Yayınlarım

2000-2020 yılları arasında yapmış olduğum akademik yayınlar aşağıda listelenmiştir.

  1. Aydin, Mustafa, et al. “Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.” 2020 10th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2020.
  2. Bicakci, Kemal, et al. “Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography.” 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2019.
  3. Tok, Mevlut Serkan, Osman Tufan Tekin, and Kemal Bicakci. “Analyzing Turkish F and Turkish E keyboard layouts using learning curves.” arXiv preprint arXiv:1905.11791 (2019).
  4. Aksu, M. Ugur, Kemal Bıçakçı, and Enes Altuncu. “A First Look at the Usability of OpenVAS Vulnerability Scanner.” Workshop on Usable Security (USEC) 2019. NDSS, 2019.
  5. Huseinovic, Alvin, et al. “A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures.” 2018 26th Telecommunications Forum (TELFOR). IEEE, 2018.
  6. Bicakci, Kemal, et al. “How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification.” International Conference on Information Security. Springer, Cham, 2018.
  7. Aksu, M. Ugur, et al. “Automated generation of attack graphs using nvd.” Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. 2018.
  8. Mrdovic, Sasa, et al. “A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures.” 2018 26th Telecommunications Forum, TELFOR 2018-Proceedings. IEEE, 2018.
  9. Bıçakçı, Kemal, et al. “The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks.” (2018).
  10. Aksu, M. Ugur, et al. “A quantitative CVSS-based cyber security risk assessment methodology for IT systems.” 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017.
  11. Bıçakçı, Kemal, and Hakan Ezgi Kiziloz. “A Closer Look at Pure-Text Human-Interaction Proofs.” (2017).
  12. Bicakci, Kemal, Davut Deniz Yavuz, and Sezin Gurkan. “TwinCloud: secure cloud sharing without explicit key management.” 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016.
  13. Bicakci, Kemal, and Hakan Ezgi Kiziloz. “Leveraging human computation for pure-text Human Interaction Proofs.” International Journal of Human-Computer Studies 92 (2016): 44-54.
  14. Yildiz, Huseyin Ugur, et al. “The impact of incomplete secure connectivity on the lifetime of wireless sensor networks.” IEEE Systems Journal 12.1 (2016): 1042-1046.
  15. Yildiz, Huseyin Ugur, et al. “Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies.” Ad Hoc Networks 37 (2016): 301-323.
  16. Bicakci, Kemal, Davut Deniz Yavuz, and Sezin Gurkan. “Twincloud: a client-side encryption solution for secure sharing on clouds without explicit key management.” CoRR abs/1606.04705 (2016).
  17. Uzunay, Yusuf, and Kemal Bicakci. “Trust-in-the-middle: towards establishing trustworthiness of authentication proxies using trusted computing.” arXiv preprint arXiv:1511.05682 (2015).
  18. Uzun, Yasin, Kemal Bicakci, and Yusuf Uzunay. “Could we distinguish child users from adults using keystroke dynamics?.” arXiv preprint arXiv:1511.05672 (2015).
  19. Kiziloz, Hakan Ezgi, and Kemal Bicakci. “Towards making accessible human-interaction proofs more secure and usable.” 2015 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2015.
  20. Incebacak, Davut, Kemal Bicakci, and Bulent Tavli. “Evaluating energy cost of route diversity for security in wireless sensor networks.” Computer Standards & Interfaces 39 (2015): 44-57.
  21. Bicakci, Kemal, and Tashtanbek Satiev. “charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication.” International Conference on Passwords. Springer, Cham, 2014.
  22. Pala, Zeydin, Kemal Bicakci, and Mustafa Turk. “Effects of node mobility on energy balancing in wireless networks.” Computers & Electrical Engineering 41 (2015): 314-324.
  23. Uzun, Erkam, et al. “The impact of scalable routing on lifetime of smart grid communication networks.” Ad hoc networks 22 (2014): 27-42.
  24. Bicakci, Kemal, et al. “Mobile authentication secure against man-in-the-middle attacks.” 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering. IEEE, 2014.
  25. Cotuk, Huseyin, et al. “The impact of bandwidth constraints on the energy consumption of wireless sensor networks.” 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2014.
  26. Uzunay, Yusuf, and Kemal Bicakci. “Trusted3Ballot: Improving Security and Usability of Three Ballot Voting System Using Trusted Computing.” 2014 5th International Conference on Intelligent Systems, Modelling and Simulation. IEEE, 2014.
  27. Yildiz, Huseyin Ugur, Kemal Bicakci, and Bulent Tavli. “Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies.” 2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet). IEEE, 2014.
  28. Cotuk, Huseyin, et al. “The impact of transmission power control strategies on lifetime of wireless sensor networks.” IEEE Transactions on Computers 63.11 (2013): 2866-2879.
  29. Akpulat, Murat, Kemal Bicakci, and Ugur Cil. “Revisiting graphical passwords for augmenting, not replacing, text passwords.” Proceedings of the 29th Annual Computer Security Applications Conference. 2013.
  30. Bicakci, Kemal, Bruno Crispo, and Gabriele Oligeri. “LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload.” ACM Transactions on Internet Technology (TOIT) 13.2 (2013): 1-27.
  31. Incebacak, Davut, et al. “Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks.” EURASIP Journal on Wireless Communications and Networking 2013.1 (2013): 252.
  32. Pala, Zeydin, Kemal Bicakci, and Bulent Tavli. “Mobility helps energy balancing in wireless networks.” MILCOM 2013-2013 IEEE Military Communications Conference. IEEE, 2013.
  33. Batmaz, Anil Ufuk, et al. “The impact of link unidirectionality and reverse path length on wireless sensor network lifetime.” 2013 IEEE International Conference on Communications (ICC). IEEE, 2013.
  34. Bicakci, Kemal, et al. “Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation.” Computer Standards & Interfaces 35.4 (2013): 396-402.
  35. Soylev, Arda, Kemal Bicakci, and Bulent Tavli. “Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks.” 2013 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, 2013.
  36. Batmaz, Anıl Ufuk, et al. “Effects of handshake hop length of unidirectional links on the lifetime of wireless sensor networks.” 2013 21st Signal Processing and Communications Applications Conference (SIU). IEEE, 2013.
  37. Uzun, Erkam, et al. “Network lifetime maximization and localized routing tradeoff in wireless sensor networks.” 2013 21st Signal Processing and Communications Applications Conference (SIU). IEEE, 2013.
  38. Cil, Ugur, and Kemal Bicakci. “gridwordx: Design, implementation, and usability evaluation of an authentication scheme supporting both desktops and mobile devices.” Workshop on Mobile Security Technologies (MoST’13). 2013.
  39. Tavli, Bulent, et al. “A survey of visual sensor network platforms.” Multimedia Tools and Applications 60.3 (2012): 689-726.
  40. Uzun, Yasin, and Kemal Bicakci. “A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset.” Computers & Security 31.5 (2012): 717-726.
  41. Incebacak, Davut, Kemal Bicakci, and Bulent Tavli. “Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks.” 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2012.
  42. Bicakci, Kemal, Ibrahim Ethem Bagci, and Bulent Tavli. “Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures.” Information Sciences 188 (2012): 44-63.
  43. Bicakci, Kemal, et al. “Exploration and field study of a password manager using icon-based passwords.” International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2011.
  44. Bicakci, Kemal, Nart Bedin Atalay, and Hakan Ezgi Kiziloz. “Johnny in internet café: user study and exploration of password autocomplete in web browsers.” Proceedings of the 7th ACM workshop on Digital identity management. 2011.
  45. Bicakci, Kemal, and Paul C. Van Oorschot. “A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.” Proceedings of the 2011 New security paradigms workshop. 2011.
  46. Bicakci, Kemal, et al. “Maximizing lifetime of event-unobservable wireless sensor networks.” Computer Standards & Interfaces 33.4 (2011): 401-410.
  47. Bicakci, Kemal, Ibrahim Ethem Bagci, and Bulent Tavli. “Lifetime bounds of wireless sensor networks preserving perfect sink unobservability.” IEEE Communications Letters 15.2 (2011): 205-207.
  48. Bicakci, Kemal, et al. “Exploration and field study of a browser-based password manager using icon-based passwords.” Workshop on Real-Life Cryptographic Protocols and Standardization. Vol. 10. 2011.
  49. Tavli, Bulent, M. Burak Akgun, and Kemal Bicakci. “Impact of limiting number of links on the lifetime of wireless sensor networks.” IEEE Communications Letters 15.1 (2010): 43-45.
  50. Akgün, M. Burak, Bülent Tavlı, and Kemal Biçakcı. “Number of connection restriction in wireless sensor networks and its influence on network lifetime.” National Conference on Electrical, Electronics and Computer Engineering. IEEE, 2010.
  51. Incebacak, Davut, Kemal Bicakci, and Bulent Tavli. “Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks.” 2010 Fourth UKSim European Symposium on Computer Modeling and Simulation. IEEE, 2010.
  52. Unlu, Seckin Anil, and Kemal Bicakci. “Notabnab: Protection against the “tabnabbing attack”.” 2010 eCrime Researchers Summit. IEEE, 2010.
  53. Tavli, Bulent, M. Mikail Ozciloglu, and Kemal Bicakci. “Mitigation of compromising privacy by transmission range control in wireless sensor networks.” IEEE Communications Letters 14.12 (2010): 1104-1106.
  54. Guerrero-Zapata, Manel, et al. “The future of security in wireless multimedia sensor networks.” Telecommunication Systems 45.1 (2010): 77-91.
  55. Bicakci, Kemal, and Bulent Tavli. “Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks.” Ad Hoc Networks 8.6 (2010): 582-596.
  56. Bicakci, Kemal, Hakan Gultekin, and Bulent Tavli. “The impact of one-time energy costs on network lifetime in wireless sensor networks.” IEEE Communications Letters 13.12 (2009): 905-907.
  57. Bicakci, Kemal. “Pushing the limits of one-time signatures.” Proceedings of the 2nd international conference on Security of information and networks. 2009.
  58. Bicakci, Kemal, and Bulent Tavli. “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks.” Computer Standards & Interfaces 31.5 (2009): 931-941.
  59. Bicakci, Kemal, et al. “Towards usable solutions to graphical password hotspot problem.” 2009 33rd Annual IEEE International Computer Software and Applications Conference. Vol. 2. IEEE, 2009.
  60. Bicakci, Kemal, et al. “Graphical passwords as browser extension: Implementation and usability study.” IFIP International Conference on Trust Management. Springer, Berlin, Heidelberg, 2009.
  61. Bicakci, Kemal. “Optimal discretization for high-entropy graphical passwords.” 2008 23rd International Symposium on Computer and Information Sciences. IEEE, 2008.
  62. Bicakci, Kemal, and Yusuf Uzunay. “Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs.” World Academy of Science, Engineering and Technology 2 (2008): 198-207.
  63. Uzunay, Yusuf, and Kemal Bicakci. “SHA: A secure voice activated smart home for quadriplegia patients.” 2007 IEEE International Conference on Bioinformatics and Biomedicine Workshops. IEEE, 2007.
  64. Bicakci, Kemal. “One-time proxy signatures revisited.” Computer Standards & Interfaces 29.4 (2007): 499-505.
  65. Uzunay, Yusuf, Davut Incebacak, and Kemal Bicakci. “Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model.” EC2ND 2006. Springer, London, 2007. 105-114.
  66. Gamage, Chandana, et al. “Security for the mythical air-dropped sensor network.” 11th IEEE Symposium on Computers and Communications (ISCC’06). IEEE, 2006.
  67. GULKESEN, Kemal H., et al. “Reliability of Health Information on the Turkish Web Sites; Fever in Children at Home.” (2006).
  68. Bicakci, Kemal, Bruno Crispo, and Andrew S. Tanenbaum. “Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes.” IACR Cryptology ePrint Archive 2006 (2006): 212.
  69. Gamage, Chandana, et al. “A cost-efficient counter-intrusion scheme for one-time sensor networks.” 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing. IEEE, 2005.
  70. Uuzunay, Y., and Kemal Bicakci. “UNIDES: an efficient real-time system to detect and block unauthorized Internet access.” 11th International Conference on Parallel and Distributed Systems (ICPADS’05). Vol. 2. IEEE, 2005.
  71. Bicakci, Kemal, et al. “One-time sensors: A novel concept to mitigate node-capture attacks.” European Workshop on Security in Ad-hoc and Sensor Networks. Springer, Berlin, Heidelberg, 2005.
  72. Bicakci, Kemal, Bruno Crispo, and Andrew S. Tanenbaum. “Counting abuses using flexible off-line credentials.” Australasian Conference on Information Security and Privacy. Springer, Berlin, Heidelberg, 2005.
  73. Bicakci, Kemal, Bruno Crispo, and Andrew S. Tanenbaum. “How to incorporate revocation status information into the trust metrics for public-key certification.” Proceedings of the 2005 ACM symposium on Applied computing. 2005.
  74. Bicakci, Kemal, and Nazife Baykal. “Improved server assisted signatures.” Computer Networks 47.3 (2005): 351-366.
  75. Bicakci, Kemal, and Nazife Baykal. “A new design of privilege management infrastructure with binding signature semantics.” European Public Key Infrastructure Workshop. Springer, Berlin, Heidelberg, 2004.
  76. Bicakci, Kemal, and Nazife Baykal. “Server assisted signatures revisited.” Cryptographers’ Track at the RSA Conference. Springer, Berlin, Heidelberg, 2004.
  77. Bicakci, Kemal, and Nazife Baykal. “EVEREST: an efficient method for verification of digital signatures in real-time teleradiology.” MedInfo. 2004.
  78. Bicakci, Kemal, and Nazife Baykal. “Saots: A new efficient server assisted signature scheme for pervasive computing.” Security in pervasive computing. Springer, Berlin, Heidelberg, 2004. 187-200.
  79. Bicakci, Kemal, and Nazife Baykal. “One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication.” International Symposium on Computer and Information Sciences. Springer, Berlin, Heidelberg, 2003.
  80. Biçakci, Kemal, and Nazife Baykal. “Improving the security and flexibility of one-time passwords by signature chains.” Turkish Journal of Electrical Engineering & Computer Sciences 11.3 (2003): 223-236.
  81. Bicakci, Kemal, Gene Tsudik, and Brian Tung. “How to construct optimal one-time signatures.” Computer Networks 43.3 (2003): 339-349.
  82. Bicakci, Kemal, and Nazife Baykal. “Design and performance evaluation of a flexible and efficient server assisted signature protocol.” Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003. IEEE, 2003.
  83. Bıçakçı, Kemal. “On the efficiency of authentication protocols, digital signatures and their applications in e-health.” (2003), Doktora Tezi.
  84. Bicakci, Kemal, and Nazife Baykal. “Survivable authentication for health information systems.” AMIA Annual Symposium Proceedings. Vol. 2003. American Medical Informatics Association, 2003.
  85. Bicakci, Kemal, and Nazife Baykal. “Infinite length hash chains and their applications.” Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE, 2002.
  86. Bicakci, Kemal, and Nazife Baykal. “Wireless and mobile security.”, KES Conference, (2001).
  87. Bicakci, Kemal, Brian Tung, and Gene Tsudik. “On constructing optimal one-time signatures.” Proceedings of Fifteenth International Symposium on Computer and Information Sciences, ISCIS. 2000.
Securify