Onur, Ertan
241  Ergebnisse:
Personensuche X
?
2

Finding Islands on Encrypted Graphs:

, In: 2023 31st Signal Processing and Communications Applications Conference (SIU),
 
?
3

Privacy-Preserving User Abnormal Behavior Detection in 5G N..:

, In: 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),
Acir, Berker ; Onur, Ertan ; Boutaba, Raouf - p. 167-172 , 2023
 
?
4

A Multi-Hop Routing Protocol in Backscattering Tag-To-Tag N..:

, In: 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),
Murat, Furkan ; Eroglu, Alperen ; Onur, Ertan - p. 277-282 , 2023
 
?
5

Performance of Graph-based Zero-knowledge Proofs:

, In: 2022 30th Signal Processing and Communications Applications Conference (SIU),
 
?
6

Plane-separated routing in ad-hoc networks:

Ergenç, Doğanalp ; Onur, Ertan
Wireless Networks.  28 (2022)  1 - p. 331-353 , 2022
 
?
7

SGLC: A Logical Clock Using Succinct Graphs:

, In: 2022 30th Signal Processing and Communications Applications Conference (SIU),
Sokoto, Saidu ; Onur, Ertan - p. 1-4 , 2022
 
?
9

Revisiting Slotted ALOHA: Density Adaptation in FANETs:

Eroğlu, Alperen ; Onur, Ertan
Wireless Personal Communications.  124 (2021)  2 - p. 1711-1740 , 2021
 
?
10

Placement of 5G RAN Slices in Multi-tier O-RAN 5G Networks ..:

, In: 2021 17th International Conference on Network and Service Management (CNSM),
Sarikaya, Egemen ; Onur, Ertan - p. 274-282 , 2021
 
?
11

Joint Virtual Machine Embedding and Wireless Data Center To..:

, In: 2021 17th International Conference on Network and Service Management (CNSM),
Butun, Beyza ; Onur, Ertan - p. 63-69 , 2021
 
?
12

Content Placement Problem in a Hierarchical Collaborative C..:

, In: 2020 16th International Conference on Network and Service Management (CNSM),
Hassanzadeh, Farnaz ; Onur, Ertan - p. 1-7 , 2020
 
?
14

Covert Channel Detection Using Machine Learning:

, In: 2020 28th Signal Processing and Communications Applications Conference (SIU),
 
?
15

DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN:

, In: Information Security Applications; Lecture Notes in Computer Science,
 
1-15