№ | Авторлар | Атауы | Журнал | Сілтеме |
1 | Özer, O.| Tuna, G. | Analysis and comparison of hash functions in terms of security and performance | Cyber-Physical Systems and Supporting Technologies for Industrial Automation | ➦ |
2 | Tufan, A.| Tuna, G. | Benefits of information security awareness training against phishing attacks: A field study | Handbook of Research on Cybersecurity Risk in Contemporary Business Systems | ➦ |
3 | Kayabaş, H.| Tuna, G. | Cyber wars and cyber threats against mobile devices: Analysis of mobile devices | Handbook of Research on War Policies, Strategies, and Cyber Wars | ➦ |
4 | Uçak, U.| Tuna, G. | Design, development, and testing of web applications: Security aspects | Protecting User Privacy in Web Search Utilization | ➦ |
5 | Aydin, A.| Tuna, G. | New generation mobile cyber security threats: QR codes and social engineering threats | Cyber-Physical Systems and Supporting Technologies for Industrial Automation | ➦ |
6 | Di Vagno, G.| Malvasi, A.| Lupica, G.| Ferrari, A.| Trojano, G.| Belci, D.| Mynbaev, O.| Savino, A. | Postpartum Hemorrhage in COVID-19 Patients: Instruction for Use | Practical Guide to Simulation in Delivery Room Emergencies | ➦ |
7 | Sarı, B. | Problem of Cooperation in Stag Hunt Game: Great Power Politics in the Covid-19 Pandemic | World Politics in the Age of Uncertainty: The Covid-19 Pandemic, Volume 1 | ➦ |