Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Ahmet Koltuksuz"'
Publikováno v:
Heliyon, Vol 9, Iss 6, Pp e16653- (2023)
The definition and nature of information have perplexed scientists due to its dual nature in measurements. The information is discrete and continuous when evaluated on a metric scale, and the Laplace-Beltrami operator and Gauss-Bonnet Theorem can map
Externí odkaz:
https://doaj.org/article/5cfdf71d8be14850b54ae902a1568afe
Autor:
Ahmet Koltuksuz
Publikováno v:
Blockchain Applications in IoT Ecosystem ISBN: 9783030656904
The Internet would be the largest one had it been a country of the world. The population and the produced and consumed data in this new country have been exponentially increasing, and the metrics with which one can measure all this growth are zettaby
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ebfa391e55f56628c83a6081f10df5fd
https://doi.org/10.1007/978-3-030-65691-1_11
https://doi.org/10.1007/978-3-030-65691-1_11
Autor:
Çağatay Yücel, Ahmet Koltuksuz
Malware analysis is a forensic process. After infection and the damage represented itself with the full scale, then the analysis of the attack, the structure of the executable and the aim of the malware can be discovered. These discoveries are conver
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89dffaa0c5dc7b9e6743dac2f1d2477a
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/7307
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/7307
Autor:
Çağatay Ycel, Ahmet Koltuksuz
Publikováno v:
Applied Mathematics & Information Sciences. 8:2929-2935
Manifolds are suitable differentiable mathematical objects for information to be defined on. By their very definition they are non-Euclidean in the global view but in local scales they resemble Euclidean spaces. This property provides that the contem
Autor:
Ahmet Koltuksuz, Tugce Kalkavan
Publikováno v:
2013 7th International Conference on Application of Information and Communication Technologies.
The purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing
Publikováno v:
WODES
11th International Workshop on Discrete Event Systems, WODES 2012; Guadalajara, Jalisco; Mexico; 3 October 2012 through 5 October 2012
The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industri
The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fafaf96d149845c0f85f15c95a5325ea
http://hdl.handle.net/11147/5222
http://hdl.handle.net/11147/5222
Publikováno v:
SSIRI (Companion)
4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, SSIRI-C 2010; Singapore; Singapore; 9 June 2010 through 11 June 2010
Timed Automata is an extension to the automata-theoretic approach for th
Timed Automata is an extension to the automata-theoretic approach for th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::64a0ac31e45c0e03917de61c98323aea
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10671
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10671
Publikováno v:
SSIRI (Companion)
4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, SSIRI-C 2010; Singapore; Singapore; 9 June 2010 through 11 June 2010
Communicating Sequential Processes (CSP) is a process algebra, designed
Communicating Sequential Processes (CSP) is a process algebra, designed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fe87db147ab1c02fd1c9aeafeb62e1f3
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10672
https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10672
Autor:
Ahmet Koltuksuz
3rd International Conference on Recent Advances in Space Technologies, RAST 2007; Istanbul; Turkey; 14 June 2007 through 16 June 2007
The cryptographic key management center is the place where all the cryptographical protocols and related keys a
The cryptographic key management center is the place where all the cryptographical protocols and related keys a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0091fe6496ac166b73882905123d8234
http://hdl.handle.net/11147/2040
http://hdl.handle.net/11147/2040
Autor:
Huseyin Hisil, Ahmet Koltuksuz
Publikováno v:
Computer and Information Sciences-ISCIS 2005 ISBN: 9783540294146
ISCIS
ResearcherID
ISCIS
ResearcherID
This paper delineates the results gained throughout the development of a cryptographic multiprecision1 integer library, CRYMPIX. To obtain the know-how for cryptographic computation and thus being able to create the high level cryptographic protocols
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8704d4798b1625e7eb7d216b28a4961b
https://doi.org/10.1007/11569596_90
https://doi.org/10.1007/11569596_90