Παρακολούθηση
Dr Çağatay Yücel
Dr Çağatay Yücel
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα bournemouth.ac.uk
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Imaging and evaluating the memory access for malware
Ç Yücel, A Koltuksuz
Forensic Science International: Digital Investigation 32, 200903, 2020
282020
Age and gender as cyber attribution features in keystroke dynamic-based user classification processes
I Tsimperidis, C Yucel, V Katos
Electronics 10 (7), 835, 2021
192021
On the assessment of completeness and timeliness of actionable cyber threat intelligence artefacts
C Yucel, I Chalkias, D Mallis, E Karagiannis, D Cetinkaya, V Katos
Multimedia Communications, Services and Security: 10th International …, 2020
82020
Detecting user behavior in cyber threat intelligence: Development of Honeypsy system
M Odemis, C Yucel, A Koltuksuz
Security and Communication Networks 2022 (1), 7620125, 2022
72022
Suggesting a honeypot design to capture hacker psychology, personality and sophistication
M Odemis, C Yucel, A Koltuksuz, G Ozbilgin
13th International Conference on Cyber Warfare and Security. Academic …, 2018
62018
Education in cyber physical systems security: The case of connected autonomous vehicles
S McCall, C Yucel, V Katos
2021 IEEE Global Engineering Education Conference (EDUCON), 1379-1385, 2021
42021
Investigating IPTV Malware in the Wild
A Lockett, I Chalkias, C Yucel, J Henriksen-Bulmer, V Katos
Future Internet 15 (10), 325, 2023
22023
Trust and quality computation for cyber threat intelligence sharing platforms
KB Mavzer, E Konieczna, H Alves, C Yucel, I Chalkias, D Mallis, ...
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
22021
MAIT: Malware Analysis and Intelligence Tool
C Yucel, A Lockett, I Chalkias, D Mallis, V Katos
Information & Security 50 (1), 49-65, 2021
22021
An annotated bibliographical survey on cyber intelligence for cyber intelligence officers
C Yucel, A Koltuksuz
Journal of Information Warfare 13 (4), 1-11, 2014
22014
An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System
I Chalkias, C Yucel, D Mallis, J Rajamaki, F De Vecchis, V Katos
Digital Transformation, Cyber Security and Resilience: Second International …, 2023
12023
An information geometrical evaluation of Shannon information metrics on a discrete n-dimensional digital manifold
A Koltuksuz, C Yucel, AM Kademi
Heliyon 9 (6), 2023
12023
Privacy Goals for the Data Lifecycle
J Henriksen-Bulmer, C Yucel, S Faily, I Chalkias
Future Internet 14 (11), 315, 2022
12022
Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms
C Yucel, I Chalkias, D Mallis, D Cetinkaya, J Henriksen-Bulmer, A Cooper
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
12021
A programmable threat intelligence framework for containerized clouds
Ç Yücel, A Koltuksuz, M Ödemiş, AM Kademi, G Özbilgin
International Conference on Cyber Warfare and Security, 503-XVI, 2018
12018
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices
R Shah, D Cemiloglu, C Yucel, R Ali, V Katos
International Journal of Information Security, 1-14, 2024
2024
Privacy Essentials
J Taylor, J Henriksen-Bulmer, C Yucel
Electronics 13 (12), 2263, 2024
2024
Distributed and biometric signature-based identity proofing system for the maritime sector
T Akbas, A Koltuksuz, C Yucel
2023 8th International Conference on Computer Science and Engineering (UBMK …, 2023
2023
Clandestine cell based honeypot networks
C Yucel, A Koltuksuz, H Yagci
ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and …, 2016
2016
Software development for transitions of graphs from discrete state into the continuous state
Ç Yücel
2012
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20