Sort of Turkey's top 20 banks by cipher suite value
Main Article Content
Abstract
Today, the main purpose of increasing importance of banks that transfer funds and expanding application areas [1]. As in all areas of the financial sector on security is an important issue. Cloud technology and the increasing importance of security issues in this area is not limited because it is not certain can occur unexpectedly. The aim of this study is located in the ranking of the top 20 banks in Turkey in 2014 [2] is classified according to various criteria. This is undoubtedly one of the troughs with the classification criteria is their Cipher Suite.
Keywords: Missing Value, Ranking, SSL
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Global Journal of Computer Sciences: Theory and Research is an Open Access Journal. All articles can be downloaded free of charge. Articles published in the Journal are Open-Access articles distributed under CC-BY license [Attribution 4.0 International (CC BY 4.0)]
Birlesik Dunya Yenilik Arastirma ve Yayincilik Merkezi (BD-Center) is a gold open access publisher. At the point of publication, all articles from our portfolio of journals are immediately and permanently accessible online free of charge. BD-Center articles are published under the CC-BY license [Attribution 4.0 International (CC BY 4.0)], which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and the source are credited.
References
Demirguc-Kunt, A., Feyen, E., & Levine, R. (2011). Optimal Financial Structures and Development: The evolving importance of banks and markets. World Bank, mimeo.
Information on, https://ekonomist.co/bankalar/turkiyenin-en-buyuk-20 bankasi-4849/.
‘Basics of Banking’, KESDeE, https://www.kesden.com
Parlakkaya, R. Ç., & Akten, S. (2011). Finansal rasyolarin katilim bankalari ve geleneksel bankalar arasında bir tasnif aracı olarak kullanimi: Turkiye ornegi. Ege Akademik Bakıs, 11(3), 397-405.
Rescorla, E, Transport Layer Security (TLS) Parameters, (Last Updated: 2015/10/7), https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4
Panko, R. (2010). Corporate Computer and Network Security, 2/e. Pearson Education India, 2010.
Grzymala-Busse, J. W., & Hu, M. (2001, January). A comparison of several approaches to missing attribute values in data mining. In Rough sets and current trends in computing (pp. 378-385). Springer Berlin Heidelberg.