A. Selcuk Uluagac

Orcid: 0000-0002-9823-3464

Affiliations:
  • Florida International University, Miami, FL, USA


According to our database1, A. Selcuk Uluagac authored at least 146 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A review of on-device machine learning for IoT: An energy perspective.
Ad Hoc Networks, February, 2024

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
IEEE Trans. Serv. Comput., 2024

A comprehensive security and performance assessment of UAV authentication schemes.
Secur. Priv., 2024

Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
IEEE Secur. Priv., 2024

Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
CoRR, 2024

A Survey on Decentralized Identifiers and Verifiable Credentials.
CoRR, 2024

X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains.
Distributed Ledger Technol. Res. Pract., December, 2023

MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation.
J. Netw. Syst. Manag., October, 2023

Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats.
IEEE Internet Things J., May, 2023

Energy consumption of on-device machine learning models for IoT intrusion detection.
Internet Things, April, 2023

A survey on security and privacy issues of UAVs.
Comput. Networks, April, 2023

Ransomware Detection Using Federated Learning with Imbalanced Datasets.
CoRR, 2023

RøB: Ransomware over Modern Web Browsers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots.
Proceedings of the IEEE International Conference on Communications, 2023

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security.
Dataset, March, 2022

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions.
ACM Comput. Surv., January, 2022

Who's Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment.
ACM Trans. Internet Things, 2022

Real or Virtual: A Video Conferencing Background Manipulation-Detection System.
CoRR, 2022

Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective.
Ad Hoc Networks, 2022

A First Look at Code Obfuscation for WebAssembly.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

LoFin: LoRa-based UAV Fingerprinting Framework.
Proceedings of the IEEE Military Communications Conference, 2022

Systematic Threat Analysis of Modern Unified Healthcare Communication Systems.
Proceedings of the IEEE Global Communications Conference, 2022

S-Pot: A Smart Honeypot Framework with Dynamic Rule Configuration for SDN.
Proceedings of the IEEE Global Communications Conference, 2022

A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Identification of Wearable Devices with Bluetooth.
IEEE Trans. Sustain. Comput., 2021

HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks.
IEEE Trans. Netw. Sci. Eng., 2021

A Usable and Robust Continuous Authentication Framework Using Wearables.
IEEE Trans. Mob. Comput., 2021

Distributed Connectivity Maintenance in Swarm of Drones During Post-Disaster Transportation Applications.
IEEE Trans. Intell. Transp. Syst., 2021

A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA.
ACM Trans. Priv. Secur., 2021

CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice.
IEEE Trans. Inf. Forensics Secur., 2021

Real-time Analysis of Privacy-(un)aware IoT Applications.
Proc. Priv. Enhancing Technol., 2021

A scalable private Bitcoin payment channel network with privacy guarantees.
J. Netw. Comput. Appl., 2021

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses.
ACM Trans. Comput. Heal., 2021

D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network.
CoRR, 2021

A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
CoRR, 2021

A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems.
CoRR, 2021

A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications.
IEEE Commun. Surv. Tutorials, 2021

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems.
IEEE Commun. Surv. Tutorials, 2021

A survey on IoT platforms: Communication, security, and privacy perspectives.
Comput. Networks, 2021

LightningStrike: (in)secure practices of E-IoT systems in the wild.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

MINOS: A Lightweight Real-Time Cryptojacking Detection System.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

SoK: Cryptojacking Malware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

In-Browser Cryptomining for Good: An Untold Story.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

2020
A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices.
IEEE Trans. Mob. Comput., 2020

A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case.
ACM Trans. Cyber Phys. Syst., 2020

USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework.
J. Hardw. Syst. Secur., 2020

Customized novel routing metrics for wireless mesh-based swarm-of-drones applications.
Internet Things, 2020

A Bitcoin payment network with reduced transaction fees and confirmation times.
Comput. Networks, 2020

Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings.
Proceedings of the BuildSys '20: The 7th ACM International Conference on Systems for Energy-Efficient Buildings, 2020

Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Cost-efficient IoT Forensics Framework with Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems.
Proceedings of the IEEE Global Communications Conference, 2020

LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit.
Proceedings of the Computer Security - ESORICS 2020, 2020

HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A privacy-preserving multifactor authentication system.
Secur. Priv., 2019

SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios.
J. Netw. Comput. Appl., 2019

Verifying Internet of Things Safety and Security in Physical Spaces.
IEEE Secur. Priv., 2019

LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network.
CoRR, 2019

Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019

Attacking HDMI distribution networks: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Dynamically detecting USB attacks in hardware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A digital forensics framework for smart settings: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019

A novel routing metric for IEEE 802.11s-based swarm-of-drones applications.
Proceedings of the MobiQuitous 2019, 2019

CSPoweR-Watch: A Cyber-Resilient Residential Power Management System.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

An Analysis of Malware Trends in Enterprise Networks.
Proceedings of the Information Security - 22nd International Conference, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links.
Proceedings of the IEEE International Conference on Blockchain, 2019

Aegis: a context-aware security framework for smart home systems.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018

A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
ACM Comput. Surv., 2018

IoTDots: A Digital Forensics Framework for Smart Environments.
CoRR, 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018

Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles.
IEEE Commun. Mag., 2018

Advertising in the IoT Era: Vision and Challenges.
IEEE Commun. Mag., 2018

Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

WACA: Wearable-Assisted Continuous Authentication.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

SOTA: Secure Over-the-Air Programming of IoT Devices.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems.
Proceedings of the 43rd IEEE Conference on Local Computer Networks Workshops, 2018

Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

U-PoT: A Honeypot Framework for UPnP-Based IoT Devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
A Survey on Function and System Call Hooking Approaches.
J. Hardw. Syst. Secur., 2017

A Survey on Smart Grid Cyber-Physical System Testbeds.
IEEE Commun. Surv. Tutorials, 2017

UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges.
IEEE Commun. Mag., 2017

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Identifying counterfeit smart grid devices: A lightweight system level framework.
Proceedings of the IEEE International Conference on Communications, 2017

2016
In-Depth Survey of Digital Advertising Technologies.
IEEE Commun. Surv. Tutorials, 2016

A simple visualization and programming framework for wireless sensor networks: PROVIZ.
Ad Hoc Networks, 2016

Drones for smart cities: Issues in cybersecurity, privacy, and public safety.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Software defined networking for resilient communications in Smart Grid active distribution networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Inducing data loss in Zigbee networks via join/association handshake spoofing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A framework for counterfeit smart grid device detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A novel storage covert channel on wearable devices using status bar notifications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
GTID: A Technique for Physical Device and Device Type Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2015

SDN-based resilience for smart grid communications.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Software defined networking for wireless local networks in Smart Grid.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

InterSec: An interaction system for network security applications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Information Leakage in Encrypted IP Video Traffic.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Active deception model for securing cloud infrastructure.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Efficient safety message forwarding using multi-channels in low density VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Sensory channel threats to Cyber Physical Systems: A wake-up call.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A multi-factor re-authentication framework with user privacy.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Cell-based snapshot and continuous data collection in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Practical unicast and convergecast scheduling schemes for cognitive radio networks.
J. Comb. Optim., 2013

<i>NAVSEC</i>: a recommender system for 3D network security visualizations.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

PROVIZ: An integrated visualization and programming framework for WSNs.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Examining the characteristics and implications of sensor side channels.
Proceedings of IEEE International Conference on Communications, 2013

P3D: A parallel 3D coordinate visualization for advanced network scans.
Proceedings of IEEE International Conference on Communications, 2013

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A passive technique for fingerprinting wireless devices with Wired-side Observations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

S-Match: An efficient privacy-preserving profile matching scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
The Monitoring Core: A framework for sensor security application development.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Plugging the leaks without unplugging your network in the midst of Disaster.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
The Design of NetSecLab: A Small Competition-Based Network Security Lab.
IEEE Trans. Educ., 2011

2010
A secure communication framework for wireless sensor networks.
PhD thesis, 2010

VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Analysis of Varying AS Path Lengths from the Edge of the Network.
Proceedings of IEEE International Conference on Communications, 2010

Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2008
Designing Secure Protocols for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2008

2003
IP Multicast over Cable TV Networks.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003


  Loading...