Ismail Butun
Title
Cited by
Cited by
Year
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
I Butun, SD Morgera, R Sankar
Communications Surveys & Tutorials 16 (1), 266 - 282, 2013
7802013
An overview of Wireless Sensor Networks towards internet of things
M Kocakulak, I Butun
2017 IEEE 7th annual computing and communication workshop and conference …, 2017
1862017
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
I Butun, P Österberg, H Song
IEEE Communications Surveys & Tutorials 22 (1), 616-644, 2019
1252019
Cloud-centric multi-level authentication as a service for secure public safety device networks
I Butun, M Erol-Kantarci, B Kantarci, H Song
IEEE Communications Magazine 54 (4), 47-53, 2016
1052016
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
XH Le, S Lee, I Butun, M Khalid, R Sankar, M Kim, M Han, YK Lee, H Lee
Journal of Communications and Networks 11 (6), 599-606, 2009
602009
Security risk analysis of LoRaWAN and future directions
I Butun, N Pereira, M Gidlund
Future Internet 11 (1), 3, 2019
572019
Analysis of LoRaWAN v1. 1 security
I Butun, N Pereira, M Gidlund
Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design …, 2018
562018
Anomaly detection and privacy preservation in cloud-centric Internet of Things
I Butun, B Kantarci, M Erol-Kantarci
2015 IEEE International Conference on Communication Workshop (ICCW), 2610-2615, 2015
512015
Impact of mobility prediction on the performance of cognitive radio networks
I Bütün, AÇ Talay, DT Altilar, M Khalid, R Sankar
2010 Wireless Telecommunications Symposium (WTS), 1-5, 2010
422010
Formal security analysis of LoRaWAN
M Eldefrawy, I Butun, N Pereira, M Gidlund
Computer Networks 148, 328-339, 2019
402019
Intrusion prevention with two–level user authentication in heterogeneous wireless sensor networks
I Butun, Y Wang, Y Lee, R Sankar
International Journal of Security and Networks 7 (2), 107-121, 2012
252012
A brief survey of access control in wireless sensor networks
I Butun, R Sankar
2011 IEEE Consumer Communications and Networking Conference (CCNC), 1118-1119, 2011
212011
Advanced two tier user authentication scheme for heterogeneous wireless sensor networks
I Butun, R Sankar
2011 IEEE Consumer Communications and Networking Conference (CCNC), 169-171, 2011
202011
Security implications of fog computing on the internet of things
I Butun, A Sari, P Österberg
2019 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2019
182019
Challenges of securing the industrial internet of things value chain
S Forsström, I Butun, M Eldefrawy, U Jennehag, M Gidlund
2018 Workshop on Metrology for Industry 4.0 and IoT, 218-223, 2018
182018
A central intrusion detection system for RPL-based Industrial Internet of Things
E Aydogan, S Yilmaz, S Sen, I Butun, S Forsström, M Gidlund
2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019
172019
Privacy and trust relations in internet of things from the user point of view
I Butun
2017 IEEE 7th annual computing and communication workshop and conference …, 2017
172017
A broad overview of GPS fundamentals: Now and future
S Vatansever, I Butun
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
152017
An intrusion detection system based on multi-level clustering for hierarchical wireless sensor networks
I Butun, IH Ra, R Sankar
Sensors 15 (11), 28960-28978, 2015
142015
Coherence time-based cooperative mac protocol 1 for wireless ad hoc networks
M Khalid, Y Wang, I Butun, H Kim, I Ra, R Sankar
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-12, 2011
142011
The system can't perform the operation now. Try again later.
Articles 1–20