A quantitative CVSS-based cyber security risk assessment methodology for IT systems MU Aksu, MH Dilek, Eİ Tatlı, K Bicakci, HI Dirik, MU Demirezen, T Aykır 2017 International Carnahan Conference on Security Technology (ICCST), 1-8, 2017 | 97 | 2017 |
Cracking more Password Hashes with Patterns E Tatli Information Forensics and Security, IEEE Transactions on 10 (8), 1656 - 1665, 2015 | 86 | 2015 |
Automated generation of attack graphs using NVD MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu, E Tatli Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 58 | 2018 |
Detecting cybersecurity events from noisy short text S Yagcioglu, MS Seyfioglu, B Citamak, B Bardak, S Guldamlasioglu, ... arXiv preprint arXiv:1904.05054, 2019 | 26 | 2019 |
Security challenges of location-aware mobile business EI Tatly, D Stegemann, S Lucks Second IEEE International Workshop on Mobile Commerce and Services, 84-95, 2005 | 25 | 2005 |
Context data model for privacy EI Tatlı PRIME Project Standardization Workshop, Zürich, 2006 | 20 | 2006 |
WIVET—benchmarking coverage qualities of web crawlers Eİ Tatli, B Urgun The Computer Journal 60 (4), 555-572, 2017 | 13 | 2017 |
Issues on designing a cryptographic compiler S Lucks, N Schmoigl, EI Tatlı Gesellschaft für Informatik eV, 2005 | 11* | 2005 |
Analysis of HTTP Security Headers in Turkey E Kısa, Eİ Tatlı 9th International Information Security and Cryptography Conference (ISCTurkey16), 2016 | 10* | 2016 |
Privacy in Danger: Let’s google your privacy EI Tatli IFIP International Summer School on the Future of Identity in the …, 2007 | 10 | 2007 |
Google reveals cryptographic secrets EI Tatlı Kryptowochenende, Kloster Bronbach, 2006 | 9 | 2006 |
Mobile identity management revisited EI Tatli, S Lucks Electronic Notes in Theoretical Computer Science 244, 125-137, 2009 | 8 | 2009 |
The Past and Future of Mobile Malwares MO Topgül, Eİ Tatli The 7th International Conference on Information Security and Cryptology …, 2014 | 6 | 2014 |
Extending P3P/Appel for Friend Finder EI Tatli 2007 International Conference on Mobile Data Management, 243-247, 2007 | 6 | 2007 |
Security in context-aware mobile business applications (PhD Thesis) EI Tatli Universität Mannheim, 2008 | 5* | 2008 |
Dynamic mobile anonymity with mixing EI Tatli, D Stegemann, S Lucks Technical reports 6, 2006 | 5 | 2006 |
Abused android permissions by advertising networks M Ogul, S Baktir, EI Tatli 2014 International Conference on IT Convergence and Security (ICITCS), 1-4, 2014 | 3 | 2014 |
Password Replacement Patterns EI Tatli, E Seker CoDIT 2018 - The 5th edition in the series of IEEE International Conference …, 2018 | 2 | 2018 |
Security Analysis of Medical Devices within Wireless Body Area Networks and Mobile Health Applications A DEMİR, Eİ TATLI Bilişim Teknolojileri Dergisi 11 (1), 1-8, 2018 | 2 | 2018 |
Google hacking against privacy EI Tatlı International IFIP Privacy Summer School, Karlstad-Sweden, 2007 | 2 | 2007 |