Refereed Journal and Magazine Articles:

  • Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac. 2020. Peek-a-Boo: I see your smart home activities, even encrypted!. In 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’20), July 8–10, 2020, Linz (Virtual Event), Austria.ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3395351.3399421. [pdf] [bibtex]
  • K. Denney, L. Babun, and A. S. Uluagac, “USB-Watch: A Generalized Hardware-Assisted Insider Threat Detection Framework”, in the Springer Journal of Hardware and Systems Security, March 2020, DOI: https://doi.org/10.1007/s41635-020-00092-z, pdf, [bibtex].
  • L. Babun, H. Aksu, A. S. Uluagac, “A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case”, in the the ACM Transactions on Cyber-Physical Systems (ACM TCPS), article 16, vol. 4, issue 2, Nov. 2019, pdf, [bibtex].
  • Z. B. Celik, P. McDaniel, G. Tan, L. Babun and A. S. Uluagac, “Verifying Internet of Things Safety and Security in Physical Spaces,” in IEEE Security & Privacy, vol. 17, no. 5, pp. 30-37, Sept.-Oct. 2019, pdf, [bibtex]
  • Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac, “A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case,” Accepted to Appear in ACM Transactions on Cyber-Physical Systems, September 2019, [bibtex]
  • Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac,”A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices,” in IEEE Transactions on Mobile Computing, January 2019 pdf, [bibtex]
  • Abbas Acar, Wenyi Liu, A. Selcuk Uluagac, and Raheem Beyah, “A Privacy-Preserving Two-factor Active Authentication Framework,” Wiley Security and Privacy Journal, August 2019 pdf, [bibtex]
  • A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, “A survey on homomorphic encryption schemes: Theory and implementation,” ACM Computing Surveys, vol. 51, no. 4, pp. 79:1–79:35, Jul. 2018, pdf, [bibtex]
  • Mumin Cebe, Enes Erdin, A. Selcuk Uluagac, and Kemal Akkaya, “Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles,” in IEEE Communications Magazine, May 2018, pdf, [bibtex]
  • Abdullah Aydeger, Nico Saputro, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, “SDN-Enabled Recovery for Smart Grid Teleprotection Applications in Post-disaster Scenarios,” Elsevier Journal of Network and Computer Applications, Volume 138, Pages 39-50, 15 July 2019, pdf, [bibtex]
  • Hidayet Aksu, A. Selcuk Uluagac, and Elizabeth S. Bentley, “Identification of Wearable Devices with Bluetooth,” Accepted to Appear in IEEE Transactions on Sustainable Computing, February 2018
  • Gabriele Tolomei, Leo Babun, Hidayet Aksu, A. Selcuk Uluagac, and Mauro Conti “ Advertising in the IoT Era: Vision and Challenges,” Accepted to Appear in IEEE Communications Magazine, January 2018
  • S. Tonyali, K. Akkaya, N. Saputro, A. S. Uluagac, and M. Nojoumian, “privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems,” Elsevier Future Generation Computer Systems Journal, Volume 78, Part 2, Pages 547-557, January 2018, pdf
  • Juan Lopez, Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac, “A Survey on Function and System Call Hooking Approaches,” Springer Journal of Hardware and Systems Security, Volume 1, Issue 2, pp 114-136, June 2017, pdf
  • H. Menouar, I. Guvenc, K. Akkaya, A. S. Uluagac, A. Kadri, and A. Tuncer, “Uav-enabled intelligent transportation systems for the smart city: Applications and challenges,” IEEE Communications Magazine, vol. 55, no. 3, pp. 22–28, March 2017, pdf
  • Mehmet Cintoglu, Kemal Akkaya, Osama Mohammed, and A. Selcuk Uluagac, “A Survey on Smart Grid Cyber-Physical System Testbeds,” IEEE Communications Surveys and Tutorials, vol.PP, no.99, pp.1-1, Nov 3, 2016, [bibtex],[pdf]
  • Shruthi Ravichandran, Ramalingam K. Chandrasekar, A. Selcuk Uluagac, and R. A. Beyah,”A Simple Visualization and Programming Framework for Wireless Sensor Networks: PROVIZ,” Elsevier Ad Hoc Networks Journal, Volume 53, 15 December 2016, Pages 1-16, ISSN 1570-870, [bibtex],[pdf]
  • Gong Chen, Jacob H. Cox Jr, A. Selcuk Uluagac, and John A. Copeland, “In-depth Survey of Digital Advertising Technologies,” IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 2124-2148, 25 January 2016, [bibtex],[pdf]
  • Sakthi V. Radhakrishnan, A. Selcuk Uluagac, and Raheem A. Beyah,”GTID: A Technique for Physical Device and Device Type Fingerprinting,” Transactions on Dependable and Secure Computing (TDSC), vol. 12, no 5, pp: 519-532, Sept.-Oct. 2015, [bibtex],[pdf]
  • Shouling Ji, Jing He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li. “Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks.” ACM Transactions on Sensor Networks, vol. 9, no 4, pp: 47:1-47:29, Jul. 2013, [bibtex], [pdf]
  • A. Selcuk Uluagac, R. A. Beyah, and J. A. Copeland, “Secure Source-Based Loose Synchronization (SOBAS) for Wireless Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp. 803-813, April 2013, [bibtex], [pdf]
  • Shouling Ji, A. Selcuk Uluagac, R. Beyah, and Z. Cai. “Virtual Backbone based Unicasting and Convergecasting in Cognitive Radio Networks”, Springer Journal of Combinatorial Optimization, January 2012, [bibtex], [pdf]
  • C. P. Lee, A. Selcuk Uluagac, K.Fairbanks, and J. A. Copeland, ”The Design of NetSecLab: A Small Competition-Based Network Security Lab”, IEEE Transactions on Education, Vol 54, Issue 1, March 2011, [bibtex], [pdf]
  • A. Selcuk Uluagac, Raheem A. Beyah, Yingshu Li, John A. Copeland, “VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 994-1007, July 2010, [bibtex],[pdf]

 

Refereed Book Chapters:

  • Kyle Denney, Hidayet Aksu, Kemal Akkaya, A. Selcuk Uluagac, “An IoT Covert Channel Using Android-based Notifications,” Book Chapter, in Springer “Versatile Security” In ’Advances in Information Security’ Series, Mauro Conti, Gaurav Somani, and Radha Poovendran (Eds.), May 2018, pdf, [bibtex]
  • A. Selcuk Uluagac, Kemal Akkaya, Apurva Mohan, Hazar Cintuglu, Tarek Youssef, Osama Mohammed, “Wireless Communication in ICSs,” Book Chapter in Cyber Security Methods for Industrial Control and SCADA Systems, Edited by Ed Colbert and Alex Kott, Springer, vol: 66, Pages 29-49, September 2016, ISBN 978-3-319-32125-7, pdf
  • Nico Saputro, Ali Yurekli, Kemal Akkaya, and A. Selcuk Uluagac, “Privacy-preservation for IoT in Smart Buildings,” Book Chapter in Security and Privacy in Internet of Things (IoT): Models, Algorithms, and Implementations, edited by Fie Hu, Pages 135–166, April 1, 2016, CRC Press, ISBN 9781498723183, pdf
  • Kemal Akkaya, A. Selcuk Uluagac, Abdullah Aydeger, and Apurva Mohan, “Secure Software Defined Networking Architectures for The Smart Grid,” Book Chapter in Smart Grid: Networking, Data Management and Business Models, edited by Hussein Mouftah and Melike Erol Kantarci, Pages 53–70, April 1, 2016, CRC Press, ISBN 9781498719704, pdf

Refereed Conference Papers:

  • Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, and A. Selcuk Uluagac, “KRATOS: Multi-User Multi-Device-Aware Access Control System for Smart Home”, accepted for publication in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020),  July 2020, Linz, Austria, pdf, [bibtex]
  • AKM Iqtidar Newaz, A. K. Sikder, L. Babun, and A. S. Uluagac, “HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices”, accepted for publication in the 2020 IEEE Conference on Communications and Network Security, June-July 2020, pdf, [bibtex]
  • L. Babun, H. Aksu, L. Ryan, E. Bentley, K. Akkaya, and A. S. Uluagac, “Z-IoT: Passive Device-class Fingerprinting of Zigbee and Z-wave IoT Devices”, accepted for publication in the 2020 IEEE International Conference on Communications (ICC), June 2020, Dublin, Ireland, pdf, [bibtex].
  • Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac, “Aegis: A Context-aware Security Framework for Smart Home Systems,” In Proc. of Annual Computer Security Applications Conference (ACSAC), Puerto Rico, Dec. 2019 pdf, [bibtex]
  • L. Puche Rondon, L. Babun, K. Akkaya, and S. Uluagac, “HDMI-Walk: attacking HDMI distribution networks via consumer electronic control protocol,” in In Proc. of Annual Computer Security Applications Conference (ACSAC), Puerto Rico, Dec. 2019 pdf, [bibtex]
  • AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, and A. Selcuk Uluagac. “Healthguard: A machine learning-based security framework for smart healthcare systems.” In 6th International Conference on Social Networks Analysis, Management and Security (SNAMS), IEEE, October, 2019, pdf, [bibtex]
  • Abbas Acar, Long Lu, Selcuk Uluagac, Engin Kirda, “An Analysis of Malware Trends in Enterprise Networks, “ In Proc. of 16th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2019), New York, USA, September 2019, pdf, [bibtex]
  • Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, A. Selcuk Uluagac and Patrick McDaniel,”Curie: Policy-based Secure Data Exchange,” In 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA, March 2019, pdf, [bibtex]
  • M. A. Hakim, H. Aksu, S. Uluagac, and K. Akkaya, “U-PoT: a honeypot framework for UPnP-Based IoT devices,” in 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC 2018), Orlando, USA, Nov. 2018, pdf, [bibtex]
  • E. Erdin, H. Aksu, S. Uluagac, M. Vai, and K. Akkaya, “OS independent and Hardware-Assisted insider threat detection and prevention framework,” in Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018 Track 3), Los Angeles, USA, Oct. 2018, pdf, [bibtex]
  • H. B. Yesilyurt, H. Aksu, S. Uluagac, and R. Beyah, “SOTA: secure Over-the-Air programming of IoT devices,” in Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018 Track 3), Los Angeles, USA, Oct. 2018, pdf, [bibtex]
  • Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac, “Sensitive Information Tracking in Commodity IoT,” in Proc. of the 27th USENIX Security Symposium, Maryland, MD, August, 2018, pdf, [bibtex]
  • Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac, “Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations,” In Proc. of 2018 IEEE Blockchain Symposium, July 2018, Halifax, NS, Canada, Canada, pdf, [bibtex]
  • K. Akkaya, V. Baboolal, N. Saputro, S. Uluagac and H. Menouar, “Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems,” in Proc. of 2019 IEEE International CPS-Security Workshop, Washington DC, USA, June 2019, pp. 1-7., pdf, [bibtex]
  • Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu and Selcuk Uluagac, “Detection of Compromised
    Smart Grid Devices with Machine Learning and Convolution Techniques,” in Proc. of the IEEE
    International Conference on Communications (ICC)
    , May 2018, Kansas City, MO, USA
  • Abbas Acar, Hidayet Aksu, Kemal Akkaya, and A. Selcuk Uluagac, “WACA: Wearable-Assisted Continuous Authentication,” 3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience co-located with 39th IEEE Symposium on Security and Privacy (IEEE S&P 2018), Oakland, CA, May 24, 2018.
  • Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac, and Mauro Conti, “IoT-enabled Smart Lighting Systems for Smart Cities,” in Proc. of the 8th IEEE Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, January 2018
  • Abdullah Aydeger, Nico Saputro, Kemal Akkaya, and Selcuk Uluagac, “Assessing the Overhead of Authentication during SDN-Enabled Restoration of Smart Grid Inter-substation Communications,” in Proc. of the IEEE Consumer Communications & Networking Conference (CCNC) Conference, Las Vegas, NV, January 2018.
  • A. K. Sikder, H. Aksu, and A. S. Uluagac, “6thsense: A context-aware sensor-based attack detector for smart devices,” in Proc. of the 26th USENIX Security Symposium, Vancouver, BC, 2017, pdf
  • A. Acar, Z. B. Celik, H. Aksu, A. S. Uluagac, and P. McDaniel, “Achieving secure and differentially private computations in multiparty settings,” in Proceedings of the IEEE Symposium on Privacy-Aware Computing (IEEE PAC). D.C., USA: IEEE, 2017
  • A. Akkiraju, D. Gabay, B. Yesilyurt, H. Aksu, and A. S. Uluagac, “Cybergrenade: Automated exploitation of local network machines via single board computers,” in Proc. of the 4th National Workshop for REU Research in Networking and Systems, Orlando, FL, USA, 2017
  • Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac, “Identifying Counterfeit Smart Grid Devices: A Lightweight System Level Framework,” in Proc. of the IEEE International Conference on Communications (ICC), France, May 2017
  • Edwin Vattapparamban, Ismail Guvenc, Ali Ihsan Yurekli, Kemal Akkaya, and A. Selcuk Uluagac, “Drones for Smart Cities: Issues in Cybersecurity, Privacy, and Public Safety,” in Proc. of the IEEE International Wireless Communications & Mobile Computing Conference (IWCMC) Smart Cities and Smart Mobility Platforms Symposium, Paphos, Cyprus, September 2016.
  • Abdullah Aydeger, Mehmet Cintoglu, Kemal Akkaya, Osama Muhammed, and A. Selcuk Uluagac, “Software Defined Networking for Resilient Communications in Smart Grid Active Distribution Networks,” in Proc. of the IEEE International Conference on Communications (ICC), Malaysia, May 2016
  • Kyle Denney, A. Selcuk Uluagac, and Kemal Akkaya, “A Novel Storage Covert Channel on Wearable Devices Using Status Bar Notifications”, in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC) Conference, Las Vegas, NV, January 2016
  • Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac, “A Reliable Data Aggregation Mechanism with Homomorphic Encryption in Smart Grid AMI Networks”, in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC) Conference, Las Vegas, NV, January 2016
  • Chris Wampler, A. Selcuk Uluagac, and Raheem Beyah ”Information Leakage in Encrypted IP Video Traffic,” In Proceedings of the IEEE Global Communications (GLOBECOM) Conference, San Diego, CA, USA, December 2015
  • Troy Nunnally, A. Selcuk Uluagac, and R. A. Beyah, “InterSec: An Interaction System for Network Security Applications,” in Proceedings of the IEEE International Conference on Communications (ICC), London, UK, June 2015
  • Jinyoun Cho, A. Selcuk Uluagac, J. A. Copeland, and Yusun Chang ”Efficient Safety Message Forwarding using Multi-Channels in Low Density VANETs,” In Proceedings of the IEEE Global Communications (GLOBECOM) Conference, Austin, TX, December 2014
  • A. Selcuk Uluagac, Venkatachalam S., and Raheem A. Beyah,”Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call,” In Proceedings of the IEEE Conference on Communications and Network Security (CNS), October 2014, San Francisco, USA
  • Aaron Goldman, A. Selcuk Uluagac, and J. A. Copeland, ”Cryptographically-Curated File System (CCFS): Secure, Inter-operable, and Easily Implementable Information-Centric Networking,” In Proceedings of the IEEE International Conference on Local Computer Networks (LCN), September 2014, Edmonton, Canada
  • Xiaojing Liao, A.Selcuk Uluagac, and R. A. Beyah, “S-MATCH: Verifiable Privacy-preserving Profile Matching for Mobile Social Services,”in Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), June 2014, Atlanta, USA
  • Wenyi Liu, A. Selcuk Uluagac, and Raheem Beyah, “MACA: A Privacy-Preserving Multi-factor Cloud Authentication System Utilizing Big Data”, in Proceedings of the IEEE INFOCOM Workshop on Security and Privacy in Big Data, April 2014, Toronto, Canada
  • Albert Brzeczko, A. Selcuk Uluagac, Raheem Beyah, and John A. Copeland, “Active Deception Model for Securing Cloud Infrastructure”, in Proceedings of the IEEE INFOCOM Workshop on Security and Privacy in Big Data, April 2014, Toronto, Canada
  • A. Selcuk Uluagac, Sakthi V. Radhakrishnan, Cherita Corbett, Antony Baca, and Raheem A. Beyah,”A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observations,” in Proceedings of the IEEE Conference on Communications and Network Security (CNS), October 2013, [bibtex],[pdf]
  • Sakthi V. Radhakrishnan, A.Selcuk Uluagac, and R. A. Beyah,”Realizing an 802.11-based Covert Timing Channel using Off-The-Shelf Wireless Cards,” in Proceedings of the IEEE Global Communications (GLOBECOM) Conference, Atlanta, GA, December 2013, [bibtex],[pdf]
  • Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, J. A. Copeland, and R. A. Beyah, “NAVSEC : A Recommender System for 3D Network Security Visualizations”, in Proceedings of the ACM Visualization for Cyber Security Workshop (VizSec), October 2013, [bibtex],[pdf]
  • Ramalingam K. C., A.Selcuk Uluagac, and R. A. Beyah,“PROVIZ: An Integrated Visualization and Programming Framework for WSNs,“ in Proceedings of the 8th IEEE Workshop on Practical Issues in Building Sensor Network Applications 2013 (IEEE SenseApp 2013), Australia, October 2013, [bibtex],[pdf]
  • Venkatachalam S., A. Selcuk Uluagac, and Raheem Beyah, “Examining the Characteristics and Implications of Sensor Side Channels“, in Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, June 2013,[bibtex],[pdf]
  • Troy Nunnally, Penyen Chi, Kulsoom Abdullah, A. Selcuk Uluagac, and R. A. Beyah, “P3D: A Parallel 3D Coordinate System for Advanced Network Scans“, in Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, June 2013,[bibtex],[pdf]
  • Marco Valero, A. Selcuk Uluagac, Venkatachalam S., Ramalingam K. C., and Raheem Beyah, “The Monitoring Core (M-Core): A Modular Architecture for Rapid Sensor App Development“, in Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2012, [bibtex],[pdf]
  • Aaron Goldman, A. Selcuk Uluagac, R. A. Beyah, and J. A. Copeland, ”Plugging the Leaks without Unplugging your Network in the Midst of Disaster,” in Proceedings of the IEEE International Conference on Local Computer Networks (LCN), October 2012, [bibtex],[pdf]
  • Troy Nunnally, A. Selcuk Uluagac, R. A. Beyah, and J. A. Copeland, “3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for Network Security”, in Proceedings of the IEEE International Conference on Local Computer Networks (LCN), October 2012, [bibtex],[pdf]
  • Ramalingam K. C., Venkatachalam Subramanian, A.Selcuk Uluagac, and R. A. Beyah,“Secure Distribution of Images for Wireless Sensor Networks,“ in Proceedings of the IEEE Global Communications (GLOBECOM) Conference, Anaheim, CA, December 2012, [bibtex],[pdf]
  • Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem Beyah, “Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks“, in Proceedings of the IEEE INFOCOM Conference, Orlando, FL, March 2012, [bibtex],[pdf]
  • A. Selcuk Uluagac, R. A. Beyah, and J. A. Copeland, “TIme-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks,“ in Proceedings of the IEEE Global Communications (GLOBECOM) Conference, Miami, FL, December 2010, [bibtex],[pdf]
  • A.Selcuk Uluagac, Roma Kane, Siddharth Joshi, R. A. Beyah, and J. A. Copeland, “Analysis of Varying AS Path Lengths from the Edge of the Network,“ in Proceedings of the IEEE International Communications Conference (ICC), Cape Town, South Africa, May 2010, [bibtex],[pdf]
  • A. Selcuk Uluagac, T. Fallon, W. Thain, and J. A. Copeland, ”Development of Undergraduate Network Security Labs with Open Source Tools,” in Proceedings of the American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition, Austin, TX, June 2009, [bibtex], [pdf]
  • A. Selcuk Uluagac, C. P. Lee, R. A. Beyah, and J. A. Copeland, “Designing Secure Protocols for Wireless Sensor Networks,“ in Proceedings of the 3rd International Conference on Wireless Algorithms, Systems and Applications (WASA), Dallas, Texas, October 2008 (also available in Lecture Notes in Computer Science (LNCS) 5258, Springer-Verlag, pp. 503-514, 2008), [bibtex],[pdf]
  • A. Selcuk Uluagac and D. Williams, “Building Hardware-based Low-Cost Experimental DSP Learning Modules,“ in Proceedings of the American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition, Pittsburgh, PA, June 2008, [bibtex], [pdf]
  • R. Butera, M. Clark, A. Deck, M. Torba, S. Trahan, Selcuk Uluagac, D. Williams, “Cooperative University/Industry Development of a Freshman Introduction to ECE Design Course,“ in Proceedings of the American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition, Honolulu, Hawaii, June 2007, [bibtex], [pdf]
  • A. Selcuk Uluagac and J. M. Peha, “IP Multicast over Cable TV Networks,“ in Proceedings of 5th International Workshop on Networked Group Communications (NGC), Munich, Germany, September 2003 (also available in Lecture Notes in Computer Science 2816, Springer-Verlag, pp. 168-180, 2003), [bibtex],[pdf]

Refereed Demos and Posters:

  • L. Babun and A. S. Uluagac, “Security and Privacy Mechanisms for IoT and IIoT Devices and Applications”, in the RSA Conference, San Francisco February 2020.
  • Peer-reviewed Poster: L. Babun, B. Celik, P. McDaniel, and A. S. Uluagac, “Real-time Privacy Analysis of IoT Apps”, Annual Computer Security Applications Conference (ACSAC), December 2019, San Juan, Puerto Rico.
  • Peer-reviewed Poster: A.K.Sikder, L. Babun, B. Celik, A. Acar, H. Aksu, P. McDaniel, E. Kirda, and A. S. Uluagac, “A Novel Fine-grained Access Control System for Multi-user Multi-device Smart Home Systems”, Annual Computer Security Applications Conference (ACSAC), December 2019, San Juan, Puerto Rico.
  • L. Babun and A. S. Uluagac, “Blockchain-assisted Privacy Analysis of IoT Apps”, in the GDRR Foundations for Blockchain Data Analytics Workshop, October 2019, the Statistical and Applied Mathematical Sciences Institute (SAMSI), October 2019, Durham, NC.
  • A. K. Sikder and A. S. Uluagac, “CAREER: Securing Sensory Side-Channels in Cyber-Physical Systems”, in the 2019 Annual NSF CPS PI Meeting, Crystal City, VA, USA.
  • Peer-reviewed Poster: Kyle Denney, Enes Erdin, Leonardo Babun, and Selcuk Uluagac, “POSTER: Dynamically Detecting USB Attacks in Hardware,” Poster at the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Miami, May 16, 2019
  • Peer-reviewed Poster: Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, and Selcuk Uluagac, “POSTER: Attacking HDMI Distribution Networks,” Poster at the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Miami, May 16, 2019
  • Peer-reviewed Poster: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, and Selcuk Uluagac, “POSTER: A Digital Forensics Framework for Smart Settings,” Poster at the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACMWiSec), Miami, May 16, 2019
  • Peer-reviewed Poster: Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, and Selcuk Uluagac, “HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol,” Poster at the Annual Research Conference at the University of Florida’s Florida Institute of Cybersecurity Research, Gainesville, FL, March 9, 2019
  • Peer-reviewed Poster: Kyle Denney, Enes Erdin, Leonardo Babun, and Selcuk Uluagac, “Hardware Assisted Insider Threat Detection Framework,” Poster at the Annual Research Conference at the University of Florida’s Florida Institute of Cybersecurity Research, Gainesville, FL, March 9, 2019.
  • A. K. Sikder and A. S. Uluagac, “A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices”, Transforming Antenna Center Workshop, Florida International University, September 12, 2018. (Best Poster Award)
  • Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu and A.Selcuk Uluagac,”Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations,” Poster at the Annual Research Conference at the University of Florida’s Florida Institute of Cybersecurity Research, Gainesville, FL, March 1, 2018 (Best Poster Award)
  • Leonardo Babun, Z. Berkay Celik, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac, “SaINT: Sensitive Information Tracking for IoT Apps,” Demo at the Annual Research Conference at the University of Florida’s Florida Institute of Cybersecurity Research, Gainesville, FL, March 1, 2018 (Best Demo Award)
  • Abbas Acar, Hidayet Aksu, Kemal Akkaya, and A. Selcuk Uluagac, “Wearable-assisted Continuous Authentication,” Poster at the Annual Research Conference at the University of Florida’s Florida Institute of Cybersecurity Research, Gainesville, FL, March 1, 2018
  • Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac, “A Framework for
    Counterfeit Smart Grid Device Detection,” Demo at the Annual Research Conference at the University of Florida’s Florida Institute of Cybersecurity Research, Gainesville, FL, March 8, 2017 (Best Demo Award)
  • Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac, “A Framework for Counterfeit Smart Grid
    Device Detection,” Poster and Demo at the Annual Department of Energy’s SEEDS Center Research
    Meeting, Miami, FL, 19 January 2017 (Best Poster and Demo Award)
  • Abbas Acar, Hidayet Aksu, Kemal Akkaya, and A.Selcuk Uluagac, ”WACA: Wearable-Assisted Continuous Authentication Framework with Motion Sensors,“ Poster at The 25th USENIX Security Symposium, August 2016
  • Abdullah Aydeger, Kemal Akkaya, A. Selcuk Uluagac, “SDN-based Resilience for Smart Grid Communications,” Demo at the IEEE International Conference on Network Function Virtualization and Software Defined Networks, San Francisco, CA, November 2015
  • Kyle Denney, A. Selcuk Uluagac, Kemal Akkaya, and Nico Saputro, “A Novel Storage Covert Channel on Wearable Devices Using Status Bar Notifications”, Demo at the IEEE International Conference on Local Computer Networks (LCN), Clearwater Beach, FL, October 2015
  • A. Selcuk Uluagac,Wenyi Liu, and Raheem Beyah, “A Multi-factor Re-authentication Framework with User Privacy,” Poster at the IEEE Conference on Communications and Network Security (CNS), San Fransisco, CA, October 2014
  • Aaron Goldman, A. Selcuk Uluagac, and J. A. Copeland, ”Cryptographically-Curated File System (CCFS): Secure, Inter-operable, and Easily Implementable Information-Centric Networking,” Demo at the IEEE International Conference on Local Computer Networks (LCN), September 2014, Edmonton, Canada
  • Xiaojing Liao, A.Selcuk Uluagac, and R. A. Beyah,“S-Match: An Efficient Privacy-preserving Profile Matching Scheme” Poster at the IEEE Conference on Communications and Network Security (CNS), October 2013.
  • Sakthi V Radhakrishnan, A.Selcuk Uluagac, and R. A. Beyah,”A DCF-Based Covert Timing Channel for IEEE 802.11 With Off-The-Shelf Wireless Cards,“ Poster at The 21st USENIX Security Symposium, August 2012
  • Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem Beyah, “The Monitoring Core (M-Core): Toward Fully Securing Heterogeneous Wireless Sensor Networks“, Poster at The 27th Annual Computer Security Applications Conference (ACSAC), December 2011
  • Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem Beyah, “Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks“, Demo at ACM International Conference on Mobile Computing and Networking (MobiCom), September 2011

Other Unrefereed Articles, Demos, and Posters

  • “The Design of NetSecLab: A Small Competition-Based Network Security Lab”, Poster at at The 2010 Georgia Tech Security Summit: Emerging Cyber Security Threats, Georgia Tech Information Security Center (GTISC), October 2010
  • “TIme-Based DynamiC Keying and En-Route Filtering (TICK) for Sensor-Based Ceyber-Physical Systems“, Poster at at The 2010 Georgia Tech Security Summit: Emerging Cyber Security Threats, Georgia Tech Information Security Center (GTISC), October 2010

Media Coverage:

  • TV Interview (Spanish), “Noticias Telemundo: “¡Puedo verte en la cama! ¡Vamos! ¡Despierta!”. Denuncian preocupantes casos de piratería con cámaras de seguridad”, Rogelio Mora-Tagle, 2019, Miami, FL, link.
  • TV Interview (Spanish), “Noticias Telemundo: Thousands of people are heard through Alexa”, NBC Universal, Rogelio Mora-Tagle, April 12, 2019, Miami, FL, link.
  • TV Interview (Spanish), “Primer Impacto: Did you know that a ‘hacker’ can steal your information by approaching your smart watch?”, Univison, Rogelio Santiago Franco, March 29, 2019, Miami, FL, link.
  • TV Interview (Spanish), “Noticias Telemundo: Internet turns 30”, Telemundo, Rogelio Mora-Tagle, March 12, 2019, Miami, FL, link.
  • News Article, “Security flaws found in popular smart home devices,” PBS Newshour Science, Jamie Leventhal, November 6, 2019, link
  • News Article, “FIU students searching for cybersecurity solutions”, NBC Miami, November 26, 2018, link
  • News Article, “FIU inspires future learners,” Miami’s Community Newspapers, February 28, 2018, link
  • News Article, “How to stop phone apps from spying on you, Stephen Ornes, January 26, 2018, link
  • News Article, “Your phone is like a spy in your pocket,” Science News, Maria Temming, January 23, 2018, link
  • TV Interview, “Connect U: FIU offers students specialized training in smart devices,” WSVN
    Channel 7, Lorena Estrada, December 29, 2017, Miami, FL, link
  • News Article, “Experts talk cyber attacks on business, lead live hack,” FIU News, Gisela Valencia, December 21, 2017, link
  • TV Interview, “FIU Looks to Future With ’Internet of Things’ Degree,” NBC 6 Miami, Jamie Guirola,
    Nov 2, 2017, link
  • News Article, “CyberCorps pays for students’ education, gives them job opportunities,” FIU News,
    Diana Hernandez-Alende , October 10, 2017, link
  • TV Interview, “Guard your gadgets,” WSVN Channel 7, Leisa Williams, November 11, 2016, Miami,
    FL, link
  • TV Interview, “Dangers of Unsecured Surveillance Cameras,” NBC Miami Channel 6, Laura
    Rodriguez, August 18, 2016, link
  • News Article, “Universities, Utility Research Protecting Nation’s Power Grid From Cyber Attacks,”
    Homeland Security Today, Anthony Kimery, Editor-in-Chief, October 13, 2015
  • News Article, “FIU Works To Protect Against Power Grid Cyber Attacks,” CBS Miami, Giovanna
    Maselli, October 12, 2015
USA