| A.1 Karabey B., Baykal N.,, Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities. "International Arab Journal of Information Technology", 10, (2013), p.297-304.|
A.2 Alasehir O., Cakir MP., Acarturk C., Baykal N., Akbulut U., URAP-TR: Anational Ranking for Turkish Universities BAsed on Academic Performance. "Scientometrics", 101, (2014), p.159-178.
A.3 Yilmaz A.O Baykal N, An Infrastructure for Efficient Reporting Workflow in Grid Based Teleradiology Architectures Using Relation Based Semantic Matching and Integer Linear Programming. "Federated Conference on Computer Science and Information Systems (FedCSIS)", (2014), p.241-245.
A.4 Mizani M.A., Baykal N.,, Policymaking to Preserve Privacy in Disclosure of Public Health Data: A Suggested Framework. "Journal Of Medical Ethics", 41, (2015), p.263-267.
| A.1 Aydın M., Baykal N.,, Feature Extraction and Classification Phishing Websites Based on URL. "Communications and Network Security (CNS), 2015 IEEE Conference on", (2015), p.769 - 770.|