Browsing Scopus İndeksli Yayınlar Koleksiyonu by Subject "Security"
Now showing items 1-20 of 22
-
A 2020 vision for the Black Sea region: the Commission on the Black Sea proposes
(Routledge Journals Taylor & Francis Ltd, 2010)The Black Sea region is coming into its own although it is at times a contested and dangerous neighbourhood. Despite heightened interest in the region its real priorities and needs are still being largely ignored by insiders ... -
Adults' recollection of the earliest memories: early parental elaboration mediated the link between attachment and remembering
(Springer, 2022)Social interactions are a major factor in organizing the earliest experiences in the memory system. In the current study, we tested the role of parental reminiscing on the relationship between parental attachment and ... -
After the Crimean crisis: towards a greater Russian maritime power in the Black Sea
(Routledge Journals Taylor & Francis Ltd, 2014)The modernization of the Black Sea Fleet currently underway is believed to be one of the most ambitious parts of the Russian State Arms Procurement programme 2011-2020. Up to 18 units are being built and are expected to ... -
AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection
(IEEE-Inst Electrical Electronics Engineers Inc, 2022)The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder ... -
Applications of ML/DL in the management of smart cities and societies based on new trends in information technologies: A systematic literature review
(Elsevier, 2022)The goal of managing smart cities and societies is to maximize the efficient use of finite resources while enhancing the quality of life. To establish a sustainable urban existence, smart cities use some new technologies ... -
Blockchain Systems in Embedded Internet of Things: Systematic Literature Review, Challenges Analysis, and Future Direction Suggestions
(Mdpi, 2022)Internet of Things (IoT) environments can extensively use embedded devices. Without the participation of consumers; tiny IoT devices will function and interact with one another, but their operations must be reliable and ... -
Cloud healthcare services: A comprehensive and systematic literature review
(Wiley, 2022)Over the last decade, the landscape of cloud computing has been significantly changed. It has been known as a paradigm in which a shared pool of computing resources is accessible for users. The rapid growth of the healthcare ... -
Escalating rivalries and diverging interests: prospects for stability and security in the Black Sea region
(Routledge Journals Taylor & Francis Ltd, 2010)The Black Sea region is increasingly becoming a priority on the international agenda. In fact a regional approach is emerging as actors understand that common problems need to be addressed jointly. Nevertheless cooperation ... -
From the Atlantic Pact to NATO: Debating Turkey's location and function in the Turkish Grand National Assembly
(International Relations Council of Turkey, 2012)This article, using critical geopolitics as a framework, analyzes identity formation in Turkey during Turkey's NATO accession. The main thesis of this article is that identity that is made through foreign policy discourse ... -
Geopolitics and gas-transit security through pipelines
(Springer International Publishing, 2020)Hydrocarbons are valuable only if they can be transited from where they are produced to where they are consumed. Despite the enduring importance of transit to the global energy system, the topic did not begin to be extensively ... -
A Hybrid Approach With GAN and DP for Privacy Preservation of IIoT Data
(IEEE-Inst Electrical Electronics Engineers Inc, 2023)There are emerging trends to use the Industrial Internet of Things (IIoT) in manufacturing and related industries. Machine Learning (ML) techniques are widely used to interpret the collected IoT data for improving the ... -
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ... -
The Only Thing We Have to Fear: Post 9/11 Institutionalization of In-security [Korkmamız gereken tek şey: 11 Eylül sonrasında güvensizliğin kurumsallaşması]
(Uluslararası İlişkiler Konseyi Derneği, 2012)During the last decade billions of dollars have been spent to increase security measures in the United States. New institutions including a department for homeland security have been established new security tools have ... -
Perception or Discourse? Security Threats in Copenhagen School and Neoclassical Realism
(2011)This article compares the perceptive approach of neoclassical realist security understanding with the discursive constructivist methodology of the Copenhagen School in analyzing the emergence of security threats. It departs ... -
Physical-Layer Security in 6G Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2021)The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These ... -
Physical-Layer Security With Optical Generalized Space Shift Keying
(Ieee-Inst Electrıcal Electronıcs Engıneers Inc, 2020)Spatial modulation (SM) is a promising technique that reduces inter-channel interference while providing high power efficiency and detection simplicity. In order to ensure the secrecy of SM, precoding and friendly jamming ... -
Protecting openflow switches against denial of service attacks
(Institute of Electrical and Electronics Engineers Inc., 2018)This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible programmable ... -
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review
(Springer, 2023)With the galloping progress of the Internet of Things (IoT) and related technologies in multiple facets of science, distribution environments, namely cloud, edge, fog, Internet of Drones (IoD), and Internet of Vehicles ... -
A Secure Intrusion Detection Platform Using Blockchain and Radial Basis Function Neural Networks for Internet of Drones
(IEEE-Inst Electrical Electronics Engineers Inc, 2023)The Internet of Drones (IoD) is built on the Internet of Things (IoT) by replacing Things with Drones while retaining incomparable features. Because of its vital applications, IoD technologies have attracted much attention ... -
Secure Transmission for THz-Empowered RIS-Assisted Non-Terrestrial Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2023)The non-terrestrial networks (NTNs) are recognized as a key component to provide cost-effective and high-capacity ubiquitous connectivity in the future wireless communications. In this paper, we investigate the secure ...