A. Selcuk Uluagac

According to our database1, A. Selcuk Uluagac authored at least 100 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices.
IEEE Trans. Mob. Comput., 2020

A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case.
ACM Trans. Cyber Phys. Syst., 2020

USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework.
J. Hardw. Syst. Secur., 2020

Customized novel routing metrics for wireless mesh-based swarm-of-drones applications.
Internet Things, 2020

PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings.
CoRR, 2020

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems.
CoRR, 2020

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses.
CoRR, 2020

A Bitcoin payment network with reduced transaction fees and confirmation times.
Comput. Networks, 2020

Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Cost-efficient IoT Forensics Framework with Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit.
Proceedings of the Computer Security - ESORICS 2020, 2020

HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A privacy-preserving multifactor authentication system.
Secur. Priv., 2019

SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios.
J. Netw. Comput. Appl., 2019

Verifying Internet of Things Safety and Security in Physical Spaces.
IEEE Secur. Priv., 2019

LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network.
CoRR, 2019

Real-time Analysis of Privacy-(un)aware IoT Applications.
CoRR, 2019

Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019

Attacking HDMI distribution networks: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Dynamically detecting USB attacks in hardware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A digital forensics framework for smart settings: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019

A novel routing metric for IEEE 802.11s-based swarm-of-drones applications.
Proceedings of the MobiQuitous 2019, 2019

CSPoweR-Watch: A Cyber-Resilient Residential Power Management System.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

An Analysis of Malware Trends in Enterprise Networks.
Proceedings of the Information Security - 22nd International Conference, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links.
Proceedings of the IEEE International Conference on Blockchain, 2019

Aegis: a context-aware security framework for smart home systems.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018

A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
ACM Comput. Surv., 2018

Identification of Wearable Devices with Bluetooth.
CoRR, 2018

IoTDots: A Digital Forensics Framework for Smart Environments.
CoRR, 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018

Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles.
IEEE Commun. Mag., 2018

Advertising in the IoT Era: Vision and Challenges.
IEEE Commun. Mag., 2018

Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

WACA: Wearable-Assisted Continuous Authentication.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

SOTA: Secure Over-the-Air Programming of IoT Devices.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems.
Proceedings of the 43rd IEEE Conference on Local Computer Networks Workshops, 2018

Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
A Survey on Function and System Call Hooking Approaches.
J. Hardw. Syst. Secur., 2017

A Survey on Smart Grid Cyber-Physical System Testbeds.
IEEE Commun. Surv. Tutorials, 2017

UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges.
IEEE Commun. Mag., 2017

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Identifying counterfeit smart grid devices: A lightweight system level framework.
Proceedings of the IEEE International Conference on Communications, 2017

2016
In-Depth Survey of Digital Advertising Technologies.
IEEE Commun. Surv. Tutorials, 2016

A simple visualization and programming framework for wireless sensor networks: PROVIZ.
Ad Hoc Networks, 2016

Drones for smart cities: Issues in cybersecurity, privacy, and public safety.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Software defined networking for resilient communications in Smart Grid active distribution networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Inducing data loss in Zigbee networks via join/association handshake spoofing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A framework for counterfeit smart grid device detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A novel storage covert channel on wearable devices using status bar notifications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
GTID: A Technique for Physical Device and Device Type Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2015

SDN-based resilience for smart grid communications.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Software defined networking for wireless local networks in Smart Grid.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

InterSec: An interaction system for network security applications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Information Leakage in Encrypted IP Video Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Active deception model for securing cloud infrastructure.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Efficient safety message forwarding using multi-channels in low density VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Sensory channel threats to Cyber Physical Systems: A wake-up call.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A multi-factor re-authentication framework with user privacy.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Cell-based snapshot and continuous data collection in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Practical unicast and convergecast scheduling schemes for cognitive radio networks.
J. Comb. Optim., 2013

<i>NAVSEC</i>: a recommender system for 3D network security visualizations.
Proceedings of the Visualization for Cyber Security, 2013

PROVIZ: An integrated visualization and programming framework for WSNs.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Examining the characteristics and implications of sensor side channels.
Proceedings of IEEE International Conference on Communications, 2013

P3D: A parallel 3D coordinate visualization for advanced network scans.
Proceedings of IEEE International Conference on Communications, 2013

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

S-Match: An efficient privacy-preserving profile matching scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
The Monitoring Core: A framework for sensor security application development.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Plugging the leaks without unplugging your network in the midst of Disaster.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
The Design of NetSecLab: A Small Competition-Based Network Security Lab.
IEEE Trans. Educ., 2011

2010
A secure communication framework for wireless sensor networks.
PhD thesis, 2010

VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Analysis of Varying AS Path Lengths from the Edge of the Network.
Proceedings of IEEE International Conference on Communications, 2010

Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2008
Designing Secure Protocols for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2008

2003
IP Multicast over Cable TV Networks.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003


  Loading...