Remzi Seker

According to our database1, Remzi Seker authored at least 50 papers between 2000 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Formal modeling of cyber-physical resource scheduling in IIoT cloud environments.
J. Intell. Manuf., 2020

2019
Cyber resilience protection for industrial internet of things: A software-defined networking approach.
Comput. Ind., 2019

Target Area Surveillance Optimization with Swarms of Autonomous Micro Aerial Vehicles.
Proceedings of the 2019 IEEE International Systems Conference, 2019

Cloud-Enabled Product Design Selection and Manufacturing as a Service.
Proceedings of the 9th Workshop on Service Oriented, 2019

2018
Software Safety and Security Risk Mitigation in Cyber-physical Systems.
IEEE Softw., 2018

Cyber-Physical Resource Scheduling in the Context of Industrial Internet of Things Operations.
Proceedings of the Service Orientation in Holonic and Multi-Agent Manufacturing, 2018

Addressing Operator Privacy in Automatic Dependent Surveillance - Broadcast (ADS-B).
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Software-Defined Networking-Based Models for Secure Interoperability of Manufacturing Operations.
Proceedings of the Service Orientation in Holonic and Multi-Agent Manufacturing, 2017

Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2016
Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook.
Comput. Ind., 2016

Cybersecurity and Resilience Modelling for Software-Defined Networks-Based Manufacturing Applications.
Proceedings of the Service Orientation in Holonic and Multi-Agent Manufacturing, 2016

UAV as a Service: A Network Simulation Environment to Identify Performance and Security Issues for Commercial UAVs in a Coordinated, Cooperative Environment.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2016

2015
Manufacturing Cyber-Physical Systems Enabled by Complex Event Processing and Big Data Environments: A Framework for Development.
Proceedings of the Service Orientation in Holonic and Multi-agent Manufacturing, 2015

Manufacturing Operations, Internet of Things, and Big Data: Towards Predictive Manufacturing Systems.
Proceedings of the Service Orientation in Holonic and Multi-agent Manufacturing, 2015

Secure and Resilient Manufacturing Operations Inspired by Software-Defined Networking.
Proceedings of the Service Orientation in Holonic and Multi-Agent Manufacturing, 2015

CamAuth: Securing Web Authentication with Camera.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

2014
Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks.
J. Cyber Secur. Mobil., 2014

Threat modeling for aircraft access to national airspace system wide information management program.
Proceedings of the 17th Communications & Networking Symposium, 2014

ACM/IEEE-CS computer science curricula 2013: implementing the final report.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

LightGraph: Lighten Communication in Distributed Graph-Parallel Processing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
The Jigsaw secure distributed file system.
Comput. Electr. Eng., 2013

Special session: The CS2013 Computer Science curriculum guidelines project.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs.
IEEE Trans. Syst. Man Cybern. Part C, 2012

PCIEF: a policy conflict identification and evaluation framework.
Int. J. Inf. Comput. Secur., 2012

2011
A methodology for empirical analysis of brain connectivity through graph mining.
Proceedings of the IEEE International Conference on Systems, 2011

DM-PAS: A Data Mining Prefetching Algorithm for Storage System.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

Collaborations, mergers, acquisitions, and security policy conflict analysis.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
A Secure Distributed File System for Medical Image Archiving.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
Design of a Lattice-based Access Control Scheme.
Proceedings of the IEEE International Conference on Systems, 2009

JigDFS for Implementing Secure Container Communities.
Proceedings of the IEEE International Conference on Systems, 2009

Impact of Duty Cycle Variation on WSNs.
Proceedings of the NTMS 2009, 2009

Secure data aggregation in heterogeneous and disparate networks using stand off server architecture.
Proceedings of the Data Mining, 2009

JigDFS in container communities for international cargo security.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

JigDFS: A secure distributed file system.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Modelling and simulation: The basis for education enrichment and software design.
Enterp. Inf. Syst., 2008

Off-the-Record Secure Chat Room.
Proceedings of the WEBIST 2008, 2008

A role-based secure group communication framework.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

2007
A Dynamical System Approach to Intrusion Detection Using System Call Analysis.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

Ontology for disaster mitigation and planning.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

Societal-Consciousness in the Computing Curricula: A Time for Serious Introspection.
Proceedings of the IEEE International Symposium on Technology and Society, 2007

Off-the-Record Instant Messaging for Group Conversation.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

2005
Infrastructures for information technology systems.
Proceedings of the IEEE International Conference on Systems, 2005

Phishing in the system of systems settings: mobile technology.
Proceedings of the IEEE International Conference on Systems, 2005

A Risk Assessment Model of Embedded Software Systems.
Proceedings of the 29th Annual IEEE / NASA Software Engineering Workshop (SEW-29 2005), 2005

2004
An information-theoretical framework for modeling component-based systems.
IEEE Trans. Syst. Man Cybern. Part C, 2004

Mobile phishing : communication.
South Afr. Comput. J., 2004

Assessment of Coupling and Cohesion for Component-Based Software by using Shannon Languages.
Trans. SDPS, 2004

Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact.
Proceedings of the Software Engineering Research, 2004

A component integration meta-framework using smart adapters.
Proceedings of the Intenational Symposium on Information and Communication Technologies, 2004

2000
Validity Test for a Set of Nonlinear Measures for Short Data Length with Reference to Short-Term Heart Rate Variability Signal.
J. Syst. Integr., 2000


  Loading...