Emrah Tomur

Orcid: 0000-0001-8985-4974

According to our database1, Emrah Tomur authored at least 23 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense.
IEEE Internet Things Mag., November, 2024

Intent-Based Security for Functional Safety in Cyber-Physical Systems.
IEEE Trans. Emerg. Top. Comput., 2024

2023
OAI-Based Software Defined Radio Implementation.
Proceedings of the 31st Signal Processing and Communications Applications Conference, 2023

Towards the Concept of Trust Assurance Case.
Proceedings of the 5th IEEE/ACM International Workshop on Robotics Software Engineering, 2023

A Taxonomic Survey of Model Extraction Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data.
Comput. J., 2022

A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning.
IEEE Access, 2022

Pervasive Artificial Intelligence in Next Generation Wireless: The Hexa-X Project Perspective.
Proceedings of the Short Paper Proceedings of the First International Workshop on Artificial Intelligence in Beyond 5G and 6G Wireless Networks (AI6G 2022) co-located with IEEE World Congress on Computational Intelligence (WCCI2022), 2022

A Paradigm for Safe Adaptation of Collaborating Robots.
Proceedings of the International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2022

Towards trusting the ethical evolution of autonomous dynamic ecosystems.
Proceedings of the 1st Workshop on Software Engineering for Responsible AI, 2022

On the security of 6G use cases: Threat Analysis of 'All-Senses Meeting'.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
A Network-Based Positioning Method to Locate False Base Stations.
IEEE Access, 2021

SoK: Investigation of Security and Functional Safety in Industrial IoT.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Vulnerability Prediction From Source Code Using Machine Learning.
IEEE Access, 2020

2019
Statistical Appliance Inference in the Smart Grid by Machine Learning.
Proceedings of the 30th IEEE International Symposium on Personal, 2019

Context-Aware Operation-Based Access Control for Internet of Things Applications.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

Differentially Private Deep Learning for Load Forecasting on Smart Grid.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2016
CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system.
Secur. Commun. Networks, 2016

2015
A practical NFC relay attack on mobile devices using card emulation mode.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

2008
Security and quality of service for wireless sensor networks (Kablosuz algılayıcı ağlarda güvenlik ve servis kalitesi)
PhD thesis, 2008

2007
Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007

Tradeoff Analysis and Optimization of Security and Spatial Resolution for Sensor Networks.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Application of temporal and spatial role based access control in 802.11 wireless networks.
Comput. Secur., 2006


  Loading...