Çulha, Davut

Loading...
Profile Picture
Name Variants
Çulha, Dr. Davut
Davut, Culha
Davut, Çulha
D., Culha
Ç.,Davut
D.,Çulha
Çulha,D.
Culha D.
Ç., Davut
Culha, Davut
D., Çulha
C.,Davut
Çulha, Davut
D.,Culha
Culha,D.
C., Davut
Job Title
Doçent Doktor
Email Address
davut.culha@atilim.edu.tr
Main Affiliation
Software Engineering
Status
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

SDG data is not available
This researcher does not have a Scopus ID.
This researcher does not have a WoS ID.
Scholarly Output

7

Articles

1

Views / Downloads

28/137

Supervised MSc Theses

2

Supervised PhD Theses

0

WoS Citation Count

14

Scopus Citation Count

18

Patents

0

Projects

0

WoS Citations per Publication

2.00

Scopus Citations per Publication

2.57

Open Access Source

1

Supervised Theses

2

JournalCount
International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, IBIGDELFT 2018 - Proceedings -- 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, IBIGDELFT 2018 -- 3 December 2018 through 4 December 2018 -- Ankara -- 1445742
6th International Conference on Blockchain Computing and Applications -- NOV 26-29, 2024 -- Zayed University, Dubai, U ARAB EMIRATES1
International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) -- DEC 03-04, 2018 -- Turkish IT Author, Ankara, TURKEY1
Journal of Universal Computer Science1
Current Page: 1 / 1

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 4 of 4
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 4
    Smart Contract Upgradability: a Structured and Natural Approach
    (Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, Ali
    Software maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.
  • Conference Object
    Citation - Scopus: 14
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Culha,D.; Yazici,A.
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Conference Object
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Yazıcı, Ali; Culha,D.; Yazici,A.; Çulha, Davut; Yazıcı, Ali; Çulha, Davut; Software Engineering; Software Engineering
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.