Physical unclonable function and hashing are all you need to mutually authenticate iot devices A Mostafa, SJ Lee, YK Peker Sensors 20 (16), 4361, 2020 | 29 | 2020 |
Raising cybersecurity awareness among college students YK Peker, L Ray, S Da Silva, N Gibson, C Lamberson Journal of The Colloquium for Information Systems Security Education 4 (1 …, 2016 | 23 | 2016 |
Training teachers to integrate computational thinking into K-12 teaching R Hodhod, S Khan, Y Kurt-Peker, L Ray Proceedings of the 47th ACM Technical Symposium on Computing Science …, 2016 | 23 | 2016 |
Online cybersecurity awareness modules for college and high school students Y Peker, L Ray, S Da Silva 2018 National Cyber Summit (NCS), 24-33, 2018 | 11 | 2018 |
A new key agreement scheme based on the triple decomposition problem YK Peker International Journal of Network Security 16 (6), 426-436, 2014 | 9 | 2014 |
Extracting the security features implemented in a bluetooth le connection AM Robles-Cordero, WJ Zayas, YK Peker 2018 IEEE International Conference on Big Data (Big Data), 2559-2563, 2018 | 5 | 2018 |
Private blockchain for visitor authentication and access control KY Chan, M Lovett, YK Peker 2021 IEEE International Conference on Big Data (Big Data), 5580-5586, 2021 | 3 | 2021 |
Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings K Horvath, MR Abid, T Merino, R Zimmerman, Y Peker, S Khan Computers 13 (1), 23, 2024 | 2 | 2024 |
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices M Ahmed, SJ Lee, YK Peker Sensors 20 (16), 4361, 2020 | 1 | 2020 |
Collaboration: Developing and Piloting a Cybersecurity Curriculum for Middle School H Fleenor, Y Peker, E Cutts Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 1 | 2019 |
Modules for integrating cryptography in introductory cs and computer security courses Y Kurt Peker Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017 | 1 | 2017 |
Cybersecurity Education Across the Middle and High School Curricula: Perceived Impacts of the GenCyber Camp AR Gierhart, Y Kurt-Peker, L Ray, L Wang Inquiries of Pedagogical Shifts and Critical Mindsets Among Educators, 153-179, 2024 | | 2024 |
Blockchain-based Privacy Preserving Linear Regression Z Mutlu, YK Peker, AA Selçuk Journal of Millimeterwave Communication, Optimization and Modelling 3 (2), 45-49, 2023 | | 2023 |
Predictive Data Analytics for Energy Incident Management (EIM) in Smart Buildings: A Data Science Approach MR Abid, A Lee, T Merino, K Horvath, R Zimmerman, Y Peker, S Khan 2023 5th International Conference on Control and Robotics (ICCR), 255-260, 2023 | | 2023 |
Blockchain Ensured Physical Visitor Access Control and Authentication F Stock, J Hearst, YK Peker 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022 | | 2022 |
OpenDSA Data Structures and Algorithms Adoption L Ray, R Hodhod, YK Peker, A Perez, H Caroll, J Koech University System of Georgia, 2021 | | 2021 |
Introduction to Information Security (D2L Export) L Ray, R Hodhod, YK Peker, A Perez, H Carroll, J Koech | | 2021 |
Java Programming Adoption L Ray, R Hodhod, YK Peker, A Perez, H Carroll, J Koech University System of Georgia, 2021 | | 2021 |
Computing in the Classroom: A Workshop for Teachers to Infuse Computational Thinking into K-12 Classrooms Y Kurt-Peker, L Ray, R Hodhod, S Khan Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | | 2015 |
Technology and Applications” by Mike Hendry Cambridge University Press, 2007 YK Peker | | 2013 |