New distinguishers based on random mappings against stream ciphers M Sönmez Turan, Ç Çalık, NB Saran, A Doğanaksoy Sequences and Their Applications-SETA 2008: 5th International Conference …, 2008 | 20 | 2008 |
Choosing parameters to achieve a higher success rate for Hellman time memory trade off attack N Saran, A Doganaksoy 2009 International Conference on Availability, Reliability and Security, 504-509, 2009 | 19 | 2009 |
Sparsity-Driven Change Detection in Multitemporal SAR Images Fatih Nar, Atilla Özgür, Ayşe Nurdan Saran IEEE Geoscience and Remote Sensing Letters, 2016 | 17 | 2016 |
Perlin random erasing for data augmentation M Saran, F Nar, AN Saran 2021 29th Signal Processing and Communications Applications Conference (SIU …, 2021 | 13 | 2021 |
Vessel segmentation in MRI using a variational image subtraction approach AN Saran, F Nar, M Saran Turkish Journal of Electrical Engineering and Computer Sciences 22 (2), 499-516, 2014 | 10 | 2014 |
A survey on server-based electronic identification and signature schemes to improve eIDAS: with a new proposal for Turkey O Erdogan, NA Saran PeerJ Computer Science 7, e734, 2021 | 7 | 2021 |
İmge içine bilgi gizlemede kullanılan lsb yöntemlerinin karşılaştırması C Olcay, N Saran Çankaya University, 2013 | 7 | 2013 |
Distribution-preserving data augmentation NA Saran, M Saran, F Nar PeerJ Computer Science 7, e571, 2021 | 6 | 2021 |
Time memory trade off attack on symmetric ciphers AN Saran Middle East Technical University, 2009 | 6 | 2009 |
Siber Güvenlik ve Savunma: Standartlar ve Uygulamalar Ş Sağiroğlu, G ŞENGÜL, AH IŞIK, G DOĞAN, ÖÜA BOSTAN, ... Grafiker Yayınları, 2019 | 5 | 2019 |
The observation of information security awareness in Turkey A Durmuş | 3 | 2014 |
Stock price prediction using deep learning methods in high-frequency trading E Albayrak | 2 | 2021 |
Fidye Yazılımlar AN SARAN Siber Güvenlik ve Savunma Kitap Serisi 3, 2019 | 2 | 2019 |
Cassandra ve MongoDB NoSQL Veri Tabanlarının Karşılaştırmalı Güvenlik Analizi M Saran, N Saran Uluslararası Bilgi Güvenliği Mühendisliği Dergisi 5 (2), 1-11, 2019 | 2 | 2019 |
Analyzing the medium-interaction honeypot: A case study S Yüksel | 2 | 2018 |
Parallelism of AES Algorithm via MPI O Pekcagliyan, N Saran 6th MTS Seminar, Cankaya university, April, 2013 | 2 | 2013 |
The use of audio playback rate control tool in multimedia learning: A case study M Saran, N Saran, Z Yildirim E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare …, 2008 | 2 | 2008 |
On time-memory trade-offs for password hashing schemes AN Saran Frontiers in Computer Science 6, 1368362, 2024 | 1 | 2024 |
İstatistiksel ve Derin Öğrenme Modellerini Kullanarak Hisse Senedi Fiyat Tahmini E ALBAYRAK, N SARAN Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 16 (2 …, 2023 | 1* | 2023 |
Identity/attribute-based authentication protocols based on pairings G Öztürk Middle East Technical University, 2020 | 1 | 2020 |