Kubra Kalkan
Kubra Kalkan
Assistant Professor, Ozyegin University
Verified email at - Homepage
Cited by
Cited by
JESS: Joint entropy-based DDoS defense scheme in SDN
K Kalkan, L Altay, G Gür, F Alagöz
IEEE Journal on Selected Areas in Communications 36 (10), 2358-2372, 2018
Securing internet of things with software defined networking
K Kalkan, S Zeadally
IEEE Communications Magazine 56 (9), 186-192, 2017
Defense mechanisms against DDoS attacks in SDN environment
K Kalkan, G Gur, F Alagoz
IEEE Communications Magazine 55 (9), 175-179, 2017
Emailprofiler: Spearphishing filtering with header and stylometric features of emails
S Duman, K Kalkan-Cakmakci, M Egele, W Robertson, E Kirda
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
Filtering-based defense mechanisms against DDoS attacks: A survey
K Kalkan, G Gür, F Alagöz
IEEE Systems Journal 11 (4), 2761-2773, 2016
Privacy-preserving optimal meeting location determination on mobile devices
I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad
IEEE transactions on information forensics and security 9 (7), 1141-1156, 2014
A distributed filtering mechanism against DDoS attacks: ScoreForCore
K Kalkan, F Alagöz
Computer Networks 108, 199-209, 2016
Privacy in mobile computing for location-sharing-based services
I Bilogrevic, M Jadliwala, K Kalkan, JP Hubaux, I Aad
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
SDNScore: A statistical defense mechanism against DDoS attacks in SDN environment
K Kalkan, G Gür, F Alagöz
2017 IEEE symposium on computers and communications (ISCC), 669-675, 2017
SUTSEC: SDN utilized trust based secure clustering in IoT
K Kalkan
Computer Networks 178, 107328, 2020
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks
K Kalkan, S Yilmaz, OZ Yilmaz, A Levi
Proceedings of the 5th ACM symposium on QoS and security for wireless and …, 2009
TruSD: Trust framework for service discovery among IoT devices
K Kalkan, K Rasmussen
Computer Networks 178, 107318, 2020
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
K Kalkan, A Levi
Peer-to-Peer Networking and Applications 7 (4), 698-709, 2014
An approach for classifying program failures
B Ozcelik, K Kalkan, C Yilmaz
2010 Second International Conference on Advances in System Testing and …, 2010
When SDN and blockchain shake hands
M Latah, K Kalkan
Communications of the ACM 65 (9), 68-78, 2022
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
M Kashif, K Kalkan
2021 Third International Conference on Blockchain Computing and Applications …, 2021
DiBLIoT: a distributed blacklisting protocol for IoT device classification using the hashgraph consensus algorithm
O Tarlan, I Safak, K Kalkan
2022 International Conference on Information Networking (ICOIN), 84-89, 2022
DPSec: A blockchain-based data plane authentication protocol for SDNs
M Latah, K Kalkan
2020 Second International Conference on Blockchain Computing and …, 2020
SHAPEIoT: secure handshake protocol for autonomous IoT device discovery and blacklisting using physical unclonable functions and machine learning
C Baykara, I Şafak, K Kalkan
13th International Conference on Network and Communications Security (NCS …, 2021
SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network
A Aktypi, K Kalkan, KB Rasmussen
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20