Arama Sonuçları
Listeleniyor 1 - 10 / 10
Yayın Afghanistan's security: Political process, state-building and narcotics(Wiley-Blackwell, 2008-06) Aras, Bülent; Toktaş, ŞuleEstablishing political authority and constructing a state instrument would increase trust, which would contribute to stability.1 The lack of political institutions necessary for stability encourages the interference of individuals and groups with "special" interests, at both the state and societal levels.2 Stability is not only a prerequisite for the development of the political process and security within the country; it is also a risk to security, as it would require the involvement of groups and factors in the political process that might hinder security itself. [...] in a setting where fierce security measures are needed, running security operations without supplying adequate security personnel and munitions is an absolute risk.48 CONCLUSION The long-term objective for Afghanistan is to strengthen the state structurally and to set mechanisms in place that would prevent it from working only for narrow or factional interests.Yayın A hybrid approach to private record matching(IEEE Computer Soc, 2012-10) İnan, Ali; Kantarcıoğlu, Murat; Ghinita, Gabriel; Bertino, ElisaReal-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the data sets contain private information, the problem becomes even more difficult. Existing solutions to this problem generally follow two approaches: sanitization techniques and cryptographic techniques. We propose a hybrid technique that combines these two approaches and enables users to trade off between privacy, accuracy, and cost. Our main contribution is the use of a blocking phase that operates over sanitized data to filter out in a privacy-preserving manner pairs of records that do not satisfy the matching condition. We also provide a formal definition of privacy and prove that the participants of our protocols learn nothing other than their share of the result and what can be inferred from their share of the result, their input and sanitized views of the input data sets (which are considered public information). Our method incurs considerably lower costs than cryptographic techniques and yields significantly more accurate matching results compared to sanitization techniques, even when privacy requirements are high.Yayın Ontological insecurity, anxiety, and hubris: an affective account of Turkey-KRG relations(International Relations Council of Turkey, 2022-03-10) Kayhan Pusane, Özlem; Ilgıt, AslıGiven Iraqi Kurds’ special place in Turkey’s ‘biographical narrative’, Turkey-Iraqi Kurdish Regional Government (KRG) relations are not simply strategic or economic but also highly affectively charged. These relations involve emotional encounters filled with anxiety, pride, anger, and disappointment that generate concerns for not only Turkey’s physical security but also its ontological security. This paper traces the emotional context of Turkey-KRG relationship. It suggests that a combination of Turkey’s deep-rooted ‘anxiety’ and ‘hubris’ toward the Iraqi Kurds prevented the emergence of a close partnership between these two actors and fostered merely a ‘fragile rapprochement’ since 2008.Yayın The role of context in desecuritization: Turkish foreign policy towards Northern Iraq (2008–2017)(Routledge, 2020-05-26) Kayhan Pusane, ÖzlemFor decades, Turkish policymakers have perceived the possible emergence of a Kurdish autonomous region or an independent Kurdish state in northern Iraq as an existential threat to Turkey. However, from 2008 onwards, under the Justice and Development Party government, Turkish foreign policy towards the Iraqi Kurdistan Regional Government (KRG) was gradually desecuritized. In light of Turkey?s experience, this paper explores the role of context in desecuritizing foreign policy issues in general and Turkish foreign policy towards the KRG in particular. It argues that the changing civil?military relations in Turkey as well as the country?s broader political and economic conjuncture allowed for the desecuritization of Turkey-KRG relations from 2008 onwards. The context also determined what kind of a desecuritization Turkey experienced towards the KRG.Yayın A survey on Near Field Communication (NFC) technology(Springer, 2013-08) Coşkun, Vedat; Özdenizci Köse, Büşra; Ok, KeremNear Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and loyalty applications to access keys for offices and houses. Eventually NFC technology integrates all such services into one single mobile phone. NFC technology has emerged lately, and consequently not much academic source is available yet. On the contrary, due to its promising business case options, there will be an increasing amount of work to be studied in the very close future. This paper presents the concept of NFC technology in a holistic approach with different perspectives, including communication essentials with standards, ecosystem and business issues, applications, and security issues. Open research areas and further recommended studies in terms of academic and business point of view are also explored and discussed at the end of each major subject's subsection. This comprehensive survey will be a valuable guide for researchers and academicians as well as for business world interested in NFC technology.Yayın Turkey’s struggle with the PKK and civilian control over the Turkish Armed Forces(Routledge Journals, Taylor & Francis Ltd, 2016-05-03) Kayhan Pusane, ÖzlemAlthough most scholars of Turkey’s civil-military relations argue that the Kurdistan Workers’ Party (PKK) insurgency has led to a decrease in civilian control over the Turkish military from the 1980s onwards, this has not always been the case. This article argues that the presence or the degree of the PKK threat is not sufficient to explain the civil-military balance of power in Turkey throughout the 1980s and the 1990s. Instead, the article shows that in the face of the PKK threat, three major factors have influenced the behaviours of both civilian and military policy-makers in Turkey and shaped the level of civilian control. These factors are first, the Turkish political leaders’ control over their political parties and these parties’ control of a majority of seats in the parliament; second, how negatively or positively the military perceives the political leadership; and third, European Union pressures for democratisation.Yayın Cryptanalysis of image encryption with compound chaotic sequence(IEEE, 2009) Solak, ErcanRecently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give chosen-plaintext and known-plaintext attacks that yield the secret parameters of the algoritm. Our simulation results show that the computational complexity of the attacks is quite low.Yayın Efficient privacy-aware record integration(2013) Kuzu, Mehmet; Kantarcıoğlu, Murat; İnan, Ali; Bertino, Elisa; Durham, Elizabeth Ashley; Malin, Bradley A.The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to whom the information corresponds. Various private record linkage (PRL) protocols have been proposed to achieve this goal, involving secure multi-party computation (SMC) and similarity preserving data transformation techniques. SMC methods provide secure and accurate solutions to the PRL problem, but are prohibitively expensive in practice, mainly due to excessive computational requirements. Data transformation techniques offer more practical solutions, but incur the cost of information leakage and false matches. In this paper, we introduce a novel model for practical PRL, which 1) affords controlled and limited information leakage, 2) avoids false matches resulting from data transformation. Initially, we partition the data sources into blocks to eliminate comparisons for records that are unlikely to match. Then, to identify matches, we apply an efficient SMC technique between the candidate record pairs. To enable efficiency and privacy, our model leaks a controlled amount of obfuscated data prior to the secure computations. Applied obfuscation relies on differential privacy which provides strong privacy guarantees against adversaries with arbitrary background knowledge. In addition, we illustrate the practical nature of our approach through an empirical analysis with data derived from public voter records.Yayın Closeness and uncertainty aware adversarial examples detection in adversarial machine learning(Elsevier Ltd, 2022-07) Tuna, Ömer Faruk; Çatak, Ferhat Özgür; Eskil, Mustafa TanerWhile deep learning models are thought to be resistant to random perturbations, it has been demonstrated that these architectures are vulnerable to deliberately crafted perturbations, albeit being quasi-imperceptible. These vulnerabilities make it challenging to deploy Deep Neural Network (DNN) models in security-critical areas. Recently, many research studies have been conducted to develop defense techniques enabling more robust models. In this paper, we target detecting adversarial samples by differentiating them from their clean equivalents. We investigate various metrics for detecting adversarial samples. We first leverage moment-based predictive uncertainty estimates of DNN classifiers derived through Monte-Carlo (MC) Dropout Sampling. We also introduce a new method that operates in the subspace of deep features obtained by the model. We verified the effectiveness of our approach on different datasets. Our experiments show that these approaches complement each other, and combined usage of all metrics yields 99 % ROC-AUC adversarial detection score for well-known attack algorithms.Yayın Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty(Springer, 2022-04-02) Tuna, Ömer Faruk; Çatak, Ferhat Özgür; Eskil, Mustafa TanerAlthough state-of-the-art deep neural network models are known to be robust to random perturbations, it was verified that these architectures are indeed quite vulnerable to deliberately crafted perturbations, albeit being quasi-imperceptible. These vulnerabilities make it challenging to deploy deep neural network models in the areas where security is a critical concern. In recent years, many research studies have been conducted to develop new attack methods and come up with new defense techniques that enable more robust and reliable models. In this study, we use the quantified epistemic uncertainty obtained from the model's final probability outputs, along with the model's own loss function, to generate more effective adversarial samples. And we propose a novel defense approach against attacks like Deepfool which result in adversarial samples located near the model's decision boundary. We have verified the effectiveness of our attack method on MNIST (Digit), MNIST (Fashion) and CIFAR-10 datasets. In our experiments, we showed that our proposed uncertainty-based reversal method achieved a worst case success rate of around 95% without compromising clean accuracy.












