2000-2020 yılları arasında yapmış olduğum akademik yayınlar aşağıda listelenmiştir.
- Aydin, Mustafa, et al. “Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.” 2020 10th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2020.
- Bicakci, Kemal, et al. “Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography.” 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2019.
- Tok, Mevlut Serkan, Osman Tufan Tekin, and Kemal Bicakci. “Analyzing Turkish F and Turkish E keyboard layouts using learning curves.” arXiv preprint arXiv:1905.11791 (2019).
- Aksu, M. Ugur, Kemal Bıçakçı, and Enes Altuncu. “A First Look at the Usability of OpenVAS Vulnerability Scanner.” Workshop on Usable Security (USEC) 2019. NDSS, 2019.
- Huseinovic, Alvin, et al. “A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures.” 2018 26th Telecommunications Forum (TELFOR). IEEE, 2018.
- Bicakci, Kemal, et al. “How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification.” International Conference on Information Security. Springer, Cham, 2018.
- Aksu, M. Ugur, et al. “Automated generation of attack graphs using nvd.” Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. 2018.
- Mrdovic, Sasa, et al. “A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures.” 2018 26th Telecommunications Forum, TELFOR 2018-Proceedings. IEEE, 2018.
- Bıçakçı, Kemal, et al. “The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks.” (2018).
- Aksu, M. Ugur, et al. “A quantitative CVSS-based cyber security risk assessment methodology for IT systems.” 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017.
- Bıçakçı, Kemal, and Hakan Ezgi Kiziloz. “A Closer Look at Pure-Text Human-Interaction Proofs.” (2017).
- Bicakci, Kemal, Davut Deniz Yavuz, and Sezin Gurkan. “TwinCloud: secure cloud sharing without explicit key management.” 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016.
- Bicakci, Kemal, and Hakan Ezgi Kiziloz. “Leveraging human computation for pure-text Human Interaction Proofs.” International Journal of Human-Computer Studies 92 (2016): 44-54.
- Yildiz, Huseyin Ugur, et al. “The impact of incomplete secure connectivity on the lifetime of wireless sensor networks.” IEEE Systems Journal 12.1 (2016): 1042-1046.
- Yildiz, Huseyin Ugur, et al. “Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies.” Ad Hoc Networks 37 (2016): 301-323.
- Bicakci, Kemal, Davut Deniz Yavuz, and Sezin Gurkan. “Twincloud: a client-side encryption solution for secure sharing on clouds without explicit key management.” CoRR abs/1606.04705 (2016).
- Uzunay, Yusuf, and Kemal Bicakci. “Trust-in-the-middle: towards establishing trustworthiness of authentication proxies using trusted computing.” arXiv preprint arXiv:1511.05682 (2015).
- Uzun, Yasin, Kemal Bicakci, and Yusuf Uzunay. “Could we distinguish child users from adults using keystroke dynamics?.” arXiv preprint arXiv:1511.05672 (2015).
- Kiziloz, Hakan Ezgi, and Kemal Bicakci. “Towards making accessible human-interaction proofs more secure and usable.” 2015 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2015.
- Incebacak, Davut, Kemal Bicakci, and Bulent Tavli. “Evaluating energy cost of route diversity for security in wireless sensor networks.” Computer Standards & Interfaces 39 (2015): 44-57.
- Bicakci, Kemal, and Tashtanbek Satiev. “charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication.” International Conference on Passwords. Springer, Cham, 2014.
- Pala, Zeydin, Kemal Bicakci, and Mustafa Turk. “Effects of node mobility on energy balancing in wireless networks.” Computers & Electrical Engineering 41 (2015): 314-324.
- Uzun, Erkam, et al. “The impact of scalable routing on lifetime of smart grid communication networks.” Ad hoc networks 22 (2014): 27-42.
- Bicakci, Kemal, et al. “Mobile authentication secure against man-in-the-middle attacks.” 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering. IEEE, 2014.
- Cotuk, Huseyin, et al. “The impact of bandwidth constraints on the energy consumption of wireless sensor networks.” 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2014.
- Uzunay, Yusuf, and Kemal Bicakci. “Trusted3Ballot: Improving Security and Usability of Three Ballot Voting System Using Trusted Computing.” 2014 5th International Conference on Intelligent Systems, Modelling and Simulation. IEEE, 2014.
- Yildiz, Huseyin Ugur, Kemal Bicakci, and Bulent Tavli. “Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies.” 2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet). IEEE, 2014.
- Cotuk, Huseyin, et al. “The impact of transmission power control strategies on lifetime of wireless sensor networks.” IEEE Transactions on Computers 63.11 (2013): 2866-2879.
- Akpulat, Murat, Kemal Bicakci, and Ugur Cil. “Revisiting graphical passwords for augmenting, not replacing, text passwords.” Proceedings of the 29th Annual Computer Security Applications Conference. 2013.
- Bicakci, Kemal, Bruno Crispo, and Gabriele Oligeri. “LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload.” ACM Transactions on Internet Technology (TOIT) 13.2 (2013): 1-27.
- Incebacak, Davut, et al. “Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks.” EURASIP Journal on Wireless Communications and Networking 2013.1 (2013): 252.
- Pala, Zeydin, Kemal Bicakci, and Bulent Tavli. “Mobility helps energy balancing in wireless networks.” MILCOM 2013-2013 IEEE Military Communications Conference. IEEE, 2013.
- Batmaz, Anil Ufuk, et al. “The impact of link unidirectionality and reverse path length on wireless sensor network lifetime.” 2013 IEEE International Conference on Communications (ICC). IEEE, 2013.
- Bicakci, Kemal, et al. “Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation.” Computer Standards & Interfaces 35.4 (2013): 396-402.
- Soylev, Arda, Kemal Bicakci, and Bulent Tavli. “Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks.” 2013 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, 2013.
- Batmaz, Anıl Ufuk, et al. “Effects of handshake hop length of unidirectional links on the lifetime of wireless sensor networks.” 2013 21st Signal Processing and Communications Applications Conference (SIU). IEEE, 2013.
- Uzun, Erkam, et al. “Network lifetime maximization and localized routing tradeoff in wireless sensor networks.” 2013 21st Signal Processing and Communications Applications Conference (SIU). IEEE, 2013.
- Cil, Ugur, and Kemal Bicakci. “gridwordx: Design, implementation, and usability evaluation of an authentication scheme supporting both desktops and mobile devices.” Workshop on Mobile Security Technologies (MoST’13). 2013.
- Tavli, Bulent, et al. “A survey of visual sensor network platforms.” Multimedia Tools and Applications 60.3 (2012): 689-726.
- Uzun, Yasin, and Kemal Bicakci. “A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset.” Computers & Security 31.5 (2012): 717-726.
- Incebacak, Davut, Kemal Bicakci, and Bulent Tavli. “Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks.” 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2012.
- Bicakci, Kemal, Ibrahim Ethem Bagci, and Bulent Tavli. “Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures.” Information Sciences 188 (2012): 44-63.
- Bicakci, Kemal, et al. “Exploration and field study of a password manager using icon-based passwords.” International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2011.
- Bicakci, Kemal, Nart Bedin Atalay, and Hakan Ezgi Kiziloz. “Johnny in internet café: user study and exploration of password autocomplete in web browsers.” Proceedings of the 7th ACM workshop on Digital identity management. 2011.
- Bicakci, Kemal, and Paul C. Van Oorschot. “A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.” Proceedings of the 2011 New security paradigms workshop. 2011.
- Bicakci, Kemal, et al. “Maximizing lifetime of event-unobservable wireless sensor networks.” Computer Standards & Interfaces 33.4 (2011): 401-410.
- Bicakci, Kemal, Ibrahim Ethem Bagci, and Bulent Tavli. “Lifetime bounds of wireless sensor networks preserving perfect sink unobservability.” IEEE Communications Letters 15.2 (2011): 205-207.
- Bicakci, Kemal, et al. “Exploration and field study of a browser-based password manager using icon-based passwords.” Workshop on Real-Life Cryptographic Protocols and Standardization. Vol. 10. 2011.
- Tavli, Bulent, M. Burak Akgun, and Kemal Bicakci. “Impact of limiting number of links on the lifetime of wireless sensor networks.” IEEE Communications Letters 15.1 (2010): 43-45.
- Akgün, M. Burak, Bülent Tavlı, and Kemal Biçakcı. “Number of connection restriction in wireless sensor networks and its influence on network lifetime.” National Conference on Electrical, Electronics and Computer Engineering. IEEE, 2010.
- Incebacak, Davut, Kemal Bicakci, and Bulent Tavli. “Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks.” 2010 Fourth UKSim European Symposium on Computer Modeling and Simulation. IEEE, 2010.
- Unlu, Seckin Anil, and Kemal Bicakci. “Notabnab: Protection against the “tabnabbing attack”.” 2010 eCrime Researchers Summit. IEEE, 2010.
- Tavli, Bulent, M. Mikail Ozciloglu, and Kemal Bicakci. “Mitigation of compromising privacy by transmission range control in wireless sensor networks.” IEEE Communications Letters 14.12 (2010): 1104-1106.
- Guerrero-Zapata, Manel, et al. “The future of security in wireless multimedia sensor networks.” Telecommunication Systems 45.1 (2010): 77-91.
- Bicakci, Kemal, and Bulent Tavli. “Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks.” Ad Hoc Networks 8.6 (2010): 582-596.
- Bicakci, Kemal, Hakan Gultekin, and Bulent Tavli. “The impact of one-time energy costs on network lifetime in wireless sensor networks.” IEEE Communications Letters 13.12 (2009): 905-907.
- Bicakci, Kemal. “Pushing the limits of one-time signatures.” Proceedings of the 2nd international conference on Security of information and networks. 2009.
- Bicakci, Kemal, and Bulent Tavli. “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks.” Computer Standards & Interfaces 31.5 (2009): 931-941.
- Bicakci, Kemal, et al. “Towards usable solutions to graphical password hotspot problem.” 2009 33rd Annual IEEE International Computer Software and Applications Conference. Vol. 2. IEEE, 2009.
- Bicakci, Kemal, et al. “Graphical passwords as browser extension: Implementation and usability study.” IFIP International Conference on Trust Management. Springer, Berlin, Heidelberg, 2009.
- Bicakci, Kemal. “Optimal discretization for high-entropy graphical passwords.” 2008 23rd International Symposium on Computer and Information Sciences. IEEE, 2008.
- Bicakci, Kemal, and Yusuf Uzunay. “Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs.” World Academy of Science, Engineering and Technology 2 (2008): 198-207.
- Uzunay, Yusuf, and Kemal Bicakci. “SHA: A secure voice activated smart home for quadriplegia patients.” 2007 IEEE International Conference on Bioinformatics and Biomedicine Workshops. IEEE, 2007.
- Bicakci, Kemal. “One-time proxy signatures revisited.” Computer Standards & Interfaces 29.4 (2007): 499-505.
- Uzunay, Yusuf, Davut Incebacak, and Kemal Bicakci. “Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model.” EC2ND 2006. Springer, London, 2007. 105-114.
- Gamage, Chandana, et al. “Security for the mythical air-dropped sensor network.” 11th IEEE Symposium on Computers and Communications (ISCC’06). IEEE, 2006.
- GULKESEN, Kemal H., et al. “Reliability of Health Information on the Turkish Web Sites; Fever in Children at Home.” (2006).
- Bicakci, Kemal, Bruno Crispo, and Andrew S. Tanenbaum. “Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes.” IACR Cryptology ePrint Archive 2006 (2006): 212.
- Gamage, Chandana, et al. “A cost-efficient counter-intrusion scheme for one-time sensor networks.” 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing. IEEE, 2005.
- Uuzunay, Y., and Kemal Bicakci. “UNIDES: an efficient real-time system to detect and block unauthorized Internet access.” 11th International Conference on Parallel and Distributed Systems (ICPADS’05). Vol. 2. IEEE, 2005.
- Bicakci, Kemal, et al. “One-time sensors: A novel concept to mitigate node-capture attacks.” European Workshop on Security in Ad-hoc and Sensor Networks. Springer, Berlin, Heidelberg, 2005.
- Bicakci, Kemal, Bruno Crispo, and Andrew S. Tanenbaum. “Counting abuses using flexible off-line credentials.” Australasian Conference on Information Security and Privacy. Springer, Berlin, Heidelberg, 2005.
- Bicakci, Kemal, Bruno Crispo, and Andrew S. Tanenbaum. “How to incorporate revocation status information into the trust metrics for public-key certification.” Proceedings of the 2005 ACM symposium on Applied computing. 2005.
- Bicakci, Kemal, and Nazife Baykal. “Improved server assisted signatures.” Computer Networks 47.3 (2005): 351-366.
- Bicakci, Kemal, and Nazife Baykal. “A new design of privilege management infrastructure with binding signature semantics.” European Public Key Infrastructure Workshop. Springer, Berlin, Heidelberg, 2004.
- Bicakci, Kemal, and Nazife Baykal. “Server assisted signatures revisited.” Cryptographers’ Track at the RSA Conference. Springer, Berlin, Heidelberg, 2004.
- Bicakci, Kemal, and Nazife Baykal. “EVEREST: an efficient method for verification of digital signatures in real-time teleradiology.” MedInfo. 2004.
- Bicakci, Kemal, and Nazife Baykal. “Saots: A new efficient server assisted signature scheme for pervasive computing.” Security in pervasive computing. Springer, Berlin, Heidelberg, 2004. 187-200.
- Bicakci, Kemal, and Nazife Baykal. “One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication.” International Symposium on Computer and Information Sciences. Springer, Berlin, Heidelberg, 2003.
- Biçakci, Kemal, and Nazife Baykal. “Improving the security and flexibility of one-time passwords by signature chains.” Turkish Journal of Electrical Engineering & Computer Sciences 11.3 (2003): 223-236.
- Bicakci, Kemal, Gene Tsudik, and Brian Tung. “How to construct optimal one-time signatures.” Computer Networks 43.3 (2003): 339-349.
- Bicakci, Kemal, and Nazife Baykal. “Design and performance evaluation of a flexible and efficient server assisted signature protocol.” Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003. IEEE, 2003.
- Bıçakçı, Kemal. “On the efficiency of authentication protocols, digital signatures and their applications in e-health.” (2003), Doktora Tezi.
- Bicakci, Kemal, and Nazife Baykal. “Survivable authentication for health information systems.” AMIA Annual Symposium Proceedings. Vol. 2003. American Medical Informatics Association, 2003.
- Bicakci, Kemal, and Nazife Baykal. “Infinite length hash chains and their applications.” Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE, 2002.
- Bicakci, Kemal, and Nazife Baykal. “Wireless and mobile security.”, KES Conference, (2001).
- Bicakci, Kemal, Brian Tung, and Gene Tsudik. “On constructing optimal one-time signatures.” Proceedings of Fifteenth International Symposium on Computer and Information Sciences, ISCIS. 2000.