Yusuf UZUNAY
Yusuf UZUNAY
PhD from Middle East Technical University
afad.gov.tr üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Bilişim Suçları Kapsamında Dijital Deliller (Digital Evidence in the Domain of Cyber Crime)
Y Uzunay, M Koçak
AB’05 Akademik Bilişim Konferansı, 2005
14*2005
İnternet Üzerinden Çocuk Pornografisi ve Mücadelede Yaşanan Sıkıntılar (Child Pornography on Internet and the Difficulties in Combating)
Y Uzunay, M Koçak
Turkish Journal of Police Studies 7 (1), 97-116, 2005
112005
SHA: A secure voice activated smart home for quadriplegia patients
Y Uzunay, K Bicakci
2007 IEEE International Conference on Bioinformatics and Biomedicine …, 2007
82007
Dijital Delil Araştırma Süreci (Digital Evidence Investigation Process)
Y Uzunay
2. Polis Bilişim Sempozyumu, 14-15, 2005
8*2005
Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs
K Bicakci, Y Uzunay
World Academy of Science, Engineering and Technology 2, 198-207, 2008
72008
Could we distinguish child users from adults using keystroke dynamics?
Y Uzun, K Bicakci, Y Uzunay
arXiv preprint arXiv:1511.05672, 2015
62015
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
Y Uzunay, D Incebacak, K Bicakci
EC2ND 2006, 105-114, 2007
42007
How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification
K Bicakci, E Altuncu, MS Sahkulubey, HE Kiziloz, Y Uzunay
International Conference on Information Security, 85-98, 2018
32018
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
Y Uzunay, K Bicakci
5th International Conference on Intelligent Systems, Modelling and Simulation, 2014
32014
UNIDES: an efficient real-time system to detect and block unauthorized Internet access
Y Uzunay, K Bicakci
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
32005
Bilgisayar Ağlarına Yönelik Adli Bilişim (Network Forensics)
Y UZUNAY
Adli Bilişim Çalıştayı, 2005
32005
Trust-in-the-middle: towards establishing trustworthiness of authentication proxies using trusted computing
Y Uzunay, K Bicakci
arXiv preprint arXiv:1511.05682, 2015
12015
Design and implementation of an unauthorized internet access blocking system validating the source information in internet access logs
Y Uzunay
M. sc, Sep, 2006
12006
INTERNET ÜZERÍNDEN ÇOCUK PORNOGRAFÌSÌ VE MÜCADELEDE YAÇANAN SIKINTILAR
M KOÇAK, Y UZUNAY
Polis Bilimleri Dergisi 7 (1), 2005
12005
Increasing trustworthiness of security critical applications using trusted computing
Y Uzunay
2014
An e-Government Information System Framework: Turkish National Agency Software Project
A EFE, Y UZUNAY, G TASCIOGLU
EGOVSHARE2009 International Conference on Egovernment Sharing Experiences 1 …, 2009
2009
A3D3M: AÇIK ANAHTAR ALTYAPISI DESTEKLİ DİJİTAL DELİLLERİ DOĞRULAMA MODELİ
Y UZUNAY, K BIÇAKCI
ABG2005: National Network and Information Security Symposium, 2005
2005
Digital Attacks, It’s Importance to Security Forces and Ways of Protection
Y UZUNAY, AE Müdürlüğü
Turkish Journal of Police Studies 5 (2), 131, 2003
2003
DİJİTAL DELİL ARAŞTIRMA SÜRECİ
Y UZUNAY, AE Müdürlüğü, BĐŞ Müdürlüğü
BİLGİSAYAR AĞLARINA YÖNELİK ADLİ BİLİŞİM (NETWORK FORENSICS)
Y UZUNAY, AE Müdürlüğü, BĐŞ Müdürlüğü
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20