default search action
Mehmet Ozgun Demir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Berke Argin, Mehmet Özgün Demir, Elif Dilek Salik, Aysun Gurur Önalan, Öykü Han Batum, Ece Gelal Soyak:
Advancing WebRTC QoE Assessment with Machine Learning in Real-World Wi-Fi Scenarios. MeditCom 2024: 263-268 - 2023
- [j4]Mehmet Özgün Demir, Günes Karabulut-Kurt, Ali Emre Pusane:
A Pseudorange-Based GPS Spoofing Detection Using Hyperbola Equations. IEEE Trans. Veh. Technol. 72(8): 10770-10783 (2023) - 2021
- [i1]Mehmet Özgün Demir, Ozan Alp Topal, Ali Emre Pusane, Guido Dartmann, Gerd Ascheid, Günes Karabulut-Kurt:
An Adaptive Multi-Agent Physical Layer Security Framework for Cognitive Cyber-Physical Systems. CoRR abs/2101.02446 (2021) - 2020
- [j3]Mehmet Ozgun Demir, Ali Emre Pusane, Guido Dartmann, Gerd Ascheid, Gunes Karabulut-Kurt:
A Garden of Cyber Physical Systems: Requirements, Challenges, and Implementation Aspects. IEEE Internet Things Mag. 3(3): 84-89 (2020) - [j2]Ozan Alp Topal, Mehmet Ozgun Demir, Zekai Liang, Ali Emre Pusane, Guido Dartmann, Gerd Ascheid, Günes Karabulut-Kurt:
A Physical Layer Security Framework for Cognitive Cyber-Physical Systems. IEEE Wirel. Commun. 27(4): 32-39 (2020) - [c12]Mehmet Özgün Demir, Günes Karabulut-Kurt, Ali Emre Pusane:
On the Limitations of GPS Time-Spoofing Attacks. TSP 2020: 313-316 - [c11]Oguzhan Kubilay Ülger, Mehmet Özgün Demir, Ozan Alp Topal, Günes Karabulut-Kurt, Ali Emre Pusane:
Efficient Physical Layer Spoofing Detection with an Autoregressive Model. TSP 2020: 382-385
2010 – 2019
- 2019
- [c10]Ozan Alp Topal, Mehmet Özgün Demir, Guido Dartmann, Anke Schmeink, Gerd Ascheid, Ali Emre Pusane, Günes Karabulut-Kurt:
Physical Layer Spoofing Against Eavesdropping Attacks. MECO 2019: 1-5 - [c9]Mehmet Özgün Demir, Ozan Alp Topal, Guido Dartmann, Anke Schmeink, Gerd Ascheid, Günes Kurt, Ali Emre Pusane:
Using Perfect Codes in Relay Aided Networks: A Security Analysis. WiMob 2019: 1-6 - 2018
- [c8]Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, Gerd Ascheid, Ali Emre Pusane:
Security Analysis of Forward Error Correction Codes in Relay Aided Networks. GIIS 2018: 1-5 - [c7]Mehmet Ozgun Demir, Gunes Karabulut-Kurt, Guido Dartmann, Gerd Ascheid, Ali Emre Pusane:
Security analysis of hamming codes in relay aided networks. SIU 2018: 1-4 - 2017
- [c6]Mehmet Ozgun Demir, Gunes Karabulut-Kurt, Volker Lücken, Gerd Ascheid, Guido Dartmann:
Impact of the communication channel on information theoretical privacy. ISIT 2017: 2870-2874 - [c5]Mehmet Ozgun Demir, Selahattin Gökceli, Guido Dartmann, Volker Lücken, Gerd Ascheid, Günes Karabulut-Kurt:
Utility Privacy Trade-Off for Noisy Channels in OFDM Systems. VTC Fall 2017: 1-5 - 2016
- [j1]Mehmet Ozgun Demir, Mehmet Karaca, Gunes Karabulut-Kurt:
On Reducing Power Consumption of Transmitting Stations in 802.11 MIMO Networks. IEEE Commun. Lett. 20(2): 332-335 (2016) - 2015
- [c4]Mehmet Ozgun Demir, Günes Karabulut-Kurt, Mehmet Karaca:
Application based energy consumption characterization of IEEE 802.11n/ac access points. ICNC 2015: 520-524 - [c3]Mehmet Ozgun Demir, Gunes Karabulut-Kurt, Mehmet Karaca:
Analysis for reducing power consumption of wireless local area network access points. SIU 2015: 1453-1456 - 2014
- [c2]Mehmet Ozgun Demir, Baris Kurt, Saliha Buyukcorak, Gunes Karabulut-Kurt, A. Taylan Cemgil, Engin Zeydan:
Comparison of sampling strategies for flow length estimation. SIU 2014: 2182-2185 - [c1]Mehmet Ozgun Demir, Gunes Karabulut-Kurt, Mehmet Karaca:
An energy consumption model for 802.11ac access points. SoftCOM 2014: 67-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint