Large scale wireless sensor networks with multi-level dynamic key management scheme

OK Sahingoz - Journal of Systems Architecture, 2013 - Elsevier
Abstract Cyber-Physical Systems (CPSs) have emerged as a promising approach to
facilitate the integration of the cyber and physical worlds in highly interconnected and …

In-vehicle intrusion detection system on controller area network with machine learning models

SC Kalkan, OK Sahingoz - 2020 11th International Conference …, 2020 - ieeexplore.ieee.org
Parallel with the developing world, transportation technologies have started to expand and
change significantly year by year. This change brings with it some inevitable problems …

2D UAV path planning with radar threatening areas using simulated annealing algorithm for event detection

B Basbous - … conference on artificial intelligence and data …, 2018 - ieeexplore.ieee.org
Path Planning for Unmanned Aerial Vehicles (UAVs) can be used for many purposes.
However, the problem becomes more and more complex when dealing with a large number …

Efficient data as a service in fog computing: An adaptive multi-agent based approach

G Mangiaracina, P Plebani, M Salnitri… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data as a Service (DaaS) offers an effective provisioning model able to exploit the
advantages of cloud computing in terms of accessibility and scalability when data providers …

Autonomous aerial navigation and mapping for security of smart buildings

E Ertugrul, U Kocaman… - 2018 6th International …, 2018 - ieeexplore.ieee.org
In recent years, Smart City concept has gained tremendous attention, and it has a wide
range of application environment for the researchers. In this concept, the use of smart …

Fault tolerance in real-time systems: A review

E Ertugrul, OK Sahingoz - … Conference on Intelligent Systems Design and …, 2018 - Springer
Real-time systems are safety/mission critical computing systems which behave
deterministically, and gives correct reactions to the inputs (or changes in the physical …

Content-based publish/subscribe communication model between iot devices in smart city environment

F Ozturk, AM Ozdemir - … Smart Grids and Cities Congress and …, 2019 - ieeexplore.ieee.org
In recent years the population of the cities has been increasing the getting over half of the
whole world population. These peoples are facing with some security and infrastructural …

[PDF][PDF] Service to fault tolerance in cloud computing environment

B Meroufel, G Belalem - WSEAS Transactions on Computers, 2015 - wseas.com
Cloud Computing refers to the use of memory and computing capabilities of computers and
servers around the world, so the user has considerable computing power without the need …

A circular chain intrusion detection for cloud computing based on improved AdjointVM approach

U Oktay, MA Aydin, OK Sahingoz - 2013 IEEE 14th …, 2013 - ieeexplore.ieee.org
Cloud computing has recently emerged and gained momentum to implement existing
networks and data centers in a new architecture to enable services in a timely manner …

Circular chain VM protection in AdjointVM

U Oktay, MA Aydin, OK Sahingoz - 2013 The International …, 2013 - ieeexplore.ieee.org
Cloud computing is a demanding subject and its fans are increasing day by day in the
private or corporate areas. Confidentiality is the most important point of information security …