Ismail Butun

Orcid: 0000-0002-1723-5741

Affiliations:
  • Mid Sweden University, Information Systems and Technology, Sundsvall, Sweden
  • University of South Florida, Tampa, FL, USA (former)


According to our database1, Ismail Butun authored at least 45 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Two-Stage Feature Generator for Handwritten Digit Classification.
Sensors, October, 2023

Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum.
Sensors, January, 2023

Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme.
IEEE Access, 2023

2022
Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.
Sensors, 2022

Swarm Unmanned Aerial Vehicles (SUAVs): A Comprehensive Analysis of Localization, Recent Aspects, and Future Trends.
J. Sensors, 2022

Localization in Unprecedentedly Crowded Airspace for UAVs and SUAVs.
IEEE Access, 2022

Delay Considerations for Reliable Communications in LoRaWAN.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Review of Security Vulnerabilities in LoRaWAN.
Proceedings of the Applications in Electronics Pervading Industry, Environment and Society, 2022

Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Application Layer Packet Processing Using PISA Switches.
Sensors, 2021

A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things.
IEEE Access, 2021

Integrating Security Behavior into Attack Simulations.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
MAKE-IT - A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.
Sensors, 2020

Hardware Security of Fog End-Devices for the Internet of Things.
Sensors, 2020

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures.
IEEE Commun. Surv. Tutorials, 2020

Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Activation of LoRaWAN End Devices by Using Public Key Cryptography.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Security Risk Analysis of LoRaWAN and Future Directions.
Future Internet, 2019

Formal security analysis of LoRaWAN.
Comput. Networks, 2019

A Central Intrusion Detection System for RPL-Based Industrial Internet of Things.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019

Location Privacy Assured Internet of Things.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Security Implications of Fog Computing on the Internet of Things.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Preserving Location Privacy in Cyber-Physical Systems.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Analysis of LoRaWAN v1.1 security: research paper.
Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, 2018

Challenges of Securing the Industrial Internet of Things Value Chain.
Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, 2018

A Framework for Web Application Integrity.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A broad overview of GPS fundamentals: Now and future.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

An overview of Wireless Sensor Networks towards internet of things.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Privacy and trust relations in Internet of Things from the user point of view.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
Cloud-centric multi-level authentication as a service for secure public safety device networks.
IEEE Commun. Mag., 2016

2015
An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks.
Sensors, 2015

PCAC: Power- and Connectivity-Aware Clustering for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2015

Anomaly detection and privacy preservation in cloud-centric Internet of Things.
Proceedings of the IEEE International Conference on Communication, 2015

2014
A Survey of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2014

2013
Prevention and Detection of Intrusions in Wireless Sensor Networks.
PhD thesis, 2013

2012
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks.
Int. J. Secur. Networks, 2012

Adaptive rate transmission with opportunistic scheduling in wireless networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Evaluation of Advanced Two Tier User Authentication scheme.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Coherence time-based cooperative MAC protocol <sup>1 </sup>for wireless ad hoc networks.
EURASIP J. Wirel. Commun. Netw., 2011

A brief survey of access control in Wireless Sensor Networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Advanced two tier User Authentication scheme for heterogeneous Wireless Sensor Networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Impact of mobility prediction on the performance of Cognitive Radio networks.
Proceedings of the 2010 Wireless Telecommunications Symposium, 2010

Performance Evaluation of Quick-Start in Low Latency Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
J. Commun. Networks, 2009


  Loading...