@ARTICLE{SikderSurveyCOMST,
author={Sikder, Amit Kumar and Petracca, Giuseppe and Aksu, Hidayet and Jaeger, Trent and Uluagac, A. Selcuk},
journal={IEEE Communications Surveys & Tutorials},
title={A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications},
year={2021},
volume={23},
number={2},
pages={1125-1159},
doi={10.1109/COMST.2021.3064507}}

@ARTICLE{LuisIVYCide,
author={Puche Rondon, Luis and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
journal={IEEE Internet of Things Journal},
title={Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats},
year={2023},
volume={10},
number={10},
pages={8533-8546},
doi={10.1109/JIOT.2022.3196282}}

@inproceedings {OzRoB2023,
author = {Harun Oz and Ahmet Aris and Abbas Acar and G{\”u}liz Seray Tuncay and Leonardo Babun and Selcuk Uluagac},
title = {{R{\o}B}: Ransomware over Modern Web Browsers},
booktitle = {32nd USENIX Security Symposium (USENIX Security 23)},
year = {2023},
isbn = {978-1-939133-37-3},
address = {Anaheim, CA},
pages = {7073–7090},
url = {https://www.usenix.org/conference/usenixsecurity23/presentation/oz},
publisher = {USENIX Association},
month = aug
}

@article{AcarPACA,
author = {Acar, Abbas and Ali, Shoukat and Karabina, Koray and Kaygusuz, Cengiz and Aksu, Hidayet and Akkaya, Kemal and Uluagac, Selcuk},
title = {A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA},
year = {2021},
issue_date = {November 2021},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {24},
number = {4},
issn = {2471-2566},
url = {https://doi.org/10.1145/3464690},
doi = {10.1145/3464690},
journal = {ACM Trans. Priv. Secur.},
month = {sep},
articleno = {24},
numpages = {28},
keywords = {template, secure, Continuous, authentication, privacy-aware, matching, biometrics}
}

@article{OzSurveyRansomware,
author = {Oz, Harun and Aris, Ahmet and Levi, Albert and Uluagac, A. Selcuk},
title = {A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions},
year = {2022},
issue_date = {January 2022},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {54},
number = {11s},
issn = {0360-0300},
url = {https://doi.org/10.1145/3514229},
doi = {10.1145/3514229},
journal = {ACM Comput. Surv.},
month = {sep},
articleno = {238},
numpages = {37},
keywords = {defense, taxonomy, malware, detection, evolution, Ransomware}
}

@article{Mekdad_UAV_Survey,
title = {A survey on security and privacy issues of UAVs},
journal = {Computer Networks},
volume = {224},
pages = {109626},
year = {2023},
issn = {1389-1286},
doi = {https://doi.org/10.1016/j.comnet.2023.109626},
url = {https://www.sciencedirect.com/science/article/pii/S1389128623000713},
author = {Yassine Mekdad and Ahmet Aris and Leonardo Babun and Abdeslam El Fergougui and Mauro Conti and Riccardo Lazzeretti and A. Selcuk Uluagac},
keywords = {Unmanned Aerial Vehicles, UAVs, Security, Privacy, Drones}}

 

@inproceedings{LeoNDSS,
author = {Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A Selcuk Uluagac},
year = {2022},
month = {04},
pages = {},
title = {The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments},
}

@inproceedings{untoldStory,
isbn = {1-66543-486-4},
publisher = {IEEE},
series = {2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)},
title = {In-Browser Cryptomining for Good: An Untold Story},
year = {2021-8},
author = {Tekiner, Ege and Acar, Abbas and Uluagac, A Selcuk and Kirda, Engin and Selcuk, Ali Aydin},
booktitle = {2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)},
}

@inproceedings{IoTCryptojacking,
author = {Ege Tekiner, Abbas Acar, and A. Selcuk Uluagac},
year = {2022},
month = {04},
pages = {},
title = {A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks}
}

 

@inproceedings{FarazMinos,
author = {Arış, Ahmet and Naseem, Faraz and Babun, Leonardo and Tekiner, Ege and Uluagac, Selcuk},
year = {2021},
month = {02},
pages = {},
title = {MINOS: A Lightweight Real-Time Cryptojacking Detection System},
doi = {10.14722/ndss.2021.24444}
}

@ARTICLE{JavierHoneypotSurvey,
author={Franco, Javier and Aris, Ahmet and Canberk, Berk and Uluagac, A. Selcuk},
journal={IEEE Communications Surveys Tutorials},
title={A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems},
year={2021},
pages={1-1},
doi={10.1109/COMST.2021.3106669}}

@article{BabunACMTrans2020,
author = {Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
title = {A System-Level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case},
year = {2019},
issue_date = {February 2020},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {4},
number = {2},
issn = {2378-962X},
url = {https://doi.org/10.1145/3355300},
doi = {10.1145/3355300},
journal = {ACM Trans. Cyber-Phys. Syst.},
month = nov,
articleno = {16},
numpages = {28},
keywords = {system calls, compromised devices, CPS security, function calls, smart grid security, IEC61850}
}

@ARTICLE{cebeBlockhain2018,
author={Cebe, Mumin and Erdin, Enes and Akkaya, Kemal and Aksu, Hidayet and Uluagac, Selcuk}, journal={IEEE Communications Magazine},
title={Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles},
year={2018},
volume={56},
number={10},
\pages={50-57},
doi={10.1109/MCOM.2018.1800137}}

@ARTICLE{LopezSurvey,
author={Lopez, Juan and Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk}, journal={Journal of Hardware and Systems Security}, title={A Survey on Function and System Call Hooking Approaches},
year={2017},
volume={1},
pages={114-136},
doi={10.1007/s41635-017-0013-2}}

@ARTICLE{ShoulingVirtual,
author={Ji, Shouling and Uluagac, Arif Selcuk and Beyah, Raheem and Cai, Zhipeng}, journal={Journal of Combinatorial Optimization},
title={Practical unicast and convergecast scheduling schemes for cognitive radio networks}, year={2013},
volume={26},
pages={161-177},
doi={10.1007/s10878-011-9446-7}}

@Inbook{AkkayaBookSDN,
author=”Akkaya, Kemal and Uluagac, A. Selcuk and Aydeger, Abdullah and Mohan, Apurva”,
title=”Secure Software Defined Networking Architectures for The Smart Grid”,
bookTitle=”Smart Grid: Networking, Data Management and Business Models”,
year=”2016″,
publisher=”CRC Press”,
pages=”53–70″,
isbn=”9781315214221″,
doi=”10.1201/b19664″
}

@inproceedings{Puche:2021:WiSec,
author = {Rondon, Luis Puche and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
title = {LightningStrike: (In)secure Practices of E-IoT Systemsin the Wild},
year = {2021},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3448300.3467830},
booktitle = {14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’21)},
location = {VAbu Dhabi, United Arab Emirates},
series = {WiSec ’21}
}

@inproceedings{AmitKratosACM,
author = {Sikder, Amit Kumar and Babun, Leonardo and Celik, Z. Berkay and Acar, Abbas and Aksu, Hidayet and McDaniel, Patrick and Kirda, Engin and Uluagac, A. Selcuk},
title = {Kratos: Multi-User Multi-Device-Aware Access Control System for the Smart Home},
year = {2020},
isbn = {9781450380065},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3395351.3399358},
doi = {10.1145/3395351.3399358},
booktitle = {Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks},
pages = {1–12},
numpages = {12},
keywords = {smart home security, access control, internet of things},
location = {Linz, Austria},
series = {WiSec ’20}
}

@INPROCEEDINGS{IqtidarHeka,
author={Newaz, AKM Iqtidar and Sikder, Amit Kumar and Babun, Leonardo and Uluagac, A. Selcuk}, booktitle={2020 IEEE Conference on Communications and Network Security (CNS)},
title={HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices},
year={2020},
pages={1-9},
doi={10.1109/CNS48642.2020.9162311}}

@INPROCEEDINGS{BabunZIoT,
author={Babun, Leonardo and Aksu, Hidayet and Ryan, Lucas and Akkaya, Kemal and Bentley, Elizabeth S. and Uluagac, A. Selcuk}, booktitle={ICC 2020 – 2020 IEEE International Conference on Communications (ICC)},
title={Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices},
year={2020}, volume={},
number={},
pages={1-7},
doi={10.1109/ICC40277.2020.9149285}}

@inproceedings{TroyNavSec,
author = {Nunnally, Troy and Abdullah, Kulsoom and Uluagac, A. Selcuk and Copeland, John A. and Beyah, Raheem},
title = {NAVSEC: A Recommender System for 3D Network Security Visualizations},
year = {2013},
isbn = {9781450321730},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2517957.2517963},
doi = {10.1145/2517957.2517963},
pages = {41–48},
numpages = {8},
keywords = {NAVSEC, 3D visualization, security visualization, recommender system, network security, monitoring},
location = {Atlanta, Georgia, USA},
series = {VizSec ’13}
}

@article{sikder2019context,
title={A context-aware framework for detecting sensor-based threats on smart devices},
author={Sikder, Amit Kumar and Aksu, Hidayet and Uluagac, A Selcuk},
journal={IEEE Transactions on Mobile Computing},
year={2019},
publisher={IEEE}
}

@article{sikder2021ComstSurvey,
title={A Survey on Sensor-based Threats to Smart Devices and Applications},
author={Sikder, Amit Kumar and Petraca, Giuseppe and Aksu, Hidayet and Jaegar, Trent and Uluagac, A Selcuk},
journal={IEEE Communications Surveys and Tutorials (IEEE COMST},
year={2021},
publisher={IEEE}
}

@inproceedings{tekiner2021,
AUTHOR = {Ege Tekiner and Abbas Acar and A. Selcuk Uluagac and Engin Kirda and Ali Aydin Selcuk},
TITLE = {SoK: Cryptojacking Malware},
BOOKTITLE = {6th IEEE European Symposium on Security and Privacy},
ADDRESS = {Virtual},
MONTH = {September},
DAY = {6–10},
YEAR = {2021}
}

@inproceedings{naseemminos,
author = {Faraz Naseem and
Ahmet Aris and
Leonardo Babun and
Ege Tekiner and
Selcuk Uluagac},
title = {{MINOS}: A Lightweight Real-Time Cryptojacking Detection System},
booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS}, February 21-25, 2021},
year = {2021}
}

@article{BABUN2021108040,
title = {A survey on IoT platforms: Communication, security, and privacy perspectives},
author = {Leonardo Babun and Kyle Denney and Z. Berkay Celik and Patrick McDaniel and A. Selcuk Uluagac},
journal = {Computer Networks},
volume = {192},
pages = {108040},
year = {2021},
issn = {1389-1286},
doi = {https://doi.org/10.1016/j.comnet.2021.108040},
url = {https://www.sciencedirect.com/science/article/pii/S1389128621001444}
}

@article{BabunCelikMcDanielUluagacIoTWatch,
author = {Leonardo Babun and Z. Berkay Celik and Patrick McDaniel and A. Selcuk Uluagac},
doi = {doi:10.2478/popets-2021-0009},
url = {https://doi.org/10.2478/popets-2021-0009},
title = {Real-time Analysis of Privacy-(un)aware IoT Applications},
journal = {Proceedings on Privacy Enhancing Technologies},
number = {1},
volume = {2021},
year = {2020},
pages = {145–166}
}

@inproceedings{acar2018peek,
author = {Acar, Abbas and Fereidooni, Hossein and Abera, Tigist and Sikder, Amit Kumar and Miettinen, Markus and Aksu, Hidayet and Conti, Mauro and Sadeghi, Ahmad-Reza and Uluagac, Selcuk},
title = {Peek-a-Boo: I See Your Smart Home Activities, Even Encrypted!},
year = {2020},
isbn = {9781450380065},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3395351.3399421},
doi = {10.1145/3395351.3399421},
booktitle = {Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks},
pages = {207–218},
numpages = {12},
keywords = {privacy, ZigBee, smart-home, BLE, wifi, network traffic},
location = {Linz, Austria},
series = {WiSec ’20}
}

@ARTICLE{Kurt:2021, author={Kurt, Ahmet and Saputro, Nico and Akkaya, Kemal and Uluagac, A. Selcuk}, journal={IEEE Transactions on Intelligent Transportation Systems}, title={Distributed Connectivity Maintenance in Swarm of Drones During Post-Disaster Transportation Applications}, year={2021}, volume={}, number={}, pages={1-13}, doi={10.1109/TITS.2021.3066843}}

@ARTICLE{Sikder:2021, author={Sikder, Amit Kumar and Petracca, Giuseppe and Aksu, Hidayet and Jaeger, Trent and Uluagac, A. Selcuk}, journal={IEEE Communications Surveys Tutorials}, title={A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications}, year={2021}, volume={23}, number={2}, pages={1125-1159}, doi={10.1109/COMST.2021.3064507}}

@inproceedings{Cosson:2021,
author = {Cosson, Adrien and Sikder, Amit Kumar and Babun, Leonardo and Celik, Z. Berkay and McDaniel, Patrick and Uluagac, A. Selcuk},
title = {Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information},
year = {2021},
isbn = {9781450383547},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3450268.3453533},
doi = {10.1145/3450268.3453533},
booktitle = {Proceedings of the International Conference on Internet-of-Things Design and Implementation},
pages = {53–66},
numpages = {14},
keywords = {Intrusion detection, IoT security, Mirai Botnet, Internet of Things},
location = {Charlottesvle, VA, USA},
series = {IoTDI ’21}
}

@article{ERDIN2021103021,
title = {A scalable private Bitcoin payment channel network with privacy guarantees},
author = {Enes Erdin and Mumin Cebe and Kemal Akkaya and Eyuphan Bulut and Selcuk Uluagac},
journal = {Journal of Network and Computer Applications},
volume = {180},
pages = {103021},
year = {2021},
issn = {1084-8045},
doi = {https://doi.org/10.1016/j.jnca.2021.103021},
url = {https://www.sciencedirect.com/science/article/pii/S1084804521000485}
}

@InProceedings{AcarMalware2019,
author=”Acar, Abbas
and Lu, Long
and Uluagac, A. Selcuk
and Kirda, Engin”,
editor=”Lin, Zhiqiang
and Papamanthou, Charalampos
and Polychronakis, Michalis”,
title=”An Analysis of Malware Trends in Enterprise Networks”,
booktitle=”Information Security”,
year=”2019″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”360–380″,
isbn=”978-3-030-30215-3″
}

@inproceedings{OscarRotuing,
author = {Bautista, Oscar G. and Saputro, Nico and Akkaya, K and Uluagac, Selcuk},
title = {A Novel Routing Metric for IEEE 802.11s-Based Swarm-of-Drones Applications},
year = {2019},
isbn = {9781450372831},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3360774.3368197},
doi = {10.1145/3360774.3368197},
booktitle = {Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
pages = {514–521},
numpages = {8},
keywords = {wireless mesh network, swarm-of-drones, HWMP, network throughput, link quality metric, routing metric, propagation loss models, 802.11s, SrFTime, flying adhoc networks, MANET, airtime},
location = {Houston, Texas},
series = {MobiQuitous ’19}
}

@ARTICLE{Babun:2021:CPS, author={Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk}, journal={IEEE Transactions on Information Forensics and Security}, title={CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice}, year={2021}, volume={16}, number={}, pages={2413-2428}, doi={10.1109/TIFS.2021.3054968}}

@ARTICLE{Mercan:2020, author={Mercan, Suat and Cain, Lisa and Akkaya, Kemal and Cebe, Mumin and Uluagac, Selcuk and Alonso, Miguel and Cobanoglu, Cihan}, journal={International Journal of Contemporary Hospitality Management}, title={Improving the service industry with hyper-connectivity: IoT in hospitality}, year={2021}, volume={33}, number={1}, pages={243-262}, doi={10.1108/IJCHM-06-2020-0621}}

@ARTICLE{9849838,
author={Puche Rondon, Luis and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
journal={IEEE Internet of Things Journal},
title={Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats},
year={2023},
volume={10},
number={10},
pages={8533-8546},
doi={10.1109/JIOT.2022.3196282}}

@inproceedings{Puche:2020:PoisonIvy,
author = {Rondon, Luis Puche and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
title = {PoisonIvy: (In)Secure Practices of Enterprise IoT Systems in Smart Buildings},
year = {2020},
isbn = {9781450380614},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3408308.3427606},
doi = {10.1145/3408308.3427606},
booktitle = {Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation},
pages = {130–139},
numpages = {10},
keywords = {Enterprise IoT Systems, Smart Office, Cyber attacks, Smart buildings, Malicious Software},
location = {Virtual Event, Japan},
series = {BuildSys ’20}
}

@article{Bautista:2020,
title = {Customized novel routing metrics for wireless mesh-based swarm-of-drones applications},
journal = {Internet of Things},
volume = {11},
pages = {100265},
year = {2020},
issn = {2542-6605},
doi = {https://doi.org/10.1016/j.iot.2020.100265},
url = {https://www.sciencedirect.com/science/article/pii/S2542660520300998},
author = {Oscar Bautista and Kemal Akkaya and A. Selcuk Uluagac}
}

@InProceedings{Kurt:2020:LNBot,
author=”Kurt, Ahmet
and Erdin, Enes
and Cebe, Mumin
and Akkaya, Kemal
and Uluagac, A. Selcuk”,
title=”LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit”,
booktitle=”Computer Security — ESORICS 2020″,
year=”2020″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”734–755″,
isbn=”978-3-030-59013-0″
}

@INPROCEEDINGS{Newaz:2020:Adversarial,
author={Newaz, Akm Iqtidar and Haque, Nur Imtiazul and Sikder, Amit Kumar and Rahman, Mohammad Ashiqur and Uluagac, A. Selcuk},
booktitle={GLOBECOM 2020 – 2020 IEEE Global Communications Conference},
title={Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems},
year={2020},
pages={1-6},
doi={10.1109/GLOBECOM42002.2020.9322472}}

 

@inproceedings{SikderContextAware,
author = {Sikder, Amit Kumar and Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
title = {Aegis: A Context-Aware Security Framework for Smart Home Systems},
year = {2019},
isbn = {9781450376280},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3359789.3359840},
doi = {10.1145/3359789.3359840},
booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference},
pages = {28–41},
numpages = {14},
keywords = {smart home platforms, context-awareness, malware analysis, intrusion detection, IoT security},
location = {San Juan, Puerto Rico},
series = {ACSAC ’19}
}

@article{TekinEnergyConsumption,
title = {Energy consumption of on-device machine learning models for IoT intrusion detection},
journal = {Internet of Things},
volume = {21},
pages = {100670},
year = {2023},
issn = {2542-6605},
doi = {https://doi.org/10.1016/j.iot.2022.100670},
url = {https://www.sciencedirect.com/science/article/pii/S2542660522001512},
author = {Nazli Tekin and Abbas Acar and Ahmet Aris and A. Selcuk Uluagac and Vehbi Cagri Gungor},
}

 

@inproceedings{ShrenikCodeObfus,
author = {Bhansali, Shrenik and Aris, Ahmet and Acar, Abbas and Oz, Harun and Uluagac, A. Selcuk},
title = {A First Look at Code Obfuscation for WebAssembly},
year = {2022},
isbn = {9781450392167},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3507657.3528560},
doi = {10.1145/3507657.3528560},
pages = {140–145},
numpages = {6},
keywords = {wasm, obfuscation, cryptojacking, webassembly},
location = {San Antonio, TX, USA},
series = {WiSec ’22}
}

 

@article{PucheIoT,
author = {Puche Rondon, Luis and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
title = {LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses},
year = {2023},
issue_date = {March 2023},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {4},
number = {1},
issn = {2692-1626},
url = {https://doi.org/10.1145/3555721},
doi = {10.1145/3555721},
journal = {Digital Threats},
month = {mar},
articleno = {10},
numpages = {26},
keywords = {Enterprise Internet-of-Things, defense system, Cresnet, attacks, E-IoT security}
}

@article{Sikder:2021:Aegis,
author = {Sikder, Amit Kumar and Babun, Leonardo and Uluagac, A. Selcuk},
title = {Aegis+: A Context-Aware Platform-Independent Security Framework for Smart Home Systems},
year = {2021},
issue_date = {March 2021},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {2},
number = {1},
issn = {2692-1626},
url = {https://doi.org/10.1145/3428026},
doi = {10.1145/3428026}
journal = {Digital Threats: Research and Practice},
month = feb,
articleno = {6},
numpages = {33}
}

@inproceedings{LuisHDMIWalk,
author = {Rondon, Luis Puche and Babun, Leonardo and Akkaya, K and Uluagac, A. Selcuk},
title = {HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol},
year = {2019},
isbn = {9781450376280},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3359789.3359841},
doi = {10.1145/3359789.3359841},
booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference},
pages = {650–659},
numpages = {10},
keywords = {consumer electronics control, HDMI distributions, CEC, cyberattacks, DoS},
location = {San Juan, Puerto Rico},
series = {ACSAC ’19}
}

@inproceedings{CelikCurie,
author = {Celik, Z. Berkay and Acar, Abbas and Aksu, Hidayet and Sheatsley, Ryan and McDaniel, Patrick and Uluagac, A. Selcuk},
title = {Curie: Policy-Based Secure Data Exchange},
year = {2019},
isbn = {9781450360999},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3292006.3300042},
doi = {10.1145/3292006.3300042},
booktitle = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy},
pages = {121–132},
numpages = {12},
keywords = {policy language, collaborative learning, secure data exchange},
location = {Richardson, Texas, USA},
series = {CODASPY ’19}
}

@INPROCEEDINGS{AkkayaDrone,
author={K. {Akkaya} and V. {Baboolal} and N. {Saputro} and S. {Uluagac} and H. {Menouar}},
booktitle={2019 IEEE Conference on Communications and Network Security (CNS)},
title={Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems},
year={2019},
volume={},
number={},
pages={1-7},}

@ARTICLE{8733994,
author={Z. B. {Celik} and P. {McDaniel} and G. {Tan} and L. {Babun} and A. S. {Uluagac}},
journal={IEEE Security Privacy},
title={Verifying Internet of Things Safety and Security in Physical Spaces},
year={2019},
volume={17},
number={5},
pages={30-37},}

@ARTICLE{AcarAuth2020,
author={A. {Acar} and H. {Aksu} and A. S. {Uluagac} and K. {Akkaya}},
journal={IEEE Transactions on Mobile Computing},
title={A Usable and Robust Continuous Authentication Framework using Wearables},
year={2020},
volume={},
number={},
pages={1-1},}

@INPROCEEDINGS{ErdinOSIndependent,
author={E. {Erdin} and H. {Aksu} and S. {Uluagac} and M. {Vai} and K. {Akkaya}},
booktitle={MILCOM 2018 – 2018 IEEE Military Communications Conference (MILCOM)},
title={OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework},
year={2018},
volume={},
number={},
pages={926-932},}

@inproceedings{iqtidarThreatAnalysis,
isbn = {1-66543-541-0},
publisher = {IEEE},
series = {GLOBECOM 2022 – 2022 IEEE Global Communications Conference},
title = {Systematic Threat Analysis of Modern Unified Healthcare Communication Systems},
year = {2022-12-4},
author = {Newaz, Akm Iqtidar and Aris, Ahmet and Sikder, Amit Kumar and Uluagac, A Selcuk},
booktitle = {GLOBECOM 2022 – 2022 IEEE Global Communications Conference},
}

 

@inproceedings{SpotGlobecom,
isbn = {1-66543-541-0},
publisher = {IEEE},
series = {GLOBECOM 2022 – 2022 IEEE Global Communications Conference},
title = {S-Pot: A Smart Honeypot Framework with Dynamic Rule Configuration for SDN},
year = {2022-12-4},
author = {Franco, Javier and Aris, Ahmet and Babun, Leonardo and Uluagac, A Selcuk},
booktitle = {GLOBECOM 2022 – 2022 IEEE Global Communications Conference},
}

 

@INPROCEEDINGS{NaseemGreenComp,
author={F. {Naseem} and L. {Babun} and C. {Kaygusuz} and S. J. {Moquin} and C. {Farnell} and A. {Mantooth} and A. S. {Uluagac}},
booktitle={2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
title={CSPoweR-Watch: A Cyber-Resilient Residential Power Management System},
year={2019},
volume={},
number={},
pages={768-775},}

@INPROCEEDINGS{NewarzHealthGuard,
author={A. I. {Newaz} and A. K. {Sikder} and M. A. {Rahman} and A. S. {Uluagac}},
booktitle={2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS)},
title={HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems},
year={2019},
volume={},
number={},
pages={389-396},}

@ARTICLE{SikderContetAware,
author={A. K. {Sikder} and H. {Aksu} and A. S. {Uluagac}},
journal={IEEE Transactions on Mobile Computing},
title={A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices},
year={2020},
volume={19},
number={2},
pages={245-261},}

@INPROCEEDINGS{ErdinOffChain,
author={E. {Erdin} and M. {Cebe} and K. {Akkaya} and E. {Bulut} and A. S. {Uluagac}},
booktitle={2019 IEEE International Conference on Blockchain (Blockchain)},
title={A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links},
year={2019},
volume={},
number={},
pages={294-301},}

@INPROCEEDINGS{Mercan:2020:ACost,
author={Mercan, Suat and Cebe, Mumin and Tekiner, Ege and Akkaya, Kemal and Chang, Melissa and Uluagac, Selcuk},
booktitle={2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)}, title={A Cost-efficient IoT Forensics Framework with Blockchain},
year={2020},
pages={1-5},
doi={10.1109/ICBC48266.2020.9169397}}

@article{ERDIN2020107098,
author = “E Erdin and Mumin Cebe and K Akkaya and Senay Solak and E Bulut and Selcuk Uluagac”,
title = “A Bitcoin payment network with reduced transaction fees and confirmation times”,
journal = “Computer Networks”,
volume = “172”,
pages = “107098”,
year = “2020”,
month = “May”,
issn = “1389-1286”,
%doi = “https://doi.org/10.1016/j.comnet.2020.107098”,
%url = “http://www.sciencedirect.com/science/article/pii/S1389128619308850”,
}

@article{AYDEGER201939,
title = “SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios”,
journal = “Journal of Network and Computer Applications”,
volume = “138”,
pages = “39 – 50”,
year = “2019”,
issn = “1084-8045”,
author = “A Aydeger and Nico Saputro and K Akkaya and S Uluagac”,
}

@article{abbasPintaWiley2019,
author = {Acar, A and Liu, Wenyi and Beyah, Raheem and Akkaya, K and Uluagac, Arif Selcuk},
title = {A privacy-preserving multifactor authentication system},
journal = {Security and Privacy},
volume = {2},
number = {5},
pages = {e88},
keywords = {fuzzy hashing, homomorphic encryption, multifactor authentication, privacy-preserving},
doi = {10.1002/spy2.88},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/spy2.88},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.88},
year = {2019}
}

@INPROCEEDINGS{CPS-Sec-WS2019,
author={K. {Akkaya} and V. {Baboolal} and N. {Saputro} and S. {Uluagac} and H. {Menouar}},
booktitle={2019 IEEE Conference on Communications and Network Security (CNS) CPS-Security Workshop},
title={Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems},
year={2019},
volume={},
number={},
pages={1-7},
%doi={10.1109/CNS.2019.8802665},
ISSN={},
month={June},}

@INPROCEEDINGS{NicoDroneVTC,
author={N. {Saputro} and K. {Akkaya} and R. {Algin} and S. {Uluagac}},
booktitle={2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)},
title={Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems},
year={2018},
volume={},
number={},
pages={1-5},
%doi={10.1109/VTCFall.2018.8690977},
ISSN={},
month={Aug},}

@INPROCEEDINGS{Erdi1907:Heuristic,
AUTHOR=”E Erdin and M Cebe and K Akkaya and E Bulut and Selcuk
Uluagac”,
TITLE=”A Heuristic-based Private Bitcoin Payment Network Formation Using
{Off-Chain} Links”,
BOOKTITLE=”2019 IEEE International Conference on Blockchain (Blockchain 2019)”,
ADDRESS=”Atlanta, USA”,
DAYS=14,
MONTH=jul,
YEAR=2019,
}

@INPROCEEDINGS{Faraz-CSPoweR,
AUTHOR=”Faraz A Naseem and Leonardo Babun and Cengiz Kaygusuz and S. Joe Moquin and
Chris Farnell and Mantooth Alan and Selcuk Uluagac”,
TITLE=”{CSPoweR-Watch:} A Cyber-resilient Residential Power Management System”,
BOOKTITLE=”IEEE International Conference on Green Computing and Communications 2019
(IEEE GreenCom 2019)”,
ADDRESS=”Atlanta, USA”,
DAYS=14,
MONTH=jul,
YEAR=2019,
}

@INPROCEEDINGS{Iqtidar-HealthGuard,
AUTHOR=”AKM iqtidar Newaz and Amit Kumar Sikder and Selcuk Uluagac and Mohammad
Ashiqur Rahman”,
TITLE=”{HealthGuard:} A Machine {Learning-Based} Security Framework for Smart
Healthcare System”,
BOOKTITLE=”2019 the IEEE/ACM 4th International Conference on Connected Health:
Applications, Systems and Engineering Technologies (IEEE\&ACM CHASE 2019)”,
ADDRESS=”Washington D.C., USA”,
DAYS=25,
MONTH=sep,
YEAR=2019,
}

@ARTICLE{berkayIEEESPMagazine,
author={Z. B. {Celik} and P. {McDaniel} and G. {Tan} and L. {Babun} and A. S. {Uluagac}},
journal={IEEE Security Privacy},
title={Verifying Internet of Things Safety and Security in Physical Spaces},
year={2019},
volume={17},
number={5},
pages={30-37},
month={Sep.},
}

@InProceedings{Denney:2019:USB,
author=”Denney, Kyle
and Erdin, Enes
and Babun, Leonardo
and Vai, Michael
and Uluagac, Selcuk”,
title=”USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework”,
booktitle=”Security and Privacy in Communication Networks”,
year=”2019″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”126–146″,
isbn=”978-3-030-37228-6″
}

@INPROCEEDINGS{Puche-HDMI-Walk,
AUTHOR=”Luis {Puche Rondon} and Leonardo Babun and K Akkaya and Selcuk Uluagac”,
TITLE=”{HDMI-Walk:} Attacking {HDMI} Distribution Networks via Consumer Electronic
Control Protocol”,
BOOKTITLE=” In Proc. 2019 Annual Computer Security Applications Conference (ACSAC)”,
ADDRESS=”Porto Rico”,
DAYS=10,
MONTH=Dec,
YEAR=2019,
}

@inbook{Saputro:2020:ARev,
author = {Saputro, Nico and Tonyali, Samet and Aydeger, Abdullah and Akkaya, Kemal and Rahman, Mohammad A. and Uluagac, Selcuk},
publisher = {John Wiley & Sons, Ltd},
isbn = {9781119593386},
title = {A Review of Moving Target Defense Mechanisms for Internet of Things Applications},
booktitle = {Modeling and Design of Secure Internet of Things},
chapter = {24},
pages = {563-614},
doi = {https://doi.org/10.1002/9781119593386.ch24},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119593386.ch24},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/9781119593386.ch24},
year = {2020}
}

@ARTICLE{Puche:2020:HDMIWatch, author={PucheRondon, Luis C and Babun, Leonardo and Akkaya, Kemal and Uluagac, A. Selcuk}, journal={IEEE Transactions on Network Science and Engineering}, title={HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks}, year={2020}, volume={}, number={}, pages={1-1}, doi={10.1109/TNSE.2020.3020084}}

@InProceedings{BerkayCurieCODASPY,
Title = {Curie: Policy-based Secure Data Exchange},
Author = {Z. Berkay Celik and Abbas Acar and Hidayet Aksu and Ryan Sheatsley and A. Selcuk Uluagac and Patrick McDaniel},
Booktitle = {ACM Conference on Data and Applications Security (CODASPY)},
Year = {2019},
Address = {Dallas, TX},
Month = {March},
Eprint = {arXiv:1702.08342},
Url = {https://arxiv.org/pdf/1702.08342.pdf}
}

@INPROCEEDINGS{U-Pot-Azizul,
author={M. A. {Hakim} and H. {Aksu} and A. S. {Uluagac} and K. {Akkaya}},
booktitle={2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)},
title={U-PoT: A Honeypot Framework for UPnP-Based IoT Devices},
year={2018},
volume={},
number={},
pages={1-8},
doi={10.1109/PCCC.2018.8711321},
ISSN={2374-9628},
month={Nov},
}

@INPROCEEDINGS{EnesMilcom18,
AUTHOR=”E Erdin and H Aksu and Selcuk Uluagac and Michael Vai and K
Akkaya”,
TITLE=”{OS} Independent and {Hardware-Assisted} Insider Threat Detection and
Prevention Framework”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{BurakSOTA-Milcom18,
AUTHOR=”Halim B Yesilyurt and Hidayet Aksu and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{SOTA:} Secure {Over-the-Air} Programming of {IoT} Devices”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{AzizulIoTHoneynet,
AUTHOR=”Muhammad Azizul Hakim and H Aksu and Selcuk Uluagac and K Akkaya”,
TITLE=”{U-PoT:} A Honeypot Framework for {UPnP-Based} {IoT} Devices”,
BOOKTITLE=”2018 IEEE 37th International Performance Computing and Communications
Conference (IPCCC 2018)”,
ADDRESS=”Orlando, USA”,
DAYS=17,
MONTH=nov,
YEAR=2018,
}

@INPROCEEDINGS{NicoDronePaper18,
AUTHOR=”Nico Saputro and K Akkaya and Selcuk Uluagac”,
TITLE=”Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems”,
BOOKTITLE=”IEEE Workshop on Networks of Sensors, Wearable, and Mobile Devices
(co-located with IEEE LCN 2018) (LCN-NSWMD 2018)”,
ADDRESS=”Chicago, USA”,
DAYS=1,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{EnesMuminBlockchain18,
AUTHOR=”E Erdin and M Cebe and K Akkaya and Senay Solak and E
Bulut and Selcuk Uluagac”,
TITLE=”Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations”,
BOOKTITLE=”2018 IEEE International Conference on Blockchain (Blockchain 2018)”,
ADDRESS=”Halifax, Canada”,
DAYS=30,
MONTH=jul,
YEAR=2018,
}

@INPROCEEDINGS{EnesMilcom18,
AUTHOR=”E Erdin and H Aksu and Selcuk Uluagac and Michael Vai and K
Akkaya”,
TITLE=”{OS} Independent and {Hardware-Assisted} Insider Threat Detection and
Prevention Framework”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{BurakSOTAMilcom18,
AUTHOR=”Halim B Yesilyurt and Hidayet Aksu and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{SOTA:} Secure {Over-the-Air} Programming of {IoT} Devices”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@ARTICLE{Aksu-BT-Fingerprintng,
author={H. Aksu and A. S. Uluagac and E. Bentley},
journal={IEEE Transactions on Sustainable Computing},
title={Identification of Wearable Devices with Bluetooth},
year={2018},
volume={},
number={},
pages={1-1},
doi={10.1109/TSUSC.2018.2808455},
ISSN={},
month={February},}

@ARTICLE{IoTAdvertisementPP,
author={H. Aksu and L. Babun and M. Conti and G. Tolomei and A. S. Uluagac},
journal={IEEE Communications Magazine},
title={Advertising in the IoT Era: Vision and Challenges},
year={2018},
volume={},
number={},
pages={1-7},
keywords={Advertising;Automobiles;Computer architecture;Internet;Smart devices;Smart phones},
doi={10.1109/MCOM.2017.1700871},
ISSN={0163-6804},
month={April},}

@article{AbbasFHEsurvey,
author = {Acar, Abbas and Aksu, Hidayet and Uluagac, A. Selcuk and Conti, Mauro},
title = {A Survey on Homomorphic Encryption Schemes: Theory and Implementation},
journal = {ACM Comput. Surv.},
issue_date = {July 2018},
volume = {51},
number = {4},
month = jul,
year = {2018},
issn = {0360-0300},
pages = {79:1–79:35},
articleno = {79},
numpages = {35}}

@ARTICLE{CPSTestbedSurvey-16,
author={M. H. Cintuglu and O. A. Mohammed and K. Akkaya and A. S. Uluagac},
journal={IEEE Communications Surveys Tutorials},
title={A Survey on Smart Grid Cyber-Physical System Testbeds},
year={2017},
volume={19},
number={1},
pages={446-464},
doi={http://10.1109/COMST.2016.2627399},
ISSN={1553-877X},
month={1st quarter},}

@ARTICLE{AdertisementSurvey-16,
author={G. Chen and J. H. Cox and A. S. Uluagac and J. A. Copeland}, journal={IEEE Communications Surveys Tutorials},
title={In-Depth Survey of Digital Advertising Technologies},
year={2016},
volume={18},
number={3},
pages={2124-2148},
doi={http://10.1109/COMST.2016.2519912},
ISSN={1553-877X},
month={3rd quarter},}

@ARTICLE{UAV-Mag-2017,
author={H. Menouar and I. Guvenc and K. Akkaya and A. S. Uluagac and A. Kadri and A. Tuncer},
journal={IEEE Communications Magazine},
title={UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges},
year={2017},
volume={55},
number={3},
pages={22-28},
doi={http://10.1109/MCOM.2017.1600238CM},
ISSN={0163-6804},
month={March},}

@article{ProvizElsevier-16,
author={Shruthi Ravichandran and Ramalingam K. Chandrasekar and A. Selcuk Uluagac and Raheem Beyah},
title={A simple visualization and programming framework for wireless sensor networks: PROVIZ},
journal={Elsevier Ad Hoc Networks Journal },
volume={53},
number={},
pages={1 – 16},
year={2016},
issn={1570-8705},
doi={http://dx.doi.org/10.1016/j.adhoc.2016.06.015},
} %Received 5 January 2016, Revised 19 May 2016, Accepted 27 June 2016, Available online 24 August 2016

@article{Tonyali:2018:privacy,
title = {Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems},
journal = {Future Generation Computer Systems},
volume = {78},
pages = {547-557},
year = {2018},
issn = {0167-739X},
doi = {https://doi.org/10.1016/j.future.2017.04.031},
url = {https://www.sciencedirect.com/science/article/pii/S0167739X17306945},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro and A. Selcuk Uluagac and Mehrdad Nojoumian}
}

@ARTICLE{GTID-Journal-15,
author={S. V. Radhakrishnan and A. S. Uluagac and R. Beyah},
journal={IEEE Transactions on Dependable and Secure Computing},
title={GTID: A Technique for Physical Device and Device Type Fingerprinting},
year={2015},
volume={12},
number={5},
pages={519-532},
doi={http://10.1109/TDSC.2014.2369033},
ISSN={1545-5971},
month={Sept},}

@article{ShoulingJi-ACMTonS13,
author = {Ji, Shouling and He, Jing (Selena) and Uluagac, A. Selcuk and Beyah, Raheem and Li, Yingshu},
title = {Cell-based snapshot and continuous data collection in wireless sensor networks},
journal = {ACM Transactions on Sensor Networks},
issue_date = {July 2013},
volume = {9},
number = {4},
month = jul,
year = {2013},
issn = {1550-4859},
pages = {47:1–47:29},
articleno = {47},
numpages = {29},
doi = {10.1145/2489253.2489264},
acmid = {2489264},
publisher = {ACM},
address = {New York, NY, USA},
}

@article{ShoulingJi-Convergecast-Springer-13,
Author = {Ji, Shouling and Uluagac, A. Selcuk and Beyah, Raheem and Cai, Zhipeng},
Journal = {Springer Journal of Combinatorial Optimization},
volume = {26},
number = {1},
Pages = {161-177},
month = jul,
year = {2013},
Publisher = {Springer},
Title = {Practical unicast and convergecast scheduling schemes for cognitive radio networks},
doi= {http://dx.doi.org/10.1007/s10878-011-9446-7},
}

@ARTICLE{Sobas-TPDS-13,
author={A. Selcuk Uluagac and R. A. Beyah and J. A. Copeland},
journal={IEEE Transactions on Parallel and Distributed Systems},
title={Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks},
year={2013},
volume={24},
number={4},
pages={803-813},
doi={10.1109/TPDS.2012.170},
ISSN={1045-9219},
month={April},}

@ARTICLE{NetsecLab-ToE-11,
author={C. P. Lee and A. S. Uluagac and K. D. Fairbanks and J. A. Copeland},
journal={IEEE Transactions on Education},
title={The Design of NetSecLab: A Small Competition-Based Network Security Lab},
year={2011},
volume={54},
number={1},
pages={149-155},
doi={10.1109/TE.2010.2048215},
ISSN={0018-9359},
month={Feb},
}

@ARTICLE{Vebek-TMC-10,
author={A. S. Uluagac and R. A. Beyah and Y. Li and J. A. Copeland},
journal={IEEE Transactions on Mobile Computing},
title={VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks},
year={2010},
volume={9},
number={7},
pages={994-1007},
doi={10.1109/TMC.2010.51},
ISSN={1536-1233},
month={July},}

@incollection{BookChapter-WirelessICS-16,
author = {A. Selcuk Uluagac and K Akkaya and Apurva Mohan and H Cintuglu and Tarek Youssef and Osama Mohammed},
title = {Wireless Infrastructure in Industrial Control Systems},
journal = {Book Chapter in Cyber-security of SCADA and Other Industrial Control Systems},
issue_date = {2016},
editor={Ed Colbert and Alex Kott},
volume = {66},
number = {},
month = {September},
year = {2016},
issn = {978-3-319-32125-7},
pages = {29-49},
publisher = {Springer},
}

@incollection{BookChapter-Nico-16,
author = {Nico Saputro and A Yurekli and K Akkaya and A. Selcuk Uluagac},
title = {Privacy-preservation for IoT in Smart Buildings},
journal = {Book Chapter in Security and Privacy in Internet of Things (IoT): Models, Algorithms, and Implementations},
issue_date = {2016},
editor={Fie Hu},
volume = {66},
number = {},
month = {April},
year = {2016},
issn = {9781498723183},
pages = {135-166},
publisher = {CRC Press},
doi={http://dx.doi.org/10.1201/b19516-10},
}

@incollection{BookChapter-SDNforSmartGrid-16,
author = {K Akkaya and A. Selcuk Uluagac and A Aydeger and Apurva Mohan},
title = {Secure Software-Defined Networking Architectures for the Smart Grid},
journal = {Book Chapter in Smart Grid: Networking, Data Management and Business Models},
issue_date = {2016},
editor={Hussein Mouftah and Melike Erol Kantarci},
volume = {66},
number = {},
month = {April},
year = {2016},
issn = {9781498719704},
pages = {53-70},
publisher = {CRC Press},
doi={http://dx.doi.org/10.1201/b19664-12},
}

@INPROCEEDINGS{CengizICC18,
author={C. Kaygusuz and L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2018 IEEE International Conference on Communications (ICC)},
title={Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques},
year={2018},
DAYS=20,
volume={},
number={},
pages={1-6},
ADDRESS=”Kansas City, USA”,
doi={10.1109/ICC.2018.8423022},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{AmitAbbasSmartLighting-18,
author={A. K. Sikder and A. Acar and H. Aksu and A. S. Uluagac and K. Akkaya and M. Conti},
booktitle={2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)},
title={IoT-enabled smart lighting systems for smart cities},
year={2018},
volume={},
number={},
pages={639-645},
doi={10.1109/CCWC.2018.8301744},
ISSN={},
month={Jan},}

@INPROCEEDINGS{Ayde1801:Assessing,
AUTHOR=”A Aydeger and Nico Saputro and K Akkaya and Selcuk Uluagac”,
TITLE=”Assessing the Overhead of Authentication during {SDN-Enabled} Restoration
of Smart Grid Inter-substation Communications”,
BOOKTITLE=”2018 15th IEEE Annual Consumer Communications \& Networking Conference
(CCNC) (CCNC 2018)”,
pages={1-6},
doi={10.1109/CCNC.2018.8319206},
ISSN={2331-9860},
ADDRESS=”Las Vegas, USA”,
DAYS=12,
MONTH=jan,
YEAR=2018,
}

@inproceedings {leo-berkay-Usenix18,
author = {Z. Berkay Celik and Leonardo Babun and Amit Kumar Sikder and Hidayet Aksu and Gang Tan and Patrick McDaniel and A. Selcuk Uluagac},
title = {Sensitive Information Tracking in Commodity IoT},
booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
year = {2018},
address = {Baltimore, MD},
}

@inproceedings{6thSenseAmitUsenix17,
author = {Amit Kumar Sikder and Hidayet Aksu and A. Selcuk Uluagac},
title = {6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices},
booktitle = {Proc. of the 26th {USENIX} Security Symposium},
year = {2017},
address = {Vancouver, BC},
isbn = {978-1-931971-40-9},
pages = {397–414},
}

@inproceedings{abbas2017PAC,
author = {Abbas Acar and Z. Berkay Celik and Hidayet Aksu and A. Selcuk Uluagac and Patrick McDaniel},
title = {Achieving Secure and Differentially Private Computations in Multiparty Settings},
booktitle={2017 IEEE Symposium on Privacy-Aware Computing (PAC)},
year={2017},
organization={IEEE},
pages={49-59},
doi={10.1109/PAC.2017.12},
address = {D.C., USA}
month={Aug},
}

@inproceedings{Cybergrenade17,
author = {Anurag Akkiraju and David Gabay and Burak Yesilyurt and Hidayet Aksu and A. Selcuk Uluagac},
title = {Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers},
booktitle={4th National Workshop for REU Research in Networking and Systems, 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)},
year={2017},
pages={580-584},
address = {Orlando, FL, USA},
organization={IEEE},
month={October},
doi={10.1109/MASS.2017.95},
ISSN={2155-6814},
}

@INPROCEEDINGS{leoICC18,
author={L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2017 IEEE International Conference on Communications (ICC)},
title={Identifying counterfeit smart grid devices: A lightweight system level framework},
year={2017},
volume={},
number={},
pages={1-6},
address = {Paris, France},
doi={10.1109/ICC.2017.7996877},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{EdwinIWCMCDrone2016,
author={Edwin Vattapparamban and I Guvenc and A Yurekli and K Akkaya and A. Selcuk Uluagac},
booktitle={2016 International Wireless Communications and Mobile Computing Conference (IWCMC)},
title={Drones for smart cities: Issues in cybersecurity, privacy, and public safety},
year={2016},
volume={},
number={},
pages={216-221},
address = {Cyprus},
doi={10.1109/IWCMC.2016.7577060},
ISSN={2376-6506},
month={Sept},}

@INPROCEEDINGS{AbdullahSDN-ICC16,
author={A Aydeger and K Akkaya and M. H Cintuglu and A. Selcuk Uluagac and Osama Mohammed},
booktitle={2016 IEEE International Conference on Communications (ICC)},
title={Software defined networking for resilient communications in Smart Grid active distribution networks},
year={2016},
volume={},
number={},
pages={1-6},
address = {Malaysia},
doi={10.1109/ICC.2016.7511049},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{MACA-Liu-InfocomWS14,
author={W. Liu and A. S. Uluagac and R. Beyah},
booktitle={Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on},
title={MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data},
year={2014},
pages={518-523},
doi={10.1109/INFCOMW.2014.6849285},
month={April},}

@MISC{CSL-Lab,
author = {{Cyber Physical Systems Security Lab (CSL)}},
title = {{Electrical and Computer Engineering Department}},
url = {http://www.csl.fiu.edu}
}

@Inbook{WSN-Survey-WACA08,
author=”Uluagac, A. Selcuk
and Lee, Christopher P.
and Beyah, Raheem A.
and Copeland, John A.”,
editor=”Li, Yingshu
and Huynh, Dung T.
and Das, Sajal K.
and Du, Ding-Zhu”,
title=”Designing Secure Protocols for Wireless Sensor Networks”,
bookTitle=”Wireless Algorithms, Systems, and Applications: Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings”,
year=”2008″,
publisher=”Springer Berlin Heidelberg”,
address=”Berlin, Heidelberg”,
pages=”503–514″,
isbn=”978-3-540-88582-5″,
doi=”10.1007/978-3-540-88582-5_47″,
url=”http://dx.doi.org/10.1007/978-3-540-88582-5_47″
}

@INPROCEEDINGS{M-Core-IEEEmass12,
author={M. Valero and S. Uluagac and S. Venkatachalam and K. C. Ramalingam and R. Beyah},
booktitle={2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)},
title={The Monitoring Core: A framework for sensor security application development},
year={2012},
pages={263-271},
doi={10.1109/MASS.2012.6502525},
ISSN={2155-6806},
month={Oct},}

@INPROCEEDINGS{Albert-InfocomWS14,
author={A. Brzeczko and A. S. Uluagac and R. Beyah and J. Copeland},
booktitle={Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on},
title={Active deception model for securing cloud infrastructure},
year={2014},
pages={535-540},
doi={10.1109/INFCOMW.2014.6849288},
month={April},}

@INPROCEEDINGS{Sakthi-CovertChannel,
author={S. V. Radhakrishnan and A. Selcuk Uluagac and R. Beyah},
booktitle={2013 IEEE Global Communications Conference (GLOBECOM)},
title={Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards},
year={2013},
pages={722-728},
doi={10.1109/GLOCOM.2013.6831158},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{Disec-Infocom-12,
author={M. Valero and Sang Shin Jung and A. Selcuk Uluagac and Y. Li and R. Beyah},
booktitle={INFOCOM, 2012 Proceedings IEEE},
title={Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
year={2012},
pages={585-593},
doi={10.1109/INFCOM.2012.6195801},
ISSN={0743-166X},
month={March},}

@INPROCEEDINGS{Tick-Globecom10,
author={{A. S. Uluagac and R. A. Beyah and J. A. Copeland}},
booktitle={Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE},
title={Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks},
year={2010},
pages={1-6},
doi={10.1109/GLOCOM.2010.5683787},
ISSN={1930-529X},
month={Dec},}

@MISC{PersonalURLpubs,
url = {{http://web.eng.fiu.edu/selcuk/pubs.html}},
note = {{Retrieved November 1, 2016}}
}

@INPROCEEDINGS{OpenSourceLabs-ASEE09,
author={A. Selcuk Uluagac, T. Fallon, W. Thain, and J. A. Copeland},
booktitle={Proceedings of the American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
title={Development of Undergraduate Network Security Labs with Open Source Tools},
year={2009},
month={Jun},
address = {Austin, Tx},}

@inproceedings{Uluagac-C12-MCore-MASS-12,
Author = {Marco Valero, A. Selcuk Uluagac, Venkatachalam S., Ramalingam K. C., and Raheem Beyah},
Booktitle = {Mobile Ad-hoc and Sensor Systems (MASS) Conference, 2012 IEEE International},
Month = {October},
Title = {The Monitoring Core (M-Core): A Modular Architecture for Rapid Sensor App Development},
Year = {2012},
}

@inproceedings{Uluagac-C08-DiSec-Infocom-12,
Author = {Valero, M. and Sang Shin Jung and Uluagac, A.Selcuk and Yingshu Li and Beyah, R.},
Booktitle = {INFOCOM, 2012 Proceedings IEEE},
Month = {march},
Pages = {585 -593},
Title = {Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
Year = {2012},
}

@inproceedings{Uluagac-C10-3DSecVulnTool-LCN-12,
Author = {Troy Nunnally, A. Selcuk Uluagac,and R. A. Beyah,},
Booktitle = {Local Computer Networks (LCN), IEEE International Conference on},
Month = {Oct.},
Title = {DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for Network Security},
Year = {2012},
}

@INPROCEEDINGS{Brze1404:Active,
AUTHOR=”Albert Brzeczko, Jr and A. Selcuk Uluagac and Raheem Beyah and John A.
Copeland”,
TITLE=”Active Deception Model for Securing Cloud Infrastructure”,
BOOKTITLE=”2014 IEEE INFOCOM Workshops: 2014 IEEE INFOCOM Workshop on Security and
Privacy in Big Data (INFOCOM’2014 Workshop on Security and Privacy in Big
Data)”,
ADDRESS=”Toronto, Canada”,
DAYS=27,
MONTH=apr,
YEAR=2014,
}

@INPROCEEDINGS{Ulua1404:MACA,
AUTHOR=”Wenyi Liu and A. Selcuk Uluagac and Raheem Beyah”,
TITLE=”{MACA:} A {Privacy-Preserving} Multi-factor Cloud Authentication System
Utilizing Big Data”,
BOOKTITLE=”2014 IEEE INFOCOM Workshops: 2014 IEEE INFOCOM Workshop on Security and
Privacy in Big Data (INFOCOM’2014 Workshop on Security and Privacy in Big
Data)”,
ADDRESS=”Toronto, Canada”,
DAYS=27,
MONTH=apr,
YEAR=2014,
}

@inproceedings{Uluagac-C06-ASPL-ICC-10,
Author = {Uluagac, A.Selcuk and Beyah, R.A. and Kane, R. and Joshi, S. and Copeland, J.A.},
Booktitle = {Communications (ICC), 2010 IEEE International Conference on},
Month = {may},
Pages = {1 -6},
Title = {Analysis of Varying AS Path Lengths from the Edge of the Network},
Year = {2010},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/ICC.2010.5502709}}

@INPROCEEDINGS{Sakthi-Covert-Channel,
AUTHOR=”Sakthi Vignesh Radhakrishnan and Selcuk Uluagac and Raheem Beyah”,
TITLE=”Realizing an 802.11-based Covert Timing Channel Using {Off-The-Shelf}
Wireless Cards”,
BOOKTITLE=”Globecom 2013 – Communication and Information System Security Symposium
(GC13 CISS)”,
ADDRESS=”Atlanta, USA”,
DAYS=9,
MONTH=dec,
YEAR=2013,
}

@INPROCEEDINGS{Uluagac:CPS-Security-CNS14,
AUTHOR=”A. Selcuk Uluagac and Venkatachalam Subramanian and Raheem Beyah”,
TITLE=”Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call”,
BOOKTITLE=”2014 IEEE Conference on Communications and Network Security (CNS) (IEEE CNS
2014)”,
ADDRESS=”San Francisco, USA”,
DAYS=29,
MONTH=oct,
YEAR=2014,
}

@inproceedings{Uluagac-C08-DiSec-Infocom-12,
Author = {Valero, M. and Sang Shin Jung and Uluagac, A.Selcuk and Yingshu Li and Beyah, R.},
Booktitle = {INFOCOM, 2012 Proceedings IEEE},
Month = {march},
Pages = {585 -593},
Title = {Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
Year = {2012},
}

@inproceedings{Uluagac-C03-DSPLearning-ASEE-08,
Address = {Pittsburgh, PA},
Author = {Uluagac, A. Selcuk and Williams, D.},
Booktitle = {American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
Month = {June},
Title = {Building Hardware-based Low-Cost Experimental DSP Learning Modules},
Year = {2008}}

@inproceedings{Uluagac-C02-Design-ASEE-07,
Address = {Hawaii},
Author = {Butera, R and Clark, M. and Deck, A.and Torba, M.and Trahan, S. and Uluagac, Selcuk and Williams, D.},
Booktitle = {American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
Month = {June},
Title = {Cooperative University/Industry Development of a Freshman “Introduction to ECE Design” Course},
Year = {2007}}

@inproceedings{Uluagac-C12-MCore-MASS-12,
Author = {Marco Valero, A. Selcuk Uluagac, Venkatachalam S., Ramalingam K. C., and Raheem Beyah},
Booktitle = {Mobile Ad-hoc and Sensor Systems (MASS) Conference, 2012 IEEE International},
Month = {October},
Title = {The Monitoring Core (M-Core): A Modular Architecture for Rapid Sensor App Development},
Year = {2012},
}

@inproceedings{nunnally2013navsec,
title={NAVSEC: a recommender system for 3D network security visualizations},
author={Nunnally, Troy and Abdullah, Kulsoom and Uluagac, A Selcuk and Copeland, John A and Beyah, Raheem},
booktitle={Proceedings of the Tenth Workshop on Visualization for Cyber Security},
pages={41–48},
year={2013},
organization={ACM}
}

@inproceedings{Uluagac-C11-NDR-Sec-LCN-12,
Author = {Aaron Goldman, A. Selcuk Uluagac, R. A. Beyah, and J. A. Copeland,},
Booktitle = {Local Computer Networks (LCN), IEEE International Conference on},
Month = {Oct.},
Title = {Plugging the Leaks without Unplugging your Network in the Midst of Disaster},
Year = {2012},
}

@incollection{Uluagac-C01-IPMulticast-Springer-03,
Author = {Uluagac, A. Selcuk and Peha, Jon},
Booktitle = {Group Communications and Charges. Technology and Business Models},
Keyword = {Computer Science},
Pages = {168-180},
Publisher = {Springer Berlin / Heidelberg},
Series = {Lecture Notes in Computer Science},
Title = {IP Multicast over Cable TV Networks},
Volume = {2816},
Year = {2003},
Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-39405-1_15}}

@inproceedings{Uluagac-C05-OpenSource-ASEE-09,
Address = {Austin, TX},
Author = {Uluagac, A. Selcuk and Fallon, T. and Thain, W. and Copeland, John A.},
Booktitle = {American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
Month = {June},
Title = {Development of Undergraduate Network Security Labs with Open Source Tools},
Year = {2009}}

@INPROCEEDINGS{Nunn1306:P3D,
AUTHOR=”Troy Nunnally and Penyen Chi and Kulsoom Abdullah and Selcuk Uluagac and
John A. Copeland and Raheem Beyah”,
TITLE=”{P3D:} A Parallel {3D} Coordinate Visualization for Advanced Network Scans”,
BOOKTITLE=”IEEE ICC 2013 – Communication and Information Systems Security Symposium
(ICC’13 CISS)”,
ADDRESS=”Budapest, Hungary”,
PAGES=”2037-2042″,
DAYS=9,
MONTH=jun,
YEAR=2013,
}

@INPROCEEDINGS{K.Ch1310:PROVIZ,
AUTHOR=”Ramalingam {K. Chandrasekar} and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{PROVIZ:} An Integrated Visualization and Programming Framework for {WSNs}”,
BOOKTITLE=”Eight IEEE Workshop on Practical Issues in Building Sensor Network
Applications 2013 (IEEE SenseApp 2013)”,
ADDRESS=”Sydney, Australia”,
PAGES=”146-149″,
DAYS=21,
MONTH=oct,
YEAR=2013,
}

@INPROCEEDINGS{Lia-Smatch-Poster:S,
AUTHOR=”Xiaojing Liao and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{S-Match:} An Efficient Privacy-preserving Profile Matching Scheme”,
BOOKTITLE=”IEEE Conference on Communications and Network Security 2013 – Poster
Session (IEEE CNS 2013 – Poster Session)”,
ADDRESS=”Washington, USA”,
PAGES=”205-206″,
DAYS=14,
MONTH=oct,
YEAR=2013,
}

@INPROCEEDINGS{Venkat-ICC-13:Examining,
AUTHOR=”Venkatachalam Subramanian and Selcuk Uluagac and Raheem Beyah and Hasan Cam”,
TITLE=”Examining the Characteristics and Implications of Sensor Side Channels”,
BOOKTITLE=”IEEE ICC 2013 – Communication and Information Systems Security Symposium
(ICC’13 CISS)”,
ADDRESS=”Budapest, Hungary”,
PAGES=”2185-2190″,
DAYS=9,
MONTH=jun,
YEAR=2013,
}

@inproceedings{Uluagac-C09-Simage-Globecom-12,
Author = {Ramalingam K. C., Venkatachalam Subramanian, A.Selcuk Uluagac, and R. A. Beyah},
Booktitle = {Global Telecommunications Conference (GLOBECOM), 2012 IEEE},
Month = {dec.},
Title = {Secure Distribution of Images for Wireless Sensor Networks},
Year = {2012},
}

@inproceedings{Uluagac-C07-Tick-Globecom-10,
Author = {Uluagac, A.Selcuk and Beyah, Raheem A. and Copeland, John A.},
Booktitle = {Global Telecommunications Conference (GLOBECOM), 2010 IEEE},
Month = {dec.},
Pages = {1 -6},
Title = {Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks},
Year = {2010},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/GLOCOM.2010.5683787}}

@INPROCEEDINGS{Radh1310:Passive,
AUTHOR=”Selcuk Uluagac and Sakthi Vignesh Radhakrishnan and Cherita L Corbett and
Antony Baca and Raheem Beyah”,
TITLE=”A Passive Technique for Fingerprinting Wireless Devices with Wired-side
Observations”,
BOOKTITLE=”2013 IEEE Conference on Communications and Network Security (CNS) (IEEE CNS
2013)”,
ADDRESS=”Washington, USA”,
PAGES=”471-479″,
DAYS=14,
MONTH=oct,
YEAR=2013,
}

@incollection{Uluagac-C04-WSNSurvey-WASA-08,
Author = {Uluagac, A. Selcuk and Lee, Christopher and Beyah, Raheem and Copeland, John},
Booktitle = {Wireless Algorithms, Systems, and Applications},
Editor = {Li, Yingshu and Huynh, Dung and Das, Sajal and Du, Ding-Zhu},
Pages = {503-514},
Publisher = {Springer Berlin / Heidelberg},
Series = {Lecture Notes in Computer Science},
Title = {Designing Secure Protocols for Wireless Sensor Networks},
Volume = {5258},
Year = {2008},
Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-88582-5_47}}

@INPROCEEDINGS{6997526,
author={A. S. Uluagac and W. Liu and R. Beyah},
booktitle={2014 IEEE Conference on Communications and Network Security},
title={A multi-factor re-authentication framework with user privacy},
year={2014},
volume={},
number={},
pages={504-505},
doi={10.1109/CNS.2014.6997526},
ISSN={},
month={Oct},}

@INPROCEEDINGS{8424658,
author={A. Acar and H. Aksu and A. S. Uluagac and K. Akkaya},
booktitle={2018 IEEE Security and Privacy Workshops (SPW)},
title={WACA: Wearable-Assisted Continuous Authentication},
year={2018},
volume={},
number={},
pages={264-269},
doi={10.1109/SPW.2018.00042},
ISSN={},
month={May},}

@INPROCEEDINGS{7860522,
author={L. Babun and H. Aksu and A. Selcuk Uluagac},
booktitle={2016 IEEE Conference on Communications and Network Security (CNS)},
title={A framework for counterfeit smart grid device detection},
year={2016},
volume={},
number={},
pages={382-383},
keywords={IEC standards;power system protection;power system security;risk management;smart power grids;untrusted counterfeit smart grid device detection;two-way communication reliability;security risk;cyber threat;smart grid component protection;smart-grid GOOSE message;IEC-61850 communication protocol;Smart grids;Correlation;Security;Libraries;Performance evaluation;Malware;Reliability;Smart Grid;counterfeit devices;cyber security;IEC-61850},
doi={10.1109/CNS.2016.7860522},
ISSN={},
month={Oct},}

@INPROCEEDINGS{7387401,
author={A. Aydeger and K. Akkaya and A. S. Uluagac},
booktitle={2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN)},
title={SDN-based resilience for smart grid communications},
year={2015},
volume={},
number={},
pages={31-33},
keywords={smart power grids;software defined networking;SDN-based resilience;smart grid communications;SDN-based technologies;smart grid SCADA;distribution networks;distribution substations;Open Daylight SDN controller;network simulator;ns-3;Mininet;wireless interface;Smart grids;Wireless communication;Switches;Routing protocols;Conferences;Communication system security},
doi={10.1109/NFV-SDN.2015.7387401},
ISSN={},
month={Nov},}

@INPROCEEDINGS{Xiaojing-Poster-CNS14,
author={Xiaojing Liao and S. Uluagac and R. A. Beyah},
booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
title={S-Match: An efficient privacy-preserving profile matching scheme},
year={2013},
volume={},
number={},
pages={377-378},
doi={10.1109/CNS.2013.6682736},
ISSN={},
month={Oct},}

@INPROCEEDINGS{KyleCCNC2016,
author={K. Denney and A. S. Uluagac and K. Akkaya and S. Bhansali},
booktitle={2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC)},
title={A novel storage covert channel on wearable devices using status bar notifications},
year={2016},
volume={},
number={},
pages={845-848},
doi={10.1109/CCNC.2016.7444898},
ISSN={2331-9860},
month={Jan},}

@INPROCEEDINGS{AlbertInfocomWS-14,
author={A. Brzeczko and A. S. Uluagac and R. Beyah and J. Copeland},
booktitle={2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
title={Active deception model for securing cloud infrastructure},
year={2014},
volume={},
number={},
pages={535-540},
doi={10.1109/INFCOMW.2014.6849288},
ISSN={},
month={April},}

@INPROCEEDINGS{P3D-TroyICC-13,
author={T. Nunnally and P. Chi and K. Abdullah and A. S. Uluagac and J. A. Copeland and R. Beyah},
booktitle={2013 IEEE International Conference on Communications (ICC)},
title={P3D: A parallel 3D coordinate visualization for advanced network scans},
year={2013},
volume={},
number={},
pages={2052-2057},
doi={10.1109/ICC.2013.6654828},
ISSN={1550-3607},
month={June},}

@INPROCEEDINGS{aydegerSDNEnabled,
author={A. Aydeger and N. Saputro and K. Akkaya and S. Uluagac},
booktitle={2018 15th IEEE Annual Consumer Communications Networking Conference (CCNC)},
title={Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications},
year={2018},
volume={},
number={},
pages={1-6},
doi={10.1109/CCNC.2018.8319206},
ISSN={2331-9860},
month={Jan},}

@Inbook{Denney:2018:AnAndroid,
author=”Denney, Kyle
and Uluagac, A. Selcuk
and Aksu, Hidayet
and Akkaya, Kemal”,
editor=”Conti, Mauro
and Somani, Gaurav
and Poovendran, Radha”,
title=”An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications”,
bookTitle=”Versatile Cybersecurity”,
year=”2018″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”1–17″,
isbn=”978-3-319-97643-3″,
doi=”10.1007/978-3-319-97643-3_1″,
url=”https://doi.org/10.1007/978-3-319-97643-3_1″
}

@INPROCEEDINGS{8423022,
author={C. Kaygusuz and L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2018 IEEE International Conference on Communications (ICC)},
title={Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques},
year={2018},
volume={},
number={},
pages={1-6},
keywords={Smart grids;Libraries;Object recognition;Smart devices;Sensors;Machine learning},
doi={10.1109/ICC.2018.8423022},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{Xiaojing-DSN14,
author={X. Liao and S. Uluagac and R. A. Beyah},
booktitle={2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks},
title={S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services},
year={2014},
volume={},
number={},
pages={287-298},
doi={10.1109/DSN.2014.37},
ISSN={1530-0889},
month={June},}

@INPROCEEDINGS{TickGlobecom2010,
author={A. S. Uluagac and R. A. Beyah and J. A. Copeland},
booktitle={2010 IEEE Global Telecommunications Conference GLOBECOM 2010},
title={Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks},
year={2010},
volume={},
number={},
pages={1-6},
doi={10.1109/GLOCOM.2010.5683787},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{8301744,
author={A. K. Sikder and A. Acar and H. Aksu and A. S. Uluagac and K. Akkaya and M. Conti},
booktitle={2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)},
title={IoT-enabled smart lighting systems for smart cities},
year={2018},
volume={},
number={},
pages={639-645},
keywords={Internet of Things;lighting;protocols;smart cities;town and country planning;IoT-enabled smart lighting systems;urban services;information and communication technologies;lighting management system;IoT-enabled communication protocols;smart city environment;SLS;Lighting;Protocols;Smart cities;Intelligent sensors;Wireless communication;Smart Lighting;Internet of Things;Smart City},
doi={10.1109/CCWC.2018.8301744},
ISSN={},
month={Jan},}

@ARTICLE{6951398,
author={S. V. Radhakrishnan and A. S. Uluagac and R. Beyah},
journal={IEEE Transactions on Dependable and Secure Computing},
title={GTID: A Technique for Physical DeviceandDevice Type Fingerprinting},
year={2015},
volume={12},
number={5},
pages={519-532},
keywords={neural nets;radio networks;statistical analysis;telecommunication security;telecommunication traffic;GTID;physical device;device type fingerprinting;wireless devices;local network;statistical techniques;network traffic;artificial neural networks;ANN;security mechanisms;Wireless communication;Clocks;Protocols;Object recognition;Communication system security;Timing;Artificial neural networks;GTID;Device Fingerprinting;Wireless Device Fingerprinting;Device Type Fingerprinting;GTID;device fingerprinting;wireless device fingerprinting;device type fingerprinting},
doi={10.1109/TDSC.2014.2369033},
ISSN={1545-5971},
month={Sept},}

@INPROCEEDINGS{AsPathLength2010ICC,
author={A. S. Uluagac and R. A. Beyah and R. Kane and S. Joshi and J. A. Copeland},
booktitle={2010 IEEE International Conference on Communications},
title={Analysis of Varying AS Path Lengths from the Edge of the Network},
year={2010},
volume={},
number={},
pages={1-6},
doi={10.1109/ICC.2010.5502709},
ISSN={1938-1883},
month={May},}

@ARTICLE{5438995,
author={A. S. Uluagac and R. A. Beyah and Y. Li and J. A. Copeland},
journal={IEEE Transactions on Mobile Computing},
title={VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks},
year={2010},
volume={9},
number={7},
pages={994-1007},
doi={10.1109/TMC.2010.51},
ISSN={1536-1233},
month={July},}

@ARTICLE{8299447,
author={H. Aksu and A. S. Uluagac and E. Bentley},
journal={IEEE Transactions on Sustainable Computing},
title={Identification of Wearable Devices with Bluetooth},
year={2018},
volume={},
number={},
pages={1-1},
doi={10.1109/TSUSC.2018.2808455},
ISSN={2377-3782},
month={},}

@INPROCEEDINGS{SensoryChannelThreats-CNS-2014,
author={A. S. Uluagac and V. Subramanian and R. Beyah},
booktitle={2014 IEEE Conference on Communications and Network Security},
title={Sensory channel threats to Cyber Physical Systems: A wake-up call},
year={2014},
volume={},
number={},
pages={301-309},
doi={10.1109/CNS.2014.6997498},
ISSN={},
month={Oct},}

@INPROCEEDINGS{UluagacCNS13,
author={A. S. Uluagac and S. V. Radhakrishnan and C. Corbett and A. Baca and R. Beyah},
booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
title={A passive technique for fingerprinting wireless devices with Wired-side Observations},
year={2013},
volume={},
number={},
pages={305-313},
doi={10.1109/CNS.2013.6682720},
ISSN={},
month={Oct},}

@INPROCEEDINGS{SametCCNC2016,
author={S. Tonyali and K. Akkaya and N. Saputro and A. S. Uluagac},
booktitle={2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC)},
title={A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks},
year={2016},
volume={},
number={},
pages={550-555},
doi={10.1109/CCNC.2016.7444839},
ISSN={2331-9860},
month={Jan},}

@INPROCEEDINGS{8108803,
author={A. Akkiraju and D. Gabay and H. B. Yesilyurt and H. Aksu and S. Uluagac},
booktitle={2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)},
title={Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers},
year={2017},
volume={},
number={},
pages={580-584},
keywords={microcomputers;program testing;security of data;automated exploitation;local network machines;defensive cybersecurity framework;single local network;exploitation tool-kits;single-board computer;SBC;penetration testing tools;Cybergrenade framework;Tools;XML;Linux;Computers;Automation;Security;Automated Penetration Testing;Local Machines;OpenVAS;Metasploit;Nmap;Exploitation;Single Board Computers},
doi={10.1109/MASS.2017.95},
ISSN={2155-6814},
month={Oct},}

@INPROCEEDINGS{DiSec-Infocom12,
author={M. Valero and Sang Shin Jung and A. Selcuk Uluagac and Y. Li and R. Beyah},
booktitle={2012 Proceedings IEEE INFOCOM},
title={Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
year={2012},
volume={},
number={},
pages={585-593},
doi={10.1109/INFCOM.2012.6195801},
ISSN={0743-166X},
month={March},}

@INPROCEEDINGS{WenyiMaca-InfocomWS14,
author={W. Liu and A. S. Uluagac and R. Beyah},
booktitle={2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
title={MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data},
year={2014},
volume={},
number={},
pages={518-523},
doi={10.1109/INFCOMW.2014.6849285},
ISSN={},
month={April},}

@INPROCEEDINGS{Troy-Intersec-ICC-15,
author={T. Nunnally and A. S. Uluagac and R. Beyah},
booktitle={2015 IEEE International Conference on Communications (ICC)},
title={InterSec: An interaction system for network security applications},
year={2015},
volume={},
number={},
pages={7132-7138},
doi={10.1109/ICC.2015.7249464},
ISSN={1550-3607},
month={June},}

@INPROCEEDINGS{Marco-MCore-MASS12,
author={M. Valero and S. Uluagac and S. Venkatachalam and K. C. Ramalingam and R. Beyah},
booktitle={2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)},
title={The Monitoring Core: A framework for sensor security application development},
year={2012},
volume={},
number={},
pages={263-271},
doi={10.1109/MASS.2012.6502525},
ISSN={2155-6806},
month={Oct},}

@INPROCEEDINGS{Aaron-CCFS-LCN14,
author={A. D. Goldman and A. S. Uluagac and J. A. Copeland},
booktitle={39th Annual IEEE Conference on Local Computer Networks},
title={Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking},
year={2014},
volume={},
number={},
pages={142-149},
doi={10.1109/LCN.2014.6925766},
ISSN={0742-1303},
month={Sept},}

@INPROCEEDINGS{7577060,
author={E. Vattapparamban and İ. Güvenç and A. İ. Yurekli and K. Akkaya and S. Uluağaç},
booktitle={2016 International Wireless Communications and Mobile Computing Conference (IWCMC)},
title={Drones for smart cities: Issues in cybersecurity, privacy, and public safety},
year={2016},
volume={},
number={},
pages={216-221},
keywords={autonomous aerial vehicles;safety;smart cities;privacy;malicious entities;societal concerns;future smart cities;broadband wireless access;mobile hot spots;drones;public safety;cybersecurity;Drones;IEEE 802.11 Standard;FAA;Safety;Smart cities;Privacy;Drones;Internet of Things (IoT);privacy;search and rescue;security;UAVs;VPN;WiFi Pineapple},
doi={10.1109/IWCMC.2016.7577060},
ISSN={2376-6506},
month={Sept},}

@INPROCEEDINGS{Jinyoun-Globecom14,
author={J. Cho and A. S. Uluagac and J. Copeland and Y. Chang},
booktitle={2014 IEEE Global Communications Conference},
title={Efficient safety message forwarding using multi-channels in low density VANETs},
year={2014},
volume={},
number={},
pages={70-75},
doi={10.1109/GLOCOM.2014.7036786},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{Abdullah-SDN-LCNworkshop2015,
author={K. Akkaya and A. S. Uluagac and A. Aydeger},
booktitle={2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)},
title={Software defined networking for wireless local networks in Smart Grid},
year={2015},
volume={},
number={},
pages={826-831},
doi={10.1109/LCNW.2015.7365934},
ISSN={},
month={Oct},}

@ARTICLE{5454381,
author={C. P. Lee and A. S. Uluagac and K. D. Fairbanks and J. A. Copeland},
journal={IEEE Transactions on Education},
title={The Design of NetSecLab: A Small Competition-Based Network Security Lab},
year={2011},
volume={54},
number={1},
pages={149-155},
keywords={computer aided instruction;computer network security;Linux;NetSecLab;small competition-based network security lab;teach system;closed network;student-formed teams;Linux distribution system;teaching system security;Security;Linux;Generators;Computers;Materials;Education;IP networks;NetSecLab;network security;network security education;network security lab},
doi={10.1109/TE.2010.2048215},
ISSN={0018-9359},
month={Feb},}

@INPROCEEDINGS{ProvizSenseApp13,
author={R. K. Chandrasekar and A. S. Uluagac and R. Beyah},
booktitle={38th Annual IEEE Conference on Local Computer Networks – Workshops},
title={PROVIZ: An integrated visualization and programming framework for WSNs},
year={2013},
volume={},
number={},
pages={146-149},
doi={10.1109/LCNW.2013.6758511},
ISSN={},
month={Oct},}

@ARTICLE{6216359,
author={A. Selcuk Uluagac and R. A. Beyah and J. A. Copeland},
journal={IEEE Transactions on Parallel and Distributed Systems},
title={Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks},
year={2013},
volume={24},
number={4},
pages={803-813},
keywords={cryptographic protocols;filtering theory;routing protocols;synchronisation;telecommunication security;wireless sensor networks;secure source-based loose synchronization protocol;SOBAS protocol;wireless sensor networks;synchronization control messages;dynamic en-route filtering mechanism;WSN;reduced energy consumption;sensor technology;time 7.24 mus;Synchronization;Cryptography;Wireless sensor networks;Clocks;Protocols;Global Positioning System;Secure loose synchronization;secure time synchronization for wireless sensor networks;SOBAS;wireless sensor networks;sensor-based cyber-physical systems},
doi={10.1109/TPDS.2012.170},
ISSN={1045-9219},
month={April},}

@INPROCEEDINGS{7996877,
author={L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2017 IEEE International Conference on Communications (ICC)},
title={Identifying counterfeit smart grid devices: A lightweight system level framework},
year={2017},
volume={},
number={},
pages={1-6},
keywords={smart power grids;statistical analysis;smart grid devices;behavioural characteristics;statistical analysis;function call tracing techniques;configurable framework;smart grid components;smart grid communication infrastructure;counterfeit smart grid devices;lightweight system level framework;Smart grids;Monitoring;Performance evaluation;Computational modeling;Supply chains;Security;Phasor measurement units;Smart Grid;counterfeit devices;cyber security;IEC61850;system calls;function calls},
doi={10.1109/ICC.2017.7996877},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{SkypeInformationLeakage2015,
author={C. Wampler and S. Uluagac and R. Beyah},
booktitle={2015 IEEE Global Communications Conference (GLOBECOM)},
title={Information Leakage in Encrypted IP Video Traffic},
year={2015},
volume={},
number={},
pages={1-7},
doi={10.1109/GLOCOM.2015.7417767},
ISSN={},
month={Dec},}

@INPROCEEDINGS{AaronPluggingTheLeaksLCN12,
author={A. D. Goldman and A. S. Uluagac and R. Beyah and J. A. Copeland},
booktitle={37th Annual IEEE Conference on Local Computer Networks},
title={Plugging the leaks without unplugging your network in the midst of Disaster},
year={2012},
volume={},
number={},
pages={248-251},
doi={10.1109/LCN.2012.6423620},
ISSN={0742-1303},
month={Oct},}

@ARTICLE{7876852,
author={H. Menouar and I. Guvenc and K. Akkaya and A. S. Uluagac and A. Kadri and A. Tuncer},
journal={IEEE Communications Magazine},
title={UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges},
year={2017},
volume={55},
number={3},
pages={22-28},
keywords={autonomous aerial vehicles;intelligent transportation systems;mobile robots;mobility management (mobile radio);smart cities;UAV-enabled intelligent transportation systems;next-generation smart cities;ITS application domains;connected vehicles;autonomous vehicles;fully automated transportation systems;autonomous operation;communication capabilities;processing capabilities;Smart cities;Accidents;Road transportation;Law enforcement;Intelligent transportation systems;Urban areas},
doi={10.1109/MCOM.2017.1600238CM},
ISSN={0163-6804},
month={March},}

@INPROCEEDINGS{3dsvat-Troy-LCN12,
author={T. Nunnally and A. S. Uluagac and J. A. Copeland and R. Beyah},
booktitle={37th Annual IEEE Conference on Local Computer Networks},
title={3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security},
year={2012},
volume={},
number={},
pages={111-118},
doi={10.1109/LCN.2012.6423586},
ISSN={0742-1303},
month={Oct},}

@INPROCEEDINGS{SakthiCovertChannelGlobecom13,
author={S. V. Radhakrishnan and A. Selcuk Uluagac and R. Beyah},
booktitle={2013 IEEE Global Communications Conference (GLOBECOM)},
title={Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards},
year={2013},
volume={},
number={},
pages={722-728},
doi={10.1109/GLOCOM.2013.6831158},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{Simage-Globecom12,
author={K. C. Ramalingam and V. Subramanian and A. S. Uluagac and R. Beyah},
booktitle={2012 IEEE Global Communications Conference (GLOBECOM)},
title={SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks},
year={2012},
volume={},
number={},
pages={616-621},
doi={10.1109/GLOCOM.2012.6503181},
ISSN={1930-529X},
month={Dec},}

@ARTICLE{7390161,
author={G. Chen and J. H. Cox, and A. S. Uluagac and J. A. Copeland},
journal={IEEE Communications Surveys Tutorials},
title={In-Depth Survey of Digital Advertising Technologies},
year={2016},
volume={18},
number={3},
pages={2124-2148},
keywords={advertising;ecology;information technology;mobile computing;online front-ends;search engines;Web sites;digital advertising technology in-depth survey;primary revenue;information technology;free Web browser;search engine;mobile application;digital advertising ecosystem;mobile application interface;online Web site;Advertising;Mobile communication;Ecosystems;Internet;Google;Tutorials;Mobile applications;Digital advertising;mobile advertising;online advertising;monetization;networking;privacy;security;advertising networks;advertising policy},
doi={10.1109/COMST.2016.2519912},
ISSN={1553-877X},
month={thirdquarter},}

@INPROCEEDINGS{Venkat-ICC13,
author={V. Subramanian and S. Uluagac and H. Cam and R. Beyah},
booktitle={2013 IEEE International Conference on Communications (ICC)},
title={Examining the characteristics and implications of sensor side channels},
year={2013},
volume={},
number={},
pages={2205-2210},
doi={10.1109/ICC.2013.6654855},
ISSN={1550-3607},
month={June},}

@ARTICLE{8337812,
author={H. Aksu and L. Babun and M. Conti and G. Tolomei and A. S. Uluagac},
journal={IEEE Communications Magazine},
title={Advertising in the IoT Era: Vision and Challenges},
year={2018},
volume={},
number={},
pages={1-7},
keywords={Advertising;Internet;Automobiles;Smart phones;Computer architecture;Smart devices},
doi={10.1109/MCOM.2017.1700871},
ISSN={0163-6804},
month={},}

@INPROCEEDINGS{7511049,
author={A. Aydeger and K. Akkaya and M. H. Cintuglu and A. S. Uluagac and O. Mohammed},
booktitle={2016 IEEE International Conference on Communications (ICC)},
title={Software defined networking for resilient communications in Smart Grid active distribution networks},
year={2016},
volume={},
number={},
pages={1-6},
keywords={distribution networks;smart power grids;software defined networking;substations;software defined networking;resilient communication;smart grid active distribution network;SDN technology;smart grid communication infrastructure;heterogenous device;real-time information;active distribution substation;wireless communication link;SDN controller;fine-grained network metric;Mininet-based testing framework;ns-3 network simulator;Substations;Smart grids;IEC Standards;Wireless communication;Protocols;Quality of service;Control systems;SDN;wireless networks;smart grid;substations;resilience},
doi={10.1109/ICC.2016.7511049},
ISSN={1938-1883},
month={May},}

@ARTICLE{7740849,
author={M. H. Cintuglu and O. A. Mohammed and K. Akkaya and A. S. Uluagac},
journal={IEEE Communications Surveys Tutorials},
title={A Survey on Smart Grid Cyber-Physical System Testbeds},
year={2017},
volume={19},
number={1},
pages={446-464},
keywords={cyber-physical systems;power engineering computing;smart power grids;smart grid cyber-physical system testbeds;smart grid interdisciplinary structure;Smart grids;Phasor measurement units;Cyber-physical systems;Security;Microgrids;Taxonomy;Cyber-physical systems;testbed;smart grid},
doi={10.1109/COMST.2016.2627399},
ISSN={1553-877X},
month={Firstquarter},}

@INPROCEEDINGS{7860527,
author={S. Michaels and K. Akkaya and A. Selcuk Uluagac},
booktitle={2016 IEEE Conference on Communications and Network Security (CNS)},
title={Inducing data loss in Zigbee networks via join/association handshake spoofing},
year={2016},
volume={},
number={},
pages={401-405},
keywords={computer network security;cryptographic protocols;Internet of Things;wireless mesh networks;Zigbee;data loss;Zigbee networks;join-association handshake spoofing;IEEE 802.15.4-based specification;low-power wireless mesh networks;protocol;Internet-of-Things;IoT;network coordinator;unencrypted joining device;denial-of-service attack;rogue device;resource limitations;Zigbee devices;permanent storage;challenge-response based authentication;ZigBee;Cryptography;Computer crime;Authentication;Conferences;Protocols},
doi={10.1109/CNS.2016.7860527},
ISSN={},
month={Oct},}

@INPROCEEDINGS{8166615,
author={A. Acar and Z. B. Celik and H. Aksu and A. S. Uluagac and P. McDaniel},
booktitle={2017 IEEE Symposium on Privacy-Aware Computing (PAC)},
title={Achieving Secure and Differentially Private Computations in Multiparty Settings},
year={2017},
volume={},
number={},
pages={49-59},
keywords={cryptographic protocols;data privacy;statistical analysis;Secure multiparty computation;SMC;novel Secure Multiparty Distributed Differentially Private protocol;horizontally distributed data;final constructed statistical model;statistical model function;SM-DDP protocol;distributed DP;minimal computational overhead;Computational modeling;Protocols;Data privacy;Privacy;Linear regression;Distributed databases;Security;Secure computation;differential privacy;multiparty;distributed differential privacy;predictive models;regression},
doi={10.1109/PAC.2017.12},
ISSN={},
month={Aug},}

USA