| Issue Date | Title | Author(s) | 
| 81 | 2022 | Nesnelerin İnterneti (ıot) Tabanlı Akıllı Sulama ve Gübreleme Sistemi | Güvenoğlu, Erdal; Yenikaya, Muhammed Akif; Kondakcı, Süleyman  | 
| 82 | 2010 | Network Security Risk Assessment Using Bayesian Belief Networks | Kondakçı, Süleyman  | 
| 83 | 2007 | A New Assessment and Improvement Model of Risk Propagation in Information Security | Kondakçı, Süleyman  | 
| 84 | 2019 | A New Era in Psychiatry: Influence of Technology and Artificial Intelligence | Erol, Kutluhan  | 
| 85 | 2023 | Non-player character decision-making in computer games | Uludağlı, Muhtar Çağkan ; Oğuz, Kaya  | 
| 86 | 2016 | A Novel Study on Developing a Model-Driven Visual Dictionary | Aslan S.; Akgul C.B.; Sankur B.; Tunalı, Turhan  | 
| 87 | 2011 | Obscurity of Network Security Course Curriculum | Kondakçı, Süleyman  | 
| 88 | 2011 | On the Complexity of Trilateration With Noisy Range Measurements | Evrendilek, Cem ; Akcan, Hüseyin  | 
| 89 | 2015 | Optimal Backup Parent Pools for Resilient Multicast Trees on Peer-To Networks | Tunali, Emrullah Turhan ; Sayit, Muge | 
| 90 | 2022 | Performance Analysis and Feature Selection for Network-Based Intrusion Detection With Deep Learning | Caner, Serhat; Erdogmus, Nesli; Erten, Y. Murat  | 
| 91 | 2019 | Perspectives on the Gap Between the Software Industry and the Software Engineering Education | Oguz, Damla; Oguz, Kaya  | 
| 92 | 2022 | Prediction of Local Scour Around Bridge Piers Using Hierarchical Clustering and Adaptive Genetic Programming | Oguz, Kaya ; Bor Türkben, Aslı  | 
| 93 | 2019 | Procedural City Generation Using Cellular Automata | Temuçin M.B.; Oğuz K.  | 
| 94 | 2011 | Reconstructing Orthogonal Polyhedra From Putative Vertex Sets | Biedl, Therese; Genç, Burkay  | 
| 95 | 2008 | A Recursive Method for Validating and Improving Network Security Solutions | Kondakçı, Süleyman  | 
| 96 | 2013 | Reducing the Number of Flips in Trilateration With Noisy Range Measurements | Akcan H. ; Evrendilek C.  | 
| 97 | 2024 | A Regularization Algorithm for Local Key Detection | Gedizlioğlu, Çınar ; Erol, Kutluhan  | 
| 98 | 2006 | A Remote It Security Evaluation Scheme: A Proactive Approach To Risk Management | Kondakçı, Süleyman  | 
| 99 | 2008 | Remote Security Evaluation Agent for the Rsep Protocol | Kondakçı, Süleyman  | 
| 100 | 2012 | Resilient Peer-To Streaming of Scalable Video Over Hierarchical Multicast Trees With Backup Parent Pools | Fesci-Sayit, Muge; Tunali, E. Turhan ; Tekalp, A. Murat |