Impact of education on security practices in ICT A Bostan, İ Akman Tehnicki Vjesnik-Technical Gazette 22 (1), 161-168, 2015 | 8 | 2015 |
Bulut bilişimde bilgi güvenliği ve standardizasyon çalışmaları. 6 G Şengül, A Bostan Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı 263, 267, 2013 | 8 | 2013 |
A smart classroom application: Monitoring and reporting attendance automatically using smart devices G Şengül, M Karakaya, A Bostan Int. J. Sci. Res. Inf. Syst. Eng. IJSRISE 3 (1), 39-43, 2017 | 6 | 2017 |
How Secure is Your Smart Watch? M Karakaya, A Bostan, E Gökçay International Journal of Information Security Science 5 (4), 90-95, 2016 | 6 | 2016 |
Remotely Monitoring Activities of the Elders Using Smart Watches M Karakaya, G Sengül, A Bostan Int. J. Sci. Res. Inf. Syst. Eng 3, 56, 2017 | 5 | 2017 |
Bilişim güvenliği: kullanıcı açısından bir durum tespiti A Bostan, İ Akman IV. Ağ ve Bigli Güvenliği Sempozyumu, 51-56, 2011 | 5 | 2011 |
Öğrenci ders devamının sınavlarda alınan notlara etkisi üzerine bir durum çalışması A BOSTAN, M KARAKAYA Mersin Üniversitesi Eğitim Fakültesi Dergisi 12 (1), 2016 | 4 | 2016 |
An undergraduate curriculum for deep learning G Tirkeş, CÇÇ Ekin, A Bostan, M Karakaya 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 3 | 2018 |
Customizing SSL Certificate Extensions to Reduce False-Positive Certificate Error/Warning Messages Ş Tarazan, A Bostan International Journal of Information Security Science 5 (2), 21-28, 2016 | 3 | 2016 |
Teaching computer networks: Theory and problem solving A Bostan Journal of Advances in Computer Networks 3 (4), 299-302, 2015 | 3 | 2015 |
Adli Bilişim Alanındaki Mevcut Problemler, Çözüm Önerileri ve Gelecek Öngörüleri G Şengül, FK Atsan, A Bostan Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı 17, 18, 2014 | 3 | 2014 |
ICT user and usage characteristics and e-mail security awareness A Bostan, İ Akman 2013 International Conference on Electronics, Computer and Computation …, 2013 | 3 | 2013 |
Deep Learning and Current Trends in Machine Learning A Bostan, C Ekin, G Şengül, M Karakaya, G Tirkeş 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 2 | 2018 |
Analyzing the requirements for E-government transition of Iraqi ICS services: An Iraqi correction services case study MA Alameri, A Bostan, I Akman 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 2 | 2017 |
Implicit learning with certificate warning messages on SSL web pages: what are they teaching? A Bostan Security and Communication Networks 9 (17), 4295-4300, 2016 | 2 | 2016 |
Chaos-Based Data Encryption Using Arnold’s CAT Map A Bostan, M Karakaya, G Şengül CHAOS 4 (1), 2018 | 1 | 2018 |
ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY İ Akman, A Bostan PEOPLE: International Journal of Social Sciences (2454-5898) 3, 1046-1063, 2018 | 1 | 2018 |
Shoulder Surfing Resistant Graphical Password Schema: Randomized Pass Points (RPP) H Bostan, A Bostan 2021 International Conference on Information Security and Cryptology …, 2021 | | 2021 |
Using Fuzzy Logic in Computerized Adaptive Tests A BOSTAN Bilişim Teknolojileri Dergisi 13 (3), 289-300, 2020 | | 2020 |
Uyarlamalı Bilgisayar Testlerinde Bulanık Mantık Kullanılması A BOSTAN Bilişim Teknolojileri Dergisi 13 (3), 289-300, 2020 | | 2020 |