Skip to main content

Showing 1–34 of 34 results for author: Kantarci, B

  1. arXiv:2407.11155  [pdf, other

    cs.NI

    Joint Optimization of Completion Ratio and Latency of Offloaded Tasks with Multiple Priority Levels in 5G Edge

    Authors: Parisa Fard Moshiri, Murat Simsek, Burak Kantarci

    Abstract: Multi-Access Edge Computing (MEC) is widely recognized as an essential enabler for applications that necessitate minimal latency. However, the dropped task ratio metric has not been studied thoroughly in literature. Neglecting this metric can potentially reduce the system's capability to effectively manage tasks, leading to an increase in the number of eliminated or unprocessed tasks. This paper p… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: 16 pages, 10 figures

  2. arXiv:2406.10664  [pdf, other

    cs.NI eess.SP

    A Novel Joint DRL-Based Utility Optimization for UAV Data Services

    Authors: Xuli Cai, Poonam Lohan, Burak Kantarci

    Abstract: In this paper, we propose a novel joint deep reinforcement learning (DRL)-based solution to optimize the utility of an uncrewed aerial vehicle (UAV)-assisted communication network. To maximize the number of users served within the constraints of the UAV's limited bandwidth and power resources, we employ deep Q-Networks (DQN) and deep deterministic policy gradient (DDPG) algorithms for optimal reso… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

    Comments: 6 pages, 9 figures

  3. arXiv:2406.10382  [pdf, other

    cs.AI cs.CL

    Efficient Prompting for LLM-based Generative Internet of Things

    Authors: Bin Xiao, Burak Kantarci, Jiawen Kang, Dusit Niyato, Mohsen Guizani

    Abstract: Large language models (LLMs) have demonstrated remarkable capacities on various tasks, and integrating the capacities of LLMs into the Internet of Things (IoT) applications has drawn much research attention recently. Due to security concerns, many institutions avoid accessing state-of-the-art commercial LLM services, requiring the deployment and utilization of open-source LLMs in a local network s… ▽ More

    Submitted 17 June, 2024; v1 submitted 14 June, 2024; originally announced June 2024.

    Comments: 13 pages, 11 figures

  4. arXiv:2406.10356  [pdf, other

    cs.NI

    A New Realistic Platform for Benchmarking and Performance Evaluation of DRL-Driven and Reconfigurable SFC Provisioning Solutions

    Authors: Murat Arda Onsu, Poonam Lohan, Burak Kantarci, Emil Janulewicz, Sergio Slobodrian

    Abstract: Service Function Chain (SFC) provisioning stands as a pivotal technology in the realm of 5G and future networks. Its essence lies in orchestrating VNFs (Virtual Network Functions) in a specified sequence for different types of SFC requests. Efficient SFC provisioning requires fast, reliable, and automatic VNFs' placements, especially in a network where massive amounts of SFC requests are generated… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: 6 pages, 4 figures

  5. arXiv:2403.02645  [pdf, other

    eess.SP cs.CR cs.LG cs.NI

    DT-DDNN: A Physical Layer Security Attack Detector in 5G RF Domain for CAVs

    Authors: Ghazal Asemian, Mohammadreza Amini, Burak Kantarci, Melike Erol-Kantarci

    Abstract: The Synchronization Signal Block (SSB) is a fundamental component of the 5G New Radio (NR) air interface, crucial for the initial access procedure of Connected and Automated Vehicles (CAVs), and serves several key purposes in the network's operation. However, due to the predictable nature of SSB transmission, including the Primary and Secondary Synchronization Signals (PSS and SSS), jamming attack… ▽ More

    Submitted 11 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: 15 pages, 16 figures

  6. arXiv:2401.10396  [pdf, other

    eess.SP cs.IT cs.LG

    Deep Dict: Deep Learning-based Lossy Time Series Compressor for IoT Data

    Authors: Jinxin Liu, Petar Djukic, Michel Kulhandjian, Burak Kantarci

    Abstract: We propose Deep Dict, a deep learning-based lossy time series compressor designed to achieve a high compression ratio while maintaining decompression error within a predefined range. Deep Dict incorporates two essential components: the Bernoulli transformer autoencoder (BTAE) and a distortion constraint. BTAE extracts Bernoulli representations from time series data, reducing the size of the repres… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

    Comments: 6 pages, 13 figures, IEEE International Conference on Communications (ICC) 2024

  7. arXiv:2401.10390  [pdf, ps, other

    cs.NI eess.SP

    On the Interplay Between Network Metrics and Performance of Mobile Edge Offloading

    Authors: Parisa Fard Moshiri, Murat Simsek, Burak Kantarci

    Abstract: Multi-Access Edge Computing (MEC) emerged as a viable computing allocation method that facilitates offloading tasks to edge servers for efficient processing. The integration of MEC with 5G, referred to as 5G-MEC, provides real-time processing and data-driven decision-making in close proximity to the user. The 5G-MEC has gained significant recognition in task offloading as an essential tool for app… ▽ More

    Submitted 22 January, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

    Comments: 6 pages, 3 figures, IEEE International Conference on Communications (ICC) 2024

  8. arXiv:2401.10387  [pdf, other

    cs.CR cs.NI

    Bypassing a Reactive Jammer via NOMA-Based Transmissions in Critical Missions

    Authors: Mohammadreza Amini, Ghazal Asemian, Michel Kulhandjian, Burak Kantarci, Claude D'Amours, Melike Erol-Kantarci

    Abstract: Wireless networks can be vulnerable to radio jamming attacks. The quality of service under a jamming attack is not guaranteed and the service requirements such as reliability, latency, and effective rate, specifically in mission-critical military applications, can be deeply affected by the jammer's actions. This paper analyzes the effect of a reactive jammer. Particularly, reliability, average tra… ▽ More

    Submitted 24 January, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

    Comments: 6 pages, 7 figures, IEEE International Conference on Communications (ICC) 2024

  9. Adversarial Machine Learning-Enabled Anonymization of OpenWiFi Data

    Authors: Samhita Kuili, Kareem Dabbour, Irtiza Hasan, Andrea Herscovich, Burak Kantarci, Marcel Chenier, Melike Erol-Kantarci

    Abstract: Data privacy and protection through anonymization is a critical issue for network operators or data owners before it is forwarded for other possible use of data. With the adoption of Artificial Intelligence (AI), data anonymization augments the likelihood of covering up necessary sensitive information; preventing data leakage and information loss. OpenWiFi networks are vulnerable to any adversary… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

    Comments: 8 pages, 4 Figures, "Wireless World Research and Trends" Magazine. Initial version was presented in 47th Wireless World Research Forum

  10. arXiv:2312.06555  [pdf, other

    eess.SP cs.CR eess.SY

    On the Impact of CDL and TDL Augmentation for RF Fingerprinting under Impaired Channels

    Authors: Omer Melih Gul, Michel Kulhandjian, Burak Kantarci, Claude D'Amours, Azzedine Touazi, Cliff Ellement

    Abstract: Cyber-physical systems have recently been used in several areas (such as connected and autonomous vehicles) due to their high maneuverability. On the other hand, they are susceptible to cyber-attacks. Radio frequency (RF) fingerprinting emerges as a promising approach. This work aims to analyze the impact of decoupling tapped delay line and clustered delay line (TDL+CDL) augmentation-driven deep l… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 9 pages, 8 Figures, "Wireless World Research and Trends" Magazine. Initial version was presented in 48th Wireless World Research Forum

  11. arXiv:2312.00699  [pdf, other

    cs.CV cs.IR

    Rethinking Detection Based Table Structure Recognition for Visually Rich Document Images

    Authors: Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

    Abstract: Table Structure Recognition (TSR) is a widely discussed task aiming at transforming unstructured table images into structured formats, such as HTML sequences, to make text-only models, such as ChatGPT, that can further process these tables. One type of solution is using detection models to detect table components, such as columns and rows, then applying a rule-based post-processing method to conve… ▽ More

    Submitted 10 January, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

    Comments: under review

  12. Multidomain transformer-based deep learning for early detection of network intrusion

    Authors: Jinxin Liu, Murat Simsek, Michele Nogueira, Burak Kantarci

    Abstract: Timely response of Network Intrusion Detection Systems (NIDS) is constrained by the flow generation process which requires accumulation of network packets. This paper introduces Multivariate Time Series (MTS) early detection into NIDS to identify malicious flows prior to their arrival at target systems. With this in mind, we first propose a novel feature extractor, Time Series Network Flow Meter (… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

    Comments: 6 pages, 7 figures, 3 tables, IEEE Global Communications Conference (Globecom) 2023

  13. arXiv:2307.05419  [pdf, other

    cs.NI

    Channel Selection for Wi-Fi 7 Multi-Link Operation via Optimistic-Weighted VDN and Parallel Transfer Reinforcement Learning

    Authors: Pedro Enrique Iturria-Rivera, Marcel Chenier, Bernard Herscovici, Burak Kantarci, Melike Erol-Kantarci

    Abstract: Dense and unplanned IEEE 802.11 Wireless Fidelity(Wi-Fi) deployments and the continuous increase of throughput and latency stringent services for users have led to machine learning algorithms to be considered as promising techniques in the industry and the academia. Specifically, the ongoing IEEE 802.11be EHT -- Extremely High Throughput, known as Wi-Fi 7 -- amendment propose, for the first time,… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: Accepted in IEEE PIMRC'23

  14. arXiv:2306.10309  [pdf, other

    cs.CR

    Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

    Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo

    Abstract: The ongoing deployment of the fifth generation (5G) wireless networks constantly reveals limitations concerning its original concept as a key driver of Internet of Everything (IoE) applications. These 5G challenges are behind worldwide efforts to enable future networks, such as sixth generation (6G) networks, to efficiently support sophisticated applications ranging from autonomous driving capabil… ▽ More

    Submitted 8 February, 2024; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication in IEEE Communications Surveys \& Tutorials

  15. arXiv:2306.09451  [pdf, ps, other

    cs.CR cs.AI cs.NI

    Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

    Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic

    Abstract: Network Intrusion Detection Systems (NIDS) have been extensively investigated by monitoring real network traffic and analyzing suspicious activities. However, there are limitations in detecting specific types of attacks with NIDS, such as Advanced Persistent Threats (APT). Additionally, NIDS is restricted in observing complete traffic information due to encrypted traffic or a lack of authority. To… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

    Comments: 20 pages, 11 figures, 4 tables

    ACM Class: C.2.0; G.3; I.2

  16. Table Detection for Visually Rich Document Images

    Authors: Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

    Abstract: Table Detection (TD) is a fundamental task to enable visually rich document understanding, which requires the model to extract information without information loss. However, popular Intersection over Union (IoU) based evaluation metrics and IoU-based loss functions for the detection models cannot directly represent the degree of information loss for the prediction results. Therefore, we propose to… ▽ More

    Submitted 26 October, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted by Knowledge-Based Systems

  17. arXiv:2305.04833  [pdf, other

    cs.IR cs.CV

    Revisiting Table Detection Datasets for Visually Rich Documents

    Authors: Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

    Abstract: Table Detection has become a fundamental task for visually rich document understanding with the surging number of electronic documents. However, popular public datasets widely used in related studies have inherent limitations, including noisy and inconsistent samples, limited training samples, and limited data sources. These limitations make these datasets unreliable to evaluate the model performa… ▽ More

    Submitted 8 November, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

  18. arXiv:2303.11745  [pdf, other

    cs.CR cs.AI

    Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study

    Authors: Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Merouane Debbah, Kim-Kwang Raymond Choo

    Abstract: Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments. However, we need to also consider the potential of attacks targeting the underlying AI systems (e.g., adversaries seek to corrupt data on the IoT devices during local updates or corrupt the model updates); hence… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings

  19. arXiv:2303.08959  [pdf, other

    cs.NI

    RL meets Multi-Link Operation in IEEE 802.11be: Multi-Headed Recurrent Soft-Actor Critic-based Traffic Allocation

    Authors: Pedro Enrique Iturria Rivera, Marcel Chenier, Bernard Herscovici, Burak Kantarci, Melike Erol-Kantarci

    Abstract: IEEE 802.11be -Extremely High Throughput-, commercially known as Wireless-Fidelity (Wi-Fi) 7 is the newest IEEE 802.11 amendment that comes to address the increasingly throughput hungry services such as Ultra High Definition (4K/8K) Video and Virtual/Augmented Reality (VR/AR). To do so, IEEE 802.11be presents a set of novel features that will boost the Wi-Fi technology to its edge. Among them, Mul… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: Accepted in ICC'23

  20. arXiv:2211.15741  [pdf, other

    cs.NI

    Cooperate or not Cooperate: Transfer Learning with Multi-Armed Bandit for Spatial Reuse in Wi-Fi

    Authors: Pedro Enrique Iturria-Rivera, Marcel Chenier, Bernard Herscovici, Burak Kantarci, Melike Erol-Kantarci

    Abstract: The exponential increase of wireless devices with highly demanding services such as streaming video, gaming and others has imposed several challenges to Wireless Local Area Networks (WLANs). In the context of Wi-Fi, IEEE 802.11ax brings high-data rates in dense user deployments. Additionally, it comes with new flexible features in the physical layer as dynamic Clear-Channel-Assessment (CCA) thresh… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: 9 pages, 7 figures

  21. arXiv:2211.02128  [pdf, other

    cs.CV cs.IR

    Efficient Information Sharing in ICT Supply Chain Social Network via Table Structure Recognition

    Authors: Bin Xiao, Yakup Akkaya, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

    Abstract: The global Information and Communications Technology (ICT) supply chain is a complex network consisting of all types of participants. It is often formulated as a Social Network to discuss the supply chain network's relations, properties, and development in supply chain management. Information sharing plays a crucial role in improving the efficiency of the supply chain, and datasheets are the most… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: Globecom 2022

  22. Handling big tabular data of ICT supply chains: a multi-task, machine-interpretable approach

    Authors: Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

    Abstract: Due to the characteristics of Information and Communications Technology (ICT) products, the critical information of ICT devices is often summarized in big tabular data shared across supply chains. Therefore, it is critical to automatically interpret tabular structures with the surging amount of electronic assets. To transform the tabular data in electronic documents into a machine-interpretable fo… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

    Comments: 6 pages, 7 tables, 4 figures, IEEE Global Communications Conference (Globecom), 2022

  23. Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

    Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic

    Abstract: The number of Internet of Things (IoT) devices being deployed into networks is growing at a phenomenal level, which makes IoT networks more vulnerable in the wireless medium. Advanced Persistent Threat (APT) is malicious to most of the network facilities and the available attack data for training the machine learning-based Intrusion Detection System (IDS) is limited when compared to the normal tra… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, g figures, 6 tables

  24. Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection

    Authors: Jinxin Liu, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic

    Abstract: Intrusion Detection Systems (IDS) are critical security mechanisms that protect against a wide variety of network threats and malicious behaviors on networks or hosts. As both Network-based IDS (NIDS) or Host-based IDS (HIDS) have been widely investigated, this paper aims to present a Combined Intrusion Detection System (CIDS) that integrates network and host data in order to improve IDS performan… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 3 figures 4 tables

  25. Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

    Authors: Ahmed Omara, Burak Kantarci

    Abstract: In this paper, we study the expanding attack surface of Adversarial Machine Learning (AML) and the potential attacks against Vehicle-to-Microgrid (V2M) services. We present an anticipatory study of a multi-stage gray-box attack that can achieve a comparable result to a white-box attack. Adversaries aim to deceive the targeted Machine Learning (ML) classifier at the network edge to misclassify the… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 2 Figures, 4 Tables

  26. arXiv:2204.03433  [pdf

    cs.CR cs.LG cs.NI

    Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

    Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic

    Abstract: Despite its technological benefits, Internet of Things (IoT) has cyber weaknesses due to the vulnerabilities in the wireless medium. Machine learning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance. Advanced persistent threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics.… ▽ More

    Submitted 16 April, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: ACM Computing Surveys, 2022, 35 pages, 10 Figures, 8 Tables

  27. arXiv:2203.12434  [pdf, ps, other

    cs.NE cs.CR cs.LG cs.SI

    Collaborative Self Organizing Map with DeepNNs for Fake Task Prevention in Mobile Crowdsensing

    Authors: Murat Simsek, Burak Kantarci, Azzedine Boukerche

    Abstract: Mobile Crowdsensing (MCS) is a sensing paradigm that has transformed the way that various service providers collect, process, and analyze data. MCS offers novel processes where data is sensed and shared through mobile devices of the users to support various applications and services for cutting-edge technologies. However, various threats, such as data poisoning, clogging task attacks and fake sens… ▽ More

    Submitted 16 February, 2022; originally announced March 2022.

    Comments: 6 pages, 6 figures, one figure with two subfigures, IEEE International Conference on Communications (ICC) 2022

    Journal ref: ICC 2022 - IEEE International Conference on Communications, 2022, pp. 4794-4799

  28. arXiv:2203.03819  [pdf, other

    cs.CV cs.IR

    Table Structure Recognition with Conditional Attention

    Authors: Bin Xiao, Murat Simsek, Burak Kantarci, Ala Abu Alkheir

    Abstract: Tabular data in digital documents is widely used to express compact and important information for readers. However, it is challenging to parse tables from unstructured digital documents, such as PDFs and images, into machine-readable format because of the complexity of table structures and the missing of meta-information. Table Structure Recognition (TSR) problem aims to recognize the structure of… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

    Comments: IJDAR under review

  29. arXiv:2202.07802  [pdf, ps, other

    cs.CR cs.AI cs.LG

    Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing

    Authors: Zhiyan Chen, Burak Kantarci

    Abstract: Mobile Crowdsensing systems are vulnerable to various attacks as they build on non-dedicated and ubiquitous properties. Machine learning (ML)-based approaches are widely investigated to build attack detection systems and ensure MCS systems security. However, adversaries that aim to clog the sensing front-end and MCS back-end leverage intelligent techniques, which are challenging for MCS platform a… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: This paper contains pages, 4 figures which is accepted by IEEE ICC 2022

  30. On Cropped versus Uncropped Training Sets in Tabular Structure Detection

    Authors: Yakup Akkaya, Murat Simsek, Burak Kantarci, Shahzad Khan

    Abstract: Automated document processing for tabular information extraction is highly desired in many organizations, from industry to government. Prior works have addressed this problem under table detection and table structure detection tasks. Proposed solutions leveraging deep learning approaches have been giving promising results in these tasks. However, the impact of dataset structures on table structure… ▽ More

    Submitted 6 October, 2021; v1 submitted 6 October, 2021; originally announced October 2021.

    Journal ref: Neurocomputing, Volume 513, 2022, Pages 114-126

  31. arXiv:2108.12739  [pdf

    cs.CR cs.AI

    Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts

    Authors: Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew Malton, Andrew Walenstein

    Abstract: Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments creates ongoing challenges to manage the authorization contexts. This paper proposes RASA, a context-sensitive access authorization approach and mechan… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

    Comments: ACM Digital Threats: Research and Practice, 2021 30 pages, 14 Figures, 14 Tables

    ACM Class: K.6.5; I.5.3

  32. arXiv:2101.01266  [pdf, ps, other

    cs.LG cs.AI

    Federated Learning-Based Risk-Aware Decision toMitigate Fake Task Impacts on CrowdsensingPlatforms

    Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci

    Abstract: Mobile crowdsensing (MCS) leverages distributed and non-dedicated sensing concepts by utilizing sensors imbedded in a large number of mobile smart devices. However, the openness and distributed nature of MCS leads to various vulnerabilities and consequent challenges to address. A malicious user submitting fake sensing tasks to an MCS platform may be attempting to consume resources from any number… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  33. arXiv:2008.00088  [pdf

    cs.NI cs.DC cs.LG

    A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures

    Authors: Safa Otoum, Burak Kantarci, Hussein Mouftah

    Abstract: Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which their owners volunteer them as storage and computing power resources, has become an essential mechanism for resource management in numerous applications. The growth of the volume and variety of data traffic in the Internet leads to concerns on the robustness of cyberphysical systems especially for cri… ▽ More

    Submitted 24 July, 2020; originally announced August 2020.

    Comments: ACM Transaction on Internet Technology, 2020 22 pages, 11 Figures, 3 Tables

  34. arXiv:1402.0238  [pdf

    cs.SI physics.soc-ph

    Classification of Complex Networks Based on Topological Properties

    Authors: Burcu Kantarcı, Vincent Labatut

    Abstract: Complex networks are a powerful modeling tool, allowing the study of countless real-world systems. They have been used in very different domains such as computer science, biology, sociology, management, etc. Authors have been trying to characterize them using various measures such as degree distribution, transitivity or average distance. Their goal is to detect certain properties such as the small… ▽ More

    Submitted 2 February, 2014; originally announced February 2014.

    Journal ref: 3rd Conference on Social Computing and its Applications, Karlsruhe : Germany (2013)