Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks K Bicakci, B Tavli Computer Standards & Interfaces 31 (5), 931-941, 2009 | 230 | 2009 |
A survey of visual sensor network platforms B Tavli, K Bicakci, R Zilan, JM Barcelo-Ordinas Multimedia Tools and Applications 60, 689-726, 2012 | 191 | 2012 |
A survey of denial-of-service attacks and solutions in the smart grid A Huseinović, S Mrdović, K Bicakci, S Uludag IEEE Access 8, 177447-177470, 2020 | 123 | 2020 |
A quantitative CVSS-based cyber security risk assessment methodology for IT systems MU Aksu, MH Dilek, Eİ Tatlı, K Bicakci, HI Dirik, MU Demirezen, T Aykır 2017 International Carnahan Conference on Security Technology (ICCST), 1-8, 2017 | 101 | 2017 |
Infinite length hash chains and their applications K Bicakci, N Baykal Proceedings. Eleventh IEEE International Workshops on Enabling Technologies …, 2002 | 91 | 2002 |
The future of security in wireless multimedia sensor networks: a position paper M Guerrero-Zapata, R Zilan, JM Barceló-Ordinas, K Bicakci, B Tavli Telecommunication Systems 45 (1), 77-91, 2010 | 87 | 2010 |
The impact of transmission power control strategies on lifetime of wireless sensor networks H Cotuk, K Bicakci, B Tavli, E Uzun IEEE Transactions on Computers 63 (11), 2866-2879, 2013 | 80 | 2013 |
Towards usable solutions to graphical password hotspot problem K Bicakci, NB Atalay, M Yuceel, H Gurbaslar, B Erdeniz 2009 33rd Annual IEEE International Computer Software and Applications …, 2009 | 67 | 2009 |
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies HU Yildiz, K Bicakci, B Tavli, H Gultekin, D Incebacak Ad Hoc Networks 37, 301-323, 2016 | 65 | 2016 |
Automated generation of attack graphs using NVD MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu, E Tatli Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 58 | 2018 |
The impact of one-time energy costs on network lifetime in wireless sensor networks K Bicakci, H Gultekin, B Tavli IEEE Communications Letters 13 (12), 905-907, 2009 | 58 | 2009 |
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks K Bicakci, B Tavli Ad Hoc Networks 8 (6), 582-596, 2010 | 56 | 2010 |
Mobile authentication secure against man-in-the-middle attacks K Bicakci, D Unal, N Ascioglu, O Adalier Procedia Computer Science 34, 323-329, 2014 | 48 | 2014 |
Server assisted signatures revisited K Bicakci, N Baykal Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004 | 45 | 2004 |
Maximizing lifetime of event-unobservable wireless sensor networks K Bicakci, H Gultekin, B Tavli, IE Bagci Computer Standards & Interfaces 33 (4), 401-410, 2011 | 43 | 2011 |
How to construct optimal one-time signatures K Bicakci, G Tsudik, B Tung Computer Networks 43 (3), 339-349, 2003 | 39 | 2003 |
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset Y Uzun, K Bicakci Computers & Security 31 (5), 717-726, 2012 | 31 | 2012 |
Lifetime bounds of wireless sensor networks preserving perfect sink unobservability K Bicakci, IE Bagci, B Tavli IEEE Communications Letters 15 (2), 205-207, 2011 | 31 | 2011 |
One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication K Bicakci, N Baykal International Symposium on Computer and Information Sciences, 794-801, 2003 | 30 | 2003 |
Graphical passwords as browser extension: Implementation and usability study K Bicakci, M Yuceel, B Erdeniz, H Gurbaslar, NB Atalay IFIP International Conference on Trust Management, 15-29, 2009 | 29 | 2009 |