Publikacje
Found 167 results
Filters: Autor is Erol Gelenbe [Clear All Filters]
.
Submitted. Measuring the Accuracy of Attack Detection Relative to its Key Parameters. IEEE International Conference on Communications (ICC) 2026.
.
In Press. Data Driven Optimum Cyberattack Mitigation. IEEE DSAA'25: Data Science and Advanced Analytics Conference, Birmingham, UK.
(531.41 KB)
.
In Press. Energy Dynamics of Green IoT Nodes with Time-Varying Energy Harvesting, Leakage, and Consumption Patterns. 33rd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication System.
(1.51 MB)
.
In Press. A Probabilistic Dynamic Network Trust Model for IoT Systems with Lost Messages and Cyberattacks. 33rd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Paris, France.
(219.38 KB)
.
In Press. Signalling Storms and Taylor’s Law. 33rd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Paris, France.
(2.36 MB)
.
2025. Adaptive attack mitigation for IoV Flood Attacks. IEEE Internet of Things Journal. 12(5)
(3.55 MB)
.
2025. Backdoor attacks and defense mechanisms in federated learning: A survey. Information Fusion . 123( 103248 )
(3.16 MB)
.
2025. Data Driven Optimum Cyberattack Mitigation. IEEE DSAA'25: Data Science and Advanced Analytics Conference, Birmingham, UK.
.
2025. E. Gelenbe, M. Nakip, M. Siavvas, System Wide Vulnerability and Trust in Multi-Component Communication System Software. IEEE Network . 39(2)
(1.01 MB)
.
2025. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions. IEEE Network (Early Access), IEEEXplore.
(1.14 MB)
.
2025. Minimizing delay and power consumption at the edge. Sensors. 25(2)
(1.82 MB)
.
2025. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis. Performance Evaluation . 170(102512)
(3.95 MB)
.
2025. A Survey on Cross-Shard Transaction Allocation Optimization and Processing Mechanisms. IEEE Communications Surveys and Tutorials.
(2.41 MB)
.
2025. Time-Dependent Analysis of the Interaction Between Energy Harvesting, Leakage, and Consumption Processes in a Green IoT Device. IEEE Access .
(4.03 MB)
.
2024. On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model. 32nd IEEE MASCOTS'24 Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, October 21-23, 2024, Krakow Poland.
(216.64 KB)
.
2024. Is ChatGPT Trustworthy Enough? A Review IEEE Consumer Electronics Magazine .
(177.25 KB)
.
2024. Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection. Modeling, Analysis, and Simulation On Computer and Telecommunication Systems (MASCOTS).
(1.06 MB)
.
2024. Deep Learning Intrusion Detection and Mitigation of DoS Attacks. 32nd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS24).
(2.84 MB)
.
2024. Digital Phenotyping and Feature Extraction on Smartphone Data for Depression Detection. Proceedings of the IEEE. 112(12)
(4.59 MB)
.
2024. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with Online Learning for Health Internet of Things and Internet of Vehicles . Internet of Things. 28
(2.17 MB)
.
2024. Energy performance of Internet of Things (IoT) networks for pipeline monitoring. 2024 International Wireless Communications and Mobile Computing (IWCMC).
.
2024. Energy Performance of Off-Grid Green Cellular Base Stations. Performance Evaluation. 165
.
2024. Energy performance of self-powered Green IoT nodes. Frontiers in Energy Research. 12
.
2024. Impact of energy leakage on the energy performance of green IoT nodes. 32nd International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2024).
.
2024. Impact of IoT system imperfections and passenger errors on cruise ship evacuation delay. sensors. 24
(478.07 KB)
