Assoc. Prof. Süleyman KONDAKÇI
Faculty of Engineering
Computer Engineering
Assoc. Prof. Süleyman KONDAKÇI
Faculty of Engineering
Computer Engineering
CITED WORKS
Referenced in publications covered by other indexes
- Citing :
Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
Cited :
International Journal of Information and Computer Security/A new assessment and improvement model of risk propagation in information security - Inderscience
- Citing :
Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
Cited :
Proceedings of the 6th International Conference on Information Assurance and Security/ A causal model for information security risk assessment - IEEE Computer Society
- Citing :
Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
Cited :
Proceedings of the 2nd IEEE International Conference on Social Computing/ Network security risk assessment using bayesian belief networks - IEEE Computer Society
- Citing :
Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
Cited :
Security of Information and Networks/ A recursive method for validating and improving network security solutions - Trafford Publishing
- Citing :
Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
Cited :
Proceedings of the 4th International Conference on Information Assurance and Security/ A composite network security assessment - IEEE Computer Society
- Citing :
PeiFeng, Wang , Shang, Meng , (2009-2010)
Markov model of malicious code propagation - IEEE Computer Society
Cited :
Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
- Citing :
Suleyman Kondakci , Cemali Dincer , (2009-2010)
Internet epidemiology: Healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
Cited :
Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
- Citing :
PeiFeng Wang , Shang Meng , (2008-2009)
International Conference on Innovative Computing and Communication/Markov model of malicious code propagation - CICC-ITOE
Cited :
SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
- Citing :
Martin del Rey A. (2008-2009)
A Computer Virus Spread Model Based on Cellular Automata on Graphs - Lecture Notes in Computer Science
Cited :
SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
- Citing :
Xiong Cheng-Jie , Li Yan-Fu , (2008-2009)
ADVANCES IN SOFTWARE ENGINEERING/ Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack - Communications in Computer and Information Science
Cited :
SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
- Citing :
Suleyman Kondakci , Cemali Dincer , (2008-2009)
SECURITY AND COMMUNICATION NETWORKS/ Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Wiley-Blackwell
Cited :
SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
- Citing :
Cheng-Jie Xiong , Yan-Fu Li , (2008-2009)
Service reliability and availability analysis of distributed software systems considering malware attack - Communications in Computer and Information Science, Springer
Cited :
Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
- Citing :
Del Rey, A.M. , Del Rey , (2008-2009)
A computer virus spread model based on cellular automata on graphs - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Cited :
Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
- Citing :
Suleyman Kondakci , Suleyman Kondakci , (2008-2009)
A concise cost analysis of Internet malware - Computers & Security, Elsevier
Cited :
Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
Referenced in publications covered by WoS indexes
- Citing :
Angel Martín del Rey (2014-2015)
Mathematical modeling of the propagation of malware: a review - Security and Communication Networks
Cited :
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
- Citing :
Jesus R. Artalejo (2014-2015)
On the Markovian Approach for Modeling the Dynamics of Nosocomial Infections - Acta Biotheoretica-Springer Verlag
Cited :
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
- Citing :
J.R. Artalejo , M.J. Lopez-Herrero , (2014-2015)
Stochastic epidemic models: New behavioral indicators of the disease spreading - Applied Mathematical Modelling
Cited :
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
- Citing :
Julia Amador , Jesus R. Artalejo , (2012-2013)
Modeling computer virus with the BSDE approach - Elsevier/ COMPUTER NETWORKS
Cited :
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - SECURITY AND COMMUNICATION NETWORKS