Institutional Repository
    • Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
Search 
  •   University of Economics & Technology Repository
  • Search
  •   University of Economics & Technology Repository
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-4 of 4

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Undecidable Problems in Malware Analysis 

Selçuk, Ali Aydın; Orhan, Fatih; Batur, Berker (IEEE, 2017)
Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, ...
Thumbnail

Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs 

Uludag, Suleyman; Balli, Muhammed Fatih; Selçuk, Ali Aydın; Tavlı, Bülent (IEEE, 2015)
One of the the most propitious enablers of the Smart Grid paradigm, and a rather low-hanging fruit, is Demand Response (DR) programs. DR is a set of courses of actions to reach and maintain the supply-demand equilibrium ...
Thumbnail

An Analysis DRDoS Amplifiers in Europe 

Ercan, Emre Murat; Selçuk, Ali Aydın (International Conference on Cyber Security and Computer Science, 2018-10)
DRDoS is the new method of choice for denial of service attacks: Certain services running over UDP is chosen for the attack. Servers across the Internet are contacted by bots with the spoofed IP address of the victim host. ...
Thumbnail

Evasion Techniques Efficiency over the IPS/IDS Technology 

Kilic, H.; Katal, N.S.; Selçuk, Ali Aydın (Institute of Electrical and Electronics Engineers Inc., 2019-09)
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment. This technology is made for capturing and preventing breaches and attacks. Evading of ...

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV
 

 

Browse

All of RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit DateBy TypeKapsamWOSScopusPubMedTR-DizinAvrupa Birliği Destekli Yayın SayısıTÜBİTAK Destekli Yayın SayısıDilErişim

My Account

LoginRegister

Discover

Author
Selçuk, Ali Aydın (4)
Balli, Muhammed Fatih (1)Batur, Berker (1)Ercan, Emre Murat (1)Katal, N.S. (1)Kilic, H. (1)Orhan, Fatih (1)Tavlı, Bülent (1)Uludag, Suleyman (1)SubjectAmplification Attack (1)Computer viruses (1)DDoS (1)DNS (1)DRDoS (1)Evasion attacks-technique (1)Intrusion Detection Systems (IDS) (1)Intrusion Prevention Systems (IPS) (1)malware analysis (1)Memcached (1)... View MoreDate Issued2015 (1)2017 (1)2018 (1)2019 (1)Has File(s)No (3)Yes (1)Type
conferenceObject (4)
CoverageKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanı (4)WOSWOS:000380457400132 (1)WOS:000434957600096 (1)Scopus2-s2.0-84971237992 (1)2-s2.0-85048045724 (1)2-s2.0-85076199237 (1)Dil
eng (4)
Erişiminfo:eu-repo/semantics/closedAccess (2)info:eu-repo/semantics/openAccess (2)

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV
 

 


Creative Commons License
Institutional Repository by TOBB ETU Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License..

Institutional Repository:



TOBB ETU için Devinim Yazılım Eğitim Danışmanlık tarafından özelleştirilerek kurulmuştur.