Follow
Yusuf UZUNAY
Yusuf UZUNAY
PhD from Middle East Technical University
Verified email at afad.gov.tr
Title
Cited by
Cited by
Year
Bilişim Suçları Kapsamında Dijital Deliller (Digital Evidence in the Domain of Cyber Crime)
Y Uzunay, M Koçak
AB’05 Akademik Bilişim Konferansı, 2005
17*2005
İnternet Üzerinden Çocuk Pornografisi ve Mücadelede Yaşanan Sıkıntılar (Child Pornography on Internet and the Difficulties in Combating)
Y Uzunay, M Koçak
Turkish Journal of Police Studies 7 (1), 97-116, 2005
17*2005
Could we distinguish child users from adults using keystroke dynamics?
Y Uzun, K Bicakci, Y Uzunay
arXiv preprint arXiv:1511.05672, 2015
152015
Dijital Delil Araştırma Süreci (Digital Evidence Investigation Process)
Y Uzunay
2. Polis Bilişim Sempozyumu, 14-15, 2005
13*2005
SHA: A secure voice activated smart home for quadriplegia patients
Y Uzunay, K Bicakci
2007 IEEE International Conference on Bioinformatics and Biomedicine …, 2007
122007
Is FIDO2 passwordless authentication a hype or for real?: A position paper
K Bicakci, Y Uzunay
2022 15th International Conference on Information Security and Cryptography …, 2022
72022
How safe is safety number? A user study on SIGNAL’s fingerprint and safety number methods for public key verification
K Bicakci, E Altuncu, MS Sahkulubey, HE Kiziloz, Y Uzunay
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
62018
Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs
K Bicakci, Y Uzunay
International Journal of Electronics and Communication Engineering 2 (6 …, 2008
62008
Analysis and evaluation of keystroke dynamics as a feature of contextual authentication
K Bicakci, O Salman, Y Uzunay, M Tan
2020 International Conference on Information Security and Cryptology …, 2020
52020
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
A Blyth, I Sutherland, Y Uzunay, D Incebacak, K Bicakci
EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2007
52007
Bilgisayar Ağlarına Yönelik Adli Bilişim
Y Uzunay
İzmir Yüksek Teknoloji Enstitüsü Adli Bilişim Çalıştayı. İzmir, 19-20, 2005
52005
Optimal data backup policies for information systems subject to sudden failure
S Tekin, K Bicakci, O Mersin, GN Erdem, A Canbay, Y Uzunay
Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023
42023
Towards zero trust: the design and implementation of a secure end-point device for remote working
K Bicakci, Y Uzunay, M Khan
2021 International Conference on Information Security and Cryptology …, 2021
42021
Bilgisayar Ağlarına Yönelik Adli Bilişim (Network Forensics)
Y UZUNAY
Adli Bilişim Çalıştayı, 2005
42005
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
Y Uzunay, K Bicakci
5th International Conference on Intelligent Systems, Modelling and Simulation, 2014
32014
UNIDES: an efficient real-time system to detect and block unauthorized Internet access
Y Uzunay, K Bicakci
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
32005
Dijital Saldırılar, Emniyet Güçleri Açısından Önemi ve Korunma Yolları
Y Uzunay
Polis Bilimleri Dergisi 5 (2), 131-146, 2003
32003
Trust-in-the-middle: towards establishing trustworthiness of authentication proxies using trusted computing
Y Uzunay, K Bicakci
arXiv preprint arXiv:1511.05682, 2015
12015
Design and implementation of an unauthorized internet access blocking system validating the source information in internet access logs
Y Uzunay
Middle East Technical University, 2006
12006
INTERNET ÜZERÍNDEN ÇOCUK PORNOGRAFÌSÌ VE MÜCADELEDE YAÇANAN SIKINTILAR
M KOÇAK, Y UZUNAY
Polis Bilimleri Dergisi 7 (1), 2005
12005
The system can't perform the operation now. Try again later.
Articles 1–20