Impact of education on security practices in ICT A Bostan, İ Akman Tehnicki Vjesnik-Technical Gazette 22 (1), 161-168, 2015 | 15 | 2015 |
Bulut bilişimde bilgi güvenliği ve standardizasyon çalışmaları. 6 G Şengül, A Bostan Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, 263-267, 2013 | 9 | 2013 |
Bilişim güvenliği: kullanıcı açısından bir durum tespiti A Bostan, İ Akman IV. Ağ ve Bigli Güvenliği Sempozyumu, 51-56, 2011 | 9 | 2011 |
A smart classroom application: Monitoring and reporting attendance automatically using smart devices G Şengül, M Karakaya, A Bostan Int. J. Sci. Res. Inf. Syst. Eng. IJSRISE 3 (1), 39-43, 2017 | 7 | 2017 |
How Secure is Your Smart Watch? M Karakaya, A Bostan, E Gökçay International Journal of Information Security Science 5 (4), 90-95, 2016 | 7 | 2016 |
Remotely monitoring activities of the elders using smart watches M Karakaya, G Sengül, A Bostan Int. J. Sci. Res. Inf. Syst. Eng 3, 56, 2017 | 6 | 2017 |
Öğrenci ders devamının sınavlarda alınan notlara etkisi üzerine bir durum çalışması A BOSTAN, M KARAKAYA Mersin Üniversitesi Eğitim Fakültesi Dergisi 12 (1), 2016 | 5 | 2016 |
Teaching computer networks: theory and problem solving A Bostan Journal of Advances in Computer Networks 3 (4), 299-302, 2015 | 5 | 2015 |
An undergraduate curriculum for deep learning G Tirkeş, CCC Ekin, A Bostan, M Karakaya 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 4 | 2018 |
Implicit learning with certificate warning messages on SSL web pages: what are they teaching? A Bostan Security and Communication Networks 9 (17), 4295-4300, 2016 | 4 | 2016 |
Customizing SSL Certificate Extensions to Reduce False-Positive Certificate Error/Warning Messages Ş Tarazan, A Bostan International Journal of Information Security Science 5 (2), 21-28, 2016 | 4 | 2016 |
Adli Bilişim Alanındaki Mevcut Problemler, Çözüm Önerileri ve Gelecek Öngörüleri G Şengül, FK Atsan, A Bostan Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, 17-18, 2014 | 4 | 2014 |
ICT user and usage characteristics and e-mail security awareness A Bostan, İ Akman 2013 International Conference on Electronics, Computer and Computation …, 2013 | 4 | 2013 |
Shoulder surfing resistant graphical password schema: Randomized Pass Points (RPP) H Bostan, A Bostan Multimedia Tools and Applications 82 (28), 43517-43541, 2023 | 3 | 2023 |
Kriter Esaslı Testlerde Bulanık Mantık Ġle Ölçüm Yönteminin Uyarlamalı Bilgisayar Testlerinde Kullanılması A Bostan Basılmamış Doktora Tezi, Gazi Üniversitesi Eğitim Bilimleri Enstitüsü, 2007 | 3 | 2007 |
Deep Learning and Current Trends in Machine Learning A Bostan, C Ekin, G Şengül, M Karakaya, G Tirkeş 2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018 | 2 | 2018 |
Analyzing the requirements for E-government transition of Iraqi ICS services: An Iraqi correction services case study MA Alameri, A Bostan, I Akman 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 2 | 2017 |
Chaos-Based Data Encryption Using Arnold’s CAT Map A Bostan, M Karakaya, G Şengül CHAOS 4 (1), 2018 | 1 | 2018 |
ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY İ Akman, A Bostan PEOPLE: International Journal of Social Sciences (2454-5898) 3, 1046-1063, 2018 | 1 | 2018 |
Biometric Verification on e-ID-Card Secure Access Devices: A Case Study on Turkish National e-ID Card Secure Access Device Specifications A Bostan, G Şengül, KM Karakaya International Journal of Information Security Science 6 (4), 87-92, 2017 | 1 | 2017 |