Furkan Alaca
School of Computer Science, Carleton University

Conferences & Workshops

Device fingerprinting for augmenting web authentication: Classification and analysis of methods
Furkan Alaca and P.C. van Oorschot. ACSAC 2016, December 5-9, Los Angeles.
[ Authors' copy]

A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments
Furkan Alaca, Akram Bin Sediq, and Halim Yanikomeroglu. IEEE Global Communications Conference (Globecom 2012) Workshop: The 8th Broadband Wireless Access Workshop, 3–7 December 2012, Anaheim, CA, USA.
[ Authors' copy] [IEEE Xplore]

Efficient simulation using shadowing fields of many wireless interferers with correlated shadowing
Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, and John S. Thompson. IEEE Vehicular Technology Conference (VTC2010-Spring), 16–19 May 2010, Taipei, Taiwan.
[ Authors' copy] [IEEE Xplore]


Why phishing still works: User strategies for combating phishing attacks
Mohamed Alsharnouby, Furkan Alaca, and Sonia Chiasson. International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.
[ Preprint] [ScienceDirect]

Aggregate interference distribution from large wireless networks with correlated shadowing: An analytical-numerical-simulation approach
Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, and John Thompson. IEEE Transactions on Vehicular Technology, vol. 60, no. 6, pp. 2752-2764, July 2011.
[ Full Text] [IEEE Xplore]