Search

Your search keyword '"Uluagac, A. Selcuk"' showing total 221 results

Search Constraints

Start Over You searched for: Author "Uluagac, A. Selcuk" Remove constraint Author: "Uluagac, A. Selcuk"
221 results on '"Uluagac, A. Selcuk"'

Search Results

1. D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network

2. A Survey on Security and Privacy Issues of UAVs

3. A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems

4. SoK: Cryptojacking Malware

5. Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

6. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

7. PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings

8. Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

9. A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses

10. LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit

11. A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case

12. Real-time Analysis of Privacy-(un)aware IoT Applications

13. KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

14. A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices

15. Aegis: A Context-aware Security Framework for Smart Home Systems

16. HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

17. An Analysis of Malware Trends in Enterprise Networks

18. HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

19. U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

22. Identification of Wearable Devices with Bluetooth

23. IoTDots: A Digital Forensics Framework for Smart Environments

24. Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

25. WACA: Wearable-Assisted Continuous Authentication

26. Sensitive Information Tracking in Commodity IoT

27. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

28. Advertising in the IoT Era: Vision and Challenges

29. Achieving Secure and Differentially Private Computations in Multiparty Settings

30. 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

31. A Survey on Homomorphic Encryption Schemes: Theory and Implementation

32. Curie: Policy-based Secure Data Exchange

34. LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit

42. USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework

Catalog

Books, media, physical & digital resources