Güvenli Ürün Tasarımı için bir Yöntem Önerisi: Senaryo Kurma

Download
1998-05-26
Ergonomi ve Yaşam Kalitesi - Bildiriler, Altıncı Ergonomi Kongresi

Suggestions

Design and FPGA implementation of hash processor
Şiltu, Çelebi Tuğba; Aşkar, Murat; Department of Electrical and Electronics Engineering (2007)
In this thesis, an FPGA based hash processor is designed and implemented using a hardware description language; VHDL. Hash functions are among the most important cryptographic primitives and used in the several fields of communication integrity and signature authentication. These functions are used to obtain a fixed-size fingerprint or hash value of an arbitrary long message. The hash functions SHA-1 and SHA2-256 are examined in order to find the common instructions to implement them using same hardware blo...
The psychometric qualities of the knowledge of secure base script-prompt word outline method: multi-sample evaluation of the validity and the reliability
Anafarta, Meltem; Karancı, Ayşe Nuray; Department of Psychology (2007)
Attachment theory which emphasizes the importance of the mother infant bond and its’ crucial role in determining multiple cognitive, emotional, and behavioral factors later in life, is gaining popularity in all domains of psychology. However, both in terms of conceptualization and methods of assessment, there is no consensus among the domains and this debate encourages researchers to develop new assessment methods to resolve the issue. The current study focused on the Turkish adaptation of the most recently...
The Role of expertise on code review for security: an eye tracking study
Kaplan, Utku; Acartürk, Cengiz; Department of Cyber Security (2019)
To improve the quality of the software and find security vulnerabilities, code review is usually performed during software development activities. The experience of software developers reviewing the code may affect the quality of the code review. This study investigates whether differences between novices and experts in the detection of vulnerabilities in the code can be identified by eye tracking. Participants’ eye movements were recorded by an eye tracker while they investigated program codes for security...
Secure mail gateway
Tanık, Güven Orkun; Özgit, Attila; Department of Computer Engineering (2010)
Past few decades witnessed the birth and explosive growth of the internet and the communications –most notably the electronic mail- through it. Studies indicate that although security measures are deployed, their usage is very limited and problematic. This work proposes a system to address some of the shortcomings of present mail security systems, such as underutilization, complicated key management and unwanted immunization against filtering-scanning. A two-layer message encryption scheme with domain level...
Güvenli Yaşamak Afetlerden Korunmayı Öğreniyoruz Aile Afete Hazırlık El Kitabı
Başbuğ Erkan, Berna Burçak; Karancı, Ayşe Nuray (ODTÜ, Afet Yönetim Uygulama ve Araştırma Merkezi, 2013-01-01)
Citation Formats
G. F. Hasdoğan, “Güvenli Ürün Tasarımı için bir Yöntem Önerisi: Senaryo Kurma,” presented at the Ergonomi ve Yaşam Kalitesi - Bildiriler, Altıncı Ergonomi Kongresi, Ankara, Türkiye, 1998, Accessed: 00, 2022. [Online]. Available: https://hdl.handle.net/11511/101059.