


default search action
A. Selcuk Uluagac
Person information
- affiliation: Florida International University, Miami, FL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j55]Harun Oz, Güliz Seray Tuncay, Ahmet Aris, Amin Kharraz, Arif Selcuk Uluagac:
Beyond the Upload Button: A 10-Year Retrospective on Security Issues Within File Upload. IEEE Commun. Mag. 63(2): 104-110 (2025) - [j54]Harun Oz
, Daniele Cono D'Elia
, Güliz Seray Tuncay
, Abbas Acar
, Riccardo Lazzeretti
, Arif Selcuk Uluagac
:
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. IEEE Secur. Priv. 23(2): 52-60 (2025) - [j53]Harun Oz, Güliz Seray Tuncay, Ahmet Aris, Abbas Acar, Leonardo Babun, A. Selcuk Uluagac:
Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense Mechanism. ACM Trans. Web 19(1): 6:1-6:28 (2025) - [c96]Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac:
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. NDSS 2025 - [c95]Fernando Brito
, Yassine Mekdad
, Monique Ross
, Mark A. Finlayson
, A. Selcuk Uluagac
:
Enhancing Cybersecurity Education with Artificial Intelligence Content. SIGCSE (1) 2025: 158-164 - 2024
- [j52]Nazli Tekin
, Ahmet Aris
, Abbas Acar
, A. Selcuk Uluagac
, Vehbi Cagri Gungor
:
A review of on-device machine learning for IoT: An energy perspective. Ad Hoc Networks 153: 103348 (2024) - [j51]Nur Imtiazul Haque
, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems. Comput. Secur. 139: 103709 (2024) - [j50]Derin Cayir
, Abbas Acar
, Riccardo Lazzeretti
, Marco Angelini
, Mauro Conti
, A. Selcuk Uluagac
:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024) - [j49]Yassine Mekdad
, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - [j48]Ahmet Kurt
, Enes Erdin
, Kemal Akkaya
, A. Selcuk Uluagac
, Mumin Cebe
:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. IEEE Trans. Dependable Secur. Comput. 21(4): 2162-2180 (2024) - [j47]Ehsan Nowroozi
, Mohammadreza Mohammadi
, Pargol Golmohammadi, Yassine Mekdad
, Mauro Conti
, A. Selcuk Uluagac
:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans. Serv. Comput. 17(1): 18-29 (2024) - [c94]Edoardo Liberati
, Alessandro Visintin
, Riccardo Lazzeretti
, Mauro Conti
, A. Selcuk Uluagac
:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - [c93]Maryna Veksler
, Kemal Akkaya
, A. Selcuk Uluagac
:
Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol. AsiaCCS 2024 - [c92]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui
, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944 - [c91]Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac:
50 Shades of Support: A Device-Centric Analysis of Android Security Updates. NDSS 2024 - [c90]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari:
EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks. USENIX Security Symposium 2024 - [c89]Tushar Nayan, Qiming Guo, Mohammed Alduniawi, Marcus Botacin, A. Selcuk Uluagac, Ruimin Sun:
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice. USENIX Security Symposium 2024 - [c88]Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orçun Çetin, A. Selcuk Uluagac:
Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All...". USENIX Security Symposium 2024 - [c87]Harun Oz
, Abbas Acar
, Ahmet Aris
, Güliz Seray Tuncay
, Amin Kharraz
, A. Selcuk Uluagac
:
(In)Security of File Uploads in Node.js. WWW 2024: 1573-1584 - [c86]Behzad Ousat
, Esteban Schafir
, Duc C. Hoang
, Mohammad Ali Tofighi
, Cuong V. Nguyen
, Sajjad Arshad
, A. Selcuk Uluagac
, Amin Kharraz
:
The Matter of Captchas: An Analysis of a Brittle Security Feature on the Modern Web. WWW 2024: 1835-1846 - [i42]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti:
A Survey on Decentralized Identifiers and Verifiable Credentials. CoRR abs/2402.02455 (2024) - [i41]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024) - [i40]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024) - 2023
- [j46]Yassine Mekdad
, Ahmet Aris
, Leonardo Babun
, Abdeslam El Fergougui
, Mauro Conti
, Riccardo Lazzeretti
, A. Selcuk Uluagac
:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j45]Tayebeh Rajab
, Alvi Ataur Khalil
, Mohammad Hossein Manshaei
, Mohammad Ashiqur Rahman
, Mohammad Dakhilalian
, Maurice Ngouen
, Murtuza Jadliwala
, A. Selcuk Uluagac
:
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains. Distributed Ledger Technol. Res. Pract. 2(4): 1-21 (2023) - [j44]Luis Puche Rondon
, Leonardo Babun, Ahmet Aris
, Kemal Akkaya, A. Selcuk Uluagac
:
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses. DTRAP 4(1): 10:1-10:26 (2023) - [j43]Nazli Tekin
, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac, Vehbi Cagri Gungor:
Energy consumption of on-device machine learning models for IoT intrusion detection. Internet Things 21: 100670 (2023) - [j42]Luis Puche Rondon
, Leonardo Babun
, Ahmet Aris
, Kemal Akkaya
, A. Selcuk Uluagac
:
Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats. IEEE Internet Things J. 10(10): 8533-8546 (2023) - [j41]Oscar G. Bautista, Mohammad Hossein Manshaei, Richard Hernandez, Kemal Akkaya, Soamar Homsi, Arif Selcuk Uluagac:
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation. J. Netw. Syst. Manag. 31(4): 68 (2023) - [c85]Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. DSN 2023: 1-13 - [c84]Javier Franco, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac:
Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots. ICC 2023: 4860-4865 - [c83]Maurice Ngouen, Mohammad Ashiqur Rahman
, Nagarajan Prabakar
, A. Selcuk Uluagac, Laurent Njilla:
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption. IOTSMS 2023: 141-148 - [c82]Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, A. Selcuk Uluagac:
RøB: Ransomware over Modern Web Browsers. USENIX Security Symposium 2023: 7073-7090 - [i39]Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. CoRR abs/2305.09669 (2023) - [i38]Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, A. Selcuk Uluagac, Mohamed Rahouti, Elias Bou-Harb, Morteza Safaei Pour:
Ransomware Detection Using Federated Learning with Imbalanced Datasets. CoRR abs/2311.07760 (2023) - 2022
- [j40]Luis Puche Rondon
, Leonardo Babun, Ahmet Aris
, Kemal Akkaya, A. Selcuk Uluagac:
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective. Ad Hoc Networks 125: 102728 (2022) - [j39]Harun Oz
, Ahmet Aris
, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. 54(11s): 238:1-238:37 (2022) - [j38]Amit Kumar Sikder
, Leonardo Babun
, Z. Berkay Celik
, Hidayet Aksu
, Patrick D. McDaniel
, Engin Kirda
, A. Selcuk Uluagac
:
Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3(4): 27:1-27:39 (2022) - [c81]Alvi Ataur Khalil
, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Hossain Shahriar, Mohammad Ashiqur Rahman
:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems. COMPSAC 2022: 1774-1779 - [c80]A. K. M. Iqtidar Newaz, Ahmet Aris, Amit Kumar Sikder, A. Selcuk Uluagac:
Systematic Threat Analysis of Modern Unified Healthcare Communication Systems. GLOBECOM 2022: 1404-1410 - [c79]Javier Franco, Ahmet Aris, Leonardo Babun, A. Selcuk Uluagac:
S-Pot: A Smart Honeypot Framework with Dynamic Rule Configuration for SDN. GLOBECOM 2022: 2818-2824 - [c78]Maryna Veksler, David Langus Rodríguez, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LoFin: LoRa-based UAV Fingerprinting Framework. MILCOM 2022: 980-985 - [c77]Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments. NDSS 2022 - [c76]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac:
A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks. NDSS 2022 - [c75]Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac:
A First Look at Code Obfuscation for WebAssembly. WISEC 2022: 140-145 - [d1]Ehsan Nowroozi
, Mohammadreza Mohammadi, Mauro Conti
, Pargol Golmohammadi, Yassine Mekdad
, Arif Selcuk Uluagac
:
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security. Zenodo, 2022 - [i37]Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, A. Selcuk Uluagac, Berrin Yanikoglu:
Real or Virtual: A Video Conferencing Background Manipulation-Detection System. CoRR abs/2204.11853 (2022) - [i36]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. CoRR abs/2209.04930 (2022) - 2021
- [j37]Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Networks 192: 108040 (2021) - [j36]Amit Kumar Sikder
, Giuseppe Petracca, Hidayet Aksu
, Trent Jaeger, A. Selcuk Uluagac
:
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications. IEEE Commun. Surv. Tutorials 23(2): 1125-1159 (2021) - [j35]Javier Franco
, Ahmet Aris
, Berk Canberk
, A. Selcuk Uluagac
:
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. IEEE Commun. Surv. Tutorials 23(4): 2351-2383 (2021) - [j34]Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac:
Aegis+: A Context-aware Platform-independent Security Framework for Smart Home Systems. DTRAP 2(1): 6:1-6:33 (2021) - [j33]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses. ACM Trans. Comput. Heal. 2(3): 27:1-27:44 (2021) - [j32]Enes Erdin
, Mumin Cebe, Kemal Akkaya, Eyuphan Bulut, A. Selcuk Uluagac:
A scalable private Bitcoin payment channel network with privacy guarantees. J. Netw. Comput. Appl. 180: 103021 (2021) - [j31]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. Proc. Priv. Enhancing Technol. 2021(1): 145-166 (2021) - [j30]Leonardo Babun
, Hidayet Aksu
, A. Selcuk Uluagac
:
CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice. IEEE Trans. Inf. Forensics Secur. 16: 2413-2428 (2021) - [j29]Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac:
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. ACM Trans. Priv. Secur. 24(4): 24:1-24:28 (2021) - [j28]Ahmet Kurt
, Nico Saputro, Kemal Akkaya
, A. Selcuk Uluagac
:
Distributed Connectivity Maintenance in Swarm of Drones During Post-Disaster Transportation Applications. IEEE Trans. Intell. Transp. Syst. 22(9): 6061-6073 (2021) - [j27]Abbas Acar
, Hidayet Aksu
, A. Selcuk Uluagac
, Kemal Akkaya
:
A Usable and Robust Continuous Authentication Framework Using Wearables. IEEE Trans. Mob. Comput. 20(6): 2140-2153 (2021) - [j26]Luis Puche Rondon
, Leonardo Babun
, Kemal Akkaya, A. Selcuk Uluagac
:
HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks. IEEE Trans. Netw. Sci. Eng. 8(3): 2060-2072 (2021) - [j25]Hidayet Aksu
, A. Selcuk Uluagac
, Elizabeth S. Bentley:
Identification of Wearable Devices with Bluetooth. IEEE Trans. Sustain. Comput. 6(2): 221-230 (2021) - [c74]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
In-Browser Cryptomining for Good: An Untold Story. DAPPS 2021: 20-29 - [c73]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. EuroS&P 2021: 120-139 - [c72]Adrien Cosson, Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information. IoTDI 2021: 53-66 - [c71]Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, A. Selcuk Uluagac:
MINOS: A Lightweight Real-Time Cryptojacking Detection System. NDSS 2021 - [c70]Luis Puche Rondon, Leonardo Babun, Ahmet Aris
, Kemal Akkaya, A. Selcuk Uluagac:
LightningStrike: (in)secure practices of E-IoT systems in the wild. WISEC 2021: 106-116 - [i35]Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. CoRR abs/2102.06249 (2021) - [i34]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective. CoRR abs/2102.10695 (2021) - [i33]Nur Imtiazul Haque, Mohammad Ashiqur Rahman
, Md Hasan Shahriar, Alvi Ataur Khalil, A. Selcuk Uluagac:
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems. CoRR abs/2103.03472 (2021) - [i32]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. CoRR abs/2103.03851 (2021) - [i31]Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Mohammad Ashiqur Rahman
:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems. CoRR abs/2107.07916 (2021) - [i30]Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac:
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. CoRR abs/2108.02287 (2021) - [i29]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues of UAVs. CoRR abs/2109.14442 (2021) - [i28]Ahmet Kurt, Enes Erdin, Kemal Akkaya, A. Selcuk Uluagac, Mumin Cebe:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. CoRR abs/2112.07623 (2021) - 2020
- [j24]Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut
, A. Selcuk Uluagac:
A Bitcoin payment network with reduced transaction fees and confirmation times. Comput. Networks 172: 107098 (2020) - [j23]Oscar G. Bautista, Kemal Akkaya, A. Selcuk Uluagac:
Customized novel routing metrics for wireless mesh-based swarm-of-drones applications. Internet Things 11: 100265 (2020) - [j22]Kyle Denney, Leonardo Babun, A. Selcuk Uluagac:
USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework. J. Hardw. Syst. Secur. 4(2): 136-149 (2020) - [j21]Leonardo Babun
, Hidayet Aksu, A. Selcuk Uluagac
:
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case. ACM Trans. Cyber Phys. Syst. 4(2): 16:1-16:28 (2020) - [j20]Amit Kumar Sikder
, Hidayet Aksu
, A. Selcuk Uluagac
:
A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices. IEEE Trans. Mob. Comput. 19(2): 245-261 (2020) - [c69]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac:
HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices. CNS 2020: 1-9 - [c68]Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac:
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit. ESORICS (2) 2020: 734-755 - [c67]A. K. M. Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems. GLOBECOM 2020: 1-6 - [c66]Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, A. Selcuk Uluagac:
A Cost-efficient IoT Forensics Framework with Blockchain. IEEE ICBC 2020: 1-5 - [c65]Leonardo Babun, Hidayet Aksu, Lucas Ryan, Kemal Akkaya, Elizabeth S. Bentley, A. Selcuk Uluagac:
Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices. ICC 2020: 1-7 - [c64]Luis Puche Rondon, Leonardo Babun, Ahmet Aris
, Kemal Akkaya, A. Selcuk Uluagac:
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings. BuildSys 2020: 130-139 - [c63]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. WISEC 2020: 1-12 - [c62]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen
, Hidayet Aksu, Mauro Conti
, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218 - [i27]Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, A. Selcuk Uluagac:
A Cost-efficient IoT Forensics Framework with Blockchain. CoRR abs/2004.14691 (2020) - [i26]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses. CoRR abs/2005.07359 (2020) - [i25]A. K. M. Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems. CoRR abs/2010.03671 (2020) - [i24]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings. CoRR abs/2010.05658 (2020)
2010 – 2019
- 2019
- [j19]Z. Berkay Celik
, Patrick D. McDaniel
, Gang Tan
, Leonardo Babun
, A. Selcuk Uluagac
:
Verifying Internet of Things Safety and Security in Physical Spaces. IEEE Secur. Priv. 17(5): 30-37 (2019) - [j18]Abdullah Aydeger, Nico Saputro
, Kemal Akkaya, A. Selcuk Uluagac:
SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios. J. Netw. Comput. Appl. 138: 39-50 (2019) - [j17]Abbas Acar
, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac:
A privacy-preserving multifactor authentication system. Secur. Priv. 2(5) (2019) - [j16]Abbas Acar, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac:
A privacy-preserving multifactor authentication system. Secur. Priv. 2(6) (2019) - [c61]Amit Kumar Sikder
, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
:
Aegis: a context-aware security framework for smart home systems. ACSAC 2019: 28-41 - [c60]Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac
:
HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol. ACSAC 2019: 650-659 - [c59]Enes Erdin, Mumin Cebe, Kemal Akkaya, Eyuphan Bulut, A. Selcuk Uluagac
:
A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links. Blockchain 2019: 294-301 - [c58]Kemal Akkaya, Vashish Baboolal, Nico Saputro
, A. Selcuk Uluagac, Hamid Menouar:
Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems. CNS 2019: 1-7 - [c57]Z. Berkay Celik, Abbas Acar
, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac
:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132 - [c56]Abbas Acar
, Long Lu, A. Selcuk Uluagac
, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380 - [c55]Faraz Naseem Naseem, Leonardo Babun, Cengiz Kaygusuz, S. J. Moquin, Chris Farnell
, H. Alan Mantooth, A. Selcuk Uluagac
:
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System. iThings/GreenCom/CPSCom/SmartData 2019: 768-775 - [c54]Oscar G. Bautista, Nico Saputro
, Kemal Akkaya, A. Selcuk Uluagac:
A novel routing metric for IEEE 802.11s-based swarm-of-drones applications. MobiQuitous 2019: 514-521 - [c53]Kyle Denney, Enes Erdin, Leonardo Babun, Michael Vai, A. Selcuk Uluagac:
USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework. SecureComm (1) 2019: 126-146 - [c52]A. K. M. Iqtidar Newaz, Amit Kumar Sikder
, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac
:
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems. SNAMS 2019: 389-396 - [c51]Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac
:
Attacking HDMI distribution networks: poster. WiSec 2019: 326-327 - [c50]Kyle Denney, Enes Erdin, Leonardo Babun, A. Selcuk Uluagac
:
Dynamically detecting USB attacks in hardware: poster. WiSec 2019: 328-329 - [c49]Leonardo Babun, Amit Kumar Sikder
, Abbas Acar
, A. Selcuk Uluagac
:
A digital forensics framework for smart settings: poster. WiSec 2019: 332-333 - [i23]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems. CoRR abs/1909.10565 (2019) - [i22]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019) - [i21]Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac:
HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol. CoRR abs/1910.02139 (2019) - [i20]Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Aegis: A Context-aware Security Framework for Smart Home Systems. CoRR abs/1910.03750 (2019) - [i19]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices. CoRR abs/1910.11138 (2019) - [i18]Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Multi-User Multi-Device-Aware Access Control System for Smart Home. CoRR abs/1911.10186 (2019) - [i17]Leonardo Babun, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
Real-time Analysis of Privacy-(un)aware IoT Applications. CoRR abs/1911.10461 (2019) - [i16]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case. CoRR abs/1912.00533 (2019) - [i15]Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac:
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network. CoRR abs/1912.10617 (2019) - 2018
- [j15]Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, A. Selcuk Uluagac:
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. IEEE Commun. Mag. 56(10): 50-57 (2018) - [j14]Hidayet Aksu, Leonardo Babun, Mauro Conti
, Gabriele Tolomei, A. Selcuk Uluagac
:
Advertising in the IoT Era: Vision and Challenges. IEEE Commun. Mag. 56(11): 138-144 (2018) - [j13]Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Mauro Conti
:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Comput. Surv. 51(4): 79:1-79:35 (2018) - [j12]Samet Tonyali
, Kemal Akkaya, Nico Saputro
, A. Selcuk Uluagac
, Mehrdad Nojoumian
:
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems. Future Gener. Comput. Syst. 78: 547-557 (2018) - [c48]Abdullah Aydeger, Nico Saputro
, Kemal Akkaya, A. Selcuk Uluagac:
Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications. CCNC 2018: 1-6 - [c47]Amit Kumar Sikder
, Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya, Mauro Conti
:
IoT-enabled smart lighting systems for smart cities. CCWC 2018: 639-645 - [c46]Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
:
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques. ICC 2018: 1-6 - [c45]Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya:
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. IPCCC 2018: 1-8 - [c44]Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac:
Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations. iThings/GreenCom/CPSCom/SmartData 2018: 1609-1615 - [c43]Nico Saputro
, Kemal Akkaya, A. Selcuk Uluagac:
Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems. LCN Workshops 2018: 110-116 - [c42]Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah
:
SOTA: Secure Over-the-Air Programming of IoT Devices. MILCOM 2018: 1-8 - [c41]Enes Erdin, Hidayet Aksu, A. Selcuk Uluagac, Michael Vai, Kemal Akkaya:
OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework. MILCOM 2018: 926-932 - [c40]Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. IEEE Symposium on Security and Privacy Workshops 2018: 264-269 - [c39]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. USENIX Security Symposium 2018: 1687-1704 - [c38]Nico Saputro, Kemal Akkaya, Ramazan Algin, A. Selcuk Uluagac:
Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems. VTC Fall 2018: 1-5 - [i14]Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, A. Selcuk Uluagac:
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. CoRR abs/1802.00561 (2018) - [i13]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs/1802.02041 (2018) - [i12]Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac:
Advertising in the IoT Era: Vision and Challenges. CoRR abs/1802.04102 (2018) - [i11]Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, A. Selcuk Uluagac:
Sensitive Information Tracking in Commodity IoT. CoRR abs/1802.08307 (2018) - [i10]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
WACA: Wearable-Assisted Continuous Authentication. CoRR abs/1802.10417 (2018) - [i9]Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques. CoRR abs/1804.05106 (2018) - [i8]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018) - [i7]Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
IoTDots: A Digital Forensics Framework for Smart Environments. CoRR abs/1809.00745 (2018) - [i6]Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley:
Identification of Wearable Devices with Bluetooth. CoRR abs/1809.10387 (2018) - [i5]Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. CoRR abs/1812.05558 (2018) - 2017
- [j11]Hamid Menouar, Ismail Güvenç, Kemal Akkaya, A. Selcuk Uluagac
, Abdullah Kadri, Adem Tuncer
:
UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges. IEEE Commun. Mag. 55(3): 22-28 (2017) - [j10]Mehmet Hazar Cintuglu, Osama A. Mohammed
, Kemal Akkaya, A. Selcuk Uluagac
:
A Survey on Smart Grid Cyber-Physical System Testbeds. IEEE Commun. Surv. Tutorials 19(1): 446-464 (2017) - [j9]Juan Lopez, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
A Survey on Function and System Call Hooking Approaches. J. Hardw. Syst. Secur. 1(2): 114-136 (2017) - [c37]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
:
Identifying counterfeit smart grid devices: A lightweight system level framework. ICC 2017: 1-6 - [c36]Anurag Akkiraju, David Gabay, Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac:
Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers. MASS 2017: 580-584 - [c35]Abbas Acar
, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac
, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59 - [c34]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. USENIX Security Symposium 2017: 397-414 - [i4]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017) - [i3]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. CoRR abs/1704.03578 (2017) - [i2]Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac:
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. CoRR abs/1706.10220 (2017) - [i1]Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. CoRR abs/1707.01871 (2017) - 2016
- [j8]Shruthi Ravichandran, Ramalingam K. Chandrasekar, A. Selcuk Uluagac
, Raheem A. Beyah
:
A simple visualization and programming framework for wireless sensor networks: PROVIZ. Ad Hoc Networks 53: 1-16 (2016) - [j7]Gong Chen, Jacob H. Cox Jr., A. Selcuk Uluagac
, John A. Copeland:
In-Depth Survey of Digital Advertising Technologies. IEEE Commun. Surv. Tutorials 18(3): 2124-2148 (2016) - [c33]Samet Tonyali
, Kemal Akkaya, Nico Saputro
, A. Selcuk Uluagac
:
A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks. CCNC 2016: 550-555 - [c32]Kyle Denney, A. Selcuk Uluagac
, Kemal Akkaya, Shekhar Bhansali
:
A novel storage covert channel on wearable devices using status bar notifications. CCNC 2016: 845-848 - [c31]Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
:
A framework for counterfeit smart grid device detection. CNS 2016: 382-383 - [c30]Spencer Michaels, Kemal Akkaya, A. Selcuk Uluagac
:
Inducing data loss in Zigbee networks via join/association handshake spoofing. CNS 2016: 401-405 - [c29]Abdullah Aydeger, Kemal Akkaya, Mehmet Hazar Cintuglu, A. Selcuk Uluagac
, Osama A. Mohammed
:
Software defined networking for resilient communications in Smart Grid active distribution networks. ICC 2016: 1-6 - [c28]Edwin Vattapparamban, Ismail Güvenç, Ali Ihsan Yurekli, Kemal Akkaya, A. Selcuk Uluagac:
Drones for smart cities: Issues in cybersecurity, privacy, and public safety. IWCMC 2016: 216-221 - 2015
- [j6]Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac
, Raheem A. Beyah
:
GTID: A Technique for Physical Device and Device Type Fingerprinting. IEEE Trans. Dependable Secur. Comput. 12(5): 519-532 (2015) - [c27]Christopher Wampler, A. Selcuk Uluagac, Raheem A. Beyah
:
Information Leakage in Encrypted IP Video Traffic. GLOBECOM 2015: 1-7 - [c26]Troy J. Nunnally, A. Selcuk Uluagac
, Raheem A. Beyah
:
InterSec: An interaction system for network security applications. ICC 2015: 7132-7138 - [c25]Kemal Akkaya, A. Selcuk Uluagac
, Abdullah Aydeger:
Software defined networking for wireless local networks in Smart Grid. LCN Workshops 2015: 826-831 - [c24]Abdullah Aydeger, Kemal Akkaya, A. Selcuk Uluagac
:
SDN-based resilience for smart grid communications. NFV-SDN 2015: 31-33 - 2014
- [c23]A. Selcuk Uluagac
, Venkatachalam Subramanian, Raheem A. Beyah
:
Sensory channel threats to Cyber Physical Systems: A wake-up call. CNS 2014: 301-309 - [c22]A. Selcuk Uluagac
, Wenyi Liu, Raheem A. Beyah
:
A multi-factor re-authentication framework with user privacy. CNS 2014: 504-505 - [c21]Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah
:
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. DSN 2014: 287-298 - [c20]Jinyoun Cho, A. Selcuk Uluagac
, John A. Copeland, Yusun Chang:
Efficient safety message forwarding using multi-channels in low density VANETs. GLOBECOM 2014: 70-75 - [c19]Wenyi Liu, A. Selcuk Uluagac
, Raheem A. Beyah
:
MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data. INFOCOM Workshops 2014: 518-523 - [c18]Albert Brzeczko, A. Selcuk Uluagac
, Raheem A. Beyah
, John A. Copeland:
Active deception model for securing cloud infrastructure. INFOCOM Workshops 2014: 535-540 - [c17]Aaron D. Goldman, A. Selcuk Uluagac
, John A. Copeland:
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking. LCN 2014: 142-149 - 2013
- [j5]Shouling Ji, A. Selcuk Uluagac
, Raheem A. Beyah
, Zhipeng Cai:
Practical unicast and convergecast scheduling schemes for cognitive radio networks. J. Comb. Optim. 26(1): 161-177 (2013) - [j4]Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac
, Raheem A. Beyah
, Yingshu Li
:
Cell-based snapshot and continuous data collection in wireless sensor networks. ACM Trans. Sens. Networks 9(4): 47:1-47:29 (2013) - [j3]A. Selcuk Uluagac
, Raheem A. Beyah
, John A. Copeland:
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 24(4): 803-813 (2013) - [c16]A. Selcuk Uluagac
, Sakthi V. Radhakrishnan, Cherita L. Corbett, Antony Baca, Raheem A. Beyah
:
A passive technique for fingerprinting wireless devices with Wired-side Observations. CNS 2013: 305-313 - [c15]Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah
:
S-Match: An efficient privacy-preserving profile matching scheme. CNS 2013: 377-378 - [c14]Sakthi V. Radhakrishnan, A. Selcuk Uluagac
, Raheem A. Beyah
:
Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards. GLOBECOM 2013: 722-728 - [c13]Troy J. Nunnally, Penyen Chi, Kulsoom Abdullah, A. Selcuk Uluagac
, John A. Copeland, Raheem A. Beyah
:
P3D: A parallel 3D coordinate visualization for advanced network scans. ICC 2013: 2052-2057 - [c12]Venkatachalam Subramanian, A. Selcuk Uluagac, Hasan Cam, Raheem A. Beyah
:
Examining the characteristics and implications of sensor side channels. ICC 2013: 2205-2210 - [c11]Ramalingam K. Chandrasekar, A. Selcuk Uluagac
, Raheem A. Beyah
:
PROVIZ: An integrated visualization and programming framework for WSNs. LCN Workshops 2013: 146-149 - [c10]Troy J. Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac
, John A. Copeland, Raheem A. Beyah
:
NAVSEC: a recommender system for 3D network security visualizations. VizSEC 2013: 41-48 - 2012
- [c9]K. C. Ramalingam, Venkatachalam Subramanian, A. Selcuk Uluagac
, Raheem A. Beyah
:
SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks. GLOBECOM 2012: 616-621 - [c8]Marco Valero, Sang Shin Jung, A. Selcuk Uluagac
, Yingshu Li
, Raheem A. Beyah
:
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks. INFOCOM 2012: 585-593 - [c7]Troy J. Nunnally, A. Selcuk Uluagac
, John A. Copeland, Raheem A. Beyah
:
3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security. LCN 2012: 111-118 - [c6]Aaron D. Goldman, A. Selcuk Uluagac
, Raheem A. Beyah
, John A. Copeland:
Plugging the leaks without unplugging your network in the midst of Disaster. LCN 2012: 248-251 - [c5]Marco Valero, A. Selcuk Uluagac, S. Venkatachalam, K. C. Ramalingam, Raheem A. Beyah
:
The Monitoring Core: A framework for sensor security application development. MASS 2012: 263-271 - 2011
- [j2]Christopher P. Lee, A. Selcuk Uluagac
, Kevin D. Fairbanks, John A. Copeland:
The Design of NetSecLab: A Small Competition-Based Network Security Lab. IEEE Trans. Educ. 54(1): 149-155 (2011) - 2010
- [b1]Arif Selcuk Uluagac:
A secure communication framework for wireless sensor networks. Georgia Institute of Technology, Atlanta, GA, USA, 2010 - [j1]A. Selcuk Uluagac
, Raheem A. Beyah
, Yingshu Li
, John A. Copeland:
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 994-1007 (2010) - [c4]A. Selcuk Uluagac
, Raheem A. Beyah
, John A. Copeland:
Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks. GLOBECOM 2010: 1-6 - [c3]A. Selcuk Uluagac
, Raheem A. Beyah
, Roma Kane, Siddharth Joshi, John A. Copeland:
Analysis of Varying AS Path Lengths from the Edge of the Network. ICC 2010: 1-6
2000 – 2009
- 2008
- [c2]A. Selcuk Uluagac, Christopher P. Lee, Raheem A. Beyah, John A. Copeland:
Designing Secure Protocols for Wireless Sensor Networks. WASA 2008: 503-514 - 2003
- [c1]A. Selcuk Uluagac, Jon M. Peha:
IP Multicast over Cable TV Networks. Networked Group Communication 2003: 168-180
Coauthor Index
aka: Raheem Beyah

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-15 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint