Çağlayan, Mehmet Ufuk

Loading...
Profile Picture
Name Variants
Job Title
Prof.Dr.
Email Address
Main Affiliation
01.01.09.01. Bilgisayar Mühendisliği Bölümü
Status
Former Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
0
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
0
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
0
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
0
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
0
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
0
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
0
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
0
Research Products
CLIMATE ACTION13
CLIMATE ACTION
1
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
0
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
0
Research Products
Scopus data could not be loaded because of an error. Please refresh the page or try again later.
Documents

60

Citations

423

Scholarly Output

7

Articles

2

Views / Downloads

0/0

Supervised MSc Theses

0

Supervised PhD Theses

0

WoS Citation Count

11

Scopus Citation Count

19

Patents

0

Projects

0

WoS Citations per Publication

1.57

Scopus Citations per Publication

2.71

Open Access Source

3

Supervised Theses

0

JournalCount
13th International Conference on Risks and Security of Internet and Systems CRiSIS 20181
1st International Conference on 6G Networking (6GNet)1
1st International Symposia on Computer and Information Sciences ISCIS 20181
28th International Symposium on Modelling Analysis and Simulation of Computer and Telecommunication Systems MASCOTS 20201
2nd International Symposium on Security in Computer and Information Sciences EuroCybersec 20211
Current Page: 1 / 2

Scopus Quartile Distribution

Quartile distribution chart data is not available

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 7 of 7
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 3
    Authenticated Quality of Service Aware Routing in Software Defined Networks
    (Springer Verlag service@springer.de, 2019) Samet Aytaç; Orhan Ermiş; Mehmet Ufuk Çaĝlayan; Fatíh Alagöz; Ermiş, Orhan; Aytaç, Samet; Çağlayan, Mehmet Ufuk; Alagöz, Fatih; Ermi, Orhan; N. Cuppens-Boulahia , F. Cuppens , A. Zemmari , M. Mosbah
    Quality of Service (QoS) aware routing is an ongoing and major problem for traditional networks since they are not able to manage network traffic for immense variety of users due to their inflexible and static architectures. Software Defined Networking (SDN) has emerged to remove these limitations by separating the control plane and the data plane to provide centralized control with the help of programmable controllers. Such improvements also make SDN more flexible than traditional networks in terms of achieving QoS-aware routing for large and medium sized networks. However providing QoS-aware routing in SDN without using any security mechanism may become a challenging issue. For instance malicious users in the network may escalate their privileges to monopolize resource utilization. The provision of an authentication mechanism that jointly works with QoS-aware routing is expected to solve the issue. In this paper we propose an Authenticated QoS-Aware Routing (AQoSAR) for Software Defined Networks to determine routing paths of a single user and a group of users in an authenticated manner. AQoSAR consists of the authentication application and the routing application. In the authentication application we employ Ciphertext Policy Attribute Based Encryption since it easily operates with huge variety of users by defining attributes such as QoS-aware routing metrics. In the routing application we propose a routing approach based on a metric list rather than a single metric for determining the QoS level of users. To show the applicability of AQoSAR the security analysis and the performance analysis are presented. © 2019 Elsevier B.V. All rights reserved.
  • Review
    Citation - WoS: 4
    Citation - Scopus: 6
    Review of Some Recent European Cybersecurity Research and Innovation Projects
    (SCIENTIFIC ASSOC INFOCOMMUNICATIONS, 2022) Mehmet Ufuk Caglayan; Çağlayan, Mehmet Ufuk
    This paper reviews research from several EU Projects that have addressed cybersecurity using techniques based on Machine Learning including the security of Mobile Networks and the Internet of Things (IoT). These research projects have considered IoT Gateways and their design security and performance the security of digital health systems that are interconnected across Europe to provide health services to pople who travel through the EU and related issues of the energy consumption and sustainability in Information and Communication Technologies (ICT) and their cybersecurity. The methods used in much of these research projects are based on Machine Learning both for attack detection and dynamic attack mitigation as well as performance analysis and measurement techniques based on applied probability models.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 2
    Some current cybersecurity research in Europe
    (Springer Verlag service@springer.de, 2018) Mehmet Ufuk Çaĝlayan; Çag̃layan, Mehmet Ufuk; L. Romano , E. Gelenbe , T. Czachorski , D. Tzovaras , P. Campegiani , I. Komnios , S.K. Katsikas
    We present a brief summary of the papers that were presented at the Security Workshop 2018 of the International Symposium on Computer and Information Sciences (ISCIS) that was held on February 26 2018 at Imperial College London. These papers are primarily based on several research projects funded by the European Commission. The subjects that are covered include the cybersecurity of the Internet of Things (IoT) the security of networked health systems that are used to provide health services the security of mobile telephony and the security of software itself. The papers include overall presentations project objectives plans and achievements and their specific research findings. © 2018 Elsevier B.V. All rights reserved.
  • Conference Object
    Citation - WoS: 3
    Citation - Scopus: 5
    Trust Enhanced Security for Routing in SDN
    (IEEE, 2022) Nurefsan Sertbas Bulbul; Orhan Ermis; Serif Bahtiyar; M. Ufuk Caglayan; Fatih Alagoz; Bulbul, Nurefsan Sertbas; Ermis, Orhan; Bahtiyar, Serif; Caglayan, M. Ufuk; Alagoz, Fatih
    Software Defined Networking (SDN) paradigm is the redefinition of conventional networks based on the use of programmable entities together with a clear separation between the data plane and the control plane. The idea behind this new paradigm is to achieve a more flexible network architecture and better management capabilities. However with all these advantages it has been experienced that SDNs are open to new security threats and unfortunately current technologies are not mature enough to overcome those vulnerabilities. As an example we can consider the detection of the compromised switches in the network. Since switches are programmable entities in SDN they are the potential targets for attackers. When a switch is compromised the attacker can use this switch to deploy incorrect packet forwarding and unsubstantiated packet dropping attacks. Current SDN protocols are not able to detect such kinds of attacks in the network and hence the whole network traffic can be affected in the end. One particular assumption is to use an approach that reflects the trust level of switches in the network for the detection of a compromised one. Therefore in this paper we propose Trust Enhanced Security (TES) for routing in SDN. The proposed approach provides three different trust computations to find the most suitable trust level for different states of a network. To show the applicability of the proposed approach we demonstrate a set of simulations based on the detection of compromised switches. Simulation results show that the proposed model operates effectively to detect and eliminate compromised nodes while selecting secure paths.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Analytical models for the scalability of dynamic group-key agreement protocols and secure file sharing systems
    (Association for Computing Machinery acmhelp@acm.org, 2019) Gokcan Cantali; Orhan Ermiş; Mehmet Ufuk Çaĝlayan; Cem Ersoy; Ermis, Orhan; Çaglayan, Mehmet Ufuk; Ersoy, Cem; Cantali, Gokcan
    Dynamic group key agreement protocols are cryptographic primitives to provide secure group communications in decentralized and dynamic networks. Such protocols provide additional operations to update the group key while adding new participants into the group and removing existing participants from the group without re-executing the protocol from the beginning. However the lack of scalability emerges as one of the most significant issues of dynamic group key agreement protocols when the number of participants in the group increases. For instance frequent participant join requests for large groups may cause an effect similar to a Distributed Denial of Service (DDoS) attack and violate the system availability due to the increase in group key update time. Therefore analyzing the scalability of dynamic group key agreement protocols is crucial to detect conditions where the system becomes unavailable. In this article we propose an analytical performance model to evaluate the scalability of dynamic group key agreement protocols by using queueing models. We also extend our performance model for evaluating the scalability of secure file sharing systems that utilize group key agreement protocols. Moreover we present a demonstrative use case to show the applicability of our performance model on an example group key agreement protocol and a secure file sharing system. © 2019 Elsevier B.V. All rights reserved.
  • Conference Object
    Citation - Scopus: 1
    Performance Energy Savings and Security: An Introduction
    (Springer Science and Business Media Deutschland GmbH, 2021) Mehmet Ufuk Çaĝlayan; Çag̃layan, Ufuk; M.C. Calzarossa , E. Gelenbe , K. Grochla , R. Lent , T. Czachórski
    The International Symposia on the Modelling Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) have a 28 year-long distinguished record and we introduce the papers that were presented at the MASCOTS 2020 workshop. We also briefly review recent work of one of the founders of this series and organizer of this year’s conference on the occasion of his 75th birthday covering recent research on the Performance of Systems and Networks encompassing a broad view that includes Quality of Service Energy Consumption and Security. © 2021 Elsevier B.V. All rights reserved.
  • Conference Object
    Citation - Scopus: 1
    AI and Quality of Service Driven Attack Detection Mitigation and Energy Optimization: A Review of Some EU Project Results
    (Springer Science and Business Media Deutschland GmbH, 2022) Mehmet Ufuk Çaĝlayan; Çag̃layan, Mehmet Ufuk; E. Gelenbe , M. Jankovic , D. Kehagias , A. Marton , A. Vilmos
    This article summarizes briefly the contributions presented in this EuroCyberSecurity Workshop 2021 which is organized as part of the series of International Symposia on Computer and Information Sciences (ISCIS) with the support of the European Commission funded IoTAC Project that was held on November and in NIce France and sponsored by the Institute of Teoretical and Applied Informatics of the Polish Academy of Sciences. It also summarizes some of the research contributions of several EU Projects including NEMESYS GHOST KONFIDO SDK4ED and IoTAC primarily with a cybersecurity and Machine Learning orientation. Thus subjects covered include the cybersecurity of Mobile Networks and of the Internet of Things (IoT) the design of IoT Gateways and their performance the security of networked health systems that provide health services to individuals across the EU Member states as well as the issues of energy consumption by ICT which are becoming increasingly important including in the cybersecurity perspective as we focus increasingly on climate change and the needed transition towards highly reduced emissions. Many of the techniques and results discussed in this article are based either on Machine Learning (ML) methods or on methods for the performance modeling and optimization of networked and distributed computer systems. © 2022 Elsevier B.V. All rights reserved.