


default search action
Mehmet Hadi Gunes
Person information
- affiliation: Stevens Institute of Technology, Hoboken, NJ, USA
- affiliation (former): University of Nevada, Reno, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Batyr Charyyev
, Mehmet Hadi Gunes
:
Identifying Anomaly in IoT Traffic Flow With Locality Sensitive Hashes. IEEE Access 12: 89467-89478 (2024) - [j17]Ahmet Soran, Murat Yuksel, Mehmet Hadi Gunes:
MCPR: Routing using parallel shortest paths. J. Commun. Networks 26(3): 366-382 (2024) - 2021
- [j16]Batyr Charyyev
, Mehmet Hadi Gunes
:
Locality-Sensitive IoT Network Traffic Fingerprinting for Device Identification. IEEE Internet Things J. 8(3): 1272-1281 (2021) - [c60]Batyr Charyyev, Mo Mansouri, Mehmet Hadi Gunes:
Modeling the Adoption of Internet of Things in Healthcare: A Systems Approach. ISSE 2021: 1-8 - [c59]Batyr Charyyev
, Mehmet Hadi Gunes:
Misactivation detection and user identification in smart home speakers using traffic flow features. WISEC 2021: 135-146 - 2020
- [c58]Batyr Charyyev, Mehmet Hadi Gunes:
Voice Command Fingerprinting with Locality Sensitive Hashes. CPSIOTSEC@CCS 2020: 87-92 - [c57]Batyr Charyyev, Engin Arslan, Mehmet Hadi Gunes:
Latency Comparison of Cloud Datacenters and Edge Servers. GLOBECOM 2020: 1-6 - [c56]Batyr Charyyev
, Mehmet Hadi Gunes:
Detecting Anomalous IoT Traffic Flow with Locality Sensitive Hashes. GLOBECOM 2020: 1-6 - [c55]Batyr Charyyev
, Mehmet Hadi Gunes:
IoT Traffic Flow Identification using Locality Sensitive Hashes. ICC 2020: 1-6 - [c54]Batyr Charyyev, Mehmet Hadi Gunes:
IoT Event Classification Based on Network Traffic. INFOCOM Workshops 2020: 854-859
2010 – 2019
- 2019
- [j15]Mustafa Solmaz, Adam Lane, Bilal Gonen
, Ogulsheker Akmamedova, Mehmet Hadi Gunes, Kakajan Komurov:
Graphical data mining of cancer mechanisms with SEMA. Bioinform. 35(21): 4413-4418 (2019) - [j14]Khalid Bakhshaliyev, Muhammed Abdullah Canbaz, Mehmet Hadi Gunes
:
Investigating Characteristics of Internet Paths. ACM Trans. Model. Perform. Evaluation Comput. Syst. 4(3): 16:1-16:24 (2019) - [c53]Batyr Charyyev
, Ahmed Alhussen, Hemanta Sapkota, Eric Pouyoul, Mehmet Hadi Gunes, Engin Arslan:
Towards Securing Data Transfers Against Silent Data Corruption. CCGRID 2019: 262-271 - [c52]Ahmet Aksoy, Mehmet Hadi Gunes:
Automated IoT Device Identification using Network Traffic. ICC 2019: 1-7 - 2018
- [j13]Majed Al Zayer
, Mehmet Hadi Gunes:
Exploring visual impairment awareness campaigns on Twitter. Soc. Netw. Anal. Min. 8(1): 40:1-40:16 (2018) - [c51]Prasun Kanti Dey, Muhammed Abdullah Canbaz, Murat Yuksel, Mehmet Hadi Gunes:
On Correlating ISP Topologies to Their Businesses. ICC 2018: 1-7 - 2017
- [c50]Majed Al Zayer
, Mehmet Hadi Gunes:
Analyzing the Use of Twitter to Disseminate Visual Impairments Awareness Information. ASONAM 2017: 187-194 - [c49]Esra Erdin, Mehmet Hadi Gunes:
Efficient Data Dissemination in Distributed Social Networks. ASONAM 2017: 990-997 - [c48]Vahid Behzadan, Amin Nourmohammadi, Mehmet Hadi Gunes, Murat Yuksel:
On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks. ASONAM 2017: 1120-1127 - [c47]Ahmet Aksoy, Sushil J. Louis, Mehmet Hadi Gunes:
Operating system fingerprinting via automated network traffic analysis. CEC 2017: 2502-2509 - [c46]Travis Goldade, Batyr Charyyev
, Mehmet Hadi Gunes:
Network Analysis of Migration Patterns in the United States. COMPLEX NETWORKS 2017: 770-783 - [c45]Muhammed Abdullah Canbaz, Jay Thom, Mehmet Hadi Gunes:
Comparative analysis of internet topology data sets. INFOCOM Workshops 2017: 635-640 - [c44]Ahmet Soran, Murat Yuksel, Mehmet Hadi Gunes:
Multiple graph abstractions for parallel routing over virtual topologies. INFOCOM Workshops 2017: 904-909 - [c43]Muhammed Abdullah Canbaz, Khalid Bakhshaliyev, Mehmet Hadi Gunes:
Analysis of path stability within autonomous systems. M&N 2017: 1-6 - 2016
- [c42]Eric Klukovich, Esra Erdin, Mehmet Hadi Gunes:
POSN: A privacy preserving decentralized social network app for mobile devices. ASONAM 2016: 1426-1429 - [c41]Manoj Kumar Popuri, Mehmet Hadi Gunes:
Empirical Analysis of Crypto Currencies. CompleNet 2016: 281-292 - [c40]Derek Gossi, Mehmet Hadi Gunes:
Lyric-Based Music Recommendation. CompleNet 2016: 301-310 - [c39]Eric Klukovich, Mehmet Hadi Gunes, Lee Barford, Frederick C. Harris Jr.:
Accelerating BFS shortest paths calculations using CUDA for Internet topology measurements. HPCS 2016: 66-73 - [c38]Ahmet Aksoy, Mehmet Hadi Gunes:
SILEA: A system for inductive LEArning. IISA 2016: 1-8 - [c37]Ibrahim Ethem Coskun, Muhammed Abdullah Canbaz, Mehmet Hadi Gunes:
Efficient as Network Topology Measurement Based on Ingress to Subnet Reachability. LCN Workshops 2016: 87-95 - [c36]Ahmet Aksoy, Mehmet Hadi Gunes:
Operating System Classification Performance of TCP/IP Protocol Headers. LCN Workshops 2016: 112-120 - 2015
- [j12]Hakan Kardes, Mehmet Hadi Gunes, Kamil Saraç:
Graph Based Induction of unresponsive routers in Internet topologies. Comput. Networks 81: 178-200 (2015) - [j11]Mehmet Hadi Gunes, Murat Yuksel, Hayreddin Çeker:
A blind processing framework to facilitate openness in smart grid communications. Comput. Networks 86: 14-26 (2015) - [j10]Esra Erdin, Christopher Zachor, Mehmet Hadi Gunes:
How to Find Hidden Users: A Survey of Attacks on Anonymity Networks. IEEE Commun. Surv. Tutorials 17(4): 2296-2316 (2015) - [j9]Engin Arslan, Murat Yuksel
, Mehmet Hadi Gunes:
Training network administrators in a game-like environment. J. Netw. Comput. Appl. 53: 14-23 (2015) - [c35]Esra Erdin, Eric Klukovich, Mehmet Hadi Gunes:
An analysis of friend circles of Facebook users. LCN Workshops 2015: 680-686 - [c34]Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Hadi Gunes:
POSN: A Personal Online Social Network. SEC 2015: 51-66 - 2014
- [c33]Guoxun Tian, Mehmet Hadi Gunes:
Complex Network Analysis of Ozone Transport. CompleNet 2014: 87-96 - [c32]Grace Crosley, Mehmet Hadi Gunes:
Using Complex Network Representation to Identify Important Structural Components of Chinese Characters. CompleNet 2014: 319-328 - 2013
- [j8]Engin Arslan, Murat Yuksel, Mehmet Hadi Gunes:
Network management game. Comput. Commun. Rev. 43(1): 46-50 (2013) - [j7]Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, Todd Shipley:
An overview of anonymity technology usage. Comput. Commun. 36(12): 1269-1283 (2013) - [j6]Bingdong Li, Jeff Springer, George Bebis, Mehmet Hadi Gunes:
A survey of network flow applications. J. Netw. Comput. Appl. 36(2): 567-581 (2013) - [c31]Bingdong Li, Mehmet Hadi Gunes, George Bebis, Jeff Springer:
A supervised machine learning approach to classify host roles on line using sFlow. HPPN@HPDC 2013: 53-60 - [c30]Andrew Dittrich, Sergiu Dascalu, Mehmet Hadi Gunes:
ATMOS - A Data Collection and Presentation Toolkit for the Nevada Climate Change Portal. ICSOFT 2013: 206-213 - [c29]Mehmet Burak Akgun
, Mehmet Hadi Gunes:
Impact of Multi-access Links on the Internet Topology Modeling. MASCOTS 2013: 399-403 - [c28]Mehmet Burak Akgun
, Mehmet Hadi Gunes:
Bipartite Internet topology at the subnet-level. NSW 2013: 94-97 - 2012
- [j5]David S. Shelley, Mehmet Hadi Gunes:
GerbilSphere: Inner sphere network visualization. Comput. Networks 56(3): 1016-1028 (2012) - [c27]Hakan Kardes, Abdullah Sevincer, Mehmet Hadi Gunes, Murat Yuksel:
Six Degrees of Separation among US Researchers. ASONAM 2012: 654-659 - [c26]Dorothy P. Cheung, Mehmet Hadi Gunes:
A Complex Network Analysis of the United States Air Transportation. ASONAM 2012: 699-701 - [c25]Tony Morelli, Mehmet Hadi Gunes:
Video Game Industry as a Social Network. ASONAM 2012: 1183-1188 - [c24]Andrew Dittrich, Mehmet Hadi Gunes, Sergiu Dascalu:
Network Analysis of Software Repositories: Identifying Subject Matter Experts. CompleNet 2012: 187-198 - [c23]Daniel Ramos, Mehmet Hadi Gunes, Donica Mensing, David M. Ryfe:
Mapping Emerging News Networks: A Case Study of the San Francisco Bay Area. CompleNet 2012: 237-244 - [c22]Christopher Zachor, Mehmet Hadi Gunes:
Software Collaboration Networks. CompleNet 2012: 257-264 - [c21]Hakan Kardes, Mehmet Hadi Gunes, Talha Oz
:
Cheleby: A subnet-level internet topology mapping system. COMSNETS 2012: 1-10 - [c20]Hasan T. Karaoglu, Mehmet Burak Akgun
, Mehmet Hadi Günes, Murat Yuksel:
Multi Path Considerations for Anonymized Routing: Challenges and Opportunities. NTMS 2012: 1-5 - 2011
- [c19]Hema Andal Jayaprakash Narayanan, Mehmet Hadi Günes:
Ensuring access control in cloud provisioned healthcare systems. CCNC 2011: 247-251 - [c18]Jeff Naruchitparames, Mehmet Hadi Günes, Cansin Yaman Evrenosoglu
:
Secure communications in the smart grid. CCNC 2011: 1171-1175 - [c17]Jeffrey Naruchitparames, Mehmet Hadi Gunes, Sushil J. Louis:
Friend recommendations in social networks using genetic algorithms and network topology. IEEE Congress on Evolutionary Computation 2011: 2207-2214 - [c16]Engin Arslan, Mehmet Hadi Gunes, Murat Yuksel:
Analysis of academic ties: A case study of Mathematics Genealogy. GLOBECOM Workshops 2011: 125-129 - [c15]Hasan T. Karaoglu, Murat Yuksel, Mehmet Hadi Gunes:
On the Scalability of Path Exploration Using Opportunistic Path-Vector Routing. ICC 2011: 1-5 - [c14]Mehmet Burak Akgün
, Mehmet Hadi Gunes:
Link-Level Network Topology Generation. ICDCS Workshops 2011: 140-145 - [c13]Jeffrey Naruchitparames, Mehmet Hadi Günes:
Enhancing data privacy and integrity in the cloud. HPCS 2011: 427-434 - [c12]Engin Arslan, Murat Yuksel, Mehmet Hadi Gunes:
Network management game. LANMAN 2011: 1-6 - [c11]Bingdong Li, Esra Erdin, Mehmet Hadi Günes, George Bebis, Todd Shipley:
An Analysis of Anonymizer Technology Usage. TMA 2011: 108-121 - 2010
- [c10]Adrienne Breland, Karen Schlauch, Mehmet Hadi Gunes, Frederick C. Harris Jr.
:
Fast graph approaches to measure influenza transmission across geographically distributed host types. BCB 2010: 594-601 - [c9]Adrienne Breland, Mehmet Hadi Günes, Karen Schlauch, Frederick C. Harris Jr.
:
Mixing patterns in a global influenza a virus network using whole genome comparisons. CIBCB 2010: 1-8 - [c8]Hakan Kardes, Mehmet Hadi Günes:
Structural Graph Indexing for Mining Complex Networks. ICDCS Workshops 2010: 99-104 - [c7]Murat Yuksel, Kostas E. Bekris, Cansin Yaman Evrenosoglu
, Mehmet Hadi Gunes, M. Sami Fadali, Mehdi Etezadi-Amoli, Frederick C. Harris Jr.
:
Open Cyber-Architecture for electrical energy markets. LCN 2010: 1024-1031
2000 – 2009
- 2009
- [j4]Mehmet Hadi Gunes, Kamil Saraç:
Resolving IP aliases in building traceroute-based internet maps. IEEE/ACM Trans. Netw. 17(6): 1738-1751 (2009) - [c6]Mehmet Hadi Gunes, Kamil Saraç:
Analyzing Router Responsiveness to Active Measurement Probes. PAM 2009: 23-32 - 2008
- [c5]Mehmet Hadi Gunes, Kamil Saraç:
Resolving Anonymous Routers in Internet Topology Measurement Studies. INFOCOM 2008: 1076-1084 - 2007
- [j3]Mehmet Hadi Gunes, Sevcan Bilir, Kamil Saraç, Turgay Korkmaz:
A measurement study on overhead distribution of value-added internet services. Comput. Networks 51(14): 4153-4173 (2007) - [c4]Mehmet Hadi Gunes, Kamil Saraç:
Inferring subnets in router-level topology collection studies. Internet Measurement Conference 2007: 203-208 - [c3]Mehmet Hadi Gunes, Nicolas Sanchis Nielsen, Kamil Saraç:
Impact of Alias Resolution on Traceroute -Based Sample Network Topologies. PAM 2007: 260-264 - 2006
- [c2]Mehmet Hadi Günes, Kamil Saraç:
Analytical IP Alias Resolution. ICC 2006: 459-464 - 2005
- [j2]Fatih Kocan, Mehmet Hadi Gunes, Atakan Kurt:
On-Line Pruning of ZBDD for Path Delay Fault Coverage Calculation. IEICE Trans. Inf. Syst. 88-D(7): 1381-1388 (2005) - [j1]Fatih Kocan, Mehmet Hadi Gunes:
On the ZBDD-based nonenumerative path delay fault coverage calculation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(7): 1137-1143 (2005) - [c1]Fatih Kocan, Mehmet Hadi Gunes:
Acyclic circuit partitioning for path delay fault emulation. AICCSA 2005: 22
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint