Issue Date | Title | Author(s) |
2009 | The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing | Tuğlular, Tuğkan ; Kaya, Özgür; Müftüoğlu, Can Arda; Belli, Fevzi |
2008 | Automatic enforcement of location aware user based network access control policies | Tuğlular, Tuğkan |
Dec-2020 | Blackhole attacks in IoT networks | Sokat, Barış |
Feb-2011 | Challenges for the security analysis of next generation networks | Atay, Serap ; Masera, Marcelo |
2008 | Comparing the pre- and post-specified peer models for key agreement | Menezes, Alfred; Ustaoğlu, Berkant |
2017 | Comparison of group key establishment protocols | Şahin, Serap ; Aslanoğlu, Rabia |
Jun-2019 | Extended topology analysis of a detection mechanism implementation against Botnet Based DDoS flooding attack in SDN | Karakış, Emre |
2010 | Modeling efficient multi-chained stream signature protocol using communicating sequential processeses | Koltuksuz, Ahmet ; Özkan, Murat; Külahçıoğlu, Burcu |
2011 | Mutation-based evaluation of weighted test case selection for firewall testing | Tuğlular, Tuğkan ; Gerçek, Gürcan |
2023 | New Security Proofs and Complexity Records for Advanced Encryption Standard | Kara, O. |
2021 | NFA based regular expression matching on FPGA | Sert, Kamil; Bazlamaçcı, Cüneyt |
2022 | A novel countermeasure for selective forwarding attacks in IoT networks | Yaman, Okan; Sokat, Barış ; Ayav, Tolga ; Erten, Yusuf Murat |
2009 | Towards denial-of-service-resilient key agreement protocols | Stebila, Douglas; Ustaoğlu, Berkant |
2010 | Utilization of timed automata as a verification tool for security protocols | Koltuksuz, Ahmet ; Külahçıoğlu, Burcu; Özkan, Murat |