default search action
Ahmet Aris
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Nazli Tekin, Ahmet Aris, Abbas Acar, A. Selcuk Uluagac, Vehbi Cagri Gungor:
A review of on-device machine learning for IoT: An energy perspective. Ad Hoc Networks 153: 103348 (2024) - [j8]Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - [c19]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944 - [c18]Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac:
50 Shades of Support: A Device-Centric Analysis of Android Security Updates. NDSS 2024 - [c17]Harun Oz, Abbas Acar, Ahmet Aris, Güliz Seray Tuncay, Amin Kharraz, A. Selcuk Uluagac:
(In)Security of File Uploads in Node.js. WWW 2024: 1573-1584 - [i6]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024) - 2023
- [j7]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j6]Nazli Tekin, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac, Vehbi Cagri Gungor:
Energy consumption of on-device machine learning models for IoT intrusion detection. Internet Things 21: 100670 (2023) - [j5]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats. IEEE Internet Things J. 10(10): 8533-8546 (2023) - [c16]Javier Franco, Abbas Acar, Ahmet Aris, A. Selcuk Uluagac:
Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots. ICC 2023: 4860-4865 - [c15]Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, A. Selcuk Uluagac:
RøB: Ransomware over Modern Web Browsers. USENIX Security Symposium 2023: 7073-7090 - 2022
- [j4]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective. Ad Hoc Networks 125: 102728 (2022) - [j3]Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. 54(11s): 238:1-238:37 (2022) - [c14]Akm Iqtidar Newaz, Ahmet Aris, Amit Kumar Sikder, A. Selcuk Uluagac:
Systematic Threat Analysis of Modern Unified Healthcare Communication Systems. GLOBECOM 2022: 1404-1410 - [c13]Javier Franco, Ahmet Aris, Leonardo Babun, A. Selcuk Uluagac:
S-Pot: A Smart Honeypot Framework with Dynamic Rule Configuration for SDN. GLOBECOM 2022: 2818-2824 - [c12]Maryna Veksler, David Langus Rodríguez, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LoFin: LoRa-based UAV Fingerprinting Framework. MILCOM 2022: 980-985 - [c11]Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac:
A First Look at Code Obfuscation for WebAssembly. WISEC 2022: 140-145 - 2021
- [j2]Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac:
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. IEEE Commun. Surv. Tutorials 23(4): 2351-2383 (2021) - [c10]Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, A. Selcuk Uluagac:
MINOS: A Lightweight Real-Time Cryptojacking Detection System. NDSS 2021 - [c9]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LightningStrike: (in)secure practices of E-IoT systems in the wild. WISEC 2021: 106-116 - [i5]Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. CoRR abs/2102.06249 (2021) - [i4]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective. CoRR abs/2102.10695 (2021) - [i3]Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac:
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems. CoRR abs/2108.02287 (2021) - [i2]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues of UAVs. CoRR abs/2109.14442 (2021) - 2020
- [c8]Ahmet Aris, Sema F. Oktug:
Analysis of the RPL Version Number Attack with Multiple Attackers. CyberSA 2020: 1-8 - [c7]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings. BuildSys@SenSys 2020: 130-139 - [c6]Ahmet Haydar Örnek, Ahmet Aris, Nima Najaflou, Berk Canberk:
Dynamic Compression Scheduling for Content Delivery Networks. SIU 2020: 1-4 - [i1]Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings. CoRR abs/2010.05658 (2020)
2010 – 2019
- 2019
- [b1]Ahmet Aris:
New lightweight DoS attack mitigation techniques for RPL based IoT networks (RPL temelli IoT ağları için DoS saldırılarının etkisini azaltacak yeni teknikler). İstanbul Technical University, Turkey, 2019 - [j1]Ahmet Aris, Siddika Berna Örs Yalçin, Sema F. Oktug:
New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Networks 85: 81-91 (2019) - [c5]Nima Najaflou, Ahmet Aris, Berk Canberk, Zeynep Gürkas Aydin:
The Nearest Origin-Shield (NOS): A Jitter-Free Overlay Routing Framework for Content Delivery Networks. ISNCC 2019: 1-6 - 2018
- [p1]Ahmet Aris, Sema F. Oktug, Thiemo Voigt:
Security of Internet of Things for a Reliable Internet of Services. Autonomous Control for a Reliable Internet of Services 2018: 337-370 - 2017
- [c4]Ahmet Aris, Sema F. Oktug:
Poster: State of the Art IDS Design for IoT. EWSN 2017: 196-197 - 2016
- [c3]Ahmet Aris, Sema F. Oktug, Siddika Berna Örs Yalçin:
RPL version number attacks: In-depth study. NOMS 2016: 776-779 - 2015
- [c2]Ahmet Aris, Sema F. Oktug, Siddika Berna Örs Yalçin:
Internet-of-Things security: Denial of service attacks. SIU 2015: 903-906 - 2011
- [c1]Ahmet Aris, Siddika Berna Örs, Gökay Saldamli:
Architectures for Fast Modular Multiplication. DSD 2011: 434-437
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint