Network security risk assessment using Bayesian belief networks S Kondakci 2010 IEEE Second International Conference on Social Computing, 952-960, 2010 | 42 | 2010 |
Epidemic state analysis of computers under malware attacks S Kondakci Simulation Modelling Practice and Theory 16 (5), 571-584, 2008 | 39 | 2008 |
Is cancer a pure growth curve or does it follow a kinetics of dynamical structural transformation? MM González, JAG Joa, LEB Cabrales, AEB Pupo, B Schneider, ... BMC cancer 17, 1-14, 2017 | 30 | 2017 |
A causal model for information security risk assessment S Kondakci 2010 Sixth International Conference on Information Assurance and Security …, 2010 | 27 | 2010 |
A concise cost analysis of Internet malware S Kondakci Computers & Security 28 (7), 648-659, 2009 | 27 | 2009 |
Analysis of information security reliability: A tutorial S Kondakci Reliability Engineering & System Safety 133, 275-299, 2015 | 23 | 2015 |
A new assessment and improvement model of risk propagation in information security S Kondakci International Journal of Information and Computer Security 1 (3), 341-366, 2007 | 19 | 2007 |
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered S Kondakci, C Dincer Security and Communication Networks 4 (2), 216-238, 2011 | 16 | 2011 |
A composite network security assessment S Kondakci 2008 The Fourth International Conference on Information Assurance and …, 2008 | 12 | 2008 |
A remote IT security evaluation scheme: A proactive approach to risk management S Kondakci Fourth IEEE International Workshop on Information Assurance (IWIA'06), 8 pp.-102, 2006 | 9 | 2006 |
Intelligent network security assessment with modeling and analysis of attack patterns S Kondakci Security and communication networks 5 (12), 1471-1486, 2012 | 8 | 2012 |
Dependency analysis of risks in information security S Kondakci International Review on Computers and Software 3 (1), 11-19, 2008 | 6 | 2008 |
Routing efficiency of infrastructureless networks: a comparative analysis S Kondakci IEEE Open Journal of the Communications Society 1, 1171-1184, 2020 | 5 | 2020 |
Building epidemic models for living populations and computer networks S Kondakci, DD Kondakci Science Progress 104 (2), 00368504211017800, 2021 | 4 | 2021 |
A recursive method for validating and improving network security solutions S Kondakci Proceedings of the International Conference on Security of Information and …, 2008 | 4 | 2008 |
Remote security evaluation agent for the RSEP protocol S Kondakci Int. Conf. on Security of Information and Networks 1, 186-195, 2008 | 4 | 2008 |
Ubiquitous monitoring system for critical rescue operations S Kondakci, G Yilmaz, E Kocabiyik, F Coskuner, A Akçöltekin, MS Yüksel 2010 6th International Conference on Wireless and Mobile Communications, 515-520, 2010 | 3 | 2010 |
Efficiency evaluation of the averaging noise reduction system S Kondakci 2001 Conference Proceedings of the 23rd Annual International Conference of …, 2001 | 3 | 2001 |
Implementation and performance evaluation of the RSEP protocol on ARM and Intel platforms S Kondakci, G Yilmaz Proceedings of the 3rd international conference on Security of information …, 2010 | 2 | 2010 |
DARIS: a probabilistic model for dependency analysis of risks in information security S Kondakci Security of Information and Networks: Proceedings of the First International …, 2008 | 2 | 2008 |