Show all

1.

Tayebeh Rajabi, Alvi Ataur Khalil, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Mohammad Dakhilalian, Maurice Ngouen, Murtuza Jadliwala, A. Selcuk Uluagac

Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains Journal Article

ACM Distributed Ledger Technologies: Research and Practice Journal, 2023.

Abstract | Links | BibTeX | Tags: Blockchain Security, Network Security, Smart Home Security

2.

Maryna Veksler, David Langus Rodríguez, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac

LoFin: LoRa-based UAV Fingerprinting Framework Conference Paper

In the Proceedings of the 41st IEEE Military Communications Conference (MILCOM) , 2022.

Abstract | Links | BibTeX | Tags: Fingerprinting, Network Security, UAV Security

3.

Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

Real or Virtual: A Video Conferencing Background Manipulation-Detection System Conference Paper

Arxiv, 2022.

Abstract | Links | BibTeX | Tags: Network Security, Web Security

4.

Akm Iqtidar Newaz, Ahmet Aris, Amit Kumar Sikder, A Selcuk Uluagac

Systematic Threat Analysis of Modern Unified Healthcare Communication Systems Conference Paper

In the Proceedings of the 37th IEEE Global Communications Conference (GLOBECOM), 2022.

Abstract | Links | BibTeX | Tags: Healthcare Security, Network Security

5.

Ahmet Kurt, Nico Saputro, Kemal Akkaya, A. Selcuk Uluagac

Distributed Connectivity Maintenance in Swarm of Drones During Post-Disaster Transportation Applications Journal Article

IEEE Transactions on Intelligent Transportation Systems Journal, 2021.

Abstract | Links | BibTeX | Tags: Network Security, UAV Security

6.

Ahmet Kurt, Enes Erdin, Kemal Akkaya, Selcuk Uluagac, Mumin Cebe

D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network Journal Article

IEEE Transactions on Dependable and Secure Computing Journal, 2021.

Abstract | Links | BibTeX | Tags: Blockchain Security, Network Security

7.

Oscar G. Bautista, Nico Saputro, Kemal Akkaya, Selcuk Uluagac

A novel routing metric for IEEE 802.11s-based swarm-of-drones applications Conference Paper

In the Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems, 2020.

Abstract | Links | BibTeX | Tags: Network Security, UAV Security

8.

Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac

HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol Conference Paper

In the Proceedings of the 35th Annual Computer Security Applications Conference, 2019.

Abstract | Links | BibTeX | Tags: Enterprise Security, Network Security

9.

Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac

Attacking HDMI Distribution Networks: Poster Demo/Poster

Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019.

Abstract | Links | BibTeX | Tags: Network Security

10.

Nico Saputro, Kemal Akkaya, Ramazan Algin, Selcuk Uluagac

Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems Conference Paper

In the proceedings of the 88th Vehicular Technology Conference (VTC-Fall), 2018.

Abstract | Links | BibTeX | Tags: Network Security, UAV Security

11.

Nico Saputro, Kemal Akkaya, Selcuk Uluagac

Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems Conference Paper

In the Proceedings of the 43rd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), 2018.

Abstract | Links | BibTeX | Tags: Network Security, UAV Security

12.

Amit Kumar Sikder, Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, Mauro Conti

IoT-enabled smart lighting systems for smart cities Conference Paper

In the Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security

13.

Kyle Denney, A. Selcuk Uluagac, Hidayet Aksu, Kemal Akkaya

An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications Journal Article

2018.

Abstract | Links | BibTeX | Tags: Covert channels, Network Security, Wearables

14.

Anurag Akkiraju, David Gabay, Halim Burak Yesilyurt, Hidayet Aksu, Selcuk Uluagac

Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers Conference Paper

In the Proceedings of the IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2017.

Abstract | Links | BibTeX | Tags: Network Security

15.

Abdullah Aydeger, Kemal Akkaya, Mehmet H. Cintuglu, A. Selcuk Uluagac, Osama Mohammed

Software defined networking for resilient communications in Smart Grid active distribution networks Conference Paper

In the Proceedings of the IEEE International Conference on Communications (ICC), 2016.

Abstract | Links | BibTeX | Tags: Network Security, SDN Security

16.

Selcuk Uluagac, Kemal Akkaya, Apurva Mohan, Mehmet H Cintuglu, Tarek Youssef, Osama Mohammed, Daniel Sullivan

Wireless Infrastructure in Industrial Control Systems Journal Article

Cyber-security of SCADA and Other Industrial Control Systems, 2016.

Links | BibTeX | Tags: CPS Security, Network Security

17.

Spencer Michaels, Kemal Akkaya, A. Selcuk Uluagac

Inducing data loss in Zigbee networks via join/association handshake spoofing Conference Paper

In the Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security

18.

Troy Nunnally, A Selcuk Uluagac, Raheem Beyah

InterSec: An interaction system for network security applications Conference Paper

In the Proceedings of the IEEE International Conference on Communications (ICC), 2015.

Abstract | Links | BibTeX | Tags: Network Security

19.

Christopher Wampler, Selcuk Uluagac, Raheem Beyah

Information leakage in encrypted ip video traffic Conference Paper

In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), 2015.

Abstract | Links | BibTeX | Tags: Network Security

20.

Kemal Akkaya, A. Selcuk Uluagac, Abdullah Aydeger

Software defined networking for wireless local networks in Smart Grid Conference Paper

In the Proceedings of the 40th IEEE Local Computer Networks Conference Workshops (LCN Workshops), 2015.

Abstract | Links | BibTeX | Tags: Network Security, SDN Security

21.

Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac, Raheem Beyah

GTID: A Technique for Physical Device and Device Type Fingerprinting Journal Article

IEEE Transactions on Dependable and Secure Computing Journal, 2015.

Abstract | Links | BibTeX | Tags: Fingerprinting, Network Security

22.

Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, Zhipeng Cai

Practical unicast and convergecast scheduling schemes for Cognitive Radio Networks Journal Article

Journal of Combinatorial Optimization, 2013.

Abstract | Links | BibTeX | Tags: Network Security, Wireless Security

23.

Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem Beyah, Yingshu Li

Cell-Based Snapshot and Continuous Data Collection in Wireless Sensor Networks Journal Article

ACM Transactions on Sensor Networks (TOSN), 2013.

Abstract | Links | BibTeX | Tags: Network Security

24.

A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland

Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks Journal Article

In proceedings of IEEE Transactions on Parallel and Distributed Systems, 2013.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

25.

Sakthi V. Radhakrishnan, A. Selcuk Uluagac, Raheem Beyah

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards Conference Paper

In the proceedings of the IEEE Global Communications Conference (GLOBECOM), 2013.

Abstract | Links | BibTeX | Tags: Covert channels, Network Security

26.

Troy Nunnally, Penyen Chi, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah

P3D: A parallel 3D coordinate visualization for advanced network scans Conference Paper

In the proceedings of the IEEE International Conference on Communications (ICC), 2013.

Abstract | Links | BibTeX | Tags: Network Security, Security Visualization

27.

Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah

NAVSEC: A Recommender System for 3D Network Security Visualizations Conference Paper

In the proceedings of the 10th Workshop on Visualization for Cyber Security, 2013.

Abstract | Links | BibTeX | Tags: Network Security, Security Visualization

28.

Venkatachalam Subramanian, A. Selcuk Uluagac, Hasan Cam, Raheem Beyah

Examining the characteristics and implications of sensor side channels Conference Paper

In the proceedings of IEEE International Conference on Communications (ICC), 2013.

Abstract | Links | BibTeX | Tags: CPS Security, Network Security, Side Channel

29.

Marco Valero, A. Selcuk Uluagac, S. Venkatachalam, K. C. Ramalingam, Raheem Beyah

The Monitoring Core: A framework for sensor security application development Conference Paper

In the proceedings of the IEEE 9th International Conference on Mobile Adhoc and Sensor Systems (MASS) , 2012.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

30.

KC Ramalingam, Venkatachalam Subramanian, Selcuk Uluagac, Raheem Beyah

SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks Conference Paper

In the proceedings of IEEE Global Communications Conference (GLOBECOM), 2012.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

31.

Aaron D Goldman, A. Selcuk Uluagac, Raheem Beyah, John A Copeland

Plugging the leaks without unplugging your network in the midst of Disaster Conference Paper

In the proceedings of 37th Annual IEEE Conference on Local Computer Networks (LCN), 2012.

Abstract | Links | BibTeX | Tags: Network Security

32.

Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem Beyah

Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks Conference Paper

In the proceedings IEEE International Conference on Computer Communications (INFOCOM), 2012.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

33.

Troy Nunnally, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah

3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security Conference Paper

In the proceedings of 37th Annual IEEE Conference on Local Computer Networks (LCN), 2012.

Abstract | Links | BibTeX | Tags: Network Security, Security Visualization

34.

Christopher P. Lee, Arif Selcuk Uluagac, Kevin D. Fairbanks, John A. Copeland

The Design of NetSecLab: A Small Competition-Based Network Security Lab Journal Article

IEEE Transactions on Education Journal, 2011.

Abstract | Links | BibTeX | Tags: Network Security, Security Education

35.

A. Selcuk Uluagac, Raheem A. Beyah, Yingshu Li, John A. Copeland

VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Journal Article

IEEE Transactions on Mobile Computing Journal, 2010.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

36.

Selcuk Uluagac, Raheem A. Beyah, John A. Copeland

Time-Based Dynamic Keying and En-Route Filtering (TICK) for Wireless Sensor Networks Conference Paper

In the proceedings of IEEE Global Telecommunications Conference (GLOBECOM), 2010.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

37.

Selcuk Uluagac, Raheem A Beyah,, John A. Copeland

Analysis of Varying AS Path Lengths from the Edge of the Network Conference Paper

In the proceedings of IEEE Global Telecommunications Conference (GLOBECOM), 2010.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security, Wireless Security

38.

A. Selcuk Uluagac, Christopher P. Lee, Raheem A. Beyah, John A. Copeland

Designing Secure Protocols for Wireless Sensor Networks Book

Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.

Abstract | Links | BibTeX | Tags: IoT Security, Network Security

39.

A. Selcuk Uluagac, Jon M. Peha

IP Multicast over Cable TV Networks Book

Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.

Abstract | Links | BibTeX | Tags: Network Security

Citations: 8413

h-index: 44

i10-index: 107