Ali Tekeoglu

Orcid: 0000-0001-7638-0941

According to our database1, Ali Tekeoglu authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ACPPS: Autonomic Computing based Phishing Protection System.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
A Networked System Dependability Validation Framework Using Physical and Virtual Nodes.
IEEE Access, 2023

A Reference Architecture for Activities-as-Asset Distributed Ledger with Secure Private Computation.
Proceedings of the International Conference on Information Networking, 2023

An Autonomic Architecture for Multi-Agent Self-Maintaining Robotic Systems.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
PDF Malware Detection based on Stacking Learning.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Detecting Obfuscated Malware using Memory Feature Engineering.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Trust Me, I'm Lying: Enhancing Machine-to-Machine Trust.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart Cities.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Optimized Transaction Processing in Lightweight Distributed Ledger Networks for Internet of Things.
Proceedings of the Blockchain - ICBC 2022, 2022

2021
Low-Cost Internet of Things Based Real- Time Pavement Monitoring System.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Unsupervised Time-Series based Anomaly Detection in ICS/SCADA Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Stealthy Data Exfiltration via TCP Sequence Numbers based Covert Channel.
Proceedings of the International Conference on Computer, 2021

2020
Efficient variant transaction injection protocols and adaptive policy optimisation for decentralised ledger systems.
Int. J. Grid Util. Comput., 2020

A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

A Quantum Assisted Secure Client-Centric Polyvalent Blockchain Architecture for Smart Cities.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Hankel-based Unsupervised Anomaly Detection.
Proceedings of the 2020 American Control Conference, 2020

2019
A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System.
Future Internet, 2019

Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments.
Proceedings of the 17th IEEE International Conference on Software Engineering Research, 2019

TangoChain: A Lightweight Distributed Ledger for Internet of Things Devices in Smart Cities.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

Artorias: IoT Security Testing Framework.
Proceedings of the 26th International Conference on Telecommunications, 2019

Analyzing the Security of Bluetooth Low Energy.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019

Symmetric kullback-leibler divergence of softmaxed distributions for anomaly scores.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A Probabilistic Model of Periodic Pulsed Transaction Injection.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

Tango: The Beginning-A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

Security Analysis of Open Source Network Access Control in Virtual Networks.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Parameterized Pulsed Transaction Injection Computation Model And Performance Optimizer For IOTA-Tango.
Proceedings of the Advances on P2P, 2018

Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol For A Distributed Ledger System.
Proceedings of the Advances on P2P, 2018

2017
An Experimental Framework for Investigating Security and Privacy of IoT Devices.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

2016
A Testbed for Security and Privacy Analysis of IoT Devices.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

2015
A closer look into privacy and security of Chromecast multimedia cloud communications.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
Blackbox security evaluation of chromecast network communications.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2011
DoS resilience of real time streaming protocol.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Approximating the Number of Active Nodes Behind a NAT Device.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011


  Loading...