default search action
Hasan Çam
Person information
- affiliation: Arizona State University, Tempe, Arizona, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam:
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications. ACM Trans. Internet Things 5(2): 8:1-8:31 (2024) - 2023
- [j37]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. 16(4): 2359-2371 (2023) - 2022
- [j36]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j35]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. IEEE Trans. Dependable Secur. Comput. 19(6): 3804-3821 (2022) - 2021
- [i4]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. CoRR abs/2112.07826 (2021) - 2020
- [j34]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j33]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Pierangela Samarati, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j32]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020)
2010 – 2019
- 2019
- [j31]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j30]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j29]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [c48]Hasan Cam:
Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations. MILCOM 2019: 1-6 - [p4]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - 2018
- [j28]Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah:
Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Secur. Priv. 16(5): 49-59 (2018) - [j27]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j26]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j25]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [c47]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. ICCCN 2018: 1-9 - [c46]Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam:
Measuring the Effectiveness of Network Deception. ISI 2018: 142-147 - [c45]Xiaoyun Wang, Chun-Ming Lai, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. MILCOM 2018: 1-9 - [c44]Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese:
On Defensive Cyber Deception: A Case Study Using SDN. MILCOM 2018: 110-115 - [c43]Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. SecureComm (1) 2018: 22-42 - [i3]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups. CoRR abs/1802.04500 (2018) - [i2]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - [i1]Chun-Ming Lai, Xiaoyun Wang, Jon William Chapman, Yu-Cheng Lin, Yu-Chang Ho, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
More or Less? Predict the Social Influence of Malicious URLs on Social Media. CoRR abs/1812.02978 (2018) - 2017
- [j24]Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk. ACM Trans. Intell. Syst. Technol. 8(4): 52:1-52:32 (2017) - [c42]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
Source-End DDoS Defense in IoT Environments. IoT S&P@CCS 2017: 63-64 - [c41]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking strategies and temporal analysis involving Facebook discussion groups. CNSM 2017: 1-9 - [c40]Hasan Cam:
Online detection and control of malware infected assets. MILCOM 2017: 701-706 - [c39]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - 2016
- [j23]Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. Int. J. Secur. Networks 11(1/2): 66-81 (2016) - [j22]Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016) - [c38]Brian Thompson, James R. Morris-King, Hasan Cam:
Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems. CNS 2016: 437-441 - [c37]Jin-Hee Cho, Hasan Cam, Alessandro Oltramari:
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. CogSIMA 2016: 7-13 - [c36]Brian Thompson, James R. Morris-King, Hasan Çam:
Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware. MILCOM 2016: 479-484 - [c35]James R. Morris-King, Hasan Çam:
Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning. MILCOM 2016: 503-508 - 2015
- [c34]Jonathan Kuck, Honglei Zhuang, Xifeng Yan, Hasan Cam, Jiawei Han:
Query-Based Outlier Detection in Heterogeneous Information Networks. EDBT 2015: 325-336 - [c33]Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, Robert F. Erbacher, Hasan Cam:
On simulation studies of jamming threats against LTE networks. ICNC 2015: 99-103 - [c32]James R. Morris-King, Hasan Cam:
Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge. MILCOM 2015: 336-341 - [c31]Brian Thompson, Hasan Cam:
Inferring pairwise influence from encrypted communication. MILCOM 2015: 1367-1372 - 2014
- [j21]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, K. P. Subbalakshmi, Rajarathnam Chandramouli, Hasan Cam:
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. IEEE Trans. Veh. Technol. 63(8): 3867-3874 (2014) - [c30]Hasan Cam, Pierre Mouallem, Yilin Mo, Bruno Sinopoli, Benjamin Nkrumah:
Modeling impact of attacks, recovery, and attackability conditions for situational awareness. CogSIMA 2014: 181-187 - [c29]Chen Zhong, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236 - [c28]Hasan Cam, Pierre Mouallem:
Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks. ICNC 2014: 58-62 - [c27]Manish Gupta, Jing Gao, Xifeng Yan, Hasan Cam, Jiawei Han:
Top-K interesting subgraph discovery in information networks. ICDE 2014: 820-831 - [c26]Honglei Zhuang, Jing Zhang, George Brova, Jie Tang, Hasan Çam, Xifeng Yan, Jiawei Han:
Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks. ICDM 2014: 1127-1132 - [c25]Bo Zong, Yinghui Wu, Jie Song, Ambuj K. Singh, Hasan Çam, Jiawei Han, Xifeng Yan:
Towards scalable critical alert mining. KDD 2014: 1057-1066 - [p3]Hasan Çam:
Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems. Secure Cloud Computing 2014: 325-343 - [p2]Massimiliano Albanese, Hasan Çam, Sushil Jajodia:
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance. Cybersecurity Systems for Human Cognition Augmentation 2014: 47-60 - [p1]Hasan Çam, Pierre A. Mouallem, Robinson E. Pino:
Alert Data Aggregation and Transmission Prioritization over Mobile Networks. Network Science and Cybersecurity 2014: 205-220 - 2013
- [c24]Manish Gupta, Jing Gao, Xifeng Yan, Hasan Cam, Jiawei Han:
On detecting association-based clique outliers in heterogeneous information networks. ASONAM 2013: 108-115 - [c23]Hasan Cam, Pierre Mouallem:
Mission-aware time-dependent cyber asset criticality and resilience. CSIIRW 2013: 12 - [c22]Venkatachalam Subramanian, A. Selcuk Uluagac, Hasan Cam, Raheem A. Beyah:
Examining the characteristics and implications of sensor side channels. ICC 2013: 2205-2210 - [c21]Chen Zhong, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. ISI 2013: 263-265 - 2010
- [j20]Narasimha Challa, Hasan Çam:
Class-Based Fair Code Allocation with Delay Guarantees for OVSF-CDMA and VSF-OFCDM in Next-Generation Cellular Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j19]Hidayet Ozgur Sanli, Hasan Çam:
Collaborative Event-Driven Coverage and Rate Allocation for Event Miss-Ratio Assurances in Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j18]Suat Özdemir, Hasan Cam:
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks. IEEE/ACM Trans. Netw. 18(3): 736-749 (2010)
2000 – 2009
- 2008
- [j17]Narasimha Challa, Hasan Çam, Madhur Sikri:
Secure and Efficient Data Transmission over Body Sensor and Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c20]Hidayet Ozgur Sanli, Hasan Çam:
Joint Coverage Scheduling and Identity Management for Multiple-Target Tracking in Wireless Sensor Networks. GLOBECOM 2008: 453-458 - [c19]Narasimha Challa, Hasan Cam:
Flexible Code Allocation to Improve System Utilization Using Nonblocking OVSF Codes in WCDMA. ICC 2008: 2618-2624 - 2007
- [j16]Hasan Cam:
Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks. Int. J. Sens. Networks 2(5/6): 375-385 (2007) - [c18]Hidayet Ozgur Sanli, Hasan Cam:
Event-Driven Coverage and Rate Allocation for Providing Miss-Ratio Assurances in Wireless Sensor Networks. GLOBECOM 2007: 1134-1138 - [c17]Dong An, Hasan Cam:
Route Recovery with One-Hop Broadcast to Bypass Compromised Nodes in Wireless Sensor Networks. WCNC 2007: 2495-2500 - 2006
- [j15]Hasan Çam, Suat Özdemir, Prashant Nair, Devasenapathy Muthuavinashiappan, Hidayet Ozgur Sanli:
Energy-efficient secure pattern based data aggregation for wireless sensor networks. Comput. Commun. 29(4): 446-455 (2006) - [c16]Jin Wook Lee, Yann-Hang Lee, Hasan Cam:
SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks. EUC 2006: 121-130 - [c15]Hasan Çam:
Multiple-Input Turbo Code for Joint Data Aggregation, Source and Channel Coding in Wireless Sensor Networks. ICC 2006: 3530-3535 - [c14]Suat Özdemir, Hasan Cam:
Key establishment with source coding and reconciliation for wireless sensor networks. IPCCC 2006 - [c13]Hidayet Ozgur Sanli, Hasan Çam:
Collaborative scheduling of event types and allocation of rates for wireless sensor nodes with multiple sensing units. SenSys 2006: 411-412 - [c12]Hidayet Ozgur Sanli, Hasan Cam:
Adaptive task scheduling for providing event miss-ratio statistical assurances in wireless sensor networks. WCNC 2006: 445-450 - 2005
- [c11]Hasan Cam:
Secure data aggregation and source-channel coding with MIT code for wireless sensor networks. IPCCC 2005: 377-382 - [c10]Rajesh Poornachandran, Hani Ahmad, Hasan Cam:
Energy-efficient task scheduling for wireless sensor nodes with multiple sensing units. IPCCC 2005: 409-414 - [c9]Hidayet Ozgur Sanli, Hasan Çam:
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks. PerCom Workshops 2005: 406-410 - [c8]Hidayet Ozgur Sanli, Rajesh Poornachandran, Hasan Cam:
Collaborative two-level task scheduling for wireless sensor nodes with multiple sensing units. SECON 2005: 350-361 - 2004
- [j14]Kiran K. Vadde, Hasan Cam:
A Code Assignment Algorithm for Nonblocking OVSF Codes in WCDMA. Telecommun. Syst. 25(3-4): 417-431 (2004) - [c7]Narasimha Challa, Hasan Çam:
Cost-aware downlink scheduling of shared channels for cellular networks with relays. IPCCC 2004: 793-798 - 2003
- [j13]Hasan Cam, Willie W. Lu:
Guest editorial: 3G wireless and beyond. Comput. Commun. 26(17): 1905-1906 (2003) - [j12]Hasan Cam:
Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems. Comput. Commun. 26(17): 1907-1917 (2003) - [j11]Hasan Cam:
Rearrangeability of (2n-1)-Stage Shuffle-Exchange Networks. SIAM J. Comput. 32(3): 557-585 (2003) - 2000
- [j10]Hasan Çam:
Preventing internal and external conflicts in an input buffering reverse baseline ATM switch. Int. J. Commun. Syst. 13(4): 317-334 (2000) - [j9]Hasan Çam:
An on-line scheduling policy for IRIS real-time composite tasks. J. Syst. Softw. 52(1): 25-32 (2000) - [j8]Hasan Çam:
List ranking on processor arrays. J. Syst. Softw. 55(2): 185-192 (2000) - [c6]Hasan Çam:
A distributed dynamic channel and packet assignment for wireless multimedia traffic. WCNC 2000: 1131-1135
1990 – 1999
- 1999
- [j7]Hasan Cam:
A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network. Comput. Commun. 22(2): 110-119 (1999) - [j6]Hasan Çam:
Balanced permutations and multistage interconnection networks. Int. J. Comput. Math. 73(1): 125-137 (1999) - [j5]Hasan Çam:
A header-population based flow control for multicomputer networks. J. Syst. Softw. 47(1): 19-26 (1999) - [j4]Hasan Cam, José A. B. Fortes:
Work-Efficient Routing Algorithms for Rearrangeable Symmetrical Networks. IEEE Trans. Parallel Distributed Syst. 10(7): 733-741 (1999) - [c5]Hasan Cam, Mostafa I. H. Abd-El-Barr, Sadiq M. Sait:
A High-Performance Hardware-Efficient Memory Allocation Technique and Design. ICCD 1999: 274-276 - 1998
- [c4]Hasan Çam:
A congestion sense network interface. CATA 1998: 58-61 - 1997
- [j3]Hasan Çam:
A multiclass priority-based slotted-ring network for LAN-ATM interworking. Comput. Commun. 20(13): 1216-1224 (1997) - [c3]Hasan Çam:
Preventing conflicts in input buffering baseline-based ATM switches. Advances in Switching Networks 1997: 245-271 - [c2]Hasan Cam:
LAN-ATM Internetworking over a Priority-Based Slotted-Ring Network. LCN 1997: 54-63 - 1995
- [j2]Hasan Cam, José A. B. Fortes:
A Fast VLSI-Efficient Self-Routing Permutation Network. IEEE Trans. Computers 44(3): 448-453 (1995) - [j1]Hasan Cam, José A. B. Fortes:
Frames: A Simple Characterization of Permutations Realized by Frequently Used Networks. IEEE Trans. Computers 44(5): 695-697 (1995) - 1992
- [c1]Hasan Cam, José A. B. Fortes:
Fault-Tolerant Self-Routing Permutation Networks. ICPP (1) 1992: 243-247
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint