Nazife Baykal

According to our database1, Nazife Baykal authored at least 43 papers between 1996 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm.
J. Netw. Comput. Appl., 2020

Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains.
Turkish J. Electr. Eng. Comput. Sci., 2019

Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

2017
Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense.
CoRR, 2017

A window-based time series feature extraction method.
Comput. Biol. Medicine, 2017

DDoS Attack Modeling and Detection Using SMO.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

2016
A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness.
Int. J. Crit. Infrastructure Prot., 2016

Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop.
CoRR, 2016

A novel approach to optimize workflow in grid-based teleradiology applications.
Comput. Methods Programs Biomed., 2016

Regulatory approaches for cyber security of critical infrastructures: The case of Turkey.
Comput. Law Secur. Rev., 2016

Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

2015
Feature extraction and classification phishing websites based on URL.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Turkey's Approaches on Cyber Security Policy Framework.
Proceedings of the Cyber Security and Resiliency Policy Framework, 2014

URAP-TR: a national ranking for Turkish universities based on academic performance.
Scientometrics, 2014

Integration of Federated Medical Systems for Vendor Neutral Image Access in Teleradiology Applications.
Proceedings of the e-Health - For Continuity of Care - Proceedings of MIE2014, the 25th European Medical Informatics Conference, Istanbul, Turkey, August 31, 2014

An infrastructure for efficient reporting workflow in grid based teleradiology architectures using Relation Based Semantic Matching and Integer Linear Programming.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

The analysis of feature selection methods and classification algorithms in permission based Android malware detection.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

2013
Attack tree based information security risk assessment method integrating enterprise objectives with vulnerabilities.
Int. Arab J. Inf. Technol., 2013

2012
A Knowledge Based Search Tool for Performance Measures in Health Care Systems.
J. Medical Syst., 2012

2011
The Need of a Semantic Layer between UMLS and Biomedical Information Systems.
Proceedings of the Metadata and Semantic Research - 5th International Conference, 2011

2010
Design and evaluation of an ontology based information extraction system for radiological reports.
Comput. Biol. Medicine, 2010

2007
MedicoPort: A medical search engine for all.
Comput. Methods Programs Biomed., 2007

An integrated approach to breast diseases and breast cancer registry and research: BDRS as a web-based multi-institutional model.
Comput. Biol. Medicine, 2007

2006
Evaluation of a Hospital Information System in an International Context: Towards Implementing PB-ISM in Turkey.
Electron. J. Inf. Syst. Dev. Ctries., 2006

2005
Improved server assisted signatures.
Comput. Networks, 2005

2004
EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology.
Proceedings of the MEDINFO 2004, 2004

A New Design of Privilege Management Infrastructure with Binding Signature Semantics.
Proceedings of the Public Key Infrastructure, 2004

Server Assisted Signatures Revisited.
Proceedings of the Topics in Cryptology, 2004

2003
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.
Proceedings of the Security in Pervasive Computing, 2003

One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication.
Proceedings of the Computer and Information Sciences, 2003

Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Integrated Breast Diseases Research and Cancer Registry in Turkey.
Proceedings of the AMIA 2003, 2003

Survivable Authentication for Health Information Systems.
Proceedings of the AMIA 2003, 2003

2002
Infinite Length Hash Chains and Their Applications.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

2000
Resilient backpropagation for RBF networks.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

1999
Extended Self Organizing Feature Map: A Tagged Potential Field Approach.
Neural Process. Lett., 1999

1998
An experimental comparison of symbolic and neural learning algorithms.
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1998

Tagged potential field extension to self-organizing feature maps.
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1998

1996
Hydips: A Hybrid neural network based diagnostic tool for perinatal surveillance (Perinatal takipte bir hibrit nöron ağına dayanan tanı aracı)
PhD thesis, 1996

Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms.
Comput. Biol. Medicine, 1996


  Loading...