Search Results - "Gur, Gurkan"

Refine Results
  1. 1

    Expansive networks: Exploiting spectrum sharing for capacity boost and 6G vision by Gur, Gurkan

    Published in Journal of communications and networks (01-12-2020)
    “…Adaptive capacity with cost-efficient resource provisioning is a crucial capability for future 6G networks. In this work, weconceptualize “expansive networks”…”
    Get full text
    Journal Article
  2. 2

    JESS: Joint Entropy-Based DDoS Defense Scheme in SDN by Kalkan, Kubra, Altay, Levent, Gur, Gurkan, Alagoz, Fatih

    “…Software-defined networking (SDN) is a communication paradigm that brings cost efficiency and flexibility through software-defined functions resident on…”
    Get full text
    Journal Article
  3. 3

    The Fight Against the COVID-19 Pandemic With 5G Technologies by Siriwardhana, Yushan, De Alwis, Chamitha, Gur, Gurkan, Ylianttila, Mika, Liyanage, Madhusanka

    Published in IEEE engineering management review (01-09-2020)
    “…The coronavirus disease (COVID-19) pandemic has affected the world in an unexpected manner. The human race is battling against the pandemic while schools,…”
    Get full text
    Journal Article
  4. 4

    The Roadmap to 6G Security and Privacy by Porambage, Pawani, Gur, Gurkan, Osorio, Diana Pamela Moya, Liyanage, Madhusanka, Gurtov, Andrei, Ylianttila, Mika

    “…Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already…”
    Get full text
    Journal Article
  5. 5

    Cooperative Caching and Video Characteristics in D2D Edge Networks by Kafiloglu, S. Sinem, Gur, Gurkan, Alagoz, Fatih

    Published in IEEE communications letters (01-11-2020)
    “…Device-to-device (D2D) transmissions in wireless edge networks are promising for optimizing system-wide energy consumption and improving system service…”
    Get full text
    Journal Article
  6. 6

    TopoFuzzer - A Network Topology Fuzzer for Moving Target Defense in the Telco Cloud by Soussi, Wissem, Christopoulou, Maria, Anagnostopoulos, Themis, Gur, Gurkan, Stiller, Burkhard

    “…Telecommunication networks are shifting to multi-cloud environments. This trend is expected to shape the standardization and implementation of future networks…”
    Get full text
    Conference Proceeding
  7. 7

    Towards Practical Dynamic Trust Monitoring of Containerized Services in NFV Infrastructure by De Riggi, Valeria, Vogt, Raphael, Kalinagac, Onur, Gur, Gurkan

    “…Although Network Function Virtualization (NFV) and containerized services embedded therein are an already active research field while becoming increasingly…”
    Get full text
    Conference Proceeding
  8. 8

    Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target Defense by Soussi, Wissem, Christopoulou, Maria, Xilouris, George, Oca, Edgardo Montes de, Lefebvre, Vincent, Gur, Gurkan, Stiller, Burkhard

    “…This work presents a Moving Target Defense (MTD) framework for the protection of network slices and virtual resources in a telco cloud environment. The…”
    Get full text
    Conference Proceeding
  9. 9

    Root Cause and Liability Analysis in the Microservices Architecture for Edge IoT Services by Kalinagac, Onur, Soussi, Wissem, Anser, Yacine, Gaber, Chrystel, Gur, Gurkan

    “…In this work, we present a liability analysis frame-work for root cause analysis (RCA) in the microservices architecture with IoT-oriented containerized…”
    Get full text
    Conference Proceeding
  10. 10

    Connectivity Mode Management for User Devices in Heterogeneous D2D Networks by Kafiloglu, S. Sinem, Gur, Gurkan, Alagoz, Fatih

    Published in IEEE wireless communications letters (01-01-2021)
    “…Device-to-Device (D2D) paradigm is one of the key enablers for boosting the energy efficiency (EE) of networks. For the actualization of EE in multi-mode…”
    Get full text
    Journal Article
  11. 11

    Integration of ICN and MEC in 5G and Beyond Networks: Mutual Benefits, Use Cases, Challenges, Standardization, and Future Research by Gur, Gurkan, Kalla, Anshuman, de Alwis, Chamitha, Pham, Quoc-Viet, Ngo, Khac-Hoang, Liyanage, Madhusanka, Porambage, Pawani

    “…Multi-access Edge Computing (MEC) is a novel edge computing paradigm that moves cloudbased processing and storage capabilities closer to mobile users by…”
    Get full text
    Journal Article
  12. 12

    Micro-computed tomographic assessment of the shaping ability of the One Curve, One Shape, and ProTaper Next nickel-titanium rotary systems by Tufenkci, Pelin, Orhan, Kaan, Celikten, Berkan, Bilecenoglu, Burak, Gur, Gurkan, Sevimay, Semra

    Published in Restorative dentistry & endodontics (01-08-2020)
    “…This micro-computed tomographic (CT) study aimed to compare the shaping abilities of ProTaper Next (PTN), One Shape (OS), and One Curve (OC) files in…”
    Get full text
    Journal Article
  13. 13

    Cognitive femtocell networks: an overlay architecture for localized dynamic spectrum access [Dynamic Spectrum Management by Gur, Gurkan, Bayhan, Suzan, Alagoz, Fatih

    Published in IEEE wireless communications (01-08-2010)
    “…We define and propose a femtocell-based cognitive radio architecture for enabling multitiered opportunistic access in next-generation broadband wireless…”
    Get full text
    Journal Article
  14. 14

    Security Strategies for Unmanned Aircraft Systems Networks by Hernandez, Marco, Gur, Gurkan, Namuduri, Kamesh

    “…The rapid growth of Unmanned Aircraft Systems (UASs) usage in both commercial and defense areas has increased the requirement for advanced security schemes for…”
    Get full text
    Conference Proceeding
  15. 15

    PIM Detection in Wireless Networks as an Anomaly Detection Problem by Cantali, Gokcan, Deniz, Eren, Ozay, Ozcan, Yildirim, Onur, Gur, Gurkan, Alagoz, Fatih

    “…As the number of base stations keeps increasing due to ever-growing wireless services and pervasive connectivity, the cost of operation for network service…”
    Get full text
    Conference Proceeding
  16. 16

    Micro-computed tomographic assessment of the shaping ability of the One Curve, One Shape, and ProTaper Next nickel-titanium rotary systems by Tufenkci, Pelin, Orhan, Kaan, Celikten, Berkan, Bilecenoglu, Burak, Gur, Gurkan, Sevimay, Semra

    “…Objectives: This micro-computed tomographic (CT) study aimed to compare the shaping abilities of ProTaper Next (PTN), One Shape (OS), and One Curve (OC) files…”
    Get full text
    Journal Article
  17. 17

    MERLINS - Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security by Soussi, Wissem, Christopoulou, Maria, Gur, Gurkan, Stiller, Burkhard

    “…Moving to a multi-cloud environment and service-based architecture, 5G and future 6G networks require additional defensive mechanisms to protect virtualized…”
    Get full text
    Conference Proceeding
  18. 18

    6G Security Vision - A Concise Update by Gur, Gurkan, Porambage, Pawani, Osorio, Diana Moya, Yavuz, Attila A., Liyanage, Madhusanka

    “…The vision and key elements of the 6th generation (6G) ecosystem are being discussed very actively in academic and industrial circles. In this work, we provide…”
    Get full text
    Conference Proceeding
  19. 19

    Towards Data Analytics Based PIM Detection in Wireless Networks by Deniz, Eren, Cantali, Gokcan, Ozay, Ozcan, Yildirim, Onur, Gur, Gurkan, Alagoz, Fatih

    “…Passive Intermodulation (PIM) is a physical layer Radio Access Network (RAN) problem observed in both 4G and 5G networks. It is caused by internal physical…”
    Get full text
    Conference Proceeding
  20. 20

    ETSI ZSM Driven Security Management in Future Networks by Chollon, Geoffrey, Ayed, Dhouha, Garriga, Rodrigo Asensio, Zarca, Alejandro Molina, Skarmeta, Antonio, Christopoulou, Maria, Soussi, Wissem, Gur, Gurkan, Herzog, Uwe

    “…This paper presents a security management framework driven by Zero-Touch Network and Service Management (ZSM) paradigm and embedded in the High-Level…”
    Get full text
    Conference Proceeding