
Ahmet KoltuksuzYaşar University · Computer Engineering
Ahmet Koltuksuz
About
21
Publications
2,920
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
233
Citations
Publications
Publications (21)
The Internet would be the largest one had it been a country of the world. The population and the produced and consumed data in this new country have been exponentially increasing, and the metrics with which one can measure all this growth are zettabytes, if not the yottabytes now. The issue of forgery detection on authentication and integrity and o...
Cyberspace, which is a complex system, constitutes dynamic networks of various interacting entities such as cyber-physical systems and world-wide-web of information. The quest for principles underlying the structural organization and dynamics of cyberspace often uses a Top-down approach, and no general framework for describing, categorizing, and an...
Malware analysis is a forensic process. After infection and the damage represented itself with the full scale, then the analysis of the attack, the structure of the executable and the aim of the malware can be discovered. These discoveries are converted into analysis reports and malware signatures and shared among antivirus databases and threat int...
The first bot implemented in the history of computers is the Eggdrop(Fisher J 1998). The first instance of this kind was benign; it was an automated management tool for Internet Relay Chat (IRC) rooms. It wasn't much later for Internet users to experience the first botnet attack. GTbot family is the first known malicious automated attack network on...
The benefits of collaborating across disciplines, such as social sciences, applied statistics and computer science, primarily affect the security arena regarding the fields of open source intelligence, information warfare, and strategic studies of security. Computer science and psychology are becoming more and more involved with the advancements in...
Contemporarily, one of the main challenges for information security community is the growing number of cyber threats. Large scaled, globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore, collection and the exchange of cyber threat intelligence is of supreme importance. The...
Since 2008, Cyberspace is officially regarded as a distinct military domain, along with land, sea, and air for many countries (Goel 2011). The nature of warfare in cyberspace is radically different than traditional warfare: the attacks are more remote, stealthy, and detecting the identity of the adversary may be impossible (Greengard 2010). Nations...
Inadequate formalisation or theoretical perspective is a sign of new domain which also holds in cyberspace and its
related areas (cyber warfare, etc.). The development of which could solve the problems in lexicon, lack of consensus and
provides a ground truth for general analysis and further development. Cyberspace is a complex domain in which the...
PST 2015 Conference Proceedings
Manifolds are suitable differentiable mathematical objects for information to be defined on. By their very definition they are non-Euclidean in the global view but in local scales they resemble Euclidean spaces. This property provides that the contemporary information models can also be defined within the previsioned new models of information model...
The purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing systems. With the distributed key generation, each node has equal responsibility for creating distri...
This paper addresses theoretical and practical issues experienced in the construction of Turkish National Corpus (TNC). TNC is designed to be a balanced, large scale (50 million words) and general-purpose corpus for contemporary Turkish. It has benefited from previous practices and efforts for the construction of corpora. In this sense, TNC general...
The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastru...
This paper addresses theoretical and practical issues experienced in the construction of Turkish National Corpus (TNC). TNC is designed to be a balanced, large scale (50 million words) and general-purpose corpus for contemporary Turkish. It has benefited
from previous practices and efforts for the construction of corpora. In this sense, TNC general...
Communicating Sequential Processes (CSP) is a process algebra, designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP, each of the Efficient Multi-chai...
Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Ti...
The cryptographic key management center is the place where all the cryptographical protocols and related keys are in action. Traditionally the key management centers operate on the ground. However; with the satellites, it is possible to conceive a space based key management center. This paper underlines the pros and cons of having a satellite netwo...
Elliptic curves are proposed for the asymmetrical cryptography by Neal Koblitz and Victor Miller in 1986 separately. Elliptic curve cryptography (ECC) is utilized by hardware embedded solutions on mobile equipments and smart cards after 2000. Currently, software implementation of ECC faces the computational speed problem. One of the proposed soluti...
Intelligence is the process of supporting the policymakers in making their decisions by providing them with the specific information they need. Intelligence analysis is the effort of extracting the nature of intelligence issue with the policy goal in mind. It is performed by intelligence analysts who form judgments that add value to the collected m...
This paper delineates the results gained throughout the development of a cryptographic multiprecision integer library, CRYMPIX.
To obtain the know-how for cryptographic computation and thus being able to create the high level cryptographic protocols
in an in-house-fashion are the main reasons of this development. CRYMPIX is mainly designed to suppl...
The digital signature law of Turkey has been affective since 2005 and the two certification authorities have been serving to the purpose. Although we haven't encountered any attacks on digital signatures as yet the problem prevails nevertheless. In this paper the basic definitions for digital signatures provided along with a digital signature class...