Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Mehmet Ozgun Demir"'
Publikováno v:
IEEE Transactions on Vehicular Technology. :1-13
Publikováno v:
IEEE Internet of Things Magazine. 3:84-89
With the integration of cyber and physical components with a closed loop, cyber physical systems (CPS) offer a wide range of applications in our daily lives and industrial fields. To deploy these applications, a diverse set of requirements and challe
Autor:
Mehmet Ozgun Demir, Ali Emre Pusane, Gunes Karabulut Kurt, Oguzhan Kubilay Ulger, Ozan Alp Topal
Publikováno v:
TSP
The broadcast nature of the wireless medium makes it vulnerable to impersonation attacks. Traditionally, cryptographic techniques are used against these threats. However, these methods are computationally complex and demanding for lesser equipped dev
Publikováno v:
TSP
In recent years, there has been a number of incidents against the security of the location services. Jamming and spoofing attacks are intensively studied to find effective detection and mitigation techniques to provide secure signaling. However, the
Autor:
Gerd Ascheid, Gunes Karabulut Kur, Mehmet Ozgun Demir, Ali Emre Pusane, Zekai Liang, Ozan Alp Topal, Guido Dartmann
Cognitive cyber physical systems (CCPSs) are integrated closed-loop solutions with cyber and physical components that are empowered with cognitive properties. The security of these highly capable CCPSs is a critical issue that needs to be addressed c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2ccfcf792b36687aa93dbb91c42ea6f9
https://aperta.ulakbim.gov.tr/record/3977
https://aperta.ulakbim.gov.tr/record/3977
Autor:
Gunes Karabulut Kurt, Ali Emre Pusane, Anke Schmeink, Mehmet Ozgun Demir, Guido Dartmann, Gerd Ascheid, Ozan Alp Topal
Publikováno v:
WiMob
Cyber-physical systems (CPS) are state-of-the-art communication environments that offer various applications with distinct requirements. However, security in CPS is a non-negotiable concept, since without a proper security mechanism the applications
Autor:
Gunes Karabulut Kurt, Guido Dartmann, Gerd Ascheid, Anke Schmeink, Ozan Alp Topal, Mehmet Ozgun Demir, Ali Emre Pusane
Publikováno v:
MECO
In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc49414c4549bef7bdf8cde9ba1c9b9a
https://aperta.ulakbim.gov.tr/record/69409
https://aperta.ulakbim.gov.tr/record/69409
Under the Internet of things paradigm, cyber-physical systems offer various applications in daily or industrial lives, whereas sensitive information about individuals may be collected to increase the system efficiency. When a piece of correlated publ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f89b8c648c3fb4c56455e1dd7bf05e8c
https://doi.org/10.1016/b978-0-12-816637-6.00014-2
https://doi.org/10.1016/b978-0-12-816637-6.00014-2
Publikováno v:
GIIS
Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer secur
Publikováno v:
SIU
In near future, industrial wireless sensor networks will be commonly deployed, so that the security improvements in these networks will gain much importance. With respect to the physical layer solutions, the standard system model that includes an eav