Hasan Çam
Orcid: 0000-0002-3531-7003Affiliations:
- Arizona State University, Tempe, Arizona, USA
According to our database1,
Hasan Çam
authored at least 91 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on eas.asu.edu
On csauthors.net:
Bibliography
2024
ACM Trans. Internet Things, May, 2024
2023
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center.
IEEE Trans. Serv. Comput., 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Maintaining the level of operational effectiveness of a CSOC under adverse conditions.
Int. J. Inf. Sec., 2022
2020
ACM Trans. Web, 2020
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst., 2020
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020
2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Syst. J., 2019
Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
2018
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM Trans. Intell. Syst. Technol., 2018
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Serv. Oriented Comput. Appl., 2018
Int. J. Inf. Sec., 2018
IEEE Secur. Priv., 2018
CoRR, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
ACM Trans. Intell. Syst. Technol., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
2016
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM Trans. Intell. Syst. Technol., 2016
Int. J. Secur. Networks, 2016
Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016
Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the 18th International Conference on Extending Database Technology, 2015
2014
Proceedings of the Network Science and Cybersecurity, 2014
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Veh. Technol., 2014
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014
Modeling impact of attacks, recovery, and attackability conditions for situational awareness.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014
Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems.
Proceedings of the Secure Cloud Computing, 2014
2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
On detecting association-based clique outliers in heterogeneous information networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2010
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2010
Collaborative Event-Driven Coverage and Rate Allocation for Event Miss-Ratio Assurances in Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010
Class-Based Fair Code Allocation with Delay Guarantees for OVSF-CDMA and VSF-OFCDM in Next-Generation Cellular Networks.
EURASIP J. Wirel. Commun. Netw., 2010
2008
EURASIP J. Wirel. Commun. Netw., 2008
Flexible Code Allocation to Improve System Utilization Using Nonblocking OVSF Codes in WCDMA.
Proceedings of IEEE International Conference on Communications, 2008
Joint Coverage Scheduling and Identity Management for Multiple-Target Tracking in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks.
Int. J. Sens. Networks, 2007
Route Recovery with One-Hop Broadcast to Bypass Compromised Nodes in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Event-Driven Coverage and Rate Allocation for Providing Miss-Ratio Assurances in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007
2006
Comput. Commun., 2006
Adaptive task scheduling for providing event miss-ratio statistical assurances in wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Collaborative scheduling of event types and allocation of rates for wireless sensor nodes with multiple sensing units.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006
Key establishment with source coding and reconciliation for wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Multiple-Input Turbo Code for Joint Data Aggregation, Source and Channel Coding in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006
SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
2005
Collaborative two-level task scheduling for wireless sensor nodes with multiple sensing units.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Energy-efficient task scheduling for wireless sensor nodes with multiple sensing units.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Secure data aggregation and source-channel coding with MIT code for wireless sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
2004
Telecommun. Syst., 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
2003
Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems.
Comput. Commun., 2003
2000
J. Syst. Softw., 2000
Preventing internal and external conflicts in an input buffering reverse baseline ATM switch.
Int. J. Commun. Syst., 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
1999
IEEE Trans. Parallel Distributed Syst., 1999
J. Syst. Softw., 1999
Int. J. Comput. Math., 1999
A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network.
Comput. Commun., 1999
Proceedings of the IEEE International Conference On Computer Design, 1999
1998
A congestion sense network interface.
Proceedings of the Computers and Their Applications (CATA-98), 1998
1997
Comput. Commun., 1997
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997
Proceedings of the Advances in Switching Networks, 1997
1995
Frames: A Simple Characterization of Permutations Realized by Frequently Used Networks.
IEEE Trans. Computers, 1995
1992
Fault-Tolerant Self-Routing Permutation Networks.
Proceedings of the 1992 International Conference on Parallel Processing, 1992