Abbas Acar

Orcid: 0000-0002-4891-160X

According to our database1, Abbas Acar authored at least 27 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A review of on-device machine learning for IoT: An energy perspective.
Ad Hoc Networks, February, 2024

A comprehensive security and performance assessment of UAV authentication schemes.
Secur. Priv., 2024

Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
IEEE Secur. Priv., 2024

Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
CoRR, 2024

A Survey on Decentralized Identifiers and Verifiable Credentials.
CoRR, 2024

2023
Energy consumption of on-device machine learning models for IoT intrusion detection.
Internet Things, April, 2023

RøB: Ransomware over Modern Web Browsers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots.
Proceedings of the IEEE International Conference on Communications, 2023

2022
A First Look at Code Obfuscation for WebAssembly.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
A Usable and Robust Continuous Authentication Framework Using Wearables.
IEEE Trans. Mob. Comput., 2021

A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA.
ACM Trans. Priv. Secur., 2021

SoK: Cryptojacking Malware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

In-Browser Cryptomining for Good: An Untold Story.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

2020
Kratos: multi-user multi-device-aware access control system for the smart home.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
A privacy-preserving multifactor authentication system.
Secur. Priv., 2019

Multi-User Multi-Device-Aware Access Control System for Smart Home.
CoRR, 2019

A digital forensics framework for smart settings: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

An Analysis of Malware Trends in Enterprise Networks.
Proceedings of the Information Security - 22nd International Conference, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
ACM Comput. Surv., 2018

IoTDots: A Digital Forensics Framework for Smart Environments.
CoRR, 2018

WACA: Wearable-Assisted Continuous Authentication.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
Achieving Secure and Differentially Private Computations in Multiparty Settings.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017


  Loading...