Size meydan okuyorum!

2011-10-01

Suggestions

Aman Tanrım! Beynimizi Ele Geçiriyorlar: Eşikaltı Uyaranlar Nedir, Ne Değildir?
Çoksan, Sami (2019-04-01)
Military innovation critical and dual use technologies
Yazan, Abdurrahman Mete; Durgut, Metin; Department of Science and Technology Policy Studies (2004)
This thesis represents an attempt to explore critical issues in the national military literature and bring up findings for further studies by exploring military innovation,smart management of defense R&D, critical and dual-use technologies concepts in detail. The study has two main components. The first part provides a conceptual and theoretical framework to discuss and understand military innovation, critical technology and dual-use technology. A military that fails to innovate when their contemporaries ar...
Modelling long term user experience for mobile phones
Karapars, Gülhis Zeynep; Erbuğ, Çiğdem; Börekçi, Naz Ayşe Güzide Z.; Department of Industrial Design (2013)
This study presents an exploration into evolution of user experience in the long-term use of smartphones. The research methodology was comprised of two phases. In the first phase, a qualitative longitudinal study was conducted with 21 first-time users of smartphones for a duration of three months. Users were interviewed in the first, second and third months of their usage and telephone questionnaires were made in between the interviews. The analysis was made with Grounded Theory method. The evolving stages ...
Malicious user input detection on web-based attacks with the negative selection algorithm
Karataş, Mustafa Mer; Acar, Aybar Can; Department of Cyber Security (2019)
In the cyber security domain, detection and prevention of intrusions is a crucial task. Intrusion attempts exploiting vulnerabilities in an organization’s servers or applications may lead to devastating consequences. The malicious actor may obtain sensitive information from the application, seize database records or take over the servers completely. While protecting web applications/services, discrimination of legitimate user inputs from malicious payloads must be done. Taking inspiration from the Human Imm...
Cumhuriyet Devriminin Yolu Atatürk Bulvarı
Keskinok, Hüseyin Çağatay (Koleksiyoncular Derneği, 2009-01-01)
Citation Formats
T. Özkan, “Size meydan okuyorum!,” Trafik, pp. 16–17, 2011, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/83678.