Search
Now showing items 1-6 of 6
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Protecting openflow switches against denial of service attacks
(Institute of Electrical and Electronics Engineers Inc., 2018)
This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible programmable ...
From the Atlantic pact to NATO: debating Turkey's location and function in the Turkish grand national assembly
(Uluslararası İlişkiler Konseyi Derneği, 2012)
This article using critical geopolitics as a framework analyzes identity formation in Turkey during Turkey's NATO accession. The main thesis of this article is that identity that is made through foreign policy discourse ...
Geopolitics and gas-transit security through pipelines
(Springer International Publishing, 2020)
Hydrocarbons are valuable only if they can be transited from where they are produced to where they are consumed. Despite the enduring importance of transit to the global energy system, the topic did not begin to be extensively ...
Terror as potentiality - the affective rhythms of the political
(Routledge Journals, 2018)
The paper addresses the ways in which the cultural, the affective and the political intersect, counter and/or feed upon one another in the context of contemporary terror. Initially, building upon Machiavelli and Hobbes, ...
Physical-Layer Security With Optical Generalized Space Shift Keying
(Ieee-Inst Electrıcal Electronıcs Engıneers Inc, 2020)
Spatial modulation (SM) is a promising technique that reduces inter-channel interference while providing high power efficiency and detection simplicity. In order to ensure the secrecy of SM, precoding and friendly jamming ...