@article{10.1145/3355300,
author = {Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
title = {A System-Level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case},
year = {2019},
issue_date = {February 2020},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {4},
number = {2},
issn = {2378-962X},
url = {https://doi.org/10.1145/3355300},
doi = {10.1145/3355300},
abstract = {Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications between smart devices to increase efficiency, enhance reliability, and reduce costs. However, compromised devices in the smart grid poses several security challenges. Consequences of propagating fake data or stealing sensitive smart grid information via compromised devices are costly. Hence, early behavioral detection of compromised devices is critical for protecting the smart grid’s components and data. To address these concerns, in this article, we introduce a novel and configurable system-level framework to identify compromised smart grid devices. The framework combines system and function call tracing techniques with signal processing and statistical analysis to detect compromised devices based on their behavioral characteristics. We measure the efficacy of our framework with a realistic smart grid substation testbed that includes both resource-limited and resource-rich devices. In total, using our framework, we analyze six different types of compromised device scenarios with different resources and attack payloads. To the best of our knowledge, the proposed framework is the first in detecting compromised CPS smart grid devices with system and function-level call tracing techniques. The experimental results reveal an excellent rate for the detection of compromised devices. Specifically, performance metrics include accuracy values between 95% and 99% for the different attack scenarios. Finally, the performance analysis demonstrates that the use of the proposed framework has minimal overhead on the smart grid devices’ computing resources.},
journal = {ACM Trans. Cyber-Phys. Syst.},
month = nov,
articleno = {16},
numpages = {28},
keywords = {system calls, compromised devices, CPS security, function calls, smart grid security, IEC61850}
}

@ARTICLE{8493118, author={Cebe, Mumin and Erdin, Enes and Akkaya, Kemal and Aksu, Hidayet and Uluagac, Selcuk}, journal={IEEE Communications Magazine}, title={Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles}, year={2018}, volume={56}, number={10}, pages={50-57}, doi={10.1109/MCOM.2018.1800137}}

@ARTICLE{LopezSurvey, author={Lopez, Juan and Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk}, journal={Journal of Hardware and Systems Security}, title={A Survey on Function and System Call Hooking Approaches}, year={2017}, volume={1}, pages={114-136}, doi={10.1007/s41635-017-0013-2}}

@ARTICLE{ShoulingVirtual, author={Ji, Shouling and Uluagac, Arif Selcuk and Beyah, Raheem and Cai, Zhipeng}, journal={Journal of Combinatorial Optimization}, title={Practical unicast and convergecast scheduling schemes for cognitive radio networks}, year={2013}, volume={26}, pages={161-177}, doi={10.1007/s10878-011-9446-7}}

@Inbook{AkkayaBookSDN,
author=”Akkaya, Kemal and Uluagac, A. Selcuk and Aydeger, Abdullah and Mohan, Apurva”,
title=”Secure Software Defined Networking Architectures for The Smart Grid”,
bookTitle=”Smart Grid: Networking, Data Management and Business Models”,
year=”2016″,
publisher=”CRC Press”,
pages=”53–70″,
isbn=”9781315214221″,
doi=”10.1201/b19664″
}

@inproceedings{Puche:2021:WiSec,
author = {Rondon, Luis Puche and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
title = {LightningStrike: (In)secure Practices of E-IoT Systemsin the Wild},
year = {2021},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3448300.3467830},
booktitle = {14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’21)},
location = {VAbu Dhabi, United Arab Emirates},
series = {WiSec ’21}
}

@inproceedings{10.1145/3395351.3399358,
author = {Sikder, Amit Kumar and Babun, Leonardo and Celik, Z. Berkay and Acar, Abbas and Aksu, Hidayet and McDaniel, Patrick and Kirda, Engin and Uluagac, A. Selcuk},
title = {Kratos: Multi-User Multi-Device-Aware Access Control System for the Smart Home},
year = {2020},
isbn = {9781450380065},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3395351.3399358},
doi = {10.1145/3395351.3399358},
abstract = {In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a multi-user environment, users have conflicting, complex, and dynamically changing demands on multiple devices, which cannot be handled by traditional access control techniques. To address these challenges, in this paper, we introduce Kratos, a novel multi-user and multi-device-aware access control mechanism that allows smart home users to flexibly specify their access control demands. Kratos has three main components: user interaction module, back-end server, and policy manager. Users can specify their desired access control settings using the interaction module which are translated into access control policies in the backend server. The policy manager analyzes these policies and initiates negotiation between users to resolve conflicting demands and generates final policies. We implemented Kratos and evaluated its performance on real smart home deployments featuring multi-user scenarios with a rich set of configurations (309 different policies including 213 demand conflicts and 24 restriction policies). These configurations included five different threats associated with access control mechanisms. Our extensive evaluations show that Kratos is very effective in resolving conflicting access control demands with minimal overhead, and robust against different attacks.},
booktitle = {Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks},
pages = {1–12},
numpages = {12},
keywords = {smart home security, access control, internet of things},
location = {Linz, Austria},
series = {WiSec ’20}
}

@INPROCEEDINGS{9162311, author={Newaz, AKM Iqtidar and Sikder, Amit Kumar and Babun, Leonardo and Uluagac, A. Selcuk}, booktitle={2020 IEEE Conference on Communications and Network Security (CNS)}, title={HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices}, year={2020}, volume={}, number={}, pages={1-9}, doi={10.1109/CNS48642.2020.9162311}}

@INPROCEEDINGS{9149285, author={Babun, Leonardo and Aksu, Hidayet and Ryan, Lucas and Akkaya, Kemal and Bentley, Elizabeth S. and Uluagac, A. Selcuk}, booktitle={ICC 2020 – 2020 IEEE International Conference on Communications (ICC)}, title={Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices}, year={2020}, volume={}, number={}, pages={1-7}, doi={10.1109/ICC40277.2020.9149285}}

@inproceedings{10.1145/2517957.2517963,
author = {Nunnally, Troy and Abdullah, Kulsoom and Uluagac, A. Selcuk and Copeland, John A. and Beyah, Raheem},
title = {NAVSEC: A Recommender System for 3D Network Security Visualizations},
year = {2013},
isbn = {9781450321730},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2517957.2517963},
doi = {10.1145/2517957.2517963},
abstract = {As network attacks increase in complexity, the ability to quickly analyze security data and mitigate the effect of these attacks becomes a difficult problem. To alleviate these challenges, researchers are looking into various two-dimensional (2D) and three-dimensional (3D) visualization tools to detect, identify, and analyze malicious attacks. These visualization tools often require advanced knowledge in networking, visualization, and information security to operate, navigate, and successfully examine malicious attacks. Novice users, deficient in the required advanced knowledge, may find navigation within these visualization tools difficult. Furthermore, expert users may be limited and costly. We discuss the use of a modern recommender system to aid in navigating within a complex 3D visualization for network security applications. We developed a visualization module called NAVSEC, a recommender system prototype for navigating in 3D network security visualization tools. NAVSEC recommends visualizations and interactions to novice users. Given visualization interaction input from a novice user and expert communities, NAVSEC is instrumental in reducing confusion for a novice user while navigating in a 3D visualization. We illustrate NAVSEC with a use-case from an emulated stealthy scanning attack disguised as a file transfer with multiple concurrent connections. We show that using NAVSEC, a novice user’s visualization converges towards a visualization used to identify or detect a suspected attack by an expert user. As a result, NAVSEC can successfully guide the novice user in differentiating between complex network attacks and benign legitimate traffic with step-by-step created visualizations and suggested user interactions.},
booktitle = {Proceedings of the Tenth Workshop on Visualization for Cyber Security},
pages = {41–48},
numpages = {8},
keywords = {NAVSEC, 3D visualization, security visualization, recommender system, network security, monitoring},
location = {Atlanta, Georgia, USA},
series = {VizSec ’13}
}

@article{sikder2019context,
title={A context-aware framework for detecting sensor-based threats on smart devices},
author={Sikder, Amit Kumar and Aksu, Hidayet and Uluagac, A Selcuk},
journal={IEEE Transactions on Mobile Computing},
year={2019},
publisher={IEEE}
}

@article{sikder2021ComstSurvey,
title={A Survey on Sensor-based Threats to Smart Devices and Applications},
author={Sikder, Amit Kumar and Petraca, Giuseppe and Aksu, Hidayet and Jaegar, Trent and Uluagac, A Selcuk},
journal={IEEE Communications Surveys and Tutorials (IEEE COMST},
year={2021},
publisher={IEEE}
}

@inproceedings{tekiner2021,
AUTHOR = {Ege Tekiner and Abbas Acar and A. Selcuk Uluagac and Engin Kirda and Ali Aydin Selcuk},
TITLE = {SoK: Cryptojacking Malware},
BOOKTITLE = {6th IEEE European Symposium on Security and Privacy},
ADDRESS = {Virtual},
MONTH = {September},
DAY = {6–10},
YEAR = {2021}
}

@inproceedings{naseemminos,
author = {Faraz Naseem and
Ahmet Aris and
Leonardo Babun and
Ege Tekiner and
Selcuk Uluagac},
title = {{MINOS}: A Lightweight Real-Time Cryptojacking Detection System},
booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS}, February 21-25, 2021},
year = {2021}
}

@article{BABUN2021108040,
title = {A survey on IoT platforms: Communication, security, and privacy perspectives},
author = {Leonardo Babun and Kyle Denney and Z. Berkay Celik and Patrick McDaniel and A. Selcuk Uluagac},
journal = {Computer Networks},
volume = {192},
pages = {108040},
year = {2021},
issn = {1389-1286},
doi = {https://doi.org/10.1016/j.comnet.2021.108040},
url = {https://www.sciencedirect.com/science/article/pii/S1389128621001444}
}

@article{BabunCelikMcDanielUluagacIoTWatch,
author = {Leonardo Babun and Z. Berkay Celik and Patrick McDaniel and A. Selcuk Uluagac},
doi = {doi:10.2478/popets-2021-0009},
url = {https://doi.org/10.2478/popets-2021-0009},
title = {Real-time Analysis of Privacy-(un)aware IoT Applications},
journal = {Proceedings on Privacy Enhancing Technologies},
number = {1},
volume = {2021},
year = {2020},
pages = {145–166}
}

@inproceedings{acar2018peek,
author = {Acar, Abbas and Fereidooni, Hossein and Abera, Tigist and Sikder, Amit Kumar and Miettinen, Markus and Aksu, Hidayet and Conti, Mauro and Sadeghi, Ahmad-Reza and Uluagac, Selcuk},
title = {Peek-a-Boo: I See Your Smart Home Activities, Even Encrypted!},
year = {2020},
isbn = {9781450380065},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3395351.3399421},
doi = {10.1145/3395351.3399421},
booktitle = {Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks},
pages = {207–218},
numpages = {12},
keywords = {privacy, ZigBee, smart-home, BLE, wifi, network traffic},
location = {Linz, Austria},
series = {WiSec ’20}
}

@ARTICLE{Kurt:2021, author={Kurt, Ahmet and Saputro, Nico and Akkaya, Kemal and Uluagac, A. Selcuk}, journal={IEEE Transactions on Intelligent Transportation Systems}, title={Distributed Connectivity Maintenance in Swarm of Drones During Post-Disaster Transportation Applications}, year={2021}, volume={}, number={}, pages={1-13}, doi={10.1109/TITS.2021.3066843}}

@ARTICLE{Sikder:2021, author={Sikder, Amit Kumar and Petracca, Giuseppe and Aksu, Hidayet and Jaeger, Trent and Uluagac, A. Selcuk}, journal={IEEE Communications Surveys Tutorials}, title={A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications}, year={2021}, volume={23}, number={2}, pages={1125-1159}, doi={10.1109/COMST.2021.3064507}}

@inproceedings{Cosson:2021,
author = {Cosson, Adrien and Sikder, Amit Kumar and Babun, Leonardo and Celik, Z. Berkay and McDaniel, Patrick and Uluagac, A. Selcuk},
title = {Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information},
year = {2021},
isbn = {9781450383547},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3450268.3453533},
doi = {10.1145/3450268.3453533},
booktitle = {Proceedings of the International Conference on Internet-of-Things Design and Implementation},
pages = {53–66},
numpages = {14},
keywords = {Intrusion detection, IoT security, Mirai Botnet, Internet of Things},
location = {Charlottesvle, VA, USA},
series = {IoTDI ’21}
}

@article{ERDIN2021103021,
title = {A scalable private Bitcoin payment channel network with privacy guarantees},
author = {Enes Erdin and Mumin Cebe and Kemal Akkaya and Eyuphan Bulut and Selcuk Uluagac},
journal = {Journal of Network and Computer Applications},
volume = {180},
pages = {103021},
year = {2021},
issn = {1084-8045},
doi = {https://doi.org/10.1016/j.jnca.2021.103021},
url = {https://www.sciencedirect.com/science/article/pii/S1084804521000485}
}

@InProceedings{10.1007/978-3-030-30215-3_18,
author=”Acar, Abbas
and Lu, Long
and Uluagac, A. Selcuk
and Kirda, Engin”,
editor=”Lin, Zhiqiang
and Papamanthou, Charalampos
and Polychronakis, Michalis”,
title=”An Analysis of Malware Trends in Enterprise Networks”,
booktitle=”Information Security”,
year=”2019″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”360–380″,
isbn=”978-3-030-30215-3″
}

@inproceedings{10.1145/3360774.3368197,
author = {Bautista, Oscar G. and Saputro, Nico and Akkaya, K and Uluagac, Selcuk},
title = {A Novel Routing Metric for IEEE 802.11s-Based Swarm-of-Drones Applications},
year = {2019},
isbn = {9781450372831},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3360774.3368197},
doi = {10.1145/3360774.3368197},
booktitle = {Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
pages = {514–521},
numpages = {8},
keywords = {wireless mesh network, swarm-of-drones, HWMP, network throughput, link quality metric, routing metric, propagation loss models, 802.11s, SrFTime, flying adhoc networks, MANET, airtime},
location = {Houston, Texas},
series = {MobiQuitous ’19}
}

@ARTICLE{Babun:2021:CPS, author={Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk}, journal={IEEE Transactions on Information Forensics and Security}, title={CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice}, year={2021}, volume={16}, number={}, pages={2413-2428}, doi={10.1109/TIFS.2021.3054968}}

@ARTICLE{Mercan:2020, author={Mercan, Suat and Cain, Lisa and Akkaya, Kemal and Cebe, Mumin and Uluagac, Selcuk and Alonso, Miguel and Cobanoglu, Cihan}, journal={International Journal of Contemporary Hospitality Management}, title={Improving the service industry with hyper-connectivity: IoT in hospitality}, year={2021}, volume={33}, number={1}, pages={243-262}, doi={10.1108/IJCHM-06-2020-0621}}

@inproceedings{Puche:2020:PoisonIvy,
author = {Rondon, Luis Puche and Babun, Leonardo and Aris, Ahmet and Akkaya, Kemal and Uluagac, A. Selcuk},
title = {PoisonIvy: (In)Secure Practices of Enterprise IoT Systems in Smart Buildings},
year = {2020},
isbn = {9781450380614},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3408308.3427606},
doi = {10.1145/3408308.3427606},
booktitle = {Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation},
pages = {130–139},
numpages = {10},
keywords = {Enterprise IoT Systems, Smart Office, Cyber attacks, Smart buildings, Malicious Software},
location = {Virtual Event, Japan},
series = {BuildSys ’20}
}

@article{Bautista:2020,
title = {Customized novel routing metrics for wireless mesh-based swarm-of-drones applications},
journal = {Internet of Things},
volume = {11},
pages = {100265},
year = {2020},
issn = {2542-6605},
doi = {https://doi.org/10.1016/j.iot.2020.100265},
url = {https://www.sciencedirect.com/science/article/pii/S2542660520300998},
author = {Oscar Bautista and Kemal Akkaya and A. Selcuk Uluagac}
}

@InProceedings{Kurt:2020:LNBot,
author=”Kurt, Ahmet
and Erdin, Enes
and Cebe, Mumin
and Akkaya, Kemal
and Uluagac, A. Selcuk”,
title=”LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit”,
booktitle=”Computer Security — ESORICS 2020″,
year=”2020″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”734–755″,
isbn=”978-3-030-59013-0″
}

@INPROCEEDINGS{Newaz:2020:Adversarial, author={Newaz, Akm Iqtidar and Haque, Nur Imtiazul and Sikder, Amit Kumar and Rahman, Mohammad Ashiqur and Uluagac, A. Selcuk}, booktitle={GLOBECOM 2020 – 2020 IEEE Global Communications Conference}, title={Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems}, year={2020}, volume={}, number={}, pages={1-6}, doi={10.1109/GLOBECOM42002.2020.9322472}}

@inproceedings{10.1145/3359789.3359840,
author = {Sikder, Amit Kumar and Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
title = {Aegis: A Context-Aware Security Framework for Smart Home Systems},
year = {2019},
isbn = {9781450376280},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3359789.3359840},
doi = {10.1145/3359789.3359840},
booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference},
pages = {28–41},
numpages = {14},
keywords = {smart home platforms, context-awareness, malware analysis, intrusion detection, IoT security},
location = {San Juan, Puerto Rico},
series = {ACSAC ’19}
}

@article{Sikder:2021:Aegis,
author = {Sikder, Amit Kumar and Babun, Leonardo and Uluagac, A. Selcuk},
title = {Aegis+: A Context-Aware Platform-Independent Security Framework for Smart Home Systems},
year = {2021},
issue_date = {March 2021},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {2},
number = {1},
issn = {2692-1626},
url = {https://doi.org/10.1145/3428026},
doi = {10.1145/3428026}
journal = {Digital Threats: Research and Practice},
month = feb,
articleno = {6},
numpages = {33}
}

@inproceedings{10.1145/3359789.3359841,
author = {Rondon, Luis Puche and Babun, Leonardo and Akkaya, K and Uluagac, A. Selcuk},
title = {HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol},
year = {2019},
isbn = {9781450376280},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3359789.3359841},
doi = {10.1145/3359789.3359841},
booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference},
pages = {650–659},
numpages = {10},
keywords = {consumer electronics control, HDMI distributions, CEC, cyberattacks, DoS},
location = {San Juan, Puerto Rico},
series = {ACSAC ’19}
}

@inproceedings{10.1145/3292006.3300042,
author = {Celik, Z. Berkay and Acar, Abbas and Aksu, Hidayet and Sheatsley, Ryan and McDaniel, Patrick and Uluagac, A. Selcuk},
title = {Curie: Policy-Based Secure Data Exchange},
year = {2019},
isbn = {9781450360999},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3292006.3300042},
doi = {10.1145/3292006.3300042},
booktitle = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy},
pages = {121–132},
numpages = {12},
keywords = {policy language, collaborative learning, secure data exchange},
location = {Richardson, Texas, USA},
series = {CODASPY ’19}
}

@inproceedings{10.1145/3292006.3300042,
author = {Celik, Z. Berkay and Acar, Abbas and Aksu, Hidayet and Sheatsley, Ryan and McDaniel, Patrick and Uluagac, A. Selcuk},
title = {Curie: Policy-Based Secure Data Exchange},
year = {2019},
isbn = {9781450360999},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3292006.3300042},
doi = {10.1145/3292006.3300042},
booktitle = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy},
pages = {121–132},
numpages = {12},
keywords = {policy language, collaborative learning, secure data exchange},
location = {Richardson, Texas, USA},
series = {CODASPY ’19}
}

@INPROCEEDINGS{8802665,
author={K. {Akkaya} and V. {Baboolal} and N. {Saputro} and S. {Uluagac} and H. {Menouar}},
booktitle={2019 IEEE Conference on Communications and Network Security (CNS)},
title={Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems},
year={2019},
volume={},
number={},
pages={1-7},}

@ARTICLE{8733994,
author={Z. B. {Celik} and P. {McDaniel} and G. {Tan} and L. {Babun} and A. S. {Uluagac}},
journal={IEEE Security Privacy},
title={Verifying Internet of Things Safety and Security in Physical Spaces},
year={2019},
volume={17},
number={5},
pages={30-37},}

@ARTICLE{9001165,
author={A. {Acar} and H. {Aksu} and A. S. {Uluagac} and K. {Akkaya}},
journal={IEEE Transactions on Mobile Computing},
title={A Usable and Robust Continuous Authentication Framework using Wearables},
year={2020},
volume={},
number={},
pages={1-1},}

@INPROCEEDINGS{8599719,
author={E. {Erdin} and H. {Aksu} and S. {Uluagac} and M. {Vai} and K. {Akkaya}},
booktitle={MILCOM 2018 – 2018 IEEE Military Communications Conference (MILCOM)},
title={OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework},
year={2018},
volume={},
number={},
pages={926-932},}

@INPROCEEDINGS{8875295,
author={F. {Naseem} and L. {Babun} and C. {Kaygusuz} and S. J. {Moquin} and C. {Farnell} and A. {Mantooth} and A. S. {Uluagac}},
booktitle={2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
title={CSPoweR-Watch: A Cyber-Resilient Residential Power Management System},
year={2019},
volume={},
number={},
pages={768-775},}

@INPROCEEDINGS{8931716,
author={A. I. {Newaz} and A. K. {Sikder} and M. A. {Rahman} and A. S. {Uluagac}},
booktitle={2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS)},
title={HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems},
year={2019},
volume={},
number={},
pages={389-396},}

@ARTICLE{8613866,
author={A. K. {Sikder} and H. {Aksu} and A. S. {Uluagac}},
journal={IEEE Transactions on Mobile Computing},
title={A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices},
year={2020},
volume={19},
number={2},
pages={245-261},}

@INPROCEEDINGS{8946276,
author={E. {Erdin} and M. {Cebe} and K. {Akkaya} and E. {Bulut} and A. S. {Uluagac}},
booktitle={2019 IEEE International Conference on Blockchain (Blockchain)},
title={A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links},
year={2019},
volume={},
number={},
pages={294-301},}

@INPROCEEDINGS{Mercan:2020:ACost, author={Mercan, Suat and Cebe, Mumin and Tekiner, Ege and Akkaya, Kemal and Chang, Melissa and Uluagac, Selcuk}, booktitle={2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)}, title={A Cost-efficient IoT Forensics Framework with Blockchain}, year={2020}, volume={}, number={}, pages={1-5}, doi={10.1109/ICBC48266.2020.9169397}}

@article{ERDIN2020107098,
author = “E Erdin and Mumin Cebe and K Akkaya and Senay Solak and E Bulut and Selcuk Uluagac”,
title = “A Bitcoin payment network with reduced transaction fees and confirmation times”,
journal = “Computer Networks”,
volume = “172”,
pages = “107098”,
year = “2020”,
month = “May”,
issn = “1389-1286”,
%doi = “https://doi.org/10.1016/j.comnet.2020.107098”,
%url = “http://www.sciencedirect.com/science/article/pii/S1389128619308850”,
}

@article{AYDEGER201939,
title = “SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios”,
journal = “Journal of Network and Computer Applications”,
volume = “138”,
pages = “39 – 50”,
year = “2019”,
issn = “1084-8045”,
author = “A Aydeger and Nico Saputro and K Akkaya and S Uluagac”,
}

@article{abbasPintaWiley2019,
author = {Acar, A and Liu, Wenyi and Beyah, Raheem and Akkaya, K and Uluagac, Arif Selcuk},
title = {A privacy-preserving multifactor authentication system},
journal = {Security and Privacy},
volume = {2},
number = {5},
pages = {e88},
keywords = {fuzzy hashing, homomorphic encryption, multifactor authentication, privacy-preserving},
doi = {10.1002/spy2.88},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/spy2.88},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.88},
year = {2019}
}

@INPROCEEDINGS{CPS-Sec-WS2019,
author={K. {Akkaya} and V. {Baboolal} and N. {Saputro} and S. {Uluagac} and H. {Menouar}},
booktitle={2019 IEEE Conference on Communications and Network Security (CNS) CPS-Security Workshop},
title={Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems},
year={2019},
volume={},
number={},
pages={1-7},
%doi={10.1109/CNS.2019.8802665},
ISSN={},
month={June},}

@INPROCEEDINGS{NicoDroneVTC,
author={N. {Saputro} and K. {Akkaya} and R. {Algin} and S. {Uluagac}},
booktitle={2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)},
title={Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems},
year={2018},
volume={},
number={},
pages={1-5},
%doi={10.1109/VTCFall.2018.8690977},
ISSN={},
month={Aug},}

@INPROCEEDINGS{Erdi1907:Heuristic,
AUTHOR=”E Erdin and M Cebe and K Akkaya and E Bulut and Selcuk
Uluagac”,
TITLE=”A Heuristic-based Private Bitcoin Payment Network Formation Using
{Off-Chain} Links”,
BOOKTITLE=”2019 IEEE International Conference on Blockchain (Blockchain 2019)”,
ADDRESS=”Atlanta, USA”,
DAYS=14,
MONTH=jul,
YEAR=2019,
}

@INPROCEEDINGS{Faraz-CSPoweR,
AUTHOR=”Faraz A Naseem and Leonardo Babun and Cengiz Kaygusuz and S. Joe Moquin and
Chris Farnell and Mantooth Alan and Selcuk Uluagac”,
TITLE=”{CSPoweR-Watch:} A Cyber-resilient Residential Power Management System”,
BOOKTITLE=”IEEE International Conference on Green Computing and Communications 2019
(IEEE GreenCom 2019)”,
ADDRESS=”Atlanta, USA”,
DAYS=14,
MONTH=jul,
YEAR=2019,
}

@INPROCEEDINGS{Iqtidar-HealthGuard,
AUTHOR=”AKM iqtidar Newaz and Amit Kumar Sikder and Selcuk Uluagac and Mohammad
Ashiqur Rahman”,
TITLE=”{HealthGuard:} A Machine {Learning-Based} Security Framework for Smart
Healthcare System”,
BOOKTITLE=”2019 the IEEE/ACM 4th International Conference on Connected Health:
Applications, Systems and Engineering Technologies (IEEE\&ACM CHASE 2019)”,
ADDRESS=”Washington D.C., USA”,
DAYS=25,
MONTH=sep,
YEAR=2019,
}

@ARTICLE{berkayIEEESPMagazine,
author={Z. B. {Celik} and P. {McDaniel} and G. {Tan} and L. {Babun} and A. S. {Uluagac}},
journal={IEEE Security Privacy},
title={Verifying Internet of Things Safety and Security in Physical Spaces},
year={2019},
volume={17},
number={5},
pages={30-37},
month={Sep.},
}

@InProceedings{Denney:2019:USB,
author=”Denney, Kyle
and Erdin, Enes
and Babun, Leonardo
and Vai, Michael
and Uluagac, Selcuk”,
title=”USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework”,
booktitle=”Security and Privacy in Communication Networks”,
year=”2019″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”126–146″,
isbn=”978-3-030-37228-6″
}

@INPROCEEDINGS{Puche-HDMI-Walk,
AUTHOR=”Luis {Puche Rondon} and Leonardo Babun and K Akkaya and Selcuk Uluagac”,
TITLE=”{HDMI-Walk:} Attacking {HDMI} Distribution Networks via Consumer Electronic
Control Protocol”,
BOOKTITLE=” In Proc. 2019 Annual Computer Security Applications Conference (ACSAC)”,
ADDRESS=”Porto Rico”,
DAYS=10,
MONTH=Dec,
YEAR=2019,
}

@inbook{Saputro:2020:ARev,
author = {Saputro, Nico and Tonyali, Samet and Aydeger, Abdullah and Akkaya, Kemal and Rahman, Mohammad A. and Uluagac, Selcuk},
publisher = {John Wiley & Sons, Ltd},
isbn = {9781119593386},
title = {A Review of Moving Target Defense Mechanisms for Internet of Things Applications},
booktitle = {Modeling and Design of Secure Internet of Things},
chapter = {24},
pages = {563-614},
doi = {https://doi.org/10.1002/9781119593386.ch24},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119593386.ch24},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/9781119593386.ch24},
year = {2020}
}

@ARTICLE{Puche:2020:HDMIWatch, author={PucheRondon, Luis C and Babun, Leonardo and Akkaya, Kemal and Uluagac, A. Selcuk}, journal={IEEE Transactions on Network Science and Engineering}, title={HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks}, year={2020}, volume={}, number={}, pages={1-1}, doi={10.1109/TNSE.2020.3020084}}

@InProceedings{BerkayCurieCODASPY,
Title = {Curie: Policy-based Secure Data Exchange},
Author = {Z. Berkay Celik and Abbas Acar and Hidayet Aksu and Ryan Sheatsley and A. Selcuk Uluagac and Patrick McDaniel},
Booktitle = {ACM Conference on Data and Applications Security (CODASPY)},
Year = {2019},
Address = {Dallas, TX},
Month = {March},
Eprint = {arXiv:1702.08342},
Url = {https://arxiv.org/pdf/1702.08342.pdf}
}

@INPROCEEDINGS{U-Pot-Azizul,
author={M. A. {Hakim} and H. {Aksu} and A. S. {Uluagac} and K. {Akkaya}},
booktitle={2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)},
title={U-PoT: A Honeypot Framework for UPnP-Based IoT Devices},
year={2018},
volume={},
number={},
pages={1-8},
doi={10.1109/PCCC.2018.8711321},
ISSN={2374-9628},
month={Nov},
}

@INPROCEEDINGS{EnesMilcom18,
AUTHOR=”E Erdin and H Aksu and Selcuk Uluagac and Michael Vai and K
Akkaya”,
TITLE=”{OS} Independent and {Hardware-Assisted} Insider Threat Detection and
Prevention Framework”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{BurakSOTA-Milcom18,
AUTHOR=”Halim B Yesilyurt and Hidayet Aksu and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{SOTA:} Secure {Over-the-Air} Programming of {IoT} Devices”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{AzizulIoTHoneynet,
AUTHOR=”Muhammad Azizul Hakim and H Aksu and Selcuk Uluagac and K Akkaya”,
TITLE=”{U-PoT:} A Honeypot Framework for {UPnP-Based} {IoT} Devices”,
BOOKTITLE=”2018 IEEE 37th International Performance Computing and Communications
Conference (IPCCC 2018)”,
ADDRESS=”Orlando, USA”,
DAYS=17,
MONTH=nov,
YEAR=2018,
}

@INPROCEEDINGS{NicoDronePaper18,
AUTHOR=”Nico Saputro and K Akkaya and Selcuk Uluagac”,
TITLE=”Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems”,
BOOKTITLE=”IEEE Workshop on Networks of Sensors, Wearable, and Mobile Devices
(co-located with IEEE LCN 2018) (LCN-NSWMD 2018)”,
ADDRESS=”Chicago, USA”,
DAYS=1,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{EnesMuminBlockchain18,
AUTHOR=”E Erdin and M Cebe and K Akkaya and Senay Solak and E
Bulut and Selcuk Uluagac”,
TITLE=”Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations”,
BOOKTITLE=”2018 IEEE International Conference on Blockchain (Blockchain 2018)”,
ADDRESS=”Halifax, Canada”,
DAYS=30,
MONTH=jul,
YEAR=2018,
}

@INPROCEEDINGS{EnesMilcom18,
AUTHOR=”E Erdin and H Aksu and Selcuk Uluagac and Michael Vai and K
Akkaya”,
TITLE=”{OS} Independent and {Hardware-Assisted} Insider Threat Detection and
Prevention Framework”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@INPROCEEDINGS{BurakSOTAMilcom18,
AUTHOR=”Halim B Yesilyurt and Hidayet Aksu and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{SOTA:} Secure {Over-the-Air} Programming of {IoT} Devices”,
BOOKTITLE=”Milcom 2018 Track 3 – Cyber Security and Trusted Computing (Milcom 2018
Track 3)”,
ADDRESS=”Los Angeles, USA”,
DAYS=29,
MONTH=oct,
YEAR=2018,
}

@ARTICLE{Aksu-BT-Fingerprintng,
author={H. Aksu and A. S. Uluagac and E. Bentley},
journal={IEEE Transactions on Sustainable Computing},
title={Identification of Wearable Devices with Bluetooth},
year={2018},
volume={},
number={},
pages={1-1},
doi={10.1109/TSUSC.2018.2808455},
ISSN={},
month={February},}

@ARTICLE{IoTAdvertisementPP,
author={H. Aksu and L. Babun and M. Conti and G. Tolomei and A. S. Uluagac},
journal={IEEE Communications Magazine},
title={Advertising in the IoT Era: Vision and Challenges},
year={2018},
volume={},
number={},
pages={1-7},
keywords={Advertising;Automobiles;Computer architecture;Internet;Smart devices;Smart phones},
doi={10.1109/MCOM.2017.1700871},
ISSN={0163-6804},
month={April},}

@article{AbbasFHEsurvey,
author = {Acar, Abbas and Aksu, Hidayet and Uluagac, A. Selcuk and Conti, Mauro},
title = {A Survey on Homomorphic Encryption Schemes: Theory and Implementation},
journal = {ACM Comput. Surv.},
issue_date = {July 2018},
volume = {51},
number = {4},
month = jul,
year = {2018},
issn = {0360-0300},
pages = {79:1–79:35},
articleno = {79},
numpages = {35}}

@ARTICLE{CPSTestbedSurvey-16,
author={M. H. Cintuglu and O. A. Mohammed and K. Akkaya and A. S. Uluagac},
journal={IEEE Communications Surveys Tutorials},
title={A Survey on Smart Grid Cyber-Physical System Testbeds},
year={2017},
volume={19},
number={1},
pages={446-464},
doi={http://10.1109/COMST.2016.2627399},
ISSN={1553-877X},
month={1st quarter},}

@ARTICLE{AdertisementSurvey-16,
author={G. Chen and J. H. Cox and A. S. Uluagac and J. A. Copeland}, journal={IEEE Communications Surveys Tutorials},
title={In-Depth Survey of Digital Advertising Technologies},
year={2016},
volume={18},
number={3},
pages={2124-2148},
doi={http://10.1109/COMST.2016.2519912},
ISSN={1553-877X},
month={3rd quarter},}

@ARTICLE{UAV-Mag-2017,
author={H. Menouar and I. Guvenc and K. Akkaya and A. S. Uluagac and A. Kadri and A. Tuncer},
journal={IEEE Communications Magazine},
title={UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges},
year={2017},
volume={55},
number={3},
pages={22-28},
doi={http://10.1109/MCOM.2017.1600238CM},
ISSN={0163-6804},
month={March},}

@article{ProvizElsevier-16,
author={Shruthi Ravichandran and Ramalingam K. Chandrasekar and A. Selcuk Uluagac and Raheem Beyah},
title={A simple visualization and programming framework for wireless sensor networks: PROVIZ},
journal={Elsevier Ad Hoc Networks Journal },
volume={53},
number={},
pages={1 – 16},
year={2016},
issn={1570-8705},
doi={http://dx.doi.org/10.1016/j.adhoc.2016.06.015},
} %Received 5 January 2016, Revised 19 May 2016, Accepted 27 June 2016, Available online 24 August 2016

@article{Tonyali:2018:privacy,
title = {Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems},
journal = {Future Generation Computer Systems},
volume = {78},
pages = {547-557},
year = {2018},
issn = {0167-739X},
doi = {https://doi.org/10.1016/j.future.2017.04.031},
url = {https://www.sciencedirect.com/science/article/pii/S0167739X17306945},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro and A. Selcuk Uluagac and Mehrdad Nojoumian}
}

@ARTICLE{GTID-Journal-15,
author={S. V. Radhakrishnan and A. S. Uluagac and R. Beyah},
journal={IEEE Transactions on Dependable and Secure Computing},
title={GTID: A Technique for Physical Device and Device Type Fingerprinting},
year={2015},
volume={12},
number={5},
pages={519-532},
doi={http://10.1109/TDSC.2014.2369033},
ISSN={1545-5971},
month={Sept},}

@article{ShoulingJi-ACMTonS13,
author = {Ji, Shouling and He, Jing (Selena) and Uluagac, A. Selcuk and Beyah, Raheem and Li, Yingshu},
title = {Cell-based snapshot and continuous data collection in wireless sensor networks},
journal = {ACM Transactions on Sensor Networks},
issue_date = {July 2013},
volume = {9},
number = {4},
month = jul,
year = {2013},
issn = {1550-4859},
pages = {47:1–47:29},
articleno = {47},
numpages = {29},
doi = {10.1145/2489253.2489264},
acmid = {2489264},
publisher = {ACM},
address = {New York, NY, USA},
}

@article{ShoulingJi-Convergecast-Springer-13,
Author = {Ji, Shouling and Uluagac, A. Selcuk and Beyah, Raheem and Cai, Zhipeng},
Journal = {Springer Journal of Combinatorial Optimization},
volume = {26},
number = {1},
Pages = {161-177},
month = jul,
year = {2013},
Publisher = {Springer},
Title = {Practical unicast and convergecast scheduling schemes for cognitive radio networks},
doi= {http://dx.doi.org/10.1007/s10878-011-9446-7},
}

@ARTICLE{Sobas-TPDS-13,
author={A. Selcuk Uluagac and R. A. Beyah and J. A. Copeland},
journal={IEEE Transactions on Parallel and Distributed Systems},
title={Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks},
year={2013},
volume={24},
number={4},
pages={803-813},
doi={10.1109/TPDS.2012.170},
ISSN={1045-9219},
month={April},}

@ARTICLE{NetsecLab-ToE-11,
author={C. P. Lee and A. S. Uluagac and K. D. Fairbanks and J. A. Copeland},
journal={IEEE Transactions on Education},
title={The Design of NetSecLab: A Small Competition-Based Network Security Lab},
year={2011},
volume={54},
number={1},
pages={149-155},
doi={10.1109/TE.2010.2048215},
ISSN={0018-9359},
month={Feb},
}

@ARTICLE{Vebek-TMC-10,
author={A. S. Uluagac and R. A. Beyah and Y. Li and J. A. Copeland},
journal={IEEE Transactions on Mobile Computing},
title={VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks},
year={2010},
volume={9},
number={7},
pages={994-1007},
doi={10.1109/TMC.2010.51},
ISSN={1536-1233},
month={July},}

@incollection{BookChapter-WirelessICS-16,
author = {A. Selcuk Uluagac and K Akkaya and Apurva Mohan and H Cintuglu and Tarek Youssef and Osama Mohammed},
title = {Wireless Infrastructure in Industrial Control Systems},
journal = {Book Chapter in Cyber-security of SCADA and Other Industrial Control Systems},
issue_date = {2016},
editor={Ed Colbert and Alex Kott},
volume = {66},
number = {},
month = {September},
year = {2016},
issn = {978-3-319-32125-7},
pages = {29-49},
publisher = {Springer},
}

@incollection{BookChapter-Nico-16,
author = {Nico Saputro and A Yurekli and K Akkaya and A. Selcuk Uluagac},
title = {Privacy-preservation for IoT in Smart Buildings},
journal = {Book Chapter in Security and Privacy in Internet of Things (IoT): Models, Algorithms, and Implementations},
issue_date = {2016},
editor={Fie Hu},
volume = {66},
number = {},
month = {April},
year = {2016},
issn = {9781498723183},
pages = {135-166},
publisher = {CRC Press},
doi={http://dx.doi.org/10.1201/b19516-10},
}

@incollection{BookChapter-SDNforSmartGrid-16,
author = {K Akkaya and A. Selcuk Uluagac and A Aydeger and Apurva Mohan},
title = {Secure Software-Defined Networking Architectures for the Smart Grid},
journal = {Book Chapter in Smart Grid: Networking, Data Management and Business Models},
issue_date = {2016},
editor={Hussein Mouftah and Melike Erol Kantarci},
volume = {66},
number = {},
month = {April},
year = {2016},
issn = {9781498719704},
pages = {53-70},
publisher = {CRC Press},
doi={http://dx.doi.org/10.1201/b19664-12},
}

@INPROCEEDINGS{CengizICC18,
author={C. Kaygusuz and L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2018 IEEE International Conference on Communications (ICC)},
title={Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques},
year={2018},
DAYS=20,
volume={},
number={},
pages={1-6},
ADDRESS=”Kansas City, USA”,
doi={10.1109/ICC.2018.8423022},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{AmitAbbasSmartLighting-18,
author={A. K. Sikder and A. Acar and H. Aksu and A. S. Uluagac and K. Akkaya and M. Conti},
booktitle={2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)},
title={IoT-enabled smart lighting systems for smart cities},
year={2018},
volume={},
number={},
pages={639-645},
doi={10.1109/CCWC.2018.8301744},
ISSN={},
month={Jan},}

@INPROCEEDINGS{Ayde1801:Assessing,
AUTHOR=”A Aydeger and Nico Saputro and K Akkaya and Selcuk Uluagac”,
TITLE=”Assessing the Overhead of Authentication during {SDN-Enabled} Restoration
of Smart Grid Inter-substation Communications”,
BOOKTITLE=”2018 15th IEEE Annual Consumer Communications \& Networking Conference
(CCNC) (CCNC 2018)”,
pages={1-6},
doi={10.1109/CCNC.2018.8319206},
ISSN={2331-9860},
ADDRESS=”Las Vegas, USA”,
DAYS=12,
MONTH=jan,
YEAR=2018,
}

@inproceedings {leo-berkay-Usenix18,
author = {Z. Berkay Celik and Leonardo Babun and Amit Kumar Sikder and Hidayet Aksu and Gang Tan and Patrick McDaniel and A. Selcuk Uluagac},
title = {Sensitive Information Tracking in Commodity IoT},
booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
year = {2018},
address = {Baltimore, MD},
}

@inproceedings{6thSenseAmitUsenix17,
author = {Amit Kumar Sikder and Hidayet Aksu and A. Selcuk Uluagac},
title = {6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices},
booktitle = {Proc. of the 26th {USENIX} Security Symposium},
year = {2017},
address = {Vancouver, BC},
isbn = {978-1-931971-40-9},
pages = {397–414},
}

@inproceedings{abbas2017PAC,
author = {Abbas Acar and Z. Berkay Celik and Hidayet Aksu and A. Selcuk Uluagac and Patrick McDaniel},
title = {Achieving Secure and Differentially Private Computations in Multiparty Settings},
booktitle={2017 IEEE Symposium on Privacy-Aware Computing (PAC)},
year={2017},
organization={IEEE},
pages={49-59},
doi={10.1109/PAC.2017.12},
address = {D.C., USA}
month={Aug},
}

@inproceedings{Cybergrenade17,
author = {Anurag Akkiraju and David Gabay and Burak Yesilyurt and Hidayet Aksu and A. Selcuk Uluagac},
title = {Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers},
booktitle={4th National Workshop for REU Research in Networking and Systems, 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)},
year={2017},
pages={580-584},
address = {Orlando, FL, USA},
organization={IEEE},
month={October},
doi={10.1109/MASS.2017.95},
ISSN={2155-6814},
}

@INPROCEEDINGS{leoICC18,
author={L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2017 IEEE International Conference on Communications (ICC)},
title={Identifying counterfeit smart grid devices: A lightweight system level framework},
year={2017},
volume={},
number={},
pages={1-6},
address = {Paris, France},
doi={10.1109/ICC.2017.7996877},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{EdwinIWCMCDrone2016,
author={Edwin Vattapparamban and I Guvenc and A Yurekli and K Akkaya and A. Selcuk Uluagac},
booktitle={2016 International Wireless Communications and Mobile Computing Conference (IWCMC)},
title={Drones for smart cities: Issues in cybersecurity, privacy, and public safety},
year={2016},
volume={},
number={},
pages={216-221},
address = {Cyprus},
doi={10.1109/IWCMC.2016.7577060},
ISSN={2376-6506},
month={Sept},}

@INPROCEEDINGS{AbdullahSDN-ICC16,
author={A Aydeger and K Akkaya and M. H Cintuglu and A. Selcuk Uluagac and Osama Mohammed},
booktitle={2016 IEEE International Conference on Communications (ICC)},
title={Software defined networking for resilient communications in Smart Grid active distribution networks},
year={2016},
volume={},
number={},
pages={1-6},
address = {Malaysia},
doi={10.1109/ICC.2016.7511049},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{MACA-Liu-InfocomWS14,
author={W. Liu and A. S. Uluagac and R. Beyah},
booktitle={Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on},
title={MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data},
year={2014},
pages={518-523},
doi={10.1109/INFCOMW.2014.6849285},
month={April},}

@MISC{CSL-Lab,
author = {{Cyber Physical Systems Security Lab (CSL)}},
title = {{Electrical and Computer Engineering Department}},
url = {http://www.csl.fiu.edu}
}

@Inbook{WSN-Survey-WACA08,
author=”Uluagac, A. Selcuk
and Lee, Christopher P.
and Beyah, Raheem A.
and Copeland, John A.”,
editor=”Li, Yingshu
and Huynh, Dung T.
and Das, Sajal K.
and Du, Ding-Zhu”,
title=”Designing Secure Protocols for Wireless Sensor Networks”,
bookTitle=”Wireless Algorithms, Systems, and Applications: Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings”,
year=”2008″,
publisher=”Springer Berlin Heidelberg”,
address=”Berlin, Heidelberg”,
pages=”503–514″,
isbn=”978-3-540-88582-5″,
doi=”10.1007/978-3-540-88582-5_47″,
url=”http://dx.doi.org/10.1007/978-3-540-88582-5_47″
}

@INPROCEEDINGS{M-Core-IEEEmass12,
author={M. Valero and S. Uluagac and S. Venkatachalam and K. C. Ramalingam and R. Beyah},
booktitle={2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)},
title={The Monitoring Core: A framework for sensor security application development},
year={2012},
pages={263-271},
doi={10.1109/MASS.2012.6502525},
ISSN={2155-6806},
month={Oct},}

@INPROCEEDINGS{Albert-InfocomWS14,
author={A. Brzeczko and A. S. Uluagac and R. Beyah and J. Copeland},
booktitle={Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on},
title={Active deception model for securing cloud infrastructure},
year={2014},
pages={535-540},
doi={10.1109/INFCOMW.2014.6849288},
month={April},}

@INPROCEEDINGS{Sakthi-CovertChannel,
author={S. V. Radhakrishnan and A. Selcuk Uluagac and R. Beyah},
booktitle={2013 IEEE Global Communications Conference (GLOBECOM)},
title={Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards},
year={2013},
pages={722-728},
doi={10.1109/GLOCOM.2013.6831158},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{Disec-Infocom-12,
author={M. Valero and Sang Shin Jung and A. Selcuk Uluagac and Y. Li and R. Beyah},
booktitle={INFOCOM, 2012 Proceedings IEEE},
title={Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
year={2012},
pages={585-593},
doi={10.1109/INFCOM.2012.6195801},
ISSN={0743-166X},
month={March},}

@INPROCEEDINGS{Tick-Globecom10,
author={{A. S. Uluagac and R. A. Beyah and J. A. Copeland}},
booktitle={Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE},
title={Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks},
year={2010},
pages={1-6},
doi={10.1109/GLOCOM.2010.5683787},
ISSN={1930-529X},
month={Dec},}

@MISC{PersonalURLpubs,
url = {{http://web.eng.fiu.edu/selcuk/pubs.html}},
note = {{Retrieved November 1, 2016}}
}

@INPROCEEDINGS{OpenSourceLabs-ASEE09,
author={A. Selcuk Uluagac, T. Fallon, W. Thain, and J. A. Copeland},
booktitle={Proceedings of the American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
title={Development of Undergraduate Network Security Labs with Open Source Tools},
year={2009},
month={Jun},
address = {Austin, Tx},}

@inproceedings{Uluagac-C12-MCore-MASS-12,
Author = {Marco Valero, A. Selcuk Uluagac, Venkatachalam S., Ramalingam K. C., and Raheem Beyah},
Booktitle = {Mobile Ad-hoc and Sensor Systems (MASS) Conference, 2012 IEEE International},
Month = {October},
Title = {The Monitoring Core (M-Core): A Modular Architecture for Rapid Sensor App Development},
Year = {2012},
}

@inproceedings{Uluagac-C08-DiSec-Infocom-12,
Author = {Valero, M. and Sang Shin Jung and Uluagac, A.Selcuk and Yingshu Li and Beyah, R.},
Booktitle = {INFOCOM, 2012 Proceedings IEEE},
Month = {march},
Pages = {585 -593},
Title = {Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
Year = {2012},
}

@inproceedings{Uluagac-C10-3DSecVulnTool-LCN-12,
Author = {Troy Nunnally, A. Selcuk Uluagac,and R. A. Beyah,},
Booktitle = {Local Computer Networks (LCN), IEEE International Conference on},
Month = {Oct.},
Title = {DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for Network Security},
Year = {2012},
}

@INPROCEEDINGS{Brze1404:Active,
AUTHOR=”Albert Brzeczko, Jr and A. Selcuk Uluagac and Raheem Beyah and John A.
Copeland”,
TITLE=”Active Deception Model for Securing Cloud Infrastructure”,
BOOKTITLE=”2014 IEEE INFOCOM Workshops: 2014 IEEE INFOCOM Workshop on Security and
Privacy in Big Data (INFOCOM’2014 Workshop on Security and Privacy in Big
Data)”,
ADDRESS=”Toronto, Canada”,
DAYS=27,
MONTH=apr,
YEAR=2014,
}

@INPROCEEDINGS{Ulua1404:MACA,
AUTHOR=”Wenyi Liu and A. Selcuk Uluagac and Raheem Beyah”,
TITLE=”{MACA:} A {Privacy-Preserving} Multi-factor Cloud Authentication System
Utilizing Big Data”,
BOOKTITLE=”2014 IEEE INFOCOM Workshops: 2014 IEEE INFOCOM Workshop on Security and
Privacy in Big Data (INFOCOM’2014 Workshop on Security and Privacy in Big
Data)”,
ADDRESS=”Toronto, Canada”,
DAYS=27,
MONTH=apr,
YEAR=2014,
}

@inproceedings{Uluagac-C06-ASPL-ICC-10,
Author = {Uluagac, A.Selcuk and Beyah, R.A. and Kane, R. and Joshi, S. and Copeland, J.A.},
Booktitle = {Communications (ICC), 2010 IEEE International Conference on},
Month = {may},
Pages = {1 -6},
Title = {Analysis of Varying AS Path Lengths from the Edge of the Network},
Year = {2010},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/ICC.2010.5502709}}

@INPROCEEDINGS{Sakthi-Covert-Channel,
AUTHOR=”Sakthi Vignesh Radhakrishnan and Selcuk Uluagac and Raheem Beyah”,
TITLE=”Realizing an 802.11-based Covert Timing Channel Using {Off-The-Shelf}
Wireless Cards”,
BOOKTITLE=”Globecom 2013 – Communication and Information System Security Symposium
(GC13 CISS)”,
ADDRESS=”Atlanta, USA”,
DAYS=9,
MONTH=dec,
YEAR=2013,
}

@INPROCEEDINGS{Uluagac:CPS-Security-CNS14,
AUTHOR=”A. Selcuk Uluagac and Venkatachalam Subramanian and Raheem Beyah”,
TITLE=”Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call”,
BOOKTITLE=”2014 IEEE Conference on Communications and Network Security (CNS) (IEEE CNS
2014)”,
ADDRESS=”San Francisco, USA”,
DAYS=29,
MONTH=oct,
YEAR=2014,
}

@inproceedings{Uluagac-C08-DiSec-Infocom-12,
Author = {Valero, M. and Sang Shin Jung and Uluagac, A.Selcuk and Yingshu Li and Beyah, R.},
Booktitle = {INFOCOM, 2012 Proceedings IEEE},
Month = {march},
Pages = {585 -593},
Title = {Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
Year = {2012},
}

@inproceedings{Uluagac-C03-DSPLearning-ASEE-08,
Address = {Pittsburgh, PA},
Author = {Uluagac, A. Selcuk and Williams, D.},
Booktitle = {American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
Month = {June},
Title = {Building Hardware-based Low-Cost Experimental DSP Learning Modules},
Year = {2008}}

@inproceedings{Uluagac-C02-Design-ASEE-07,
Address = {Hawaii},
Author = {Butera, R and Clark, M. and Deck, A.and Torba, M.and Trahan, S. and Uluagac, Selcuk and Williams, D.},
Booktitle = {American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
Month = {June},
Title = {Cooperative University/Industry Development of a Freshman “Introduction to ECE Design” Course},
Year = {2007}}

@inproceedings{Uluagac-C12-MCore-MASS-12,
Author = {Marco Valero, A. Selcuk Uluagac, Venkatachalam S., Ramalingam K. C., and Raheem Beyah},
Booktitle = {Mobile Ad-hoc and Sensor Systems (MASS) Conference, 2012 IEEE International},
Month = {October},
Title = {The Monitoring Core (M-Core): A Modular Architecture for Rapid Sensor App Development},
Year = {2012},
}

@inproceedings{nunnally2013navsec,
title={NAVSEC: a recommender system for 3D network security visualizations},
author={Nunnally, Troy and Abdullah, Kulsoom and Uluagac, A Selcuk and Copeland, John A and Beyah, Raheem},
booktitle={Proceedings of the Tenth Workshop on Visualization for Cyber Security},
pages={41–48},
year={2013},
organization={ACM}
}

@inproceedings{Uluagac-C11-NDR-Sec-LCN-12,
Author = {Aaron Goldman, A. Selcuk Uluagac, R. A. Beyah, and J. A. Copeland,},
Booktitle = {Local Computer Networks (LCN), IEEE International Conference on},
Month = {Oct.},
Title = {Plugging the Leaks without Unplugging your Network in the Midst of Disaster},
Year = {2012},
}

@incollection{Uluagac-C01-IPMulticast-Springer-03,
Author = {Uluagac, A. Selcuk and Peha, Jon},
Booktitle = {Group Communications and Charges. Technology and Business Models},
Keyword = {Computer Science},
Pages = {168-180},
Publisher = {Springer Berlin / Heidelberg},
Series = {Lecture Notes in Computer Science},
Title = {IP Multicast over Cable TV Networks},
Volume = {2816},
Year = {2003},
Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-39405-1_15}}

@inproceedings{Uluagac-C05-OpenSource-ASEE-09,
Address = {Austin, TX},
Author = {Uluagac, A. Selcuk and Fallon, T. and Thain, W. and Copeland, John A.},
Booktitle = {American Society for Engineering Education (ASEE) Annual Conference of Composition and Exhibition},
Month = {June},
Title = {Development of Undergraduate Network Security Labs with Open Source Tools},
Year = {2009}}

@INPROCEEDINGS{Nunn1306:P3D,
AUTHOR=”Troy Nunnally and Penyen Chi and Kulsoom Abdullah and Selcuk Uluagac and
John A. Copeland and Raheem Beyah”,
TITLE=”{P3D:} A Parallel {3D} Coordinate Visualization for Advanced Network Scans”,
BOOKTITLE=”IEEE ICC 2013 – Communication and Information Systems Security Symposium
(ICC’13 CISS)”,
ADDRESS=”Budapest, Hungary”,
PAGES=”2037-2042″,
DAYS=9,
MONTH=jun,
YEAR=2013,
}

@INPROCEEDINGS{K.Ch1310:PROVIZ,
AUTHOR=”Ramalingam {K. Chandrasekar} and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{PROVIZ:} An Integrated Visualization and Programming Framework for {WSNs}”,
BOOKTITLE=”Eight IEEE Workshop on Practical Issues in Building Sensor Network
Applications 2013 (IEEE SenseApp 2013)”,
ADDRESS=”Sydney, Australia”,
PAGES=”146-149″,
DAYS=21,
MONTH=oct,
YEAR=2013,
}

@INPROCEEDINGS{Lia-Smatch-Poster:S,
AUTHOR=”Xiaojing Liao and Selcuk Uluagac and Raheem Beyah”,
TITLE=”{S-Match:} An Efficient Privacy-preserving Profile Matching Scheme”,
BOOKTITLE=”IEEE Conference on Communications and Network Security 2013 – Poster
Session (IEEE CNS 2013 – Poster Session)”,
ADDRESS=”Washington, USA”,
PAGES=”205-206″,
DAYS=14,
MONTH=oct,
YEAR=2013,
}

@INPROCEEDINGS{Venkat-ICC-13:Examining,
AUTHOR=”Venkatachalam Subramanian and Selcuk Uluagac and Raheem Beyah and Hasan Cam”,
TITLE=”Examining the Characteristics and Implications of Sensor Side Channels”,
BOOKTITLE=”IEEE ICC 2013 – Communication and Information Systems Security Symposium
(ICC’13 CISS)”,
ADDRESS=”Budapest, Hungary”,
PAGES=”2185-2190″,
DAYS=9,
MONTH=jun,
YEAR=2013,
}

@inproceedings{Uluagac-C09-Simage-Globecom-12,
Author = {Ramalingam K. C., Venkatachalam Subramanian, A.Selcuk Uluagac, and R. A. Beyah},
Booktitle = {Global Telecommunications Conference (GLOBECOM), 2012 IEEE},
Month = {dec.},
Title = {Secure Distribution of Images for Wireless Sensor Networks},
Year = {2012},
}

@inproceedings{Uluagac-C07-Tick-Globecom-10,
Author = {Uluagac, A.Selcuk and Beyah, Raheem A. and Copeland, John A.},
Booktitle = {Global Telecommunications Conference (GLOBECOM), 2010 IEEE},
Month = {dec.},
Pages = {1 -6},
Title = {Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks},
Year = {2010},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/GLOCOM.2010.5683787}}

@INPROCEEDINGS{Radh1310:Passive,
AUTHOR=”Selcuk Uluagac and Sakthi Vignesh Radhakrishnan and Cherita L Corbett and
Antony Baca and Raheem Beyah”,
TITLE=”A Passive Technique for Fingerprinting Wireless Devices with Wired-side
Observations”,
BOOKTITLE=”2013 IEEE Conference on Communications and Network Security (CNS) (IEEE CNS
2013)”,
ADDRESS=”Washington, USA”,
PAGES=”471-479″,
DAYS=14,
MONTH=oct,
YEAR=2013,
}

@incollection{Uluagac-C04-WSNSurvey-WASA-08,
Author = {Uluagac, A. Selcuk and Lee, Christopher and Beyah, Raheem and Copeland, John},
Booktitle = {Wireless Algorithms, Systems, and Applications},
Editor = {Li, Yingshu and Huynh, Dung and Das, Sajal and Du, Ding-Zhu},
Pages = {503-514},
Publisher = {Springer Berlin / Heidelberg},
Series = {Lecture Notes in Computer Science},
Title = {Designing Secure Protocols for Wireless Sensor Networks},
Volume = {5258},
Year = {2008},
Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-88582-5_47}}

@INPROCEEDINGS{6997526,
author={A. S. Uluagac and W. Liu and R. Beyah},
booktitle={2014 IEEE Conference on Communications and Network Security},
title={A multi-factor re-authentication framework with user privacy},
year={2014},
volume={},
number={},
pages={504-505},
doi={10.1109/CNS.2014.6997526},
ISSN={},
month={Oct},}

@INPROCEEDINGS{8424658,
author={A. Acar and H. Aksu and A. S. Uluagac and K. Akkaya},
booktitle={2018 IEEE Security and Privacy Workshops (SPW)},
title={WACA: Wearable-Assisted Continuous Authentication},
year={2018},
volume={},
number={},
pages={264-269},
doi={10.1109/SPW.2018.00042},
ISSN={},
month={May},}

@INPROCEEDINGS{7860522,
author={L. Babun and H. Aksu and A. Selcuk Uluagac},
booktitle={2016 IEEE Conference on Communications and Network Security (CNS)},
title={A framework for counterfeit smart grid device detection},
year={2016},
volume={},
number={},
pages={382-383},
keywords={IEC standards;power system protection;power system security;risk management;smart power grids;untrusted counterfeit smart grid device detection;two-way communication reliability;security risk;cyber threat;smart grid component protection;smart-grid GOOSE message;IEC-61850 communication protocol;Smart grids;Correlation;Security;Libraries;Performance evaluation;Malware;Reliability;Smart Grid;counterfeit devices;cyber security;IEC-61850},
doi={10.1109/CNS.2016.7860522},
ISSN={},
month={Oct},}

@INPROCEEDINGS{7387401,
author={A. Aydeger and K. Akkaya and A. S. Uluagac},
booktitle={2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN)},
title={SDN-based resilience for smart grid communications},
year={2015},
volume={},
number={},
pages={31-33},
keywords={smart power grids;software defined networking;SDN-based resilience;smart grid communications;SDN-based technologies;smart grid SCADA;distribution networks;distribution substations;Open Daylight SDN controller;network simulator;ns-3;Mininet;wireless interface;Smart grids;Wireless communication;Switches;Routing protocols;Conferences;Communication system security},
doi={10.1109/NFV-SDN.2015.7387401},
ISSN={},
month={Nov},}

@INPROCEEDINGS{Xiaojing-Poster-CNS14,
author={Xiaojing Liao and S. Uluagac and R. A. Beyah},
booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
title={S-Match: An efficient privacy-preserving profile matching scheme},
year={2013},
volume={},
number={},
pages={377-378},
doi={10.1109/CNS.2013.6682736},
ISSN={},
month={Oct},}

@INPROCEEDINGS{KyleCCNC2016,
author={K. Denney and A. S. Uluagac and K. Akkaya and S. Bhansali},
booktitle={2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC)},
title={A novel storage covert channel on wearable devices using status bar notifications},
year={2016},
volume={},
number={},
pages={845-848},
doi={10.1109/CCNC.2016.7444898},
ISSN={2331-9860},
month={Jan},}

@INPROCEEDINGS{AlbertInfocomWS-14,
author={A. Brzeczko and A. S. Uluagac and R. Beyah and J. Copeland},
booktitle={2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
title={Active deception model for securing cloud infrastructure},
year={2014},
volume={},
number={},
pages={535-540},
doi={10.1109/INFCOMW.2014.6849288},
ISSN={},
month={April},}

@INPROCEEDINGS{P3D-TroyICC-13,
author={T. Nunnally and P. Chi and K. Abdullah and A. S. Uluagac and J. A. Copeland and R. Beyah},
booktitle={2013 IEEE International Conference on Communications (ICC)},
title={P3D: A parallel 3D coordinate visualization for advanced network scans},
year={2013},
volume={},
number={},
pages={2052-2057},
doi={10.1109/ICC.2013.6654828},
ISSN={1550-3607},
month={June},}

@INPROCEEDINGS{8319206,
author={A. Aydeger and N. Saputro and K. Akkaya and S. Uluagac},
booktitle={2018 15th IEEE Annual Consumer Communications Networking Conference (CCNC)},
title={Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications},
year={2018},
volume={},
number={},
pages={1-6},
doi={10.1109/CCNC.2018.8319206},
ISSN={2331-9860},
month={Jan},}

@Inbook{Denney:2018:AnAndroid,
author=”Denney, Kyle
and Uluagac, A. Selcuk
and Aksu, Hidayet
and Akkaya, Kemal”,
editor=”Conti, Mauro
and Somani, Gaurav
and Poovendran, Radha”,
title=”An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications”,
bookTitle=”Versatile Cybersecurity”,
year=”2018″,
publisher=”Springer International Publishing”,
address=”Cham”,
pages=”1–17″,
isbn=”978-3-319-97643-3″,
doi=”10.1007/978-3-319-97643-3_1″,
url=”https://doi.org/10.1007/978-3-319-97643-3_1″
}

@INPROCEEDINGS{8423022,
author={C. Kaygusuz and L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2018 IEEE International Conference on Communications (ICC)},
title={Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques},
year={2018},
volume={},
number={},
pages={1-6},
keywords={Smart grids;Libraries;Object recognition;Smart devices;Sensors;Machine learning},
doi={10.1109/ICC.2018.8423022},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{Xiaojing-DSN14,
author={X. Liao and S. Uluagac and R. A. Beyah},
booktitle={2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks},
title={S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services},
year={2014},
volume={},
number={},
pages={287-298},
doi={10.1109/DSN.2014.37},
ISSN={1530-0889},
month={June},}

@INPROCEEDINGS{TickGlobecom2010,
author={A. S. Uluagac and R. A. Beyah and J. A. Copeland},
booktitle={2010 IEEE Global Telecommunications Conference GLOBECOM 2010},
title={Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks},
year={2010},
volume={},
number={},
pages={1-6},
doi={10.1109/GLOCOM.2010.5683787},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{8301744,
author={A. K. Sikder and A. Acar and H. Aksu and A. S. Uluagac and K. Akkaya and M. Conti},
booktitle={2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)},
title={IoT-enabled smart lighting systems for smart cities},
year={2018},
volume={},
number={},
pages={639-645},
keywords={Internet of Things;lighting;protocols;smart cities;town and country planning;IoT-enabled smart lighting systems;urban services;information and communication technologies;lighting management system;IoT-enabled communication protocols;smart city environment;SLS;Lighting;Protocols;Smart cities;Intelligent sensors;Wireless communication;Smart Lighting;Internet of Things;Smart City},
doi={10.1109/CCWC.2018.8301744},
ISSN={},
month={Jan},}

@ARTICLE{6951398,
author={S. V. Radhakrishnan and A. S. Uluagac and R. Beyah},
journal={IEEE Transactions on Dependable and Secure Computing},
title={GTID: A Technique for Physical DeviceandDevice Type Fingerprinting},
year={2015},
volume={12},
number={5},
pages={519-532},
keywords={neural nets;radio networks;statistical analysis;telecommunication security;telecommunication traffic;GTID;physical device;device type fingerprinting;wireless devices;local network;statistical techniques;network traffic;artificial neural networks;ANN;security mechanisms;Wireless communication;Clocks;Protocols;Object recognition;Communication system security;Timing;Artificial neural networks;GTID;Device Fingerprinting;Wireless Device Fingerprinting;Device Type Fingerprinting;GTID;device fingerprinting;wireless device fingerprinting;device type fingerprinting},
doi={10.1109/TDSC.2014.2369033},
ISSN={1545-5971},
month={Sept},}

@INPROCEEDINGS{AsPathLength2010ICC,
author={A. S. Uluagac and R. A. Beyah and R. Kane and S. Joshi and J. A. Copeland},
booktitle={2010 IEEE International Conference on Communications},
title={Analysis of Varying AS Path Lengths from the Edge of the Network},
year={2010},
volume={},
number={},
pages={1-6},
doi={10.1109/ICC.2010.5502709},
ISSN={1938-1883},
month={May},}

@ARTICLE{5438995,
author={A. S. Uluagac and R. A. Beyah and Y. Li and J. A. Copeland},
journal={IEEE Transactions on Mobile Computing},
title={VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks},
year={2010},
volume={9},
number={7},
pages={994-1007},
doi={10.1109/TMC.2010.51},
ISSN={1536-1233},
month={July},}

@ARTICLE{8299447,
author={H. Aksu and A. S. Uluagac and E. Bentley},
journal={IEEE Transactions on Sustainable Computing},
title={Identification of Wearable Devices with Bluetooth},
year={2018},
volume={},
number={},
pages={1-1},
doi={10.1109/TSUSC.2018.2808455},
ISSN={2377-3782},
month={},}

@INPROCEEDINGS{SensoryChannelThreats-CNS-2014,
author={A. S. Uluagac and V. Subramanian and R. Beyah},
booktitle={2014 IEEE Conference on Communications and Network Security},
title={Sensory channel threats to Cyber Physical Systems: A wake-up call},
year={2014},
volume={},
number={},
pages={301-309},
doi={10.1109/CNS.2014.6997498},
ISSN={},
month={Oct},}

@INPROCEEDINGS{UluagacCNS13,
author={A. S. Uluagac and S. V. Radhakrishnan and C. Corbett and A. Baca and R. Beyah},
booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
title={A passive technique for fingerprinting wireless devices with Wired-side Observations},
year={2013},
volume={},
number={},
pages={305-313},
doi={10.1109/CNS.2013.6682720},
ISSN={},
month={Oct},}

@INPROCEEDINGS{SametCCNC2016,
author={S. Tonyali and K. Akkaya and N. Saputro and A. S. Uluagac},
booktitle={2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC)},
title={A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks},
year={2016},
volume={},
number={},
pages={550-555},
doi={10.1109/CCNC.2016.7444839},
ISSN={2331-9860},
month={Jan},}

@INPROCEEDINGS{8108803,
author={A. Akkiraju and D. Gabay and H. B. Yesilyurt and H. Aksu and S. Uluagac},
booktitle={2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)},
title={Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers},
year={2017},
volume={},
number={},
pages={580-584},
keywords={microcomputers;program testing;security of data;automated exploitation;local network machines;defensive cybersecurity framework;single local network;exploitation tool-kits;single-board computer;SBC;penetration testing tools;Cybergrenade framework;Tools;XML;Linux;Computers;Automation;Security;Automated Penetration Testing;Local Machines;OpenVAS;Metasploit;Nmap;Exploitation;Single Board Computers},
doi={10.1109/MASS.2017.95},
ISSN={2155-6814},
month={Oct},}

@INPROCEEDINGS{DiSec-Infocom12,
author={M. Valero and Sang Shin Jung and A. Selcuk Uluagac and Y. Li and R. Beyah},
booktitle={2012 Proceedings IEEE INFOCOM},
title={Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks},
year={2012},
volume={},
number={},
pages={585-593},
doi={10.1109/INFCOM.2012.6195801},
ISSN={0743-166X},
month={March},}

@INPROCEEDINGS{WenyiMaca-InfocomWS14,
author={W. Liu and A. S. Uluagac and R. Beyah},
booktitle={2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
title={MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data},
year={2014},
volume={},
number={},
pages={518-523},
doi={10.1109/INFCOMW.2014.6849285},
ISSN={},
month={April},}

@INPROCEEDINGS{Troy-Intersec-ICC-15,
author={T. Nunnally and A. S. Uluagac and R. Beyah},
booktitle={2015 IEEE International Conference on Communications (ICC)},
title={InterSec: An interaction system for network security applications},
year={2015},
volume={},
number={},
pages={7132-7138},
doi={10.1109/ICC.2015.7249464},
ISSN={1550-3607},
month={June},}

@INPROCEEDINGS{Marco-MCore-MASS12,
author={M. Valero and S. Uluagac and S. Venkatachalam and K. C. Ramalingam and R. Beyah},
booktitle={2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)},
title={The Monitoring Core: A framework for sensor security application development},
year={2012},
volume={},
number={},
pages={263-271},
doi={10.1109/MASS.2012.6502525},
ISSN={2155-6806},
month={Oct},}

@INPROCEEDINGS{Aaron-CCFS-LCN14,
author={A. D. Goldman and A. S. Uluagac and J. A. Copeland},
booktitle={39th Annual IEEE Conference on Local Computer Networks},
title={Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking},
year={2014},
volume={},
number={},
pages={142-149},
doi={10.1109/LCN.2014.6925766},
ISSN={0742-1303},
month={Sept},}

@INPROCEEDINGS{7577060,
author={E. Vattapparamban and İ. Güvenç and A. İ. Yurekli and K. Akkaya and S. Uluağaç},
booktitle={2016 International Wireless Communications and Mobile Computing Conference (IWCMC)},
title={Drones for smart cities: Issues in cybersecurity, privacy, and public safety},
year={2016},
volume={},
number={},
pages={216-221},
keywords={autonomous aerial vehicles;safety;smart cities;privacy;malicious entities;societal concerns;future smart cities;broadband wireless access;mobile hot spots;drones;public safety;cybersecurity;Drones;IEEE 802.11 Standard;FAA;Safety;Smart cities;Privacy;Drones;Internet of Things (IoT);privacy;search and rescue;security;UAVs;VPN;WiFi Pineapple},
doi={10.1109/IWCMC.2016.7577060},
ISSN={2376-6506},
month={Sept},}

@INPROCEEDINGS{Jinyoun-Globecom14,
author={J. Cho and A. S. Uluagac and J. Copeland and Y. Chang},
booktitle={2014 IEEE Global Communications Conference},
title={Efficient safety message forwarding using multi-channels in low density VANETs},
year={2014},
volume={},
number={},
pages={70-75},
doi={10.1109/GLOCOM.2014.7036786},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{Abdullah-SDN-LCNworkshop2015,
author={K. Akkaya and A. S. Uluagac and A. Aydeger},
booktitle={2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)},
title={Software defined networking for wireless local networks in Smart Grid},
year={2015},
volume={},
number={},
pages={826-831},
doi={10.1109/LCNW.2015.7365934},
ISSN={},
month={Oct},}

@ARTICLE{5454381,
author={C. P. Lee and A. S. Uluagac and K. D. Fairbanks and J. A. Copeland},
journal={IEEE Transactions on Education},
title={The Design of NetSecLab: A Small Competition-Based Network Security Lab},
year={2011},
volume={54},
number={1},
pages={149-155},
keywords={computer aided instruction;computer network security;Linux;NetSecLab;small competition-based network security lab;teach system;closed network;student-formed teams;Linux distribution system;teaching system security;Security;Linux;Generators;Computers;Materials;Education;IP networks;NetSecLab;network security;network security education;network security lab},
doi={10.1109/TE.2010.2048215},
ISSN={0018-9359},
month={Feb},}

@INPROCEEDINGS{ProvizSenseApp13,
author={R. K. Chandrasekar and A. S. Uluagac and R. Beyah},
booktitle={38th Annual IEEE Conference on Local Computer Networks – Workshops},
title={PROVIZ: An integrated visualization and programming framework for WSNs},
year={2013},
volume={},
number={},
pages={146-149},
doi={10.1109/LCNW.2013.6758511},
ISSN={},
month={Oct},}

@ARTICLE{6216359,
author={A. Selcuk Uluagac and R. A. Beyah and J. A. Copeland},
journal={IEEE Transactions on Parallel and Distributed Systems},
title={Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks},
year={2013},
volume={24},
number={4},
pages={803-813},
keywords={cryptographic protocols;filtering theory;routing protocols;synchronisation;telecommunication security;wireless sensor networks;secure source-based loose synchronization protocol;SOBAS protocol;wireless sensor networks;synchronization control messages;dynamic en-route filtering mechanism;WSN;reduced energy consumption;sensor technology;time 7.24 mus;Synchronization;Cryptography;Wireless sensor networks;Clocks;Protocols;Global Positioning System;Secure loose synchronization;secure time synchronization for wireless sensor networks;SOBAS;wireless sensor networks;sensor-based cyber-physical systems},
doi={10.1109/TPDS.2012.170},
ISSN={1045-9219},
month={April},}

@INPROCEEDINGS{7996877,
author={L. Babun and H. Aksu and A. S. Uluagac},
booktitle={2017 IEEE International Conference on Communications (ICC)},
title={Identifying counterfeit smart grid devices: A lightweight system level framework},
year={2017},
volume={},
number={},
pages={1-6},
keywords={smart power grids;statistical analysis;smart grid devices;behavioural characteristics;statistical analysis;function call tracing techniques;configurable framework;smart grid components;smart grid communication infrastructure;counterfeit smart grid devices;lightweight system level framework;Smart grids;Monitoring;Performance evaluation;Computational modeling;Supply chains;Security;Phasor measurement units;Smart Grid;counterfeit devices;cyber security;IEC61850;system calls;function calls},
doi={10.1109/ICC.2017.7996877},
ISSN={1938-1883},
month={May},}

@INPROCEEDINGS{SkypeInformationLeakage2015,
author={C. Wampler and S. Uluagac and R. Beyah},
booktitle={2015 IEEE Global Communications Conference (GLOBECOM)},
title={Information Leakage in Encrypted IP Video Traffic},
year={2015},
volume={},
number={},
pages={1-7},
doi={10.1109/GLOCOM.2015.7417767},
ISSN={},
month={Dec},}

@INPROCEEDINGS{AaronPluggingTheLeaksLCN12,
author={A. D. Goldman and A. S. Uluagac and R. Beyah and J. A. Copeland},
booktitle={37th Annual IEEE Conference on Local Computer Networks},
title={Plugging the leaks without unplugging your network in the midst of Disaster},
year={2012},
volume={},
number={},
pages={248-251},
doi={10.1109/LCN.2012.6423620},
ISSN={0742-1303},
month={Oct},}

@ARTICLE{7876852,
author={H. Menouar and I. Guvenc and K. Akkaya and A. S. Uluagac and A. Kadri and A. Tuncer},
journal={IEEE Communications Magazine},
title={UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges},
year={2017},
volume={55},
number={3},
pages={22-28},
keywords={autonomous aerial vehicles;intelligent transportation systems;mobile robots;mobility management (mobile radio);smart cities;UAV-enabled intelligent transportation systems;next-generation smart cities;ITS application domains;connected vehicles;autonomous vehicles;fully automated transportation systems;autonomous operation;communication capabilities;processing capabilities;Smart cities;Accidents;Road transportation;Law enforcement;Intelligent transportation systems;Urban areas},
doi={10.1109/MCOM.2017.1600238CM},
ISSN={0163-6804},
month={March},}

@INPROCEEDINGS{3dsvat-Troy-LCN12,
author={T. Nunnally and A. S. Uluagac and J. A. Copeland and R. Beyah},
booktitle={37th Annual IEEE Conference on Local Computer Networks},
title={3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security},
year={2012},
volume={},
number={},
pages={111-118},
doi={10.1109/LCN.2012.6423586},
ISSN={0742-1303},
month={Oct},}

@INPROCEEDINGS{SakthiCovertChannelGlobecom13,
author={S. V. Radhakrishnan and A. Selcuk Uluagac and R. Beyah},
booktitle={2013 IEEE Global Communications Conference (GLOBECOM)},
title={Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards},
year={2013},
volume={},
number={},
pages={722-728},
doi={10.1109/GLOCOM.2013.6831158},
ISSN={1930-529X},
month={Dec},}

@INPROCEEDINGS{Simage-Globecom12,
author={K. C. Ramalingam and V. Subramanian and A. S. Uluagac and R. Beyah},
booktitle={2012 IEEE Global Communications Conference (GLOBECOM)},
title={SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks},
year={2012},
volume={},
number={},
pages={616-621},
doi={10.1109/GLOCOM.2012.6503181},
ISSN={1930-529X},
month={Dec},}

@ARTICLE{7390161,
author={G. Chen and J. H. Cox, and A. S. Uluagac and J. A. Copeland},
journal={IEEE Communications Surveys Tutorials},
title={In-Depth Survey of Digital Advertising Technologies},
year={2016},
volume={18},
number={3},
pages={2124-2148},
keywords={advertising;ecology;information technology;mobile computing;online front-ends;search engines;Web sites;digital advertising technology in-depth survey;primary revenue;information technology;free Web browser;search engine;mobile application;digital advertising ecosystem;mobile application interface;online Web site;Advertising;Mobile communication;Ecosystems;Internet;Google;Tutorials;Mobile applications;Digital advertising;mobile advertising;online advertising;monetization;networking;privacy;security;advertising networks;advertising policy},
doi={10.1109/COMST.2016.2519912},
ISSN={1553-877X},
month={thirdquarter},}

@INPROCEEDINGS{Venkat-ICC13,
author={V. Subramanian and S. Uluagac and H. Cam and R. Beyah},
booktitle={2013 IEEE International Conference on Communications (ICC)},
title={Examining the characteristics and implications of sensor side channels},
year={2013},
volume={},
number={},
pages={2205-2210},
doi={10.1109/ICC.2013.6654855},
ISSN={1550-3607},
month={June},}

@ARTICLE{8337812,
author={H. Aksu and L. Babun and M. Conti and G. Tolomei and A. S. Uluagac},
journal={IEEE Communications Magazine},
title={Advertising in the IoT Era: Vision and Challenges},
year={2018},
volume={},
number={},
pages={1-7},
keywords={Advertising;Internet;Automobiles;Smart phones;Computer architecture;Smart devices},
doi={10.1109/MCOM.2017.1700871},
ISSN={0163-6804},
month={},}

@INPROCEEDINGS{7511049,
author={A. Aydeger and K. Akkaya and M. H. Cintuglu and A. S. Uluagac and O. Mohammed},
booktitle={2016 IEEE International Conference on Communications (ICC)},
title={Software defined networking for resilient communications in Smart Grid active distribution networks},
year={2016},
volume={},
number={},
pages={1-6},
keywords={distribution networks;smart power grids;software defined networking;substations;software defined networking;resilient communication;smart grid active distribution network;SDN technology;smart grid communication infrastructure;heterogenous device;real-time information;active distribution substation;wireless communication link;SDN controller;fine-grained network metric;Mininet-based testing framework;ns-3 network simulator;Substations;Smart grids;IEC Standards;Wireless communication;Protocols;Quality of service;Control systems;SDN;wireless networks;smart grid;substations;resilience},
doi={10.1109/ICC.2016.7511049},
ISSN={1938-1883},
month={May},}

@ARTICLE{7740849,
author={M. H. Cintuglu and O. A. Mohammed and K. Akkaya and A. S. Uluagac},
journal={IEEE Communications Surveys Tutorials},
title={A Survey on Smart Grid Cyber-Physical System Testbeds},
year={2017},
volume={19},
number={1},
pages={446-464},
keywords={cyber-physical systems;power engineering computing;smart power grids;smart grid cyber-physical system testbeds;smart grid interdisciplinary structure;Smart grids;Phasor measurement units;Cyber-physical systems;Security;Microgrids;Taxonomy;Cyber-physical systems;testbed;smart grid},
doi={10.1109/COMST.2016.2627399},
ISSN={1553-877X},
month={Firstquarter},}

@INPROCEEDINGS{7860527,
author={S. Michaels and K. Akkaya and A. Selcuk Uluagac},
booktitle={2016 IEEE Conference on Communications and Network Security (CNS)},
title={Inducing data loss in Zigbee networks via join/association handshake spoofing},
year={2016},
volume={},
number={},
pages={401-405},
keywords={computer network security;cryptographic protocols;Internet of Things;wireless mesh networks;Zigbee;data loss;Zigbee networks;join-association handshake spoofing;IEEE 802.15.4-based specification;low-power wireless mesh networks;protocol;Internet-of-Things;IoT;network coordinator;unencrypted joining device;denial-of-service attack;rogue device;resource limitations;Zigbee devices;permanent storage;challenge-response based authentication;ZigBee;Cryptography;Computer crime;Authentication;Conferences;Protocols},
doi={10.1109/CNS.2016.7860527},
ISSN={},
month={Oct},}

@INPROCEEDINGS{8166615,
author={A. Acar and Z. B. Celik and H. Aksu and A. S. Uluagac and P. McDaniel},
booktitle={2017 IEEE Symposium on Privacy-Aware Computing (PAC)},
title={Achieving Secure and Differentially Private Computations in Multiparty Settings},
year={2017},
volume={},
number={},
pages={49-59},
keywords={cryptographic protocols;data privacy;statistical analysis;Secure multiparty computation;SMC;novel Secure Multiparty Distributed Differentially Private protocol;horizontally distributed data;final constructed statistical model;statistical model function;SM-DDP protocol;distributed DP;minimal computational overhead;Computational modeling;Protocols;Data privacy;Privacy;Linear regression;Distributed databases;Security;Secure computation;differential privacy;multiparty;distributed differential privacy;predictive models;regression},
doi={10.1109/PAC.2017.12},
ISSN={},
month={Aug},}

USA