


default search action
Cihan Tunc
Person information
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Moayad Aloqaily, Helen Paik, Willian T. Lunardi, Cihan Tunc, Fang He:
Guest Editorial: Zero Trust Security Methods for Wireless Networks. IEEE Wirel. Commun. 31(2): 12-13 (2024) - [c47]Burak Tufekci, Atakan Arslan, Cihan Tunc, Kirill Morozov:
Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones. IOTSMS 2024: 58-65 - [c46]Burak Tufekci, Vinh Quach, Cihan Tunc, Ram Dantu:
DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks. IOTSMS 2024: 240-247 - [c45]Vinh Quach, Burak Tufekci, Cihan Tunc, Ram Dantu:
Hazardous Area Aware Path-Planning for Drone Swarms. MOST 2024: 168-177 - 2023
- [c44]Amal Alshehri, Cihan Tunc:
Zero Trust Engine for IoT Environments. AICCSA 2023: 1-3 - [c43]Seemaparvez Shaik, Cihan Tunc, Kirill Morozov:
Intrusion Detection for Additive Manufacturing Systems and Networks. AICCSA 2023: 1-3 - [c42]Himan Namdari, Cihan Tunc, Ram Dantu:
Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol. IOTSMS 2023: 117-124 - [c41]Evan Blake Putnam, Dylan Nihal Senarath, Giselle Ramirez Urquijo, Cihan Tunc, Renée C. Bryce:
A Lightweight Drone Simulator. SDS 2023: 52-59 - 2022
- [j6]Chongke Wu
, Sicong Shao
, Cihan Tunc
, Pratik Satam, Salim Hariri:
An explainable and efficient deep learning framework for video anomaly detection. Clust. Comput. 25(4): 2715-2737 (2022) - [c40]Cihan Tunc, Salim Hariri:
Self-Protection for Unmanned Autonomous Vehicles (SP-UAV): Design Overview and Evaluation. ACSOS-C 2022: 128-132 - [c39]Rima Grati, Cihan Tunc:
Message from AICCSA'2022 Program Chairs. AICCSA 2022: 1 - [c38]Cihan Tunc, James Durflinger, Charif Mahmoudi, Valerio Formicola:
Autonomic ZTA-based Network Management Engine (AZNME). ISSRE Workshops 2022: 25-30 - 2021
- [c37]Himan Namdari, Cihan Tunc
:
Toward Resilience Methods in Cloud Computing. AICCSA 2021: 1-2 - [c36]Sicong Shao
, Pratik Satam, Shalaka Satam, Khalid Al-Awady, Gregory Ditzler, Salim Hariri, Cihan Tunc
:
Multi-Layer Mapping of Cyberspace for Intrusion Detection. AICCSA 2021: 1-8 - [c35]Burak Tufekci
, Cihan Tunc
:
Vulnerability and Threat Analysis of UAVs. AICCSA 2021: 1-2 - 2020
- [j5]Sicong Shao
, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics. ACM Trans. Manag. Inf. Syst. 11(4): 24:1-24:25 (2020) - [c34]Chongke Wu, Sicong Shao
, Cihan Tunc
, Salim Hariri:
Video Anomaly Detection using Pre-Trained Deep Convolutional Neural Nets and Context Mining. AICCSA 2020: 1-8 - [c33]Likai Yao, Cihan Tunc
, Pratik Satam, Salim Hariri:
Resilient Machine Learning (rML) Ensemble Against Adversarial Machine Learning Attacks. DDDAS 2020: 274-282 - [c32]Farah Fargo, Olivier Franza, Cihan Tunc
, Salim Hariri:
VM Introspection-based Allowlisting for IaaS. IoTSMS 2020: 1-4 - [i1]Chongke Wu, Sicong Shao, Cihan Tunc, Salim Hariri:
Video Anomaly Detection Using Pre-Trained Deep Convolutional Neural Nets and Context Mining. CoRR abs/2010.02406 (2020)
2010 – 2019
- 2019
- [j4]Dylan Machovec, Bhavesh Khemka, Nirmal Kumbhare, Sudeep Pasricha, Anthony A. Maciejewski
, Howard Jay Siegel, Ali Akoglu
, Gregory A. Koenig, Salim Hariri, Cihan Tunc
, Michael Wright, Marcia Hilton, Rajendra Rambharos, Christopher Blandin, Farah Fargo, Ahmed Louri, Neena Imam:
Utility-based resource management in an oversubscribed energy-constrained heterogeneous environment executing parallel applications. Parallel Comput. 83: 48-72 (2019) - [c31]Farah Fargo, Olivier Franza, Cihan Tunc
, Salim Hariri:
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment. AICCSA 2019: 1-4 - [c30]Jesus Pacheco, Victor H. Benitez, Cihan Tunc
, Clarisa Grijalva:
Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications. AICCSA 2019: 1-6 - [c29]Sicong Shao
, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat. AICCSA 2019: 1-8 - [c28]Sicong Shao
, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics. AICCSA 2019: 1-8 - [c27]Mheni Merzouki, Charif Mahmoudi
, Robert B. Bohn, Cihan Tunc
:
Security Automation for Cloud-Based IoT Platforms. iThings/GreenCom/CPSCom/SmartData 2019: 1185-1191 - 2018
- [c26]Jesus Pacheco
, Cihan Tunc
, Salim Hariri:
Security Framework for IoT Cloud Services. AICCSA 2018: 1-6 - [c25]Sicong Shao
, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
Autonomic Author Identification in Internet Relay Chat (IRC). AICCSA 2018: 1-8 - [c24]Jocelyn Bernard, Sicong Shao
, Cihan Tunc
, Hamamache Kheddouci, Salim Hariri:
Quasi-cliques Analysis for IRC Channel Thread Detection. COMPLEX NETWORKS (1) 2018: 578-589 - 2017
- [j3]Cihan Tunc
, Dylan Machovec, Nirmal Kumbhare, Ali Akoglu
, Salim Hariri, Bhavesh Khemka, Howard Jay Siegel:
Value of service based resource management for large-scale computing systems. Clust. Comput. 20(3): 2013-2030 (2017) - [c23]Mingwei Yang
, Ivan B. Djordjevic, Cihan Tunc
, Salim Hariri, Ali Akoglu
:
An Optical Interconnect Network Design for Dynamically Composable Data Centers. HPCC/SmartCity/DSS 2017: 299-302 - [c22]Nirmal Kumbhare, Cihan Tunc
, Dylan Machovec, Ali Akoglu
, Salim Hariri, Howard Jay Siegel:
Value Based Scheduling for Oversubscribed Power-Constrained Homogeneous HPC Systems. ICCAC 2017: 120-130 - [c21]Cihan Tunc
, Farah Fargo, Youssif B. Al-Nashif, Salim Hariri:
Autonomic Cross-Layer Management of Cloud Systems. FAS*W@SASO/ICCAC 2017: 160-165 - [c20]Ahmet Turan Özdemir, Cihan Tunc
, Salim Hariri:
Autonomic Fall Detection System. FAS*W@SASO/ICCAC 2017: 166-170 - [c19]Cihan Tunc
, Salim Hariri, Mheni Merzouki, Charif Mahmoudi
, Frederic J. de Vaulx, Jaafar Chbili, Robert B. Bohn, Abdella Battou:
Cloud Security Automation Framework. FAS*W@SASO/ICCAC 2017: 307-312 - [c18]Sicong Shao
, Cihan Tunc
, Pratik Satam
, Salim Hariri:
Real-Time IRC Threat Detection Framework. FAS*W@SASO/ICCAC 2017: 318-323 - [c17]Salim Hariri, Cihan Tunc
, Youakim Badr
:
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview. FAS*W@SASO/ICCAC 2017: 352-356 - 2016
- [j2]Jesus Pacheco
, Cihan Tunc
, Pratik Satam
, Salim Hariri:
Secure and Resilient Cloud Services for Enhanced Living Environments. IEEE Cloud Comput. 3(6): 44-52 (2016) - [c16]Nirmal Kumbhare, Cihan Tunc
, Salim Hariri, Ivan B. Djordjevic, Ali Akoglu
, Howard Jay Siegel:
Just In Time Architecture (JITA) for dynamically composable data centers. AICCSA 2016: 1-8 - [c15]Dylan Machovec, Cihan Tunc
, Nirmal Kumbhare, Bhavesh Khemka, Ali Akoglu
, Salim Hariri, Howard Jay Siegel:
Value-Based Resource Management in High-Performance Computing Systems. ScienceCloud@HPDC 2016: 19-26 - [c14]Cihan Tunc
, Nirmal Kumbhare, Ali Akoglu
, Salim Hariri, Dylan Machovec, Howard Jay Siegel:
Value of Service Based Task Scheduling for Cloud Computing Systems. ICCAC 2016: 1-11 - [c13]Jiakai Yu, Cihan Tunc
, Salim Hariri:
Automated Framework for Scalable Collection and Intelligent Analytics of Hacker IRC Information. ICCAC 2016: 33-39 - [c12]Shuqing Gu, Likai Yao, Cihan Tunc
, Ali Akoglu
, Salim Hariri, Elizabeth Ritchie:
An Autonomic Workflow Performance Manager for Weather Research and Forecast Workflows. ICCAC 2016: 111-114 - [c11]Jesus Pacheco, Cihan Tunc, Salim Hariri:
Design and evaluation of resilient infrastructures systems for smart cities. ISC2 2016: 1-6 - 2015
- [j1]Cihan Tunc, Salim Hariri:
CLaaS: Cybersecurity Lab as a Service. J. Internet Serv. Inf. Secur. 5(4): 41-59 (2015) - [c10]Bilal Al Baalbaki, Jesus Pacheco
, Cihan Tunc
, Salim Hariri, Youssif B. Al-Nashif:
Anomaly Behavior Analysis System for ZigBee in smart buildings. AICCSA 2015: 1-4 - [c9]Cihan Tunc
, Salim Hariri, Fabian De La Pena Montero, Farah Fargo, Pratik Satam
:
CLaaS: Cybersecurity Lab as a Service - Design, Analysis, and Evaluation. ICCAC 2015: 224-227 - [c8]Cihan Tunc
, Salim Hariri, Fabian De La Pena Montero, Farah Fargo, Pratik Satam
, Youssif B. Al-Nashif:
Teaching and Training Cybersecurity as a Cloud Service. ICCAC 2015: 302-308 - 2014
- [c7]Cihan Tunc
, Farah Fargo, Youssif B. Al-Nashif, Salim Hariri, John Hughes:
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation. ICCAC 2014: 44-49 - [c6]Farah Fargo, Cihan Tunc
, Youssif B. Al-Nashif, Ali Akoglu
, Salim Hariri:
Autonomic Workload and Resources Management of Cloud Computing Services. ICCAC 2014: 101-110 - 2013
- [c5]Farah Fargo, Cihan Tunc
, Youssif B. Al-Nashif, Salim Hariri:
Autonomic performance-per-watt management (APM) of cloud resources and services. CAC 2013: 2:1-2:10 - [c4]Bilgiday Yuce, Seyrani Korkmaz, Vahap Baris Esen, Fatih Temizkan, Cihan Tunc
, Gokhan Guner, I. Faik Baskaya, Iskender Agi, Günhan Dündar
, H. Fatih Ugurdag:
Synthesis of clock trees for Sampled-Data Analog IC blocks. EWDTS 2013: 1-4 - 2011
- [c3]H. Fatih Ugurdag, Okan Keskin, Cihan Tunc
, Fatih Temizkan, Gurbey Fici, Soner Dedeoglu:
RoCoCo: Row and Column Compression for high-performance multiplication on FPGAs. EWDTS 2011: 98-101 - 2010
- [c2]Cihan Tunc
, Mehdi Baradaran Tahoori:
Variation tolerant logic mapping for crossbar array nano architectures. ASP-DAC 2010: 855-860 - [c1]Cihan Tunc
, Mehdi Baradaran Tahoori:
On-the-fly variation tolerant mapping in crossbar nano-architectures. VTS 2010: 105-110
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint