Author
Now showing items 1-4 of 4
-
A Programmable Threat Intelligence Framework for Containerized Clouds
Yucel, C.; Koltuksuz, A.; Odemis, M.; Kademi, A.M.; Ozbilgin, G. (ACAD CONFERENCES LTD, 2018)Contemporarily, one of the main challenges for information security community is the growing number of cyber threats. Large scaled, globally orchestrated and constantly evolving attacks are affecting our information systems ... -
A programmable threat intelligence framework for containerized clouds
Yucel, C.; Koltuksuz, A.; Odemis, M.; Kademi, A.M.; Ozbilgin, G. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018, 2018)Contemporarily, one of the main challenges for information security community is the growing number of cyber threats. Large scaled, globally orchestrated and constantly evolving attacks are affecting our information systems ... -
An authorization-based cryptographically secure mobile voting system
Odemis, M.; Koltuksuz, A. (European Conference on Information Warfare and Security, ECCWS, 2017)Governments and the private sector keep pace with the innovations on mobile technologies. Most countries have developed e-Government portals for their citizens, which also have mobile applications. They aim to provide ... -
Suggesting a Honeypot Design to Capture Hacker Psychology, Personality and Sophistication
Odemis, M.; Yucel, C.; Koltuksuz, A.; Ozbilgin, G. (ACAD CONFERENCES LTD, 2018)The benefits of collaborating across disciplines, such as social sciences, applied statistics and computer science, primarily affect the security arena regarding the fields of open source intelligence, information warfare, ...

DSpace@YASAR by Yasar University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..