Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Size meydan okuyorum!
Date
2011-10-01
Author
Özkan, Türker
Metadata
Show full item record
Item Usage Stats
13
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/83678
http://atestas.com.tr/upload/dergi/2011_ekim_kasim_aralik.pdf
Journal
Trafik
Collections
Department of Psychology, Article
Suggestions
OpenMETU
Core
Aman Tanrım! Beynimizi Ele Geçiriyorlar: Eşikaltı Uyaranlar Nedir, Ne Değildir?
Çoksan, Sami (2019-04-01)
Military innovation critical and dual use technologies
Yazan, Abdurrahman Mete; Durgut, Metin; Department of Science and Technology Policy Studies (2004)
This thesis represents an attempt to explore critical issues in the national military literature and bring up findings for further studies by exploring military innovation,smart management of defense R&D, critical and dual-use technologies concepts in detail. The study has two main components. The first part provides a conceptual and theoretical framework to discuss and understand military innovation, critical technology and dual-use technology. A military that fails to innovate when their contemporaries ar...
Modelling long term user experience for mobile phones
Karapars, Gülhis Zeynep; Erbuğ, Çiğdem; Börekçi, Naz Ayşe Güzide Z.; Department of Industrial Design (2013)
This study presents an exploration into evolution of user experience in the long-term use of smartphones. The research methodology was comprised of two phases. In the first phase, a qualitative longitudinal study was conducted with 21 first-time users of smartphones for a duration of three months. Users were interviewed in the first, second and third months of their usage and telephone questionnaires were made in between the interviews. The analysis was made with Grounded Theory method. The evolving stages ...
Malicious user input detection on web-based attacks with the negative selection algorithm
Karataş, Mustafa Mer; Acar, Aybar Can; Department of Cyber Security (2019)
In the cyber security domain, detection and prevention of intrusions is a crucial task. Intrusion attempts exploiting vulnerabilities in an organization’s servers or applications may lead to devastating consequences. The malicious actor may obtain sensitive information from the application, seize database records or take over the servers completely. While protecting web applications/services, discrimination of legitimate user inputs from malicious payloads must be done. Taking inspiration from the Human Imm...
Cumhuriyet Devriminin Yolu Atatürk Bulvarı
Keskinok, Hüseyin Çağatay (Koleksiyoncular Derneği, 2009-01-01)
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
T. Özkan, “Size meydan okuyorum!,”
Trafik
, pp. 16–17, 2011, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/83678.