Suleyman Kondakci

Orcid: 0000-0001-5150-3220

According to our database1, Suleyman Kondakci authored at least 15 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Routing Efficiency of Infrastructureless Networks: A Comparative Analysis.
IEEE Open J. Commun. Soc., 2020

2015
Analysis of information security reliability: A tutorial.
Reliab. Eng. Syst. Saf., 2015

Human-related IT security: A reliability model for network and computer maintenance.
Proceedings of the 2015 World Congress on Internet Security, 2015

2014
Can Random Noise Injection Eliminate Noise? - Simulation and Hardware Implementation.
Proceedings of the ICINCO 2014 - Proceedings of the 11th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Vienna, Austria, 1, 2014

2012
Intelligent network security assessment with modeling and analysis of attack patterns.
Secur. Commun. Networks, 2012

2011
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered.
Secur. Commun. Networks, 2011

Obscurity of network security course curriculum.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2010
Network Security Risk Assessment Using Bayesian Belief Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

A causal model for information security risk assessment.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A concise cost analysis of Internet malware.
Comput. Secur., 2009

2008
Epidemic state analysis of computers under malware attacks.
Simul. Model. Pract. Theory, 2008

A Composite Network Security Assessment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
A new assessment and improvement model of risk propagation in information security.
Int. J. Inf. Comput. Secur., 2007

2006
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006


  Loading...