Follow
Yesem Kurt Peker
Yesem Kurt Peker
Associate Professor of Computer Science, Columbus State University
Verified email at columbusstate.edu
Title
Cited by
Cited by
Year
Physical unclonable function and hashing are all you need to mutually authenticate iot devices
A Mostafa, SJ Lee, YK Peker
Sensors 20 (16), 4361, 2020
292020
Raising cybersecurity awareness among college students
YK Peker, L Ray, S Da Silva, N Gibson, C Lamberson
Journal of The Colloquium for Information Systems Security Education 4 (1 …, 2016
232016
Training teachers to integrate computational thinking into K-12 teaching
R Hodhod, S Khan, Y Kurt-Peker, L Ray
Proceedings of the 47th ACM Technical Symposium on Computing Science …, 2016
232016
Online cybersecurity awareness modules for college and high school students
Y Peker, L Ray, S Da Silva
2018 National Cyber Summit (NCS), 24-33, 2018
112018
A new key agreement scheme based on the triple decomposition problem
YK Peker
International Journal of Network Security 16 (6), 426-436, 2014
92014
Extracting the security features implemented in a bluetooth le connection
AM Robles-Cordero, WJ Zayas, YK Peker
2018 IEEE International Conference on Big Data (Big Data), 2559-2563, 2018
52018
Private blockchain for visitor authentication and access control
KY Chan, M Lovett, YK Peker
2021 IEEE International Conference on Big Data (Big Data), 5580-5586, 2021
32021
Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings
K Horvath, MR Abid, T Merino, R Zimmerman, Y Peker, S Khan
Computers 13 (1), 23, 2024
22024
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
M Ahmed, SJ Lee, YK Peker
Sensors 20 (16), 4361, 2020
12020
Collaboration: Developing and Piloting a Cybersecurity Curriculum for Middle School
H Fleenor, Y Peker, E Cutts
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
12019
Modules for integrating cryptography in introductory cs and computer security courses
Y Kurt Peker
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
12017
Cybersecurity Education Across the Middle and High School Curricula: Perceived Impacts of the GenCyber Camp
AR Gierhart, Y Kurt-Peker, L Ray, L Wang
Inquiries of Pedagogical Shifts and Critical Mindsets Among Educators, 153-179, 2024
2024
Blockchain-based Privacy Preserving Linear Regression
Z Mutlu, YK Peker, AA Selçuk
Journal of Millimeterwave Communication, Optimization and Modelling 3 (2), 45-49, 2023
2023
Predictive Data Analytics for Energy Incident Management (EIM) in Smart Buildings: A Data Science Approach
MR Abid, A Lee, T Merino, K Horvath, R Zimmerman, Y Peker, S Khan
2023 5th International Conference on Control and Robotics (ICCR), 255-260, 2023
2023
Blockchain Ensured Physical Visitor Access Control and Authentication
F Stock, J Hearst, YK Peker
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022
2022
OpenDSA Data Structures and Algorithms Adoption
L Ray, R Hodhod, YK Peker, A Perez, H Caroll, J Koech
University System of Georgia, 2021
2021
Introduction to Information Security (D2L Export)
L Ray, R Hodhod, YK Peker, A Perez, H Carroll, J Koech
2021
Java Programming Adoption
L Ray, R Hodhod, YK Peker, A Perez, H Carroll, J Koech
University System of Georgia, 2021
2021
Computing in the Classroom: A Workshop for Teachers to Infuse Computational Thinking into K-12 Classrooms
Y Kurt-Peker, L Ray, R Hodhod, S Khan
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
2015
Technology and Applications” by Mike Hendry Cambridge University Press, 2007
YK Peker
2013
The system can't perform the operation now. Try again later.
Articles 1–20