Recent Publications about Drone & Operation Security and Resiliency:

  • Shibli, B. Tufekci, C. Tunc, and R. Laidig, “Leveraging LLM Decision-Making in the Internet of Drone Things (IoDT) Ecosystem,” Journal on Autonomous Transportation Systems (2025).
  • Shibli, B. Tufekci, C. Tunc, and R. Bryce. "Streamlined internet of drone things (IoDT) simulator." Cluster Computing 28, no. 6 (2025): 390.
  • Laidig, F. Shibli, B. Tufekci, F. Dürr, and C. Tunc, “Improving Drone Communication QoS Through Adaptive Redundancy,” 2025 34th International Conference on Computer Communications and Networks (ICCCN), pp. 1-9. IEEE, 2025.
  • J. Alruwaili and C. Tunc, “A Lightweight and Efficient Intrusion Detection System for Drone Networks,” 2025 5th Intelligent Cybersecurity Conference (ICSC), pp. 219-226. IEEE, 2025.
  • Tufekci, V. Quach, C. Tunc, and R. Dantu, “DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks,” 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 240-247. IEEE, 2024.
  • Tufekci, A.A. Burak, C. Tunc, and K. Morozov, “Enhancing the security of the mavlink with symmetric authenticated encryption for drones,” 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 58-65. IEEE, 2024.
  • Quach, B. Tufekci, C. Tunc, and R. Dantu, “Hazardous Area Aware Path-Planning for Drone Swarms,’ 2024 IEEE International Conference on Mobility, Operations, Services and Technologies (MOST), pp. 168-177. IEEE, 2024.
  • B. Putnam, D.N. Senarath, G.R. Urquijo, C. Tunc, and R. Bryce, “A lightweight drone simulator,” 2023 Tenth International Conference on Software Defined Systems (SDS), pp. 52-59. IEEE, 2023.
  • Tufekci, C. Tunc, and R. Dantu, “Efficient Motion Control Strategy for Drone Swarms,” 2023 10th International Conference on Recent Advances in Air and Space Technologies (RAST), pp. 01-06. IEEE, 2023.
  • Tunc, and S. Hariri, “Self-Protection for Unmanned Autonomous Vehicles (SP-UAV): Design Overview and Evaluation,” 2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), pp. 128-132. IEEE, 2022.
  • Tufekci, and C. Tunc, “Vulnerability and threat analysis of uavs,” 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), pp. 1-2. IEEE, 2021.

 

Recent Publications about IoT/IIoT/OT Security and Resiliency:

  • Kawaminami, S. Shao, S. Hariri, and C. Tunc, “Attack Classification and Response Framework (ACR) Based on Machine Learning and CAPEC Ontology,” IEEE Access (2026).
  • Namdari, V. Morales Avalos, A. Alshehri, C. Tunc, and R. Dantu, “Enhanced trust in IoT environments: utilizing perfect Bayesian equilibrium, exponential smoothing, and machine learning,” Cluster Computing 28, no. 9 (2025): 572.
  • Alshehri, B. Tufekci, and C. Tunc, “Identification Management for Zero Trust Through Network Analysis,” 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA), pp. 1-6. IEEE, 2024.
  • T. Fausak, C. Tunc, and A.R. Fausak, “Crowd Counting Camera Array and Correction,” 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA), pp. 1-8. IEEE, 2024.
  • Alshehri, and C. Tunc, “Zero trust engine for iot environments,” 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), pp. 1-3. IEEE, 2023.
  • Namdari, C. Tunc, and R. Dantu, “Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol,” 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 117-124. IEEE, 2023.
  • Tunc, J. Durflinger, C. Mahmoudi, and V. Formicola, “Autonomic zta-based network management engine (aznme),” 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 25-30. IEEE, 2022.
  • Shao, P. Satam, S. Satam, K. Al-Awady, G. Ditzler, S. Hariri, and C. Tunc, “Multi-layer mapping of cyberspace for intrusion detection." In 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), pp. 1-8. IEEE, 2021.
  • Shao, C. Tunc, A. Al-Shawi, and S. Hariri, “An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics,” ACM Transactions on Management Information Systems (TMIS) 11, no. 4 (2020): 1-25.

 

Recent Publications about Cloud Computing: 

  • M. Avalos, and C. Tunc, “Trust Evaluation Based on a Risk Assessment and Game Theory for Virtual Machines in a Cloud Environment,” 2025 10th International Conference on Fog and Mobile Edge Computing (FMEC), pp. 58-65. IEEE, 2025.
  • Namdari and C. Tunc, “Toward Resilience Methods in Cloud Computing,” 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), Tangier, Morocco, 2021, pp. 1-2, doi: 10.1109/AICCSA53542.2021.9686860
  • Fargo, O. Franza, C. Tunc, and S. Hariri, “VM Introspection-based Allowlisting for IaaS,” In 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1-4. IEEE, 2020.
  • Wu, S. Shao, C. Tunc, and S. Hariri, “Video anomaly detection using pre-trained deep convolutional neural nets and context mining,” 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA), pp. 1-8. IEEE, 2020.

 

Others: 

  • K Pandit, K. Morozov, and C. Tunc, “Privacy-Preserving Medical Risk Assessment Using Homomorphic Encryption,” 2025 IEEE Secure Development Conference (SecDev), pp. 37-44. IEEE, 2025.
  • R. Fausak, C. Tunc, and A.T. Fausak, “Malicious Intent Detection Framework for Social Networks,” 2024 IEEE/ACS 21st International Conference on Computer Systems and Applications (AICCSA), pp. 1-6. IEEE, 2024.
  • Shaik, C. Tunc, and K. Morozov, “Intrusion Detection for Additive Manufacturing Systems and Networks,” 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), pp. 1-3. IEEE, 2023.
  • Yao, C. Tunc, P. Satam, and S.Hariri, “Resilient Machine Learning (rML) Ensemble Against Adversarial Machine Learning Attacks,” International Conference on Dynamic Data Driven Application Systems, pp. 274-282. Springer, Cham, 2020.
  • Petrou, V. Martinez-Gil, F. Castillo, C. Tunc, and R. Bryce, “Twitter Account Analysis for Drug Involvement Detection,” In 2023 3rd Intelligent Cybersecurity Conference (ICSC), pp. 9-16. IEEE, 2023.
  • Wu, S. Shao, C. Tunc, P. Satam, and S. Hariri, “An explainable and efficient deep learning framework for video anomaly detection,” Cluster computing 25, no. 4 (2022): 2715-2737.