101 results on '"Aydos, Murat"'
Search Results
2. Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors
3. GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings
4. ERP failure: A systematic mapping of the literature
5. Security testing of web applications: A systematic mapping of the literature
6. The rise of ransomware: Forensic analysis for windows based ransomware attacks
7. Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision
8. LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition
9. A Blockchain Based Decentralized Identity, Access Management, and Trust Evaluation Framework for IoT
10. Comparison of Top 10 Well-Known Blockchain Consensus Algorithms
11. Management of Priapism: Results of a Nationwide Survey and Comparison with International Guidelines.
12. Software Implementation Performances of Block Ciphers: A Systematic Literature Review
13. Relay Attacks on Bluetooth Authentication and Solutions
14. Upper pole access is safe and effective for pediatric percutaneous nephrolithotomy
15. Cyber Security of Connected Autonomous Vehicles
16. Cyber Security of Connected Autonomous Vehicles
17. A Tree Based Machine Learning and Deep Learning Classification for Network Intrusion Detection
18. The Role of Educational Level and Cognitive Status in Men Undergoing Artificial Urinary Sphincter Implantation
19. AUTHOR REPLY
20. Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
21. Zararlı Yazılımların Karekterislik Analizi: Cryptowall Fidye Yazılım Analizi
22. Local Image Descriptor Based Phishing Web Page Recognition as an Open-Set Problem
23. Brand Recognition of Phishing Web Pages via Global Image Descriptors
24. Detection and Analysis of Attacks Against Web Services by the SQL Injection Method
25. Eğitimde Veri Madenciliği ve Uygulamaları
26. Evaluation of Trustworthy Scrum Employment for Agile Software Development based on the Views of Software Developers
27. Assessing risks and threats with layered approach to Internet of Things security
28. PD32-10 EVALUATION OF EDUCATIONAL LEVEL AND COGNITIVE STATUS IN MEN UNDERGOING ARTIFICIAL URINARY SPHINCTER: A NEW INSIGHT TO PREDICTIVE FACTORS OF REVISION AND FAILURE RATES
29. Utilization and Comparision of Convolutional Neural Networks in Malware Recognition
30. Static and Dynamic Analysis of Third Generation Cerber Ransomware
31. Percutaneous nephrolithotomy in solitary kidneys: effective, safe and improves renal functions
32. Laboratory data quality control: A new cost-effective approach
33. Spam/ham e-mail classification using machine learning methods based on bag of words technique
34. ρ-kazanım: fayda temelli veri yayınlama modeli
35. A review on cyber security datasets for machine learning algorithms
36. Trustworthy scrum: Development of secure software with scrum
37. Tasarsız Ağlarda Yönlendirme Güvenliği Üzerine Kapsamlı Bir Araştırma
38. Spam E-Mail Classification by Utilizing N-Gram Features of Hyperlink Texts
39. A New Approach to Utility-Based Privacy Preserving in Data Publishing
40. THE GHOST IN THE SYSTEM: TECHNICAL ANALYSIS OF REMOTE ACCESS TROJAN.
41. RASTGELE VERİ KARIŞTIRMAYA DAYALI KAOTİK ŞİFRELEME
42. Liposarcoma of the spermatic cord: A case report
43. The treatment of ventral penile chordee without hypospadias by dorsal midline plication in an adolescent boy
44. Chaotic Image Encryption with Random Shuffling of Data
45. Diagnostic accuracy of UriSed automated urine microscopic sediment analyzer and dipstick parameters in predicting urine culture test results
46. Tasarsız Ağlarda Yönlendirme Güvenliği Üzerine Kapsamlı Bir Araştırma.
47. Comparing Partial and Full Return Spectral Methods
48. İNTRATESTİKÜLER VARİKOSEL.
49. A Simple, Non - Biological Model for Percutaneous Renal Access Training.
50. Utilization of local and global image descriptors for phishing web page identification
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.