default search action
Remzi Seker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j13]Shashi Bhushan Jha, Radu F. Babiceanu, Remzi Seker:
Formal modeling of cyber-physical resource scheduling in IIoT cloud environments. J. Intell. Manuf. 31(5): 1149-1164 (2020)
2010 – 2019
- 2019
- [j12]Radu F. Babiceanu, Remzi Seker:
Cyber resilience protection for industrial internet of things: A software-defined networking approach. Comput. Ind. 104: 47-58 (2019) - [c35]Radu F. Babiceanu, Remzi Seker:
Cloud-Enabled Product Design Selection and Manufacturing as a Service. SOHOMA 2019: 210-219 - [c34]Robert Koeneke, Radu F. Babiceanu, Remzi Seker:
Target Area Surveillance Optimization with Swarms of Autonomous Micro Aerial Vehicles. SysCon 2019: 1-6 - 2018
- [j11]Miklós Biró, Atif Mashkoor, Johannes Sametinger, Remzi Seker:
Software Safety and Security Risk Mitigation in Cyber-physical Systems. IEEE Softw. 35(1): 24-29 (2018) - [c33]Ryan Gauthier, Remzi Seker:
Addressing Operator Privacy in Automatic Dependent Surveillance - Broadcast (ADS-B). HICSS 2018: 1-10 - [c32]Radu F. Babiceanu, Remzi Seker:
Cyber-Physical Resource Scheduling in the Context of Industrial Internet of Things Operations. SOHOMA 2018: 399-411 - 2017
- [c31]Lauren Massey, Remzi Seker, Denise Nicholson:
Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations. AHFE (9) 2017: 117-129 - [c30]Radu F. Babiceanu, Remzi Seker:
Software-Defined Networking-Based Models for Secure Interoperability of Manufacturing Operations. SOHOMA 2017: 243-252 - 2016
- [j10]Radu F. Babiceanu, Remzi Seker:
Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook. Comput. Ind. 81: 128-137 (2016) - [c29]Justin Yapp, Remzi Seker, Radu F. Babiceanu:
UAV as a Service: A Network Simulation Environment to Identify Performance and Security Issues for Commercial UAVs in a Coordinated, Cooperative Environment. MESAS 2016: 347-355 - [c28]Radu F. Babiceanu, Remzi Seker:
Cybersecurity and Resilience Modelling for Software-Defined Networks-Based Manufacturing Applications. SOHOMA 2016: 167-176 - 2015
- [c27]Mengjun Xie, Yanyan Li, Kenji Yoshigoe, Remzi Seker, Jiang Bian:
CamAuth: Securing Web Authentication with Camera. HASE 2015: 232-239 - [c26]Radu F. Babiceanu, Remzi Seker:
Secure and Resilient Manufacturing Operations Inspired by Software-Defined Networking. SOHOMA 2015: 285-294 - [p2]Radu F. Babiceanu, Remzi Seker:
Manufacturing Operations, Internet of Things, and Big Data: Towards Predictive Manufacturing Systems. Service Orientation in Holonic and Multi-agent Manufacturing 2015: 157-164 - [p1]Radu F. Babiceanu, Remzi Seker:
Manufacturing Cyber-Physical Systems Enabled by Complex Event Processing and Big Data Environments: A Framework for Development. Service Orientation in Holonic and Multi-agent Manufacturing 2015: 165-173 - 2014
- [j9]Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Suijian Zhou, Remzi Seker, Jiang Bian:
Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks. J. Cyber Secur. Mobil. 3(3): 289-316 (2014) - [c25]Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Suijian Zhou, Remzi Seker, Jiang Bian:
LightGraph: Lighten Communication in Distributed Graph-Parallel Processing. BigData Congress 2014: 717-724 - [c24]Mehran Sahami, Steve Roach, Ernesto Cuadros-Vargas, Elizabeth K. Hawthorne, Amruth Kumar, Richard LeBlanc, David Reed, Remzi Seker:
ACM/IEEE-CS computer science curricula 2013: implementing the final report. SIGCSE 2014: 175-176 - [c23]Mohammad Moallemi, Remzi Seker, Massood Towhidnejad, Jonathan Standley, Robert Klein, Paul Jackson:
Threat modeling for aircraft access to national airspace system wide information management program. SpringSim (CNS) 2014: 1 - 2013
- [j8]Jiang Bian, Remzi Seker:
The Jigsaw secure distributed file system. Comput. Electr. Eng. 39(4): 1142-1152 (2013) - [c22]Steve Roach, Mehran Sahami, Richard LeBlanc, Remzi Seker:
Special session: The CS2013 Computer Science curriculum guidelines project. FIE 2013: 1311-1313 - 2012
- [j7]Vimalathithan Subramanian, Remzi Seker, Srini Ramaswamy, Rathinasamy B. Lenin:
PCIEF: a policy conflict identification and evaluation framework. Int. J. Inf. Comput. Secur. 5(1): 48-67 (2012) - [j6]Nitin Kanaskar, Remzi Seker, Jiang Bian, Vir V. Phoha:
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs. IEEE Trans. Syst. Man Cybern. Part C 42(6): 1579-1589 (2012) - 2011
- [c21]Vimalathithan Subramanian, Remzi Seker, Jiang Bian, Nitin Kanaskar:
Collaborations, mergers, acquisitions, and security policy conflict analysis. CSIIRW 2011: 36 - [c20]Mais Nijim, Yousef Nijim, Remzi Seker, Vamshi Reddy, Raghu Nandi Raju:
DM-PAS: A Data Mining Prefetching Algorithm for Storage System. HPCC 2011: 500-505 - [c19]Jiang Bian, Josh M. Cisler, Mengjun Xie, George Andrew James, Remzi Seker, Clinton D. Kilts:
A methodology for empirical analysis of brain connectivity through graph mining. SMC 2011: 2963-2969 - 2010
- [c18]Jiang Bian, Remzi Seker, Umit Topaloglu:
A Secure Distributed File System for Medical Image Archiving. SocialCom/PASSAT 2010: 961-966
2000 – 2009
- 2009
- [c17]Jiang Bian, Remzi Seker:
JigDFS: A secure distributed file system. CICS 2009: 76-82 - [c16]Jiang Bian, Remzi Seker, Srini Ramaswamy:
JigDFS in container communities for international cargo security. CSIIRW 2009: 19 - [c15]Vimalathithan Subramanian, Sithu D. Sudarsan, Remzi Seker, Rathinasamy B. Lenin, Srinivasan Ramaswamy:
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture. Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009: 734405 - [c14]Sithu D. Sudarsan, Vimalathithan Subramanian, Kenji Yoshigoe, Srini Ramaswamy, Remzi Seker, Rathinasamy B. Lenin:
Impact of Duty Cycle Variation on WSNs. NTMS 2009: 1-5 - [c13]Chia-Chu Chiang, Coskun Bayrak, Remzi Seker, Umit Topaloglu, Rustu Murat Demirer, Nasrola Samadi, Suleyman Tek, Jiang Bian, GuangXu Zhou, Xiaoran Wang:
Design of a Lattice-based Access Control Scheme. SMC 2009: 68-73 - [c12]Jiang Bian, Remzi Seker, Srini Ramaswamy:
JigDFS for Implementing Secure Container Communities. SMC 2009: 3651-3654 - 2008
- [j5]Srinivasan Ramaswamy, Remzi Seker, Sithu D. Sudarsan, Mhamed Itmi, Adnane Cabani, Waled Alshabi:
Modelling and simulation: The basis for education enrichment and software design. Enterp. Inf. Syst. 2(2): 177-199 (2008) - [c11]Jiang Bian, Umit Topaloglu, Remzi Seker, Coskun Bayrak, Chia-Chu Chiang:
A role-based secure group communication framework. SoSE 2008: 1-6 - [c10]Jiang Bian, Remzi Seker, Umit Topaloglu, Coskun Bayrak:
Off-the-Record Secure Chat Room. WEBIST (1) 2008: 54-61 - 2007
- [c9]Jiang Bian, Remzi Seker, Umit Topaloglu:
Off-the-Record Instant Messaging for Group Conversation. IRI 2007: 79-84 - [c8]Srini Ramaswamy, Remzi Seker, Sithu D. Sudarsan, D. Moix:
Societal-Consciousness in the Computing Curricula: A Time for Serious Introspection. ISTAS 2007: 1-6 - [c7]Hemant Joshi, Remzi Seker, Coskun Bayrak, Srini Ramaswamy, Jeffrey B. Connelly:
Ontology for disaster mitigation and planning. SCSC 2007: 26 - [c6]Nitin Kanaskar, Remzi Seker, Srinivasan Ramaswamy:
A Dynamical System Approach to Intrusion Detection Using System Call Analysis. SEKE 2007: 710-717 - 2005
- [c5]Rattikorn Hewett, Remzi Seker:
A Risk Assessment Model of Embedded Software Systems. SEW 2005: 142-149 - [c4]Alta van der Merwe, Remzi Seker, Aurona Gerber:
Phishing in the system of systems settings: mobile technology. SMC 2005: 492-498 - [c3]C. V. Ramamoorthy, Remzi Seker:
Infrastructures for information technology systems. SMC 2005: 979-986 - 2004
- [j4]Remzi Seker, A. J. van der Merwe, Paula Kotzé, Murat M. Tanik, R. Paul:
Assessment of Coupling and Cohesion for Component-Based Software by using Shannon Languages. Trans. SDPS 8(4): 33-43 (2004) - [j3]A. J. van der Merwe, Remzi Seker:
Mobile phishing : communication. South Afr. Comput. J. 33: 111-112 (2004) - [j2]Remzi Seker, Murat M. Tanik:
An information-theoretical framework for modeling component-based systems. IEEE Trans. Syst. Man Cybern. Part C 34(4): 475-484 (2004) - [c2]Leon Jololian, Jean-Claude Ngatchou, Remzi Seker:
A component integration meta-framework using smart adapters. ISICT 2004: 128-133 - [c1]C. V. Ramamoorthy, Remzi Seker:
Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact. SERA 2004: 214-228 - 2000
- [j1]Remzi Seker, Sokol Saliu, Ahmet Birand, Gulmira Kudaiberdieva:
Validity Test for a Set of Nonlinear Measures for Short Data Length with Reference to Short-Term Heart Rate Variability Signal. J. Syst. Integr. 10(1): 41-53 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint