Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Remzi Seker
@article{DBLP:journals/jim/JhaBS20, author = {Shashi Bhushan Jha and Radu F. Babiceanu and Remzi Seker}, title = {Formal modeling of cyber-physical resource scheduling in IIoT cloud environments}, journal = {J. Intell. Manuf.}, volume = {31}, number = {5}, pages = {1149--1164}, year = {2020}, url = {https://doi.org/10.1007/s10845-019-01503-x}, doi = {10.1007/S10845-019-01503-X}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/JhaBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/BabiceanuS19, author = {Radu F. Babiceanu and Remzi Seker}, title = {Cyber resilience protection for industrial internet of things: {A} software-defined networking approach}, journal = {Comput. Ind.}, volume = {104}, pages = {47--58}, year = {2019}, url = {https://doi.org/10.1016/j.compind.2018.10.004}, doi = {10.1016/J.COMPIND.2018.10.004}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/BabiceanuS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sohoma/BabiceanuS19, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Damien Trentesaux and Paulo Leit{\~{a}}o and Adriana Giret Boggino and Vicente J. Botti}, title = {Cloud-Enabled Product Design Selection and Manufacturing as a Service}, booktitle = {Proceedings of the 9th Workshop on Service Oriented, Holonic and Multi-agent Manufacturing Systems for Industry of the Future, {SOHOMA} 2019, Valencia, Spain, October 3-4, 2019}, series = {Studies in Computational Intelligence}, volume = {853}, pages = {210--219}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27477-1\_16}, doi = {10.1007/978-3-030-27477-1\_16}, timestamp = {Fri, 09 Apr 2021 18:51:46 +0200}, biburl = {https://dblp.org/rec/conf/sohoma/BabiceanuS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/syscon/KoenekeBS19, author = {Robert Koeneke and Radu F. Babiceanu and Remzi Seker}, title = {Target Area Surveillance Optimization with Swarms of Autonomous Micro Aerial Vehicles}, booktitle = {2019 {IEEE} International Systems Conference, SysCon 2019, Orlando, FL, USA, April 8-11, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SYSCON.2019.8836761}, doi = {10.1109/SYSCON.2019.8836761}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/syscon/KoenekeBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/BiroMSS17, author = {Mikl{\'{o}}s Bir{\'{o}} and Atif Mashkoor and Johannes Sametinger and Remzi Seker}, title = {Software Safety and Security Risk Mitigation in Cyber-physical Systems}, journal = {{IEEE} Softw.}, volume = {35}, number = {1}, pages = {24--29}, year = {2018}, url = {https://doi.org/10.1109/MS.2017.4541050}, doi = {10.1109/MS.2017.4541050}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/BiroMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GauthierS18, author = {Ryan Gauthier and Remzi Seker}, editor = {Tung Bui}, title = {Addressing Operator Privacy in Automatic Dependent Surveillance - Broadcast {(ADS-B)}}, booktitle = {51st Hawaii International Conference on System Sciences, {HICSS} 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2018}, url = {https://hdl.handle.net/10125/50582}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/GauthierS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sohoma/BabiceanuS18, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Damien Trentesaux and Andr{\'{e}} Thomas and Sergio Cavalieri}, title = {Cyber-Physical Resource Scheduling in the Context of Industrial Internet of Things Operations}, booktitle = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings of {SOHOMA} 2018, Bergamo, Italy, June 11-12, 2018}, series = {Studies in Computational Intelligence}, volume = {803}, pages = {399--411}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03003-2\_31}, doi = {10.1007/978-3-030-03003-2\_31}, timestamp = {Fri, 21 Dec 2018 09:28:12 +0100}, biburl = {https://dblp.org/rec/conf/sohoma/BabiceanuS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahfe/MasseySN17, author = {Lauren Massey and Remzi Seker and Denise Nicholson}, editor = {Denise Nicholson}, title = {Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations}, booktitle = {Advances in Human Factors in Cybersecurity - Proceedings of the {AHFE} 2017 International Conference on Human Factors in Cybersecurity, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, {USA}}, series = {Advances in Intelligent Systems and Computing}, volume = {593}, pages = {117--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60585-2\_13}, doi = {10.1007/978-3-319-60585-2\_13}, timestamp = {Tue, 05 Oct 2021 13:49:08 +0200}, biburl = {https://dblp.org/rec/conf/ahfe/MasseySN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sohoma/BabiceanuS17, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Damien Trentesaux and Andr{\'{e}} Thomas and Olivier Cardin}, title = {Software-Defined Networking-Based Models for Secure Interoperability of Manufacturing Operations}, booktitle = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings of {SOHOMA} 2017, Nantes, France, October 19-20, 2017}, series = {Studies in Computational Intelligence}, volume = {762}, pages = {243--252}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73751-5\_18}, doi = {10.1007/978-3-319-73751-5\_18}, timestamp = {Mon, 03 Jan 2022 22:36:11 +0100}, biburl = {https://dblp.org/rec/conf/sohoma/BabiceanuS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/BabiceanuS16, author = {Radu F. Babiceanu and Remzi Seker}, title = {Big Data and virtualization for manufacturing cyber-physical systems: {A} survey of the current status and future outlook}, journal = {Comput. Ind.}, volume = {81}, pages = {128--137}, year = {2016}, url = {https://doi.org/10.1016/j.compind.2016.02.004}, doi = {10.1016/J.COMPIND.2016.02.004}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/BabiceanuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mesas/YappSB16, author = {Justin Yapp and Remzi Seker and Radu F. Babiceanu}, editor = {Jan Hodick{\'{y}}}, title = {{UAV} as a Service: {A} Network Simulation Environment to Identify Performance and Security Issues for Commercial UAVs in a Coordinated, Cooperative Environment}, booktitle = {Modelling and Simulation for Autonomous Systems - Third International Workshop, {MESAS} 2016, Rome, Italy, June 15-16, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9991}, pages = {347--355}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47605-6\_28}, doi = {10.1007/978-3-319-47605-6\_28}, timestamp = {Fri, 11 Oct 2019 16:07:48 +0200}, biburl = {https://dblp.org/rec/conf/mesas/YappSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sohoma/BabiceanuS16, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Damien Trentesaux and Andr{\'{e}} Thomas and Paulo Leit{\~{a}}o and Jos{\'{e}} Barata Oliveira}, title = {Cybersecurity and Resilience Modelling for Software-Defined Networks-Based Manufacturing Applications}, booktitle = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings of {SOHOMA} 2016, Lisbon, Portugal, October 6-7, 2016}, series = {Studies in Computational Intelligence}, volume = {694}, pages = {167--176}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51100-9\_15}, doi = {10.1007/978-3-319-51100-9\_15}, timestamp = {Mon, 15 Jun 2020 17:10:22 +0200}, biburl = {https://dblp.org/rec/conf/sohoma/BabiceanuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/XieLYSB15, author = {Mengjun Xie and Yanyan Li and Kenji Yoshigoe and Remzi Seker and Jiang Bian}, title = {CamAuth: Securing Web Authentication with Camera}, booktitle = {16th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2015, Daytona Beach, FL, USA, January 8-10, 2015}, pages = {232--239}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HASE.2015.41}, doi = {10.1109/HASE.2015.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/XieLYSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sohoma/BabiceanuS15, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Damien Trentesaux and Andr{\'{e}} Thomas and Duncan C. McFarlane}, title = {Secure and Resilient Manufacturing Operations Inspired by Software-Defined Networking}, booktitle = {Service Orientation in Holonic and Multi-Agent Manufacturing - Proceedings of {SOHOMA} 2015, Cambridge, UK, November 5-6, 2015}, series = {Studies in Computational Intelligence}, volume = {640}, pages = {285--294}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30337-6\_26}, doi = {10.1007/978-3-319-30337-6\_26}, timestamp = {Fri, 02 Nov 2018 09:47:07 +0100}, biburl = {https://dblp.org/rec/conf/sohoma/BabiceanuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/BabiceanuS15, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Andr{\'{e}} Thomas and Damien Trentesaux}, title = {Manufacturing Operations, Internet of Things, and Big Data: Towards Predictive Manufacturing Systems}, booktitle = {Service Orientation in Holonic and Multi-agent Manufacturing}, series = {Studies in Computational Intelligence}, volume = {594}, pages = {157--164}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15159-5\_15}, doi = {10.1007/978-3-319-15159-5\_15}, timestamp = {Thu, 23 Aug 2018 17:12:59 +0200}, biburl = {https://dblp.org/rec/series/sci/BabiceanuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/BabiceanuS15a, author = {Radu F. Babiceanu and Remzi Seker}, editor = {Theodor Borangiu and Andr{\'{e}} Thomas and Damien Trentesaux}, title = {Manufacturing Cyber-Physical Systems Enabled by Complex Event Processing and Big Data Environments: {A} Framework for Development}, booktitle = {Service Orientation in Holonic and Multi-agent Manufacturing}, series = {Studies in Computational Intelligence}, volume = {594}, pages = {165--173}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15159-5\_16}, doi = {10.1007/978-3-319-15159-5\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/BabiceanuS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/0014YXZS014, author = {Yue Zhao and Kenji Yoshigoe and Mengjun Xie and Suijian Zhou and Remzi Seker and Jiang Bian}, title = {Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {289--316}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.333}, doi = {10.13052/JCSM2245-1439.333}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/0014YXZS014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/ZhaoYXZSB14, author = {Yue Zhao and Kenji Yoshigoe and Mengjun Xie and Suijian Zhou and Remzi Seker and Jiang Bian}, title = {LightGraph: Lighten Communication in Distributed Graph-Parallel Processing}, booktitle = {2014 {IEEE} International Congress on Big Data, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {717--724}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/BigData.Congress.2014.106}, doi = {10.1109/BIGDATA.CONGRESS.2014.106}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/ZhaoYXZSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/SahamiRCHKLRS14, author = {Mehran Sahami and Steve Roach and Ernesto Cuadros{-}Vargas and Elizabeth K. Hawthorne and Amruth Kumar and Richard LeBlanc and David Reed and Remzi Seker}, editor = {J. D. Dougherty and Kris Nagel and Adrienne Decker and Kurt Eiselt}, title = {{ACM/IEEE-CS} computer science curricula 2013: implementing the final report}, booktitle = {The 45th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014}, pages = {175--176}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2538862.2538863}, doi = {10.1145/2538862.2538863}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/SahamiRCHKLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/MoallemiSTSKJ14, author = {Mohammad Moallemi and Remzi Seker and Massood Towhidnejad and Jonathan Standley and Robert Klein and Paul Jackson}, title = {Threat modeling for aircraft access to national airspace system wide information management program}, booktitle = {Proceedings of the 17th Communications {\&} Networking Symposium, part of the 2014 Spring Simulation Multiconference, SpringSim '14, Tampa, FL, USA, April 13-16, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2663502}, timestamp = {Fri, 19 Sep 2014 14:02:16 +0200}, biburl = {https://dblp.org/rec/conf/springsim/MoallemiSTSKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BianS13, author = {Jiang Bian and Remzi Seker}, title = {The Jigsaw secure distributed file system}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {4}, pages = {1142--1152}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2013.01.018}, doi = {10.1016/J.COMPELECENG.2013.01.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/BianS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/RoachSLS13, author = {Steve Roach and Mehran Sahami and Richard LeBlanc and Remzi Seker}, editor = {Randa L. Shehab and James J. Sluss and Deborah Anne Trytten}, title = {Special session: The {CS2013} Computer Science curriculum guidelines project}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2013, Oklahoma City, Oklahoma, USA, October 23-26, 2013}, pages = {1311--1313}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FIE.2013.6685045}, doi = {10.1109/FIE.2013.6685045}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/RoachSLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SubramanianSRL12, author = {Vimalathithan Subramanian and Remzi Seker and Srini Ramaswamy and Rathinasamy B. Lenin}, title = {{PCIEF:} a policy conflict identification and evaluation framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {1}, pages = {48--67}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051090}, doi = {10.1504/IJICS.2012.051090}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SubramanianSRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/KanaskarSBP12, author = {Nitin Kanaskar and Remzi Seker and Jiang Bian and Vir V. Phoha}, title = {Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {42}, number = {6}, pages = {1579--1589}, year = {2012}, url = {https://doi.org/10.1109/TSMCC.2012.2208187}, doi = {10.1109/TSMCC.2012.2208187}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/KanaskarSBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SubramanianSBK11, author = {Vimalathithan Subramanian and Remzi Seker and Jiang Bian and Nitin Kanaskar}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Collaborations, mergers, acquisitions, and security policy conflict analysis}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {36}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179337}, doi = {10.1145/2179298.2179337}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/SubramanianSBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/NijimNSRR11, author = {Mais Nijim and Yousef Nijim and Remzi Seker and Vamshi Reddy and Raghu Nandi Raju}, editor = {Parimala Thulasiraman and Laurence Tianruo Yang and Qiwen Pan and Xingang Liu and Yaw{-}Chung Chen and Yo{-}Ping Huang and Lin{-}Huang Chang and Che{-}Lun Hung and Che{-}Rung Lee and Justin Y. Shi and Ying Zhang}, title = {{DM-PAS:} {A} Data Mining Prefetching Algorithm for Storage System}, booktitle = {13th {IEEE} International Conference on High Performance Computing {\&} Communication, {HPCC} 2011, Banff, Alberta, Canada, September 2-4, 2011}, pages = {500--505}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/HPCC.2011.71}, doi = {10.1109/HPCC.2011.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/NijimNSRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/BianCXJSK11, author = {Jiang Bian and Josh M. Cisler and Mengjun Xie and George Andrew James and Remzi Seker and Clinton D. Kilts}, title = {A methodology for empirical analysis of brain connectivity through graph mining}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Anchorage, Alaska, USA, October 9-12, 2011}, pages = {2963--2969}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICSMC.2011.6084151}, doi = {10.1109/ICSMC.2011.6084151}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/BianCXJSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/BianST10, author = {Jiang Bian and Remzi Seker and Umit Topaloglu}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {A Secure Distributed File System for Medical Image Archiving}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {961--966}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.142}, doi = {10.1109/SOCIALCOM.2010.142}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/BianST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cics/BianS09, author = {Jiang Bian and Remzi Seker}, title = {JigDFS: {A} secure distributed file system}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence in Cyber Security, {CICS} 2009, Nashville, TN, USA, March 31 - April 2, 2009}, pages = {76--82}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CICYBS.2009.4925093}, doi = {10.1109/CICYBS.2009.4925093}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cics/BianS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BianSR09, author = {Jiang Bian and Remzi Seker and Srini Ramaswamy}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {JigDFS in container communities for international cargo security}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {19}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558629}, doi = {10.1145/1558607.1558629}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BianSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SubramanianSSLR09, author = {Vimalathithan Subramanian and Sithu D. Sudarsan and Remzi Seker and Rathinasamy B. Lenin and Srinivasan Ramaswamy}, editor = {Belur V. Dasarathy}, title = {Secure data aggregation in heterogeneous and disparate networks using stand off server architecture}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734405}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818575}, doi = {10.1117/12.818575}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SubramanianSSLR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/SudarsanSYRSL09, author = {Sithu D. Sudarsan and Vimalathithan Subramanian and Kenji Yoshigoe and Srini Ramaswamy and Remzi Seker and Rathinasamy B. Lenin}, editor = {Khaldoun Al Agha and Mohamad Badra and Gregory B. Newby}, title = {Impact of Duty Cycle Variation on WSNs}, booktitle = {{NTMS} 2009, 3rd International Conference on New Technologies, Mobility and Security, 20-23 December 2009, Cairo, Egypt}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/NTMS.2009.5384705}, doi = {10.1109/NTMS.2009.5384705}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/SudarsanSYRSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/ChiangBSTDSTBZW09, author = {Chia{-}Chu Chiang and Coskun Bayrak and Remzi Seker and Umit Topaloglu and Rustu Murat Demirer and Nasrola Samadi and Suleyman Tek and Jiang Bian and GuangXu Zhou and Xiaoran Wang}, title = {Design of a Lattice-based Access Control Scheme}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009}, pages = {68--73}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICSMC.2009.5346329}, doi = {10.1109/ICSMC.2009.5346329}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/ChiangBSTDSTBZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/BianSR09, author = {Jiang Bian and Remzi Seker and Srini Ramaswamy}, title = {JigDFS for Implementing Secure Container Communities}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009}, pages = {3651--3654}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICSMC.2009.5346865}, doi = {10.1109/ICSMC.2009.5346865}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/BianSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/RamaswamySSICA08, author = {Srinivasan Ramaswamy and Remzi Seker and Sithu D. Sudarsan and Mhamed Itmi and Adnane Cabani and Waled Alshabi}, title = {Modelling and simulation: The basis for education enrichment and software design}, journal = {Enterp. Inf. Syst.}, volume = {2}, number = {2}, pages = {177--199}, year = {2008}, url = {https://doi.org/10.1080/17517570801927411}, doi = {10.1080/17517570801927411}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eis/RamaswamySSICA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sysose/BianTSBC08, author = {Jiang Bian and Umit Topaloglu and Remzi Seker and Coskun Bayrak and Chia{-}Chu Chiang}, title = {A role-based secure group communication framework}, booktitle = {3rd {IEEE} International Conference on System of Systems Engineering, SoSE 2008, Singapore, 2-4 June 2008}, pages = {1--6}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/SYSOSE.2008.4724150}, doi = {10.1109/SYSOSE.2008.4724150}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sysose/BianTSBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webist/BianSTB08, author = {Jiang Bian and Remzi Seker and Umit Topaloglu and Coskun Bayrak}, editor = {Jos{\'{e}} Cordeiro and Joaquim Filipe and Slimane Hammoudi}, title = {Off-the-Record Secure Chat Room}, booktitle = {{WEBIST} 2008, Proceedings of the Fourth International Conference on Web Information Systems and Technologies, Volume 1, Funchal, Madeira, Portugal, May 4-7, 2008}, pages = {54--61}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webist/BianSTB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/BianST07, author = {Jiang Bian and Remzi Seker and Umit Topaloglu}, title = {Off-the-Record Instant Messaging for Group Conversation}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2007, 13-15 August 2007, Las Vegas, Nevada, {USA}}, pages = {79--84}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2007}, url = {https://doi.org/10.1109/IRI.2007.4296601}, doi = {10.1109/IRI.2007.4296601}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/BianST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/RamaswamySSM07, author = {Srini Ramaswamy and Remzi Seker and Sithu D. Sudarsan and D. Moix}, title = {Societal-Consciousness in the Computing Curricula: {A} Time for Serious Introspection}, booktitle = {{IEEE} International Symposium on Technology and Society, {ISTAS} 2007, Las Vegas, NV, USA, June 1-2, 2007}, pages = {1--6}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISTAS.2007.4362231}, doi = {10.1109/ISTAS.2007.4362231}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/istas/RamaswamySSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scsc/JoshiSBRC07, author = {Hemant Joshi and Remzi Seker and Coskun Bayrak and Srini Ramaswamy and Jeffrey B. Connelly}, editor = {Gabriel A. Wainer}, title = {Ontology for disaster mitigation and planning}, booktitle = {Proceedings of the 2007 Summer Computer Simulation Conference, {SCSC} 2007, San Diego, California, USA, July 16-19, 2007}, pages = {26}, publisher = {Simulation Councils, Inc.}, year = {2007}, url = {https://dl.acm.org/citation.cfm?id=1358132}, timestamp = {Wed, 28 Nov 2018 12:57:16 +0100}, biburl = {https://dblp.org/rec/conf/scsc/JoshiSBRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/KanaskarSR07, author = {Nitin Kanaskar and Remzi Seker and Srinivasan Ramaswamy}, title = {A Dynamical System Approach to Intrusion Detection Using System Call Analysis}, booktitle = {Proceedings of the Nineteenth International Conference on Software Engineering {\&} Knowledge Engineering (SEKE'2007), Boston, Massachusetts, USA, July 9-11, 2007}, pages = {710--717}, publisher = {Knowledge Systems Institute Graduate School}, year = {2007}, timestamp = {Thu, 12 Mar 2020 11:30:50 +0100}, biburl = {https://dblp.org/rec/conf/seke/KanaskarSR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sew/HewettS05, author = {Rattikorn Hewett and Remzi Seker}, title = {A Risk Assessment Model of Embedded Software Systems}, booktitle = {29th Annual {IEEE} / {NASA} Software Engineering Workshop {(SEW-29} 2005), 6-7 April 2005, Greenbelt, Maryland, {USA}}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SEW.2005.16}, doi = {10.1109/SEW.2005.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sew/HewettS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/MerweSG05, author = {Alta van der Merwe and Remzi Seker and Aurona Gerber}, title = {Phishing in the system of systems settings: mobile technology}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005}, pages = {492--498}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICSMC.2005.1571194}, doi = {10.1109/ICSMC.2005.1571194}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/MerweSG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/RamamoorthyS05, author = {C. V. Ramamoorthy and Remzi Seker}, title = {Infrastructures for information technology systems}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005}, pages = {979--986}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICSMC.2005.1571273}, doi = {10.1109/ICSMC.2005.1571273}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/RamamoorthyS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jid/SekerMKTP04, author = {Remzi Seker and A. J. van der Merwe and Paula Kotz{\'{e}} and Murat M. Tanik and R. Paul}, title = {Assessment of Coupling and Cohesion for Component-Based Software by using Shannon Languages}, journal = {Trans. {SDPS}}, volume = {8}, number = {4}, pages = {33--43}, year = {2004}, url = {http://content.iospress.com/articles/journal-of-integrated-design-and-process-science/jid8-4-03}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jid/SekerMKTP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/MerweS04, author = {A. J. van der Merwe and Remzi Seker}, title = {Mobile phishing : communication}, journal = {South Afr. Comput. J.}, volume = {33}, pages = {111--112}, year = {2004}, url = {http://reference.sabinet.co.za/document/EJC27966}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/MerweS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/SekerT04, author = {Remzi Seker and Murat M. Tanik}, title = {An information-theoretical framework for modeling component-based systems}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {34}, number = {4}, pages = {475--484}, year = {2004}, url = {https://doi.org/10.1109/TSMCC.2004.829297}, doi = {10.1109/TSMCC.2004.829297}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/SekerT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isict/JololianNS04, author = {Leon Jololian and Jean{-}Claude Ngatchou and Remzi Seker}, editor = {John Waldron}, title = {A component integration meta-framework using smart adapters}, booktitle = {Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004}, series = {{ACM} International Conference Proceeding Series}, volume = {90}, pages = {128--133}, publisher = {Trinity College Dublin}, year = {2004}, url = {https://dl.acm.org/citation.cfm?id=1071535}, timestamp = {Mon, 26 Nov 2018 17:05:49 +0100}, biburl = {https://dblp.org/rec/conf/isict/JololianNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/RamamoorthyS04, author = {C. V. Ramamoorthy and Remzi Seker}, editor = {Walter Dosch and Roger Y. Lee and Chisu Wu}, title = {Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact}, booktitle = {Software Engineering Research, Management and Applications, Second International Conference, {SERA} 2004, Los Angeles, CA, USA, May 5-7, 2004, Selected Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3647}, pages = {214--228}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11668855\_16}, doi = {10.1007/11668855\_16}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/sera/RamamoorthyS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsi/SekerSBK00, author = {Remzi Seker and Sokol Saliu and Ahmet Birand and Gulmira Kudaiberdieva}, title = {Validity Test for a Set of Nonlinear Measures for Short Data Length with Reference to Short-Term Heart Rate Variability Signal}, journal = {J. Syst. Integr.}, volume = {10}, number = {1}, pages = {41--53}, year = {2000}, url = {https://doi.org/10.1023/A:1026507317626}, doi = {10.1023/A:1026507317626}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsi/SekerSBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.