Erdal Cayirci

According to our database1, Erdal Cayirci authored at least 45 papers between 1998 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Experimenting with the Mosaic Warfare Concept.
Proceedings of the Winter Simulation Conference, 2022

Computer Assisted Military Experimentations.
Proceedings of the Winter Simulation Conference, 2022

2018
Modelling trust and risk for cloud services.
J. Cloud Comput., 2018

2017
Joint military space operations simulation as a service.
Proceedings of the 2017 Winter Simulation Conference, 2017

2016
A risk assessment model for selecting cloud service providers.
J. Cloud Comput., 2016

2015
A Data Protection Impact Assessment Methodology for Cloud.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
A secure many-to-many routing protocol for wireless sensor and actuator networks.
Secur. Commun. Networks, 2014

Smart and Reconfigurable Antenna Applications in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A Cloud Adoption Risk Assessment Model.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Models for Cloud Risk Assessment: A Tutorial.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Configuration schemes for modeling and simulation as a service federation.
Simul., 2013

A joint trust and risk model for MSaaS mashups.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

Modeling and simulation as a cloud service: A survey.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

2012
Defense and security applications of modeling and simulation - grand challenges and current efforts.
Proceedings of the Winter Simulation Conference, 2012

A multi-criteria design scheme for service federating inter-cloud applications.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Modeling cyber attacks and their effects on decision process.
Proceedings of the Winter Simulation Conference 2011, 2011

Intercloud for simulation federations.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

2009
A shadow zone aware routing protocol for acoustic underwater sensor networks.
IEEE Commun. Lett., 2009

Multi-Resolution Federations in Support of Operational and Higher Level Combined/Joint Computer Assisted Exercises.
Proceedings of the 2009 Winter Simulation Conference, 2009

Secure many to many routing for wireless sensor and actuator networks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Deployed sensor networks and their security challenges in practice.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
Sensor Network Applications Implemented by Industry and Their Security Challenges.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
SENDROM: Sensor networks for disaster relief operations management.
Wirel. Networks, 2007

2006
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2006

Querying sensor networks by using dynamic task sets.
Comput. Networks, 2006

Wireless sensor networks for underwater survelliance systems.
Ad Hoc Networks, 2006

2005
PCSMAC: a power controlled sensor-MAC protocol for wireless sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

Power aware many to many routing in wireless sensor and actuator networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

2004
Guest Editorial.
Mob. Networks Appl., 2004

A multicriteria handoff decision scheme for the next generation tactical communications systems.
Comput. Networks, 2004

End-to-end reliable event transfer in wireless sensor networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Sensor wars: detecting and defending against spam attacks in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2004

Overview of Communication Protocols for Sensor Networks.
Proceedings of the Handbook of Sensor Networks, 2004

2003
Optimal Location Area Design to Minimize Registration Signaling Traffic in Wireless Systems.
IEEE Trans. Mob. Comput., 2003

Data aggregation and dilution by modulus addressing in wireless sensor networks.
IEEE Commun. Lett., 2003

Wireless sensor networks.
Comput. Networks, 2003

2002
User Mobility Pattern Scheme for Location Update and Paging in Wireless Systems.
IEEE Trans. Mob. Comput., 2002

Simulation of Tactical Communications Systems by Inferring Detailed Data from the Joint Theater-Level Computer-Aided Exercises.
Simul., 2002

Application of 3G PCS technologies to rapidly deployable mobile networks.
IEEE Netw., 2002

Wireless sensor networks: a survey.
Comput. Networks, 2002

A survey on sensor networks.
IEEE Commun. Mag., 2002

2001
A PCS based architecture for tactical mobile communications.
Comput. Networks, 2001

2000
Application of the 3G PCS technologies to the mobile subsystem of the next generation tactical communications systems (Üçüncü nesil PCS teknolojilerinin gelecek nesil taktik muharebe sistemlerinin gezgin altsistemine uyarlanması)
PhD thesis, 2000

1998
Grouping cells in PCS networks.
Proceedings of the 9th IEEE International Symposium on Personal, 1998


  Loading...