default search action
Ismail Butun
Person information
- affiliation: Mid Sweden University, Information Systems and Technology, Sundsvall, Sweden
- affiliation (former): University of South Florida, Tampa, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Ismail Butun, Imadeldin O. Mahgoub:
Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of- Battlefield Things (IoBT) Deployments. IEEE Access 12: 149647-149661 (2024) - [c26]Ismail Butun, Imad Mahgoub:
Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of-Battlefield Things (IoBT). SmartNets 2024: 1-7 - [i4]Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza:
Towards Cyber Threat Intelligence for the IoT. CoRR abs/2406.13543 (2024) - [i3]Amar Amouri, Mohamad Mahmoud Al Rahhal, Yakoub Bazi, Ismail Butun, Imad Mahgoub:
Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks. CoRR abs/2408.15886 (2024) - 2023
- [j20]Junaid Qadir, Ismail Butun, Paolo Gastaldo, Orazio Aiello, Daniele D. Caviglia:
Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme. IEEE Access 11: 68301-68315 (2023) - [j19]Kasim Oztoprak, Yusuf Kursat Tuncel, Ismail Butun:
Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum. Sensors 23(2): 1004 (2023) - [j18]Mine Altinay Günler Pirim, Hakan Tora, Kasim Oztoprak, Ismail Butun:
Two-Stage Feature Generator for Handwritten Digit Classification. Sensors 23(20): 8477 (2023) - [c25]Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza:
Towards Cyber Threat Intelligence for the IoT. DCOSS-IoT 2023: 483-490 - 2022
- [j17]Manel Khelifi, Ismail Butun:
Localization in Unprecedentedly Crowded Airspace for UAVs and SUAVs. IEEE Access 10: 65206-65220 (2022) - [j16]Manel Khelifi, Ismail Butun:
Swarm Unmanned Aerial Vehicles (SUAVs): A Comprehensive Analysis of Localization, Recent Aspects, and Future Trends. J. Sensors 2022: 1-10 (2022) - [j15]Ali Mohamed, Franz Wang, Ismail Butun, Junaid Qadir, Robert Lagerström, Paolo Gastaldo, Daniele D. Caviglia:
Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks. Sensors 22(9): 3498 (2022) - [c24]Engla Rencelj Ling, Jose Eduardo Urrea Cabus, Ismail Butun, Robert Lagerström, Johannes Olegård:
Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. ARES 2022: 74:1-74:7 - [c23]Junaid Qadir, Ismail Butun, Paolo Gastaldo, Daniele D. Caviglia:
Review of Security Vulnerabilities in LoRaWAN. ApplePies 2022: 248-254 - [c22]Joar Blom Rydell, Oliver Otterlind, Ismail Butun:
Delay Considerations for Reliable Communications in LoRaWAN. CCNC 2022: 1-6 - 2021
- [j14]Ismail Butun, Patrik Österberg:
A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things. IEEE Access 9: 5428-5441 (2021) - [j13]Ismail Butun, Yusuf Kursat Tuncel, Kasim Oztoprak:
Application Layer Packet Processing Using PISA Switches. Sensors 21(23): 8010 (2021) - [c21]Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi-Psarrou:
Integrating Security Behavior into Attack Simulations. ARES 2021: 120:1-120:13 - 2020
- [j12]Ismail Butun, Patrik Österberg, Houbing Song:
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Commun. Surv. Tutorials 22(1): 616-644 (2020) - [j11]Karanjeet Choudhary, Gurjot Singh Gaba, Ismail Butun, Pardeep Kumar:
MAKE-IT - A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things. Sensors 20(18): 5166 (2020) - [j10]Ismail Butun, Alparslan Sari, Patrik Österberg:
Hardware Security of Fog End-Devices for the Internet of Things. Sensors 20(20): 5729 (2020) - [c20]Mustafa Aydin, Ismail Butun, Kemal Bicakci, Nazife Baykal:
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs. CCWC 2020: 774-779 - [c19]Fredrik Mårlind, Ismail Butun:
Activation of LoRaWAN End Devices by Using Public Key Cryptography. CSNet 2020: 1-8 - [c18]Ismail Butun, Alexios Lekidis, Daniel Ricardo dos Santos:
Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities. ICISSP 2020: 733-741
2010 – 2019
- 2019
- [j9]Mohamed Eldefrawy, Ismail Butun, Nuno Pereira, Mikael Gidlund:
Formal security analysis of LoRaWAN. Comput. Networks 148: 328-339 (2019) - [j8]Ismail Butun, Nuno Pereira, Mikael Gidlund:
Security Risk Analysis of LoRaWAN and Future Directions. Future Internet 11(1): 3 (2019) - [c17]Ismail Butun, Patrik Österberg, Mikael Gidlund:
Preserving Location Privacy in Cyber-Physical Systems. CNS 2019: 1-6 - [c16]Ismail Butun, Alparslan Sari, Patrik Österberg:
Security Implications of Fog Computing on the Internet of Things. ICCE 2019: 1-6 - [c15]Ismail Butun, Mikael Gidlund:
Location Privacy Assured Internet of Things. ICISSP 2019: 623-630 - [c14]Emre Aydogan, Selim Yilmaz, Sevil Sen, Ismail Butun, Stefan Forsström, Mikael Gidlund:
A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. WFCS 2019: 1-5 - [i2]Ismail Butun, Patrik Österberg, Houbing Song:
Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures. CoRR abs/1910.13312 (2019) - 2018
- [c13]Pedro Fortuna, Nuno Pereira, Ismail Butun:
A Framework for Web Application Integrity. ICISSP 2018: 487-493 - [c12]Stefan Forsström, Ismail Butun, Mohamed Eldefrawy, Ulf Jennehag, Mikael Gidlund:
Challenges of Securing the Industrial Internet of Things Value Chain. MetroInd4.0&IoT 2018: 218-223 - [c11]Ismail Butun, Nuno Pereira, Mikael Gidlund:
Analysis of LoRaWAN v1.1 security: research paper. SmartObjects@MobiHoc 2018: 5:1-5:6 - [i1]Ismail Butun, Alparslan Sari, Patrik Österberg:
Security Implications of Fog Computing on the Internet of Things. CoRR abs/1809.10492 (2018) - 2017
- [c10]Ismail Butun:
Privacy and trust relations in Internet of Things from the user point of view. CCWC 2017: 1-5 - [c9]Mustafa Kocakulak, Ismail Butun:
An overview of Wireless Sensor Networks towards internet of things. CCWC 2017: 1-6 - [c8]Saffet Vatansever, Ismail Butun:
A broad overview of GPS fundamentals: Now and future. CCWC 2017: 1-6 - 2016
- [j7]Ismail Butun, Melike Erol-Kantarci, Burak Kantarci, Houbing Song:
Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Commun. Mag. 54(4): 47-53 (2016) - 2015
- [j6]Ismail Butun, In-ho Ra, Ravi Sankar:
PCAC: Power- and Connectivity-Aware Clustering for Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2015: 83 (2015) - [j5]Ismail Butun, In-ho Ra, Ravi Sankar:
An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks. Sensors 15(11): 28960-28978 (2015) - [c7]Ismail Butun, Burak Kantarci, Melike Erol-Kantarci:
Anomaly detection and privacy preservation in cloud-centric Internet of Things. ICC Workshops 2015: 2610-2615 - 2014
- [j4]Ismail Butun, Salvatore D. Morgera, Ravi Sankar:
A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 16(1): 266-282 (2014) - 2013
- [b1]Ismail Butun:
Prevention and Detection of Intrusions in Wireless Sensor Networks. University of South Florida, Tampa, USA, 2013 - 2012
- [j3]Ismail Butun, Yufeng Wang, Young-seok Lee, Ravi Sankar:
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks. Int. J. Secur. Networks 7(2): 107-121 (2012) - [c6]Ismail Butun, Yufeng Wang, Ravi Sankar:
Evaluation of Advanced Two Tier User Authentication scheme. CCNC 2012: 159-163 - [c5]Yufeng Wang, Ismail Butun, Ravi Sankar, Salvatore D. Morgera:
Adaptive rate transmission with opportunistic scheduling in wireless networks. CCNC 2012: 445-448 - 2011
- [j2]Murad Khalid, Yufeng Wang, Ismail Butun, Hyung-jin Kim, In-ho Ra, Ravi Sankar:
Coherence time-based cooperative MAC protocol 1 for wireless ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2011: 3 (2011) - [c4]Ismail Butun, Ravi Sankar:
Advanced two tier User Authentication scheme for heterogeneous Wireless Sensor Networks. CCNC 2011: 169-171 - [c3]Ismail Butun, Ravi Sankar:
A brief survey of access control in Wireless Sensor Networks. CCNC 2011: 1118-1119 - 2010
- [c2]Ismail Butun, Sumit Birla, Xuan Hung Le, Sungyoung Lee, Ravi Sankar:
Performance Evaluation of Quick-Start in Low Latency Networks. CCNC 2010: 1-3 - [c1]Ismail Butun, A. Cagatay Talay, D. Turgay Altilar, Murad Khalid, Ravi Sankar:
Impact of mobility prediction on the performance of Cognitive Radio networks. WTS 2010: 1-5
2000 – 2009
- 2009
- [j1]Xuan Hung Le, Sungyoung Lee, Ismail Butun, Murad Khalid, Ravi Sankar, Miso Kim, Manhyung Han, Young-Koo Lee, Heejo Lee:
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. J. Commun. Networks 11(6): 599-606 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint