Bilgi teknolojileri Türkiye için nasıl bir gelecek hazırlamakta Y Ceyhun, MU Çağlayan Türkiye İş Bankası Kültür, 1997 | 200 | 1997 |
Bilgi teknolojileri Türkiye için nasıl bir gelecek hazırlamakta Y Ceyhun, MU Çağlayan Türkiye İş Bankası Kültür, 1997 | 200 | 1997 |
Location area planning in cellular networks using simulated annealing I Demirkol, C Ersoy, MU Caglayan, H Delic Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 113 | 2001 |
Distributed software system design representation using modified Petri nets SS Yau, MU Caglayan IEEE Transactions on Software Engineering, 733-745, 1983 | 111 | 1983 |
Distributed software system design representation using modified Petri nets SS Yau, MU Caglayan IEEE Transactions on Software Engineering, 733-745, 1983 | 111 | 1983 |
Relay attacks on bluetooth authentication and solutions A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan International Symposium on Computer and Information Sciences, 278-288, 2004 | 100 | 2004 |
Location area planning and cell-to-switch assignment in cellular networks I Demirkol, C Ersoy, MU Çaglayan, H Deliç IEEE Transactions on Wireless Communications 3 (3), 880-890, 2004 | 85 | 2004 |
Providing destructive privacy and scalability in RFID systems using PUFs M Akgün, MU Çaǧlayan Ad Hoc Networks 32, 32-42, 2015 | 77 | 2015 |
Trust assessment of security for e-health systems Ş Bahtiyar, MU Çağlayan Electronic Commerce Research and Applications 13 (3), 164-177, 2014 | 61 | 2014 |
Hybrid approaches for detecting credit card fraud Y Kültür, MU Çağlayan Expert Systems 34 (2), e12191, 2017 | 54 | 2017 |
Extracting trust information from security system of a service Ş Bahtiyar, MU Çağlayan Journal of Network and Computer Applications 35 (1), 480-490, 2012 | 50 | 2012 |
End-to-end reliable event transfer in wireless sensor networks N Tezcan, E Cayirci, MU Caglayan 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio …, 2004 | 42 | 2004 |
A formal role-based access control model for security policies in multi-domain mobile networks D Unal, MU Çaglayan Computer Networks 57 (1), 330-350, 2013 | 36 | 2013 |
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure A Levi, MU Caglayan, CK Koc ACM Transactions on Information and System Security (TISSEC) 7 (1), 21-59, 2004 | 34 | 2004 |
An efficient, dynamic and trust preserving public key infrastructure A Levi, MU Caglayan Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 203-214, 2000 | 34 | 2000 |
Design and performance evaluation of a banyan network based interconnection structure for ATM switches SF Oktug, MU Caglayan IEEE Journal on Selected Areas in Communications 15 (5), 807-816, 1997 | 30 | 1997 |
A secure and efficient group key agreement approach for mobile ad hoc networks O Ermiş, Ş Bahtiyar, E Anarım, MU Çağlayan Ad Hoc Networks 67, 24-39, 2017 | 28 | 2017 |
A novel cardholder behavior model for detecting credit card fraud Y Kültür, MU Çağlayan Application of Information and Communication Technologies (AICT), 2015 9th …, 2015 | 28 | 2015 |
The problem of trusted third party in authentication and digital signature protocols A Levi, MU Caglayan Proc. 12th Int’l Symp. Comput. Inf. Sci, 1997 | 28 | 1997 |
Attacks and improvements to chaotic map‐based RFID authentication protocol M Akgün, AO Bayrak, MU Çaǧlayan Security and Communication Networks 8 (18), 4028-4040, 2015 | 25 | 2015 |