Ismail Butun

According to our database1, Ismail Butun authored at least 20 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Security Risk Analysis of LoRaWAN and Future Directions.
Future Internet, 2019

Formal security analysis of LoRaWAN.
Computer Networks, 2019

Location Privacy Assured Internet of Things.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Security Implications of Fog Computing on the Internet of Things.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
Analysis of LoRaWAN v1.1 security: research paper.
Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, 2018

Challenges of Securing the Industrial Internet of Things Value Chain.
Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, 2018

A Framework for Web Application Integrity.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2016
Cloud-centric multi-level authentication as a service for secure public safety device networks.
IEEE Communications Magazine, 2016

2015
An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks.
Sensors, 2015

PCAC: Power- and Connectivity-Aware Clustering for Wireless Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2015

Anomaly detection and privacy preservation in cloud-centric Internet of Things.
Proceedings of the IEEE International Conference on Communication, 2015

2014
A Survey of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Communications Surveys and Tutorials, 2014

2012
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks.
IJSN, 2012

Adaptive rate transmission with opportunistic scheduling in wireless networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Evaluation of Advanced Two Tier User Authentication scheme.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Coherence time-based cooperative MAC protocol 1 for wireless ad hoc networks.
EURASIP J. Wireless Comm. and Networking, 2011

A brief survey of access control in Wireless Sensor Networks.
Proceedings of the Consumer Communications and Networking Conference, 2011

Advanced two tier User Authentication scheme for heterogeneous Wireless Sensor Networks.
Proceedings of the Consumer Communications and Networking Conference, 2011

2010
Impact of mobility prediction on the performance of Cognitive Radio networks.
Proceedings of the 2010 Wireless Telecommunications Symposium, 2010

2009
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
Journal of Communications and Networks, 2009


  Loading...