BibTeX records: Remzi Seker

download as .bib file

@article{DBLP:journals/jim/JhaBS20,
  author       = {Shashi Bhushan Jha and
                  Radu F. Babiceanu and
                  Remzi Seker},
  title        = {Formal modeling of cyber-physical resource scheduling in IIoT cloud
                  environments},
  journal      = {J. Intell. Manuf.},
  volume       = {31},
  number       = {5},
  pages        = {1149--1164},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10845-019-01503-x},
  doi          = {10.1007/S10845-019-01503-X},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/JhaBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/BabiceanuS19,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  title        = {Cyber resilience protection for industrial internet of things: {A}
                  software-defined networking approach},
  journal      = {Comput. Ind.},
  volume       = {104},
  pages        = {47--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compind.2018.10.004},
  doi          = {10.1016/J.COMPIND.2018.10.004},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/BabiceanuS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sohoma/BabiceanuS19,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Damien Trentesaux and
                  Paulo Leit{\~{a}}o and
                  Adriana Giret Boggino and
                  Vicente J. Botti},
  title        = {Cloud-Enabled Product Design Selection and Manufacturing as a Service},
  booktitle    = {Proceedings of the 9th Workshop on Service Oriented, Holonic and Multi-agent
                  Manufacturing Systems for Industry of the Future, {SOHOMA} 2019, Valencia,
                  Spain, October 3-4, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {853},
  pages        = {210--219},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27477-1\_16},
  doi          = {10.1007/978-3-030-27477-1\_16},
  timestamp    = {Fri, 09 Apr 2021 18:51:46 +0200},
  biburl       = {https://dblp.org/rec/conf/sohoma/BabiceanuS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syscon/KoenekeBS19,
  author       = {Robert Koeneke and
                  Radu F. Babiceanu and
                  Remzi Seker},
  title        = {Target Area Surveillance Optimization with Swarms of Autonomous Micro
                  Aerial Vehicles},
  booktitle    = {2019 {IEEE} International Systems Conference, SysCon 2019, Orlando,
                  FL, USA, April 8-11, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SYSCON.2019.8836761},
  doi          = {10.1109/SYSCON.2019.8836761},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/syscon/KoenekeBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/BiroMSS17,
  author       = {Mikl{\'{o}}s Bir{\'{o}} and
                  Atif Mashkoor and
                  Johannes Sametinger and
                  Remzi Seker},
  title        = {Software Safety and Security Risk Mitigation in Cyber-physical Systems},
  journal      = {{IEEE} Softw.},
  volume       = {35},
  number       = {1},
  pages        = {24--29},
  year         = {2018},
  url          = {https://doi.org/10.1109/MS.2017.4541050},
  doi          = {10.1109/MS.2017.4541050},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/BiroMSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GauthierS18,
  author       = {Ryan Gauthier and
                  Remzi Seker},
  editor       = {Tung Bui},
  title        = {Addressing Operator Privacy in Automatic Dependent Surveillance -
                  Broadcast {(ADS-B)}},
  booktitle    = {51st Hawaii International Conference on System Sciences, {HICSS} 2018,
                  Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2018},
  url          = {https://hdl.handle.net/10125/50582},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/GauthierS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sohoma/BabiceanuS18,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Damien Trentesaux and
                  Andr{\'{e}} Thomas and
                  Sergio Cavalieri},
  title        = {Cyber-Physical Resource Scheduling in the Context of Industrial Internet
                  of Things Operations},
  booktitle    = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings
                  of {SOHOMA} 2018, Bergamo, Italy, June 11-12, 2018},
  series       = {Studies in Computational Intelligence},
  volume       = {803},
  pages        = {399--411},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03003-2\_31},
  doi          = {10.1007/978-3-030-03003-2\_31},
  timestamp    = {Fri, 21 Dec 2018 09:28:12 +0100},
  biburl       = {https://dblp.org/rec/conf/sohoma/BabiceanuS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahfe/MasseySN17,
  author       = {Lauren Massey and
                  Remzi Seker and
                  Denise Nicholson},
  editor       = {Denise Nicholson},
  title        = {Feasibility of Leveraging an Adaptive Presentation Layer for Cyber
                  Security Visualizations},
  booktitle    = {Advances in Human Factors in Cybersecurity - Proceedings of the {AHFE}
                  2017 International Conference on Human Factors in Cybersecurity, July
                  17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California,
                  {USA}},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {593},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60585-2\_13},
  doi          = {10.1007/978-3-319-60585-2\_13},
  timestamp    = {Tue, 05 Oct 2021 13:49:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ahfe/MasseySN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sohoma/BabiceanuS17,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Damien Trentesaux and
                  Andr{\'{e}} Thomas and
                  Olivier Cardin},
  title        = {Software-Defined Networking-Based Models for Secure Interoperability
                  of Manufacturing Operations},
  booktitle    = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings
                  of {SOHOMA} 2017, Nantes, France, October 19-20, 2017},
  series       = {Studies in Computational Intelligence},
  volume       = {762},
  pages        = {243--252},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73751-5\_18},
  doi          = {10.1007/978-3-319-73751-5\_18},
  timestamp    = {Mon, 03 Jan 2022 22:36:11 +0100},
  biburl       = {https://dblp.org/rec/conf/sohoma/BabiceanuS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/BabiceanuS16,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  title        = {Big Data and virtualization for manufacturing cyber-physical systems:
                  {A} survey of the current status and future outlook},
  journal      = {Comput. Ind.},
  volume       = {81},
  pages        = {128--137},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compind.2016.02.004},
  doi          = {10.1016/J.COMPIND.2016.02.004},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/BabiceanuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mesas/YappSB16,
  author       = {Justin Yapp and
                  Remzi Seker and
                  Radu F. Babiceanu},
  editor       = {Jan Hodick{\'{y}}},
  title        = {{UAV} as a Service: {A} Network Simulation Environment to Identify
                  Performance and Security Issues for Commercial UAVs in a Coordinated,
                  Cooperative Environment},
  booktitle    = {Modelling and Simulation for Autonomous Systems - Third International
                  Workshop, {MESAS} 2016, Rome, Italy, June 15-16, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9991},
  pages        = {347--355},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47605-6\_28},
  doi          = {10.1007/978-3-319-47605-6\_28},
  timestamp    = {Fri, 11 Oct 2019 16:07:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mesas/YappSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sohoma/BabiceanuS16,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Damien Trentesaux and
                  Andr{\'{e}} Thomas and
                  Paulo Leit{\~{a}}o and
                  Jos{\'{e}} Barata Oliveira},
  title        = {Cybersecurity and Resilience Modelling for Software-Defined Networks-Based
                  Manufacturing Applications},
  booktitle    = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings
                  of {SOHOMA} 2016, Lisbon, Portugal, October 6-7, 2016},
  series       = {Studies in Computational Intelligence},
  volume       = {694},
  pages        = {167--176},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51100-9\_15},
  doi          = {10.1007/978-3-319-51100-9\_15},
  timestamp    = {Mon, 15 Jun 2020 17:10:22 +0200},
  biburl       = {https://dblp.org/rec/conf/sohoma/BabiceanuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/XieLYSB15,
  author       = {Mengjun Xie and
                  Yanyan Li and
                  Kenji Yoshigoe and
                  Remzi Seker and
                  Jiang Bian},
  title        = {CamAuth: Securing Web Authentication with Camera},
  booktitle    = {16th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2015, Daytona Beach, FL, USA, January 8-10, 2015},
  pages        = {232--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HASE.2015.41},
  doi          = {10.1109/HASE.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/XieLYSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sohoma/BabiceanuS15,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Damien Trentesaux and
                  Andr{\'{e}} Thomas and
                  Duncan C. McFarlane},
  title        = {Secure and Resilient Manufacturing Operations Inspired by Software-Defined
                  Networking},
  booktitle    = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings
                  of {SOHOMA} 2015, Cambridge, UK, November 5-6, 2015},
  series       = {Studies in Computational Intelligence},
  volume       = {640},
  pages        = {285--294},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30337-6\_26},
  doi          = {10.1007/978-3-319-30337-6\_26},
  timestamp    = {Fri, 02 Nov 2018 09:47:07 +0100},
  biburl       = {https://dblp.org/rec/conf/sohoma/BabiceanuS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/BabiceanuS15,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Andr{\'{e}} Thomas and
                  Damien Trentesaux},
  title        = {Manufacturing Operations, Internet of Things, and Big Data: Towards
                  Predictive Manufacturing Systems},
  booktitle    = {Service Orientation in Holonic and Multi-agent Manufacturing},
  series       = {Studies in Computational Intelligence},
  volume       = {594},
  pages        = {157--164},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15159-5\_15},
  doi          = {10.1007/978-3-319-15159-5\_15},
  timestamp    = {Thu, 23 Aug 2018 17:12:59 +0200},
  biburl       = {https://dblp.org/rec/series/sci/BabiceanuS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/BabiceanuS15a,
  author       = {Radu F. Babiceanu and
                  Remzi Seker},
  editor       = {Theodor Borangiu and
                  Andr{\'{e}} Thomas and
                  Damien Trentesaux},
  title        = {Manufacturing Cyber-Physical Systems Enabled by Complex Event Processing
                  and Big Data Environments: {A} Framework for Development},
  booktitle    = {Service Orientation in Holonic and Multi-agent Manufacturing},
  series       = {Studies in Computational Intelligence},
  volume       = {594},
  pages        = {165--173},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15159-5\_16},
  doi          = {10.1007/978-3-319-15159-5\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/BabiceanuS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/0014YXZS014,
  author       = {Yue Zhao and
                  Kenji Yoshigoe and
                  Mengjun Xie and
                  Suijian Zhou and
                  Remzi Seker and
                  Jiang Bian},
  title        = {Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {289--316},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.333},
  doi          = {10.13052/JCSM2245-1439.333},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/0014YXZS014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdata/ZhaoYXZSB14,
  author       = {Yue Zhao and
                  Kenji Yoshigoe and
                  Mengjun Xie and
                  Suijian Zhou and
                  Remzi Seker and
                  Jiang Bian},
  title        = {LightGraph: Lighten Communication in Distributed Graph-Parallel Processing},
  booktitle    = {2014 {IEEE} International Congress on Big Data, Anchorage, AK, USA,
                  June 27 - July 2, 2014},
  pages        = {717--724},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BigData.Congress.2014.106},
  doi          = {10.1109/BIGDATA.CONGRESS.2014.106},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdata/ZhaoYXZSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/SahamiRCHKLRS14,
  author       = {Mehran Sahami and
                  Steve Roach and
                  Ernesto Cuadros{-}Vargas and
                  Elizabeth K. Hawthorne and
                  Amruth Kumar and
                  Richard LeBlanc and
                  David Reed and
                  Remzi Seker},
  editor       = {J. D. Dougherty and
                  Kris Nagel and
                  Adrienne Decker and
                  Kurt Eiselt},
  title        = {{ACM/IEEE-CS} computer science curricula 2013: implementing the final
                  report},
  booktitle    = {The 45th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014},
  pages        = {175--176},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2538862.2538863},
  doi          = {10.1145/2538862.2538863},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/SahamiRCHKLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/MoallemiSTSKJ14,
  author       = {Mohammad Moallemi and
                  Remzi Seker and
                  Massood Towhidnejad and
                  Jonathan Standley and
                  Robert Klein and
                  Paul Jackson},
  title        = {Threat modeling for aircraft access to national airspace system wide
                  information management program},
  booktitle    = {Proceedings of the 17th Communications {\&} Networking Symposium,
                  part of the 2014 Spring Simulation Multiconference, SpringSim '14,
                  Tampa, FL, USA, April 13-16, 2014},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2663502},
  timestamp    = {Fri, 19 Sep 2014 14:02:16 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/MoallemiSTSKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BianS13,
  author       = {Jiang Bian and
                  Remzi Seker},
  title        = {The Jigsaw secure distributed file system},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {4},
  pages        = {1142--1152},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2013.01.018},
  doi          = {10.1016/J.COMPELECENG.2013.01.018},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/BianS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/RoachSLS13,
  author       = {Steve Roach and
                  Mehran Sahami and
                  Richard LeBlanc and
                  Remzi Seker},
  editor       = {Randa L. Shehab and
                  James J. Sluss and
                  Deborah Anne Trytten},
  title        = {Special session: The {CS2013} Computer Science curriculum guidelines
                  project},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2013, Oklahoma City,
                  Oklahoma, USA, October 23-26, 2013},
  pages        = {1311--1313},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FIE.2013.6685045},
  doi          = {10.1109/FIE.2013.6685045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/RoachSLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SubramanianSRL12,
  author       = {Vimalathithan Subramanian and
                  Remzi Seker and
                  Srini Ramaswamy and
                  Rathinasamy B. Lenin},
  title        = {{PCIEF:} a policy conflict identification and evaluation framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {48--67},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051090},
  doi          = {10.1504/IJICS.2012.051090},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SubramanianSRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/KanaskarSBP12,
  author       = {Nitin Kanaskar and
                  Remzi Seker and
                  Jiang Bian and
                  Vir V. Phoha},
  title        = {Dynamical System Theory for the Detection of Anomalous Behavior in
                  Computer Programs},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {42},
  number       = {6},
  pages        = {1579--1589},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSMCC.2012.2208187},
  doi          = {10.1109/TSMCC.2012.2208187},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/KanaskarSBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SubramanianSBK11,
  author       = {Vimalathithan Subramanian and
                  Remzi Seker and
                  Jiang Bian and
                  Nitin Kanaskar},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Collaborations, mergers, acquisitions, and security policy conflict
                  analysis},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {36},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179337},
  doi          = {10.1145/2179298.2179337},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/SubramanianSBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/NijimNSRR11,
  author       = {Mais Nijim and
                  Yousef Nijim and
                  Remzi Seker and
                  Vamshi Reddy and
                  Raghu Nandi Raju},
  editor       = {Parimala Thulasiraman and
                  Laurence Tianruo Yang and
                  Qiwen Pan and
                  Xingang Liu and
                  Yaw{-}Chung Chen and
                  Yo{-}Ping Huang and
                  Lin{-}Huang Chang and
                  Che{-}Lun Hung and
                  Che{-}Rung Lee and
                  Justin Y. Shi and
                  Ying Zhang},
  title        = {{DM-PAS:} {A} Data Mining Prefetching Algorithm for Storage System},
  booktitle    = {13th {IEEE} International Conference on High Performance Computing
                  {\&} Communication, {HPCC} 2011, Banff, Alberta, Canada, September
                  2-4, 2011},
  pages        = {500--505},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/HPCC.2011.71},
  doi          = {10.1109/HPCC.2011.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/NijimNSRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/BianCXJSK11,
  author       = {Jiang Bian and
                  Josh M. Cisler and
                  Mengjun Xie and
                  George Andrew James and
                  Remzi Seker and
                  Clinton D. Kilts},
  title        = {A methodology for empirical analysis of brain connectivity through
                  graph mining},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Anchorage, Alaska, USA, October 9-12, 2011},
  pages        = {2963--2969},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICSMC.2011.6084151},
  doi          = {10.1109/ICSMC.2011.6084151},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/BianCXJSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/BianST10,
  author       = {Jiang Bian and
                  Remzi Seker and
                  Umit Topaloglu},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {A Secure Distributed File System for Medical Image Archiving},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {961--966},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.142},
  doi          = {10.1109/SOCIALCOM.2010.142},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/BianST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cics/BianS09,
  author       = {Jiang Bian and
                  Remzi Seker},
  title        = {JigDFS: {A} secure distributed file system},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence in Cyber Security,
                  {CICS} 2009, Nashville, TN, USA, March 31 - April 2, 2009},
  pages        = {76--82},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CICYBS.2009.4925093},
  doi          = {10.1109/CICYBS.2009.4925093},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cics/BianS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BianSR09,
  author       = {Jiang Bian and
                  Remzi Seker and
                  Srini Ramaswamy},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {JigDFS in container communities for international cargo security},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {19},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558629},
  doi          = {10.1145/1558607.1558629},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BianSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SubramanianSSLR09,
  author       = {Vimalathithan Subramanian and
                  Sithu D. Sudarsan and
                  Remzi Seker and
                  Rathinasamy B. Lenin and
                  Srinivasan Ramaswamy},
  editor       = {Belur V. Dasarathy},
  title        = {Secure data aggregation in heterogeneous and disparate networks using
                  stand off server architecture},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734405},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818575},
  doi          = {10.1117/12.818575},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SubramanianSSLR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/SudarsanSYRSL09,
  author       = {Sithu D. Sudarsan and
                  Vimalathithan Subramanian and
                  Kenji Yoshigoe and
                  Srini Ramaswamy and
                  Remzi Seker and
                  Rathinasamy B. Lenin},
  editor       = {Khaldoun Al Agha and
                  Mohamad Badra and
                  Gregory B. Newby},
  title        = {Impact of Duty Cycle Variation on WSNs},
  booktitle    = {{NTMS} 2009, 3rd International Conference on New Technologies, Mobility
                  and Security, 20-23 December 2009, Cairo, Egypt},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/NTMS.2009.5384705},
  doi          = {10.1109/NTMS.2009.5384705},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/SudarsanSYRSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ChiangBSTDSTBZW09,
  author       = {Chia{-}Chu Chiang and
                  Coskun Bayrak and
                  Remzi Seker and
                  Umit Topaloglu and
                  Rustu Murat Demirer and
                  Nasrola Samadi and
                  Suleyman Tek and
                  Jiang Bian and
                  GuangXu Zhou and
                  Xiaoran Wang},
  title        = {Design of a Lattice-based Access Control Scheme},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, San Antonio, TX, USA, 11-14 October 2009},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSMC.2009.5346329},
  doi          = {10.1109/ICSMC.2009.5346329},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/ChiangBSTDSTBZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/BianSR09,
  author       = {Jiang Bian and
                  Remzi Seker and
                  Srini Ramaswamy},
  title        = {JigDFS for Implementing Secure Container Communities},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, San Antonio, TX, USA, 11-14 October 2009},
  pages        = {3651--3654},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSMC.2009.5346865},
  doi          = {10.1109/ICSMC.2009.5346865},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/BianSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/RamaswamySSICA08,
  author       = {Srinivasan Ramaswamy and
                  Remzi Seker and
                  Sithu D. Sudarsan and
                  Mhamed Itmi and
                  Adnane Cabani and
                  Waled Alshabi},
  title        = {Modelling and simulation: The basis for education enrichment and software
                  design},
  journal      = {Enterp. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {177--199},
  year         = {2008},
  url          = {https://doi.org/10.1080/17517570801927411},
  doi          = {10.1080/17517570801927411},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eis/RamaswamySSICA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sysose/BianTSBC08,
  author       = {Jiang Bian and
                  Umit Topaloglu and
                  Remzi Seker and
                  Coskun Bayrak and
                  Chia{-}Chu Chiang},
  title        = {A role-based secure group communication framework},
  booktitle    = {3rd {IEEE} International Conference on System of Systems Engineering,
                  SoSE 2008, Singapore, 2-4 June 2008},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/SYSOSE.2008.4724150},
  doi          = {10.1109/SYSOSE.2008.4724150},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sysose/BianTSBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webist/BianSTB08,
  author       = {Jiang Bian and
                  Remzi Seker and
                  Umit Topaloglu and
                  Coskun Bayrak},
  editor       = {Jos{\'{e}} Cordeiro and
                  Joaquim Filipe and
                  Slimane Hammoudi},
  title        = {Off-the-Record Secure Chat Room},
  booktitle    = {{WEBIST} 2008, Proceedings of the Fourth International Conference
                  on Web Information Systems and Technologies, Volume 1, Funchal, Madeira,
                  Portugal, May 4-7, 2008},
  pages        = {54--61},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webist/BianSTB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/BianST07,
  author       = {Jiang Bian and
                  Remzi Seker and
                  Umit Topaloglu},
  title        = {Off-the-Record Instant Messaging for Group Conversation},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2007, 13-15 August 2007, Las Vegas, Nevada,
                  {USA}},
  pages        = {79--84},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IRI.2007.4296601},
  doi          = {10.1109/IRI.2007.4296601},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/BianST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/RamaswamySSM07,
  author       = {Srini Ramaswamy and
                  Remzi Seker and
                  Sithu D. Sudarsan and
                  D. Moix},
  title        = {Societal-Consciousness in the Computing Curricula: {A} Time for Serious
                  Introspection},
  booktitle    = {{IEEE} International Symposium on Technology and Society, {ISTAS}
                  2007, Las Vegas, NV, USA, June 1-2, 2007},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISTAS.2007.4362231},
  doi          = {10.1109/ISTAS.2007.4362231},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/RamaswamySSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scsc/JoshiSBRC07,
  author       = {Hemant Joshi and
                  Remzi Seker and
                  Coskun Bayrak and
                  Srini Ramaswamy and
                  Jeffrey B. Connelly},
  editor       = {Gabriel A. Wainer},
  title        = {Ontology for disaster mitigation and planning},
  booktitle    = {Proceedings of the 2007 Summer Computer Simulation Conference, {SCSC}
                  2007, San Diego, California, USA, July 16-19, 2007},
  pages        = {26},
  publisher    = {Simulation Councils, Inc.},
  year         = {2007},
  url          = {https://dl.acm.org/citation.cfm?id=1358132},
  timestamp    = {Wed, 28 Nov 2018 12:57:16 +0100},
  biburl       = {https://dblp.org/rec/conf/scsc/JoshiSBRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/KanaskarSR07,
  author       = {Nitin Kanaskar and
                  Remzi Seker and
                  Srinivasan Ramaswamy},
  title        = {A Dynamical System Approach to Intrusion Detection Using System Call
                  Analysis},
  booktitle    = {Proceedings of the Nineteenth International Conference on Software
                  Engineering {\&} Knowledge Engineering (SEKE'2007), Boston, Massachusetts,
                  USA, July 9-11, 2007},
  pages        = {710--717},
  publisher    = {Knowledge Systems Institute Graduate School},
  year         = {2007},
  timestamp    = {Thu, 12 Mar 2020 11:30:50 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/KanaskarSR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sew/HewettS05,
  author       = {Rattikorn Hewett and
                  Remzi Seker},
  title        = {A Risk Assessment Model of Embedded Software Systems},
  booktitle    = {29th Annual {IEEE} / {NASA} Software Engineering Workshop {(SEW-29}
                  2005), 6-7 April 2005, Greenbelt, Maryland, {USA}},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SEW.2005.16},
  doi          = {10.1109/SEW.2005.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sew/HewettS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/MerweSG05,
  author       = {Alta van der Merwe and
                  Remzi Seker and
                  Aurona Gerber},
  title        = {Phishing in the system of systems settings: mobile technology},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005},
  pages        = {492--498},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSMC.2005.1571194},
  doi          = {10.1109/ICSMC.2005.1571194},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/MerweSG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/RamamoorthyS05,
  author       = {C. V. Ramamoorthy and
                  Remzi Seker},
  title        = {Infrastructures for information technology systems},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005},
  pages        = {979--986},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSMC.2005.1571273},
  doi          = {10.1109/ICSMC.2005.1571273},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/RamamoorthyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jid/SekerMKTP04,
  author       = {Remzi Seker and
                  A. J. van der Merwe and
                  Paula Kotz{\'{e}} and
                  Murat M. Tanik and
                  R. Paul},
  title        = {Assessment of Coupling and Cohesion for Component-Based Software by
                  using Shannon Languages},
  journal      = {Trans. {SDPS}},
  volume       = {8},
  number       = {4},
  pages        = {33--43},
  year         = {2004},
  url          = {http://content.iospress.com/articles/journal-of-integrated-design-and-process-science/jid8-4-03},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jid/SekerMKTP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/MerweS04,
  author       = {A. J. van der Merwe and
                  Remzi Seker},
  title        = {Mobile phishing : communication},
  journal      = {South Afr. Comput. J.},
  volume       = {33},
  pages        = {111--112},
  year         = {2004},
  url          = {http://reference.sabinet.co.za/document/EJC27966},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/MerweS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/SekerT04,
  author       = {Remzi Seker and
                  Murat M. Tanik},
  title        = {An information-theoretical framework for modeling component-based
                  systems},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {34},
  number       = {4},
  pages        = {475--484},
  year         = {2004},
  url          = {https://doi.org/10.1109/TSMCC.2004.829297},
  doi          = {10.1109/TSMCC.2004.829297},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/SekerT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isict/JololianNS04,
  author       = {Leon Jololian and
                  Jean{-}Claude Ngatchou and
                  Remzi Seker},
  editor       = {John Waldron},
  title        = {A component integration meta-framework using smart adapters},
  booktitle    = {Proceedings of the Intenational Symposium on Information and Communication
                  Technologies, Las Vegas, Nevada, USA, June 16-18, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {90},
  pages        = {128--133},
  publisher    = {Trinity College Dublin},
  year         = {2004},
  url          = {https://dl.acm.org/citation.cfm?id=1071535},
  timestamp    = {Mon, 26 Nov 2018 17:05:49 +0100},
  biburl       = {https://dblp.org/rec/conf/isict/JololianNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/RamamoorthyS04,
  author       = {C. V. Ramamoorthy and
                  Remzi Seker},
  editor       = {Walter Dosch and
                  Roger Y. Lee and
                  Chisu Wu},
  title        = {Infrastructures for Information Technology Systems: Perspectives on
                  Their Evolution and Impact},
  booktitle    = {Software Engineering Research, Management and Applications, Second
                  International Conference, {SERA} 2004, Los Angeles, CA, USA, May 5-7,
                  2004, Selected Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3647},
  pages        = {214--228},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11668855\_16},
  doi          = {10.1007/11668855\_16},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/RamamoorthyS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsi/SekerSBK00,
  author       = {Remzi Seker and
                  Sokol Saliu and
                  Ahmet Birand and
                  Gulmira Kudaiberdieva},
  title        = {Validity Test for a Set of Nonlinear Measures for Short Data Length
                  with Reference to Short-Term Heart Rate Variability Signal},
  journal      = {J. Syst. Integr.},
  volume       = {10},
  number       = {1},
  pages        = {41--53},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1026507317626},
  doi          = {10.1023/A:1026507317626},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsi/SekerSBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics