A. Selcuk Uluagac

According to our database1, A. Selcuk Uluagac
  • authored at least 58 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Generation Comp. Syst., 2018

WACA: Wearable-Assisted Continuous Authentication.
CoRR, 2018

Sensitive Information Tracking in Commodity IoT.
CoRR, 2018

Advertising in the IoT Era: Vision and Challenges.
CoRR, 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018

Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles.
CoRR, 2018

Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.
CoRR, 2017

Curie: Policy-based Secure Data Exchange.
CoRR, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
CoRR, 2017

A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
CoRR, 2017

A Survey on Smart Grid Cyber-Physical System Testbeds.
IEEE Communications Surveys and Tutorials, 2017

UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges.
IEEE Communications Magazine, 2017

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Identifying counterfeit smart grid devices: A lightweight system level framework.
Proceedings of the IEEE International Conference on Communications, 2017

2016
In-Depth Survey of Digital Advertising Technologies.
IEEE Communications Surveys and Tutorials, 2016

A simple visualization and programming framework for wireless sensor networks: PROVIZ.
Ad Hoc Networks, 2016

Drones for smart cities: Issues in cybersecurity, privacy, and public safety.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Software defined networking for resilient communications in Smart Grid active distribution networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Inducing data loss in Zigbee networks via join/association handshake spoofing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A framework for counterfeit smart grid device detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A novel storage covert channel on wearable devices using status bar notifications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
GTID: A Technique for Physical Device and Device Type Fingerprinting.
IEEE Trans. Dependable Sec. Comput., 2015

SDN-based resilience for smart grid communications.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Software defined networking for wireless local networks in Smart Grid.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

InterSec: An interaction system for network security applications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Information Leakage in Encrypted IP Video Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Active deception model for securing cloud infrastructure.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Efficient safety message forwarding using multi-channels in low density VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Sensory channel threats to Cyber Physical Systems: A wake-up call.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A multi-factor re-authentication framework with user privacy.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

Cell-based snapshot and continuous data collection in wireless sensor networks.
TOSN, 2013

Practical unicast and convergecast scheduling schemes for cognitive radio networks.
J. Comb. Optim., 2013

NAVSEC: a recommender system for 3D network security visualizations.
Proceedings of the Visualization for Cyber Security, 2013

PROVIZ: An integrated visualization and programming framework for WSNs.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Examining the characteristics and implications of sensor side channels.
Proceedings of IEEE International Conference on Communications, 2013

P3D: A parallel 3D coordinate visualization for advanced network scans.
Proceedings of IEEE International Conference on Communications, 2013

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

S-Match: An efficient privacy-preserving profile matching scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
The Monitoring Core: A framework for sensor security application development.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Plugging the leaks without unplugging your network in the midst of Disaster.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
The Design of NetSecLab: A Small Competition-Based Network Security Lab.
IEEE Trans. Education, 2011

2010
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Analysis of Varying AS Path Lengths from the Edge of the Network.
Proceedings of IEEE International Conference on Communications, 2010

Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2008
Designing Secure Protocols for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2008

2003
IP Multicast over Cable TV Networks.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003


  Loading...