Showing results 2 to 21 of 49
< previous
next >
Issue Date | Title | Involved Person(s) |
Mar-2020 | A Markovian model for satellite integrated cognitive and D2D HetNets | Sinem Kafıloğlu, S.; Gür, Gürkan; Alagöz, Fatih |
2023 | A survey on role of blockchain for IoT : applications and technical aspects | Mathur, Shikha; Kalla, Anshuman; Gür, Gürkan; Bohra, Manoj Kumar; Liyanage, Madhusanka |
2022 | A survey on the use of blockchain for future 6G : technical aspects, use cases, challenges and research directions | Kalla, Anshuman; de Alwis, Chamitha; Porambage, Pawani; Gür, Gürkan; Liyanage, Madhusanka |
Jun-2021 | AI-enabled slice protection exploiting moving target defense in 6G networks | Christopoulou, Maria; Soussi, Wissem; Xilouris, George; Gür, Gürkan; Montes de Oca, Edgardo, et al |
Aug-2018 | Attribute based content security and caching in information centric IoT | Sertbaş, Nurefşan; Aytaç, Samet; Ermiş, Orhan; Alagöz, Fatih; Gür, Gürkan |
2019 | Caching and D2D sharing for content delivery in software-defined UAV networks | Kalinagac, Onur; Kafiloglu, S. Sinem; Alagöz, Fatih; Gür, Gürkan |
2020 | Connectivity mode management for user devices in heterogeneous D2D networks | Kafiloglu, S. Sinem; Gür, Gürkan; Alagoz, Fatih |
Dec-2020 | Convergence of ICN and MEC for 5G : opportunities and challenges | Gür, Gürkan; Porambage, Pawani; Liyanage, Madhusanka |
2020 | Cooperative caching and video characteristics in D2D edge networks | Kafıloğlu, S. Sinem; Gür, Gürkan; Alagöz, Fatih |
2019 | Cost-aware securing of IoT systems using attack graphs | Yiğit, Beytüllah; Gür, Gürkan; Alagöz, Fatih; Tellenbach, Bernhard |
May-2023 | Demo: closed-loop security orchestration in the telco cloud for moving target defense | Soussi, Wissem; Christopoulou, Maria; Xilouris, George; Oca, Edgardo Montes de; Lefebvre, Vincent, et al |
2023 | Demonstrating liability and trust metrics for multi-actor, dynamic edge and cloud microservices | Anser, Yacine; Gaber, Chrystel; Cajeat, Romain; Wary, Jean-Philippe; Bouzefrane, Samia, et al |
9-Aug-2020 | Don’t click : towards an effective anti-phishing training. A comparative literature review | Jampen, Daniel; Gür, Gürkan; Sutter, Thomas; Tellenbach, Bernhard |
Oct-2020 | Dynamic group key agreement for resource-constrained devices using blockchains | Taçyıldız, Yaşar Berkay; Ermiş, Orhan; Gür, Gürkan; Alagöz, Fatih |
2024 | Emerging directions for blockchainized 6G | Kalla, Anshuman; de Alwis, Chamitha; Gochhayat, Sarada Prasad; Gür, Gürkan; Liyanage, Madhusanka, et al |
18-Jun-2021 | Energy prioritized caching for cellular D2D networks | Kafıloğlu, Sebahat Sinem; Gür, Gürkan; Alagöz, Fatih |
2022 | ETSI ZSM driven security management in future networks | Chollon, Geoffrey; Ayed, Dhouha; Garriga, Rodrigo Asensio; Zarca, Alejandro Molina; Skarmeta, Antonio, et al |
Dec-2020 | Expansive networks : exploiting spectrum sharing for capacity boost and 6G vision | Gür, Gürkan |
2023 | Ghidrion : a Ghidra plugin to support symbolic execution | Wagner, Arno; Gür, Gürkan; Pfammatter, Damian; Flum, Silvan; Huber, Valentin |
2022 | Graph based liability analysis for the microservice architecture | Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan |