default search action
Mumin Cebe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Emmanuel Kwarteng, Mumin Cebe:
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives. Int. J. Inf. Sec. 23(3): 2225-2268 (2024) - [j10]Yacoub Hanna, Mumin Cebe, Juan V. Leon, Kemal Akkaya:
Efficient Group Key Management for Resilient Operation of LoRaWAN-Based Smart Grid Applications. IEEE Trans. Control. Syst. Technol. 32(5): 1706-1717 (2024) - [j9]Ahmet Kurt, Enes Erdin, Kemal Akkaya, A. Selcuk Uluagac, Mumin Cebe:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. IEEE Trans. Dependable Secur. Comput. 21(4): 2162-2180 (2024) - [c21]Emmanuel Kwarteng, Jamila Kwarteng, Naveen Bansal, Mumin Cebe:
Exploring Medical Device Manufacturing Domain Threat Modeling Methodologies: User Perspectives on Security, Privacy and Safety. ISMICT 2024: 22-27 - 2023
- [c20]Kadir Sabanci, Mumin Cebe:
Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations. AMCIS 2023 - [c19]Emmanuel Kwarteng, Mumin Cebe:
MEDICALHARM - A Threat Modeling designed for Modern Medical Devices. TrustCom 2023: 1147-1156 - [i8]Kadir Sabanci, Mumin Cebe:
Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations. CoRR abs/2309.03338 (2023) - 2022
- [i7]Emmanuel Kwarteng, Mumin Cebe:
A Survey on Security Issues in Modern Implantable Devices: Solutions and Future Issues. CoRR abs/2205.00893 (2022) - 2021
- [j8]Mumin Cebe, Kemal Akkaya:
Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration. Future Gener. Comput. Syst. 115: 267-278 (2021) - [j7]Enes Erdin, Mumin Cebe, Kemal Akkaya, Eyuphan Bulut, A. Selcuk Uluagac:
A scalable private Bitcoin payment channel network with privacy guarantees. J. Netw. Comput. Appl. 180: 103021 (2021) - [j6]Suat Mercan, Mumin Cebe, Ramazan Savas Aygün, Kemal Akkaya, Elijah Toussaint, Dominik Danko:
Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices. Secur. Priv. 4(2) (2021) - [c18]Suat Mercan, Mumin Cebe, Kemal Akkaya, Julian Zuluaga:
Blockchain-Based Two-Factor Authentication for Credit Card Validation. DPM/CBT@ESORICS 2021: 319-327 - [c17]Yacoub Hanna, Mumin Cebe, Suat Mercan, Kemal Akkaya:
Efficient Group-Key Management for Low-bandwidth Smart Grid Networks. SmartGridComm 2021: 188-193 - [i6]Ahmet Kurt, Enes Erdin, Kemal Akkaya, A. Selcuk Uluagac, Mumin Cebe:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. CoRR abs/2112.07623 (2021) - 2020
- [j5]Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac:
A Bitcoin payment network with reduced transaction fees and confirmation times. Comput. Networks 172: 107098 (2020) - [j4]David Gabay, Kemal Akkaya, Mumin Cebe:
Privacy-Preserving Authentication Scheme for Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs. IEEE Trans. Veh. Technol. 69(6): 5760-5772 (2020) - [c16]Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac:
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit. ESORICS (2) 2020: 734-755 - [c15]Mai A. Abdel-Malek, Kemal Akkaya, Arupjyoti Bhuyan, Mumin Cebe, Ahmed S. Ibrahim:
Enabling Second Factor Authentication for Drones in 5G using Network Slicing. GLOBECOM (Workshops) 2020: 1-6 - [c14]Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, A. Selcuk Uluagac:
A Cost-efficient IoT Forensics Framework with Blockchain. IEEE ICBC 2020: 1-5 - [i5]Dominik Danko, Suat Mercan, Mumin Cebe, Kemal Akkaya:
Assuring the Integrity of Videos from Wireless-based IoT Devices using Blockchain. CoRR abs/2003.00118 (2020) - [i4]Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, A. Selcuk Uluagac:
A Cost-efficient IoT Forensics Framework with Blockchain. CoRR abs/2004.14691 (2020)
2010 – 2019
- 2019
- [j3]Mumin Cebe, Kemal Akkaya:
Efficient certificate revocation management schemes for IoT-based advanced metering infrastructures in smart cities. Ad Hoc Networks 92 (2019) - [c13]Enes Erdin, Mumin Cebe, Kemal Akkaya, Eyuphan Bulut, A. Selcuk Uluagac:
A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links. Blockchain 2019: 294-301 - [c12]Mumin Cebe, Kemal Akkaya:
A Replay Attack-Resistant 0-RTT Key Management Scheme for Low-Bandwidth Smart Grid Communications. GLOBECOM 2019: 1-6 - [c11]David Gabay, Kemal Akkaya, Mumin Cebe:
A Privacy Framework for Charging Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs. LCN Symposium 2019: 66-73 - [c10]Dominik Danko, Suat Mercan, Mumin Cebe, Kemal Akkaya:
Assuring the Integrity of Videos from Wireless-Based IoT Devices using Blockchain. MASS Workshops 2019: 48-52 - [c9]Mumin Cebe, Kemal Akkaya:
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster. WiSec 2019: 334-335 - [c8]David Gabay, Mumin Cebe, Kemal Akkaya:
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster. WiSec 2019: 347-348 - [i3]Mumin Cebe, Kemal Akkaya:
Communication-efficient Certificate Revocation Management for Advanced Metering Infrastructure. CoRR abs/1902.04255 (2019) - [i2]Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac:
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network. CoRR abs/1912.10617 (2019) - 2018
- [j2]Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, A. Selcuk Uluagac:
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. IEEE Commun. Mag. 56(10): 50-57 (2018) - [c7]Mumin Cebe, Kemal Akkaya:
Efficient Public-Key Revocation Management for Secure Smart Meter Communications Using One-Way Cryptographic Accumulators. ICC 2018: 1-6 - [c6]Enes Erdin, Mumin Cebe, Kemal Akkaya, Senay Solak, Eyuphan Bulut, A. Selcuk Uluagac:
Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations. iThings/GreenCom/CPSCom/SmartData 2018: 1609-1615 - [c5]Mumin Cebe, Berkay Kaplan, Kemal Akkaya:
A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings. MobiQuitous 2018: 470-475 - [i1]Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, A. Selcuk Uluagac:
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. CoRR abs/1802.00561 (2018) - 2017
- [c4]Nico Saputro, Samet Tonyali, Kemal Akkaya, Mumin Cebe, Mohamed Mahmoud:
Efficient Certificate Verification for Vehicle-to-Grid Communications. FNSS 2017: 3-18 - [c3]Mumin Cebe, Kemal Akkaya:
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure. MASS 2017: 313-317 - [c2]Mumin Cebe, Kemal Akkaya:
Utilizing Advanced Metering Infrastructure to Build a Public Key Infrastructure for Electric Vehicles. DIVANet@MSWiM 2017: 91-98 - 2010
- [j1]Mumin Cebe, Cigdem Gunduz Demir:
Qualitative test-cost sensitive classification. Pattern Recognit. Lett. 31(13): 2043-2051 (2010)
2000 – 2009
- 2007
- [c1]Mumin Cebe, Cigdem Gunduz Demir:
Test-Cost Sensitive Classification Based on Conditioned Loss Functions. ECML 2007: 551-558
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint