Search
Now showing items 1-10 of 40
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
After the Crimean crisis: towards a greater Russian maritime power in the Black Sea
(Routledge Journals Taylor & Francis Ltd, 2014)
The modernization of the Black Sea Fleet currently underway is believed to be one of the most ambitious parts of the Russian State Arms Procurement programme 2011-2020. Up to 18 units are being built and are expected to ...
From the Atlantic pact to NATO: debating Turkey's location and function in the Turkish grand national assembly
(Uluslararası İlişkiler Konseyi Derneği, 2012)
This article using critical geopolitics as a framework analyzes identity formation in Turkey during Turkey's NATO accession. The main thesis of this article is that identity that is made through foreign policy discourse ...
The Only Thing We Have to Fear: Post 9/11 Institutionalization of In-security [Korkmamız gereken tek şey: 11 Eylül sonrasında güvensizliğin kurumsallaşması]
(Uluslararası İlişkiler Konseyi Derneği, 2012)
During the last decade billions of dollars have been spent to increase security measures in the United States. New institutions including a department for homeland security have been established new security tools have ...
Perception or Discourse? Security Threats in Copenhagen School and Neoclassical Realism
(2011)
This article compares the perceptive approach of neoclassical realist security understanding with the discursive constructivist methodology of the Copenhagen School in analyzing the emergence of security threats. It departs ...
Escalating rivalries and diverging interests: prospects for stability and security in the Black Sea region
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is increasingly becoming a priority on the international agenda. In fact a regional approach is emerging as actors understand that common problems need to be addressed jointly. Nevertheless cooperation ...
A 2020 vision for the Black Sea region: the Commission on the Black Sea proposes
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is coming into its own although it is at times a contested and dangerous neighbourhood. Despite heightened interest in the region its real priorities and needs are still being largely ignored by insiders ...
Protecting openflow switches against denial of service attacks
(Institute of Electrical and Electronics Engineers Inc., 2018)
This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible programmable ...
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
İstihbarat faaliyetlerinin ozel hayatin gizliligine saygi hakki acisindan degerlendirilmesi
(Kadir Has Üniversitesi, 2017)
Devletin guvenlik saiki ile yuruttugu ve hayati fonksiyonlarindan birisi olan istihbarat faaliyetleri bireyin temel hak ve ozgurluklerinden olan ozel hayatin gizliligine saygi hakki ile zaman zaman celismekte ve bu hakki ...