Follow
Selcuk Uluagac
Title
Cited by
Year
(In) Security of File Uploads in Node. js
H Oz, A Acar, A Aris, GS Tuncay, A Kharraz, S Uluagac
Proceedings of the ACM on Web Conference 2024, 1573-1584, 2024
2024
The Matter of Captchas: An Analysis of a Brittle Security Feature on the Modern Web
B Ousat, E Schafir, DC Hoang, MA Tofighi, CV Nguyen, S Arshad, ...
Proceedings of the ACM on Web Conference 2024, 1835-1846, 2024
2024
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems
NI Haque, MA Rahman, S Uluagac
Computers & Security 139, 103709, 2024
2024
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones
Y Mekdad, A Acar, A Aris, AE Fergougui, M Conti, R Lazzeretti, S Uluagac
arXiv preprint arXiv:2403.03858, 2024
2024
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
E Liberati, A Visintin, R Lazzeretti, M Conti, S Uluagac
International Conference on Applied Cryptography and Network Security, 183-210, 2024
2024
A Survey on Decentralized Identifiers and Verifiable Credentials
C Mazzocca, A Acar, S Uluagac, R Montanari, P Bellavista, M Conti
arXiv preprint arXiv:2402.02455, 2024
1 2024
Harun Oz
GS Tuncay, A Kharraz, S Uluagac
2024
50 Shades of Support: A Device-Centric Analysis of Android Security Updates
A Acar, GS Tuncay, E Luques, H Oz, A Aris, S Uluagac
3 2024
A comprehensive security and performance assessment of UAV authentication schemes
Y Mekdad, A Aris, A Acar, M Conti, R Lazzeretti, AE Fergougui, S Uluagac
Security and Privacy 7 (1), e338, 2024
2 2024
Feasibility analysis for sybil attacks in shard-based permissionless blockchains
T Rajabi, AA Khalil, MH Manshaei, MA Rahman, M Dakhilalian, ...
Distributed Ledger Technologies: Research and Practice 2 (4), 1-21, 2023
33 2023
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
D Cayir, A Acar, R Lazzeretti, M Angelini, M Conti, S Uluagac
IEEE Security & Privacy, 2023
3 2023
Resisting deep learning models against adversarial attack transferability via feature randomization
E Nowroozi, M Mohammadi, P Golmohammadi, Y Mekdad, M Conti, ...
IEEE Transactions on Services Computing, 2023
4 2023
A review of on-device machine learning for IoT: An energy perspective
N Tekin, A Aris, A Acar, S Uluagac, VC Gungor
Ad Hoc Networks, 103348, 2023
2 2023
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption
M Ngouen, MA Rahman, N Prabakar, S Uluagac, L Njilla
2023 10th International Conference on Internet of Things: Systems …, 2023
2023
Mpc-abc: Blockchain-based network communication for efficiently secure multiparty computation
OG Bautista, MH Manshaei, R Hernandez, K Akkaya, S Homsi, S Uluagac
Journal of Network and Systems Management 31 (4), 68, 2023
4 2023
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network
A Kurt, E Erdin, K Akkaya, S Uluagac, M Cebe
IEEE Transactions on Dependable and Secure Computing, 2023
4 2023
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems
NI Haque, M Ngouen, MA Rahman, S Uluagac, L Njilla
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
2 2023
Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots
J Franco, A Acar, A Aris, S Uluagac
ICC 2023-IEEE International Conference on Communications, 4860-4865, 2023
1 2023
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems
N Imtiazul Haque, M Ngouen, M Ashiqur Rahman, S Uluagac, L Njilla
arXiv e-prints, arXiv: 2305.09669, 2023
2023
Energy consumption of on-device machine learning models for IoT intrusion detection
N Tekin, A Acar, A Aris, AS Uluagac, VC Gungor
Internet of Things 21, 100670, 2023
55* 2023
The system can't perform the operation now. Try again later.
Articles 1–20