default search action
Kübra Kalkan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Anil Elakas, Hasan Sözer, Ilgin Safak, Kübra Kalkan:
A systematic mapping on software testing for blockchains. Clust. Comput. 27(6): 7111-7126 (2024) - [j14]Muhammad Kashif, Kübra Kalkan:
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things. Comput. Networks 238: 110107 (2024) - [j13]Majd Latah, Kübra Kalkan:
HostSec: A blockchain-based authentication framework for SDN hosts. Peer Peer Netw. Appl. 17(4): 2354-2370 (2024) - [c9]Ipek Motorcu, Emin Sahin Mektepli, Arda Hacifevzioglu, Kübra Kalkan:
TEMBUV: Trust Ensuring Mechanism Based on Blockchain using UAVs and VANETs. BRAINS 2024: 1-4 - 2023
- [j12]Orkun Dogan, Kübra Kalkan:
SOREC: Self-organizing and resource efficient clustered blockchain network. Comput. Networks 233: 109893 (2023) - [c8]Tolga Karadas, Kübra Kalkan:
IBAM: IPFS and Blockchain based Authentication for MQTT protocol in IoT. ISCC 2023: 537-542 - 2022
- [j11]Majd Latah, Kübra Kalkan:
When SDN and blockchain shake hands. Commun. ACM 65(9): 68-78 (2022) - [j10]Majd Latah, Kübra Kalkan:
CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication. Comput. Networks 219: 109423 (2022) - [c7]Ozan Tarlan, Ilgin Safak, Kübra Kalkan:
DiBLIoT: A Distributed Blacklisting Protocol for IoT Device Classification Using the Hashgraph Consensus Algorithm. ICOIN 2022: 84-89 - 2021
- [c6]Muhammad Kashif, Kübra Kalkan:
BCPriPIoT: BlockChain Utilized Privacy-Preservation Mechanism for IoT Devices. BCCA 2021: 201-209 - 2020
- [j9]Kübra Kalkan, Kasper Bonne Rasmussen:
TruSD: Trust framework for service discovery among IoT devices. Comput. Networks 178: 107318 (2020) - [j8]Kübra Kalkan:
SUTSEC: SDN Utilized trust based secure clustering in IoT. Comput. Networks 178: 107328 (2020) - [c5]Majd Latah, Kübra Kalkan:
DPSec: A blockchain-based data plane authentication protocol for SDNs. BCCA 2020: 22-29 - [c4]Angeliki Aktypi, Kübra Kalkan, Kasper Bonne Rasmussen:
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network. CODASPY 2020: 271-282
2010 – 2019
- 2018
- [j7]Kübra Kalkan, Sherali Zeadally:
Securing Internet of Things with Software Defined Networking. IEEE Commun. Mag. 56(9): 186-192 (2018) - [j6]Kübra Kalkan, Levent Altay, Gürkan Gür, Fatih Alagöz:
JESS: Joint Entropy-Based DDoS Defense Scheme in SDN. IEEE J. Sel. Areas Commun. 36(10): 2358-2372 (2018) - 2017
- [j5]Kübra Kalkan, Gürkan Gür, Fatih Alagöz:
Defense Mechanisms against DDoS Attacks in SDN Environment. IEEE Commun. Mag. 55(9): 175-179 (2017) - [j4]Kübra Kalkan, Gürkan Gür, Fatih Alagöz:
Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey. IEEE Syst. J. 11(4): 2761-2773 (2017) - [c3]Kübra Kalkan, Gürkan Gür, Fatih Alagöz:
SDNScore: A statistical defense mechanism against DDoS attacks in SDN environment. ISCC 2017: 669-675 - 2016
- [j3]Kübra Kalkan, Fatih Alagöz:
A distributed filtering mechanism against DDoS attacks: ScoreForCore. Comput. Networks 108: 199-209 (2016) - 2014
- [j2]Kübra Kalkan, Albert Levi:
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks. Peer-to-Peer Netw. Appl. 7(4): 698-709 (2014) - [j1]Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 9(7): 1141-1156 (2014) - 2011
- [c2]Igor Bilogrevic, Murtuza Jadliwala, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy in Mobile Computing for Location-Sharing-Based Services. PETS 2011: 77-96
2000 – 2009
- 2009
- [c1]Kübra Kalkan, Sinem Yilmaz, Omer Zekvan Yilmaz, Albert Levi:
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. Q2SWinet 2009: 29-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint