Hasan Çam

Orcid: 0000-0002-3531-7003

Affiliations:
  • Arizona State University, Tempe, Arizona, USA


According to our database1, Hasan Çam authored at least 90 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center.
IEEE Trans. Serv. Comput., 2023

2022
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity.
IEEE Trans. Dependable Secur. Comput., 2022

Maintaining the level of operational effectiveness of a CSOC under adverse conditions.
Int. J. Inf. Sec., 2022

2020
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center.
ACM Trans. Web, 2020

Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst., 2020

Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020

2019
Optimizing Alert Data Management Processes at a Cyber Security Operations Center.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019

Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019

Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center.
IEEE Syst. J., 2019

Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

2018
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM Trans. Intell. Syst. Technol., 2018

Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Serv. Oriented Comput. Appl., 2018

A methodology to measure and monitor level of operational effectiveness of a CSOC.
Int. J. Inf. Sec., 2018

Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too.
IEEE Secur. Priv., 2018

More or Less? Predict the Social Influence of Malicious URLs on Social Media.
CoRR, 2018

Securing the Smart Home via a Two-Mode Security Framework.
Proceedings of the Security and Privacy in Communication Networks, 2018

Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

On Defensive Cyber Deception: A Case Study Using SDN.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring the Effectiveness of Network Deception.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk.
ACM Trans. Intell. Syst. Technol., 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Online detection and control of malware infected assets.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Source-End DDoS Defense in IoT Environments.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

2016
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM Trans. Intell. Syst. Technol., 2016

A threat monitoring system in enterprise networks with smart mobiles.
Int. J. Secur. Networks, 2016

Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016

Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Inferring pairwise influence from encrypted communication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge.
Proceedings of the 34th IEEE Military Communications Conference, 2015

On simulation studies of jamming threats against LTE networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Query-Based Outlier Detection in Heterogeneous Information Networks.
Proceedings of the 18th International Conference on Extending Database Technology, 2015

2014
Alert Data Aggregation and Transmission Prioritization over Mobile Networks.
Proceedings of the Network Science and Cybersecurity, 2014

Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014

Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Veh. Technol., 2014

Towards scalable critical alert mining.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Top-K interesting subgraph discovery in information networks.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014

Modeling impact of attacks, recovery, and attackability conditions for situational awareness.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014

Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems.
Proceedings of the Secure Cloud Computing, 2014

2013
How to use experience in cyber analysis: An analytical reasoning support system.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Examining the characteristics and implications of sensor side channels.
Proceedings of IEEE International Conference on Communications, 2013

Mission-aware time-dependent cyber asset criticality and resilience.
Proceedings of the Cyber Security and Information Intelligence, 2013

On detecting association-based clique outliers in heterogeneous information networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2010
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2010

Collaborative Event-Driven Coverage and Rate Allocation for Event Miss-Ratio Assurances in Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Class-Based Fair Code Allocation with Delay Guarantees for OVSF-CDMA and VSF-OFCDM in Next-Generation Cellular Networks.
EURASIP J. Wirel. Commun. Netw., 2010

2008
Secure and Efficient Data Transmission over Body Sensor and Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2008

Flexible Code Allocation to Improve System Utilization Using Nonblocking OVSF Codes in WCDMA.
Proceedings of IEEE International Conference on Communications, 2008

Joint Coverage Scheduling and Identity Management for Multiple-Target Tracking in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks.
Int. J. Sens. Networks, 2007

Route Recovery with One-Hop Broadcast to Bypass Compromised Nodes in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Event-Driven Coverage and Rate Allocation for Providing Miss-Ratio Assurances in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Energy-efficient secure pattern based data aggregation for wireless sensor networks.
Comput. Commun., 2006

Adaptive task scheduling for providing event miss-ratio statistical assurances in wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Collaborative scheduling of event types and allocation of rates for wireless sensor nodes with multiple sensing units.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

Key establishment with source coding and reconciliation for wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Multiple-Input Turbo Code for Joint Data Aggregation, Source and Channel Coding in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
Collaborative two-level task scheduling for wireless sensor nodes with multiple sensing units.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Energy-efficient task scheduling for wireless sensor nodes with multiple sensing units.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Secure data aggregation and source-channel coding with MIT code for wireless sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
A Code Assignment Algorithm for Nonblocking OVSF Codes in WCDMA.
Telecommun. Syst., 2004

Cost-aware downlink scheduling of shared channels for cellular networks with relays.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
Rearrangeability of (2n-1)-Stage Shuffle-Exchange Networks.
SIAM J. Comput., 2003

Guest editorial: 3G wireless and beyond.
Comput. Commun., 2003

Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems.
Comput. Commun., 2003

2000
An on-line scheduling policy for IRIS real-time composite tasks.
J. Syst. Softw., 2000

List ranking on processor arrays.
J. Syst. Softw., 2000

Preventing internal and external conflicts in an input buffering reverse baseline ATM switch.
Int. J. Commun. Syst., 2000

A distributed dynamic channel and packet assignment for wireless multimedia traffic.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

1999
Work-Efficient Routing Algorithms for Rearrangeable Symmetrical Networks.
IEEE Trans. Parallel Distributed Syst., 1999

A header-population based flow control for multicomputer networks.
J. Syst. Softw., 1999

Balanced permutations and multistage interconnection networks.
Int. J. Comput. Math., 1999

A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network.
Comput. Commun., 1999

A High-Performance Hardware-Efficient Memory Allocation Technique and Design.
Proceedings of the IEEE International Conference On Computer Design, 1999

1998
A congestion sense network interface.
Proceedings of the Computers and Their Applications (CATA-98), 1998

1997
A multiclass priority-based slotted-ring network for LAN-ATM interworking.
Comput. Commun., 1997

LAN-ATM Internetworking over a Priority-Based Slotted-Ring Network.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

Preventing conflicts in input buffering baseline-based ATM switches.
Proceedings of the Advances in Switching Networks, 1997

1995
Frames: A Simple Characterization of Permutations Realized by Frequently Used Networks.
IEEE Trans. Computers, 1995

A Fast VLSI-Efficient Self-Routing Permutation Network.
IEEE Trans. Computers, 1995

1992
Fault-Tolerant Self-Routing Permutation Networks.
Proceedings of the 1992 International Conference on Parallel Processing, 1992


  Loading...