Showing
1 - 11
results of
11
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Alaca, Furkan
Search Results - Alaca, Furkan
Showing
1 - 11
results of
11
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Why phishing still works: User strategies for combating phishing attacks
by
Alsharnouby, Mohamed
,
Alaca, Furkan
,
Chiasson, Sonia
Published in
International journal of human-computer studies
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
Comparative Analysis and Framework Evaluating Web Single Sign-on Systems
by
Alaca, Furkan
,
Oorschot, Paul C. Van
Published in
ACM computing surveys
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes
by
Alaca, Furkan
,
Abdou, AbdelRahman
,
van Oorschot, Paul C.
Published in
IEEE transactions on dependable and secure computing
Get full text
Items that this one cites
Article
Save to List
Saved in:
4
Loading…
A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments
by
Alaca, F.
,
Sediq, A. B.
,
Yanikomeroglu, H.
Request full text
Conference Proceeding
Save to List
Saved in:
5
Loading…
Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data
by
Pepin, Ian
,
Alaca, Furkan
,
Zulkernine, Farhana
Request full text
Conference Proceeding
Save to List
Saved in:
6
Loading…
Aggregate Interference Distribution From Large Wireless Networks With Correlated Shadowing: An Analytical-Numerical-Simulation Approach
by
Szyszkowicz, S. S.
,
Alaca, F.
,
Yanikomeroglu, H.
,
Thompson, J. S.
Published in
IEEE transactions on vehicular technology
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
7
Loading…
Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace
by
Sadman, Nafiz
,
Hasan, Kazi Amit
,
Rashno, Elyas
,
Alaca, Furkan
,
Tian, Yuan
,
Zulkernine, Farhana
Request full text
Conference Proceeding
Save to List
Saved in:
8
Loading…
Efficient Simulation using Shadowing Fields of Many Wireless Interferers with Correlated Shadowing
by
Szyszkowicz, Sebastian S
,
Alaca, Furkan
,
Yanikomeroglu, Halim
,
Thompson, John S
Request full text
Conference Proceeding
Save to List
Saved in:
9
Loading…
Comparative Analysis and Framework Evaluating Web Single Sign-On Systems
by
Alaca, Furkan
,
van Oorschot, Paul C
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
10
Loading…
Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck
by
Fu, Zhiwei
,
Ding, Steven H H
,
Alaca, Furkan
,
Fung, Benjamin C M
,
Charland, Philippe
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
11
Loading…
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes
by
Alaca, Furkan
,
Abdou, AbdelRahman
,
van Oorschot, Paul C
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
3 results
3
Full Text
11 results
11
Format
Articles
7 results
7
Conference Proceedings
4 results
4
Journal Title
Acm Computing Surveys
1 results
1
Ieee Transactions On Dependable And Secure Computing
1 results
1
Ieee Transactions On Vehicular Technology
1 results
1
International Journal Of Human-Computer Studies
1 results
1
Subjects
Science & Technology
6 results
6
Technology
6 results
6
Computer Science
4 results
4
Engineering
4 results
4
Authentication
3 results
3
Engineering, Electrical & Electronic
3 results
3
Interference
3 results
3
Passwords
3 results
3
Algorithm Optimization
2 results
2
Analytical Models
2 results
2
Computer Simulation
2 results
2
Correlated Shadowing
2 results
2
Fingerprinting
2 results
2
Libraries
2 results
2
Mimicry
2 results
2
Shadow Mapping
2 results
2
Taxonomy
2 results
2
Telecommunications
2 results
2
Webs
2 results
2
Accuracy
1 results
1
Year of Publication
From:
To:
Source
Ieee Electronic Library (Iel) Conference Proceedings
4 results
4
Ieee Xplore All Conference Series
4 results
4
Free E- Journals
3 results
3
Road: Directory Of Open Access Scholarly Resources
3 results
3
Publicly Available Content Database
3 results
3
Ieee Electronic Library (Iel) Journals
2 results
2
Ieee Xplore All Journals
2 results
2
Acm Digital Library Complete
1 results
1
Business Source Ultimate
1 results
1
Association For Computing Machinery:jisc Collections:acm Open Journals 2023-2025 (Reading List)
1 results
1
Elsevier Sciencedirect Journals
1 results
1
Elsevier:jisc Collections:elsevier Read And Publish Agreement 2022-2024:Freedom Collection (Reading List)
1 results
1
Abi/Inform Global
1 results
1
Backfile Package - Computer Science (Legacy) [Ycs]
1 results
1
Backfile Package - Psychology (Legacy) [Ypt]
1 results
1