 2011
332011
Automated generation of attack graphs using nvd
MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu, E Tatli
Proceedings of the Eighth ACM Conference on Data and Application Securityá…, 2018
312018
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
Y Uzun, K Bicakci
Computers & Security 31 (5), 717-726, 2012
292012
SAOTS: A new efficient server assisted signature scheme for pervasive computing
K Bicakci, N Baykal
Security in pervasive computing, 187-200, 2004
282004
One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication
K Bicakci, N Baykal
International Symposium on Computer and Information Sciences, 794-801, 2003
272003
A survey of denial-of-service attacks and solutions in the smart grid
A Huseinović, S Mrdović, K Bicakci, S Uludag
IEEE Access 8, 177447-177470, 2020
262020
The system can't perform the operation now. Try again later.
Articles 1–20