Journal Articles
  1. [14YNN+] - E. Yüksel, H.R. Nielson, F. Nielson, H. Zhu, H. Huang.
    Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
    International Journal on Software Tools for Technology Transfer,
        vol. 16, no. 4, pages 421-435, 2014. [Springer]

  2. [12YNN] - E. Yüksel, H.R. Nielson, F. Nielson.
    Key Update Strategies for Wireless Sensor Networks.
    International Journal of Information and Electronics Engineering,
        vol. 2, no. 2, pages 141-145, 2012. [IJIEE]

  3. [10YNNa] - E. Yüksel, H.R. Nielson, F. Nielson.
    A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks.
    The Computer Journal,
        vol. 54, no. 4, pages 589-601; doi: 10.1093/comjnl/bxq036, 2010. [The Computer Journal]

Conference Papers
  1. [13VBY] - R. Vigo, A. Bruni, E. Yüksel.
    Security Games for Cyber-Physical Systems.
    In Proceedings of the 18th Nordic Conference on Secure IT Systems (NordSec 2013),
        LNCS, Ilulissat, Greenland, 2013. [Springer]

  2. [12VYR] - R. Vigo, E. Yüksel, C.K. Ramli.
    Smart Grid Security: A Smart Meter-Centric Perspective.
    In Proceedings of the Telecommunications Forum (TELFOR),
        pages 127-130, IEEE, Belgrade, Serbia, 2012. [IEEE Xplore]

  3. [12YNNa] - E. Yüksel, H.R. Nielson, F. Nielson.
    Key Update Assistant for Resource-Constrained Networks.
    In Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC 2012),
        pages 75-81, IEEE, Cappadocia, Turkey, 2012. [IEEE Xplore]

  4. [12YZN+] - E. Yüksel, H. Zhu, H.R. Nielson, H. Huang, F. Nielson.
    Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
    In Proceedings of the The 6th IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE 2012),
        pages 25-32, IEEE, Beijing, China, 2012. [IEEE Xplore]

  5. [11YNNa] - E. Yüksel, H.R. Nielson, F. Nielson.
    Resilience Analysis of Key Update Strategies for Resource-Constrained Networks.
    In Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2011),
        IEEE, Budapest, Hungary, 2011. [IEEE Xplore]

  6. [11YNN] - E. Yüksel, H.R. Nielson, F. Nielson.
    Characteristics of Key Update Strategies for Wireless Sensor Networks.
    In Proceedings of the International Conference on Network Communication and Computer (ICNCC 2011),
        pages 132-136, IEEE, New Delhi, India, 2011. [Orbit]

  7. [11YNN+] - E. Yüksel, H.R. Nielson, F. Nielson, M. Fruth, M. Kwiatkowska.
    Optimizing Key Updates in Sensor Networks.
    In Proceedings of the IEEE Sensors Applications Symposium (SAS 2011),
        pages 82-87, IEEE, San Antonio, TX, USA, 2011. [IEEE Xplore]

  8. [09YNNa] - E. Yüksel, H.R. Nielson, F. Nielson.
    A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks.
    In Proceedings of the 24th International Symposium on Computer and Information Sciences (ISCIS 2009),
        pages 350-355, IEEE, Cyprus, 2009. [IEEE Xplore]

Workshop Papers
  1. [12YNNN] - E. Yüksel, H.R. Nielson, F. Nielson, B.F. Nielsen.
    LBTool: A Stochastic Toolkit for Leave-Based Key Updates.
    In Proceedings of the 4th IEEE International Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures (PEDISWESA'12),
        pages 868-875, IEEE, Cappadocia, Turkey, 2012. [IEEE Xplore]

  2. [11YZY+] - E. Yüksel, A.H. Zaim, E. Yüksel, M.A. Aydin.
    A ZigBee-based Automatic Meter Reading System (extended abstract).
    In Proceedings of the International Conference on Networking and Future Internet (ICNFI 2011),
        Paris, France, 2011. [Orbit]

  3. [09YNNb] - E. Yüksel, H.R. Nielson, F. Nielson.
    Quantitative Security Analysis of ZigBee Key Updates (extended abstract).
    In Proceedings of the 21st Nordic Workshop on Programming Theory (NWPT 2009),
        pages 14-16, Copenhagen, Denmark, 2009. [NWPT]

  4. [08YNN] - E. Yüksel, H.R. Nielson, F. Nielson.
    ZigBee-2007 Security Essentials.
    In Proceedings of the 13rd Nordic Workshop on Secure IT-systems (NordSec 2008),
        pages 65-82, Copenhagen, Denmark, 2008. [Orbit]

  5. [07YNN+] - E. Yüksel, H.R. Nielson, C.R. Nielsen, M.B. Örencik.
    A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005.
    In Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2007),
        pages 149-164, Wroclaw, Poland, 2007. [Orbit]

Conference Papers in Turkish
  1. [05YSO+] - E. Yüksel, M. Soytürk, T. Ovatman, B. Örencik.
    Security Problem in Wireless Local Area Networks.
    In Proceedings of the National Symposium on Network and Information Systems Security (ABG 2005),
        pages 23-30, Istanbul, Turkey, 2005.

  2. [05YY] - C. Yüksel, E. Yüksel.
    Intellectual Property Strategies in the Global Economy and Digital Copyright Protection.
    In Proceedings of the National Symposium on Network and Information Systems Security (ABG 2005),
        Istanbul, Turkey, 2005.

  3. [05YÖ] - E. Yüksel, B. Örencik.
    Virtual Private Network Design and Implementation.
    In Proceedings of the National Symposium on Network and Information Systems Security (ABG 2005),
        pages 114-118, Istanbul, Turkey, 2005.

Technical Reports
  1. [13YNN] - E. Yüksel, H.R. Nielson, F. Nielson.
    Design-Efficiency in Security.
    IMM-Technical Report-2013-03,
        DTU Compute, February 2013. [CoRR]

  2. [12NNP+] - B.F. Nielsen, F. Nielson, H. Pilegaard, M.J.A. Smith, E. Yüksel, K. Zeng, L. Zhang.
    Roadmap Document on Stochastic Analysis.
    MT-LAB Roadmap Document,
        CoRR abs/1209.6578, September 2012. [CoRR]

  3. [12YNN+] - E. Yüksel, H.R. Nielson, F. Nielson, H. Zhu, H. Huang.
    Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study.
    IMM-Technical Report-2012-02,
        DTU Informatics, Lyngby, February 2012. [CoRR]

  4. [10YNN+] - E. Yüksel, H.R. Nielson, F. Nielson, M. Fruth, M. Kwiatkowska.
    Optimizing ZigBee Security using Stochastic Model Checking.
    IMM-Technical Report-2010-08,
        DTU Informatics, Lyngby, July 2010. [CoRR]

  5. [10Yuka] - E. Yüksel. Analysing
    ZigBee Key Establishment Protocols.
    Technical Report for SENSORIA Project,
        DTU Informatics, Lyngby, February 2010. [CoRR]

Posters
  1. [10YNN] - E. Yüksel, H.R. Nielson, F. Nielson.
    High Security at a Low Cost.
    Models and Logics for Quantitative Analysis Workshop(MLQA 2010),
        Edinburgh, UK, 2010.

Miscellaneous
  1. [12Yuk] - E. Yüksel.
    Strategies for Key update problem in ZigBee: A quantitative approach to security.
    In 6th European ZigBee Developers' Conference,
        Munich, Germany, 2012.

  2. [12NY] - F. Nielson, E. Yüksel.
    Models and Logics for Quantitative Analysis.
    ERCIM News Special theme: Evolving Software,
        No. 88, January 2012.

  3. [10Yuk] - E. Yüksel.
    A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks.
    In: B. Jonsson, J. Kreiker, M. Kwiatkowska (Eds.) Quantitative and Qualitative Analysis of Network Protocols, Dagstuhl Seminar Proceedings 10051,
        Schloss Dagstuhl - Leibniz Zentrum für Informatik, Germany, ISSN: 1862-4405, 2010.

Dissertations
PhD
  1. [11Yuk] - E. Yüksel.
    Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks.
    PhD Thesis,
        IMM-PHD-2011-247, Thesis Supervisors: Prof. Hanne Riis Nielson (DTU), Prof. Flemming Nielson (DTU), 2011. [DTU]

MSc
  1. [07Yuk] - E. Yüksel.
    Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis.
    MSc Thesis,
        IMM-Thesis-2007-16, Thesis Supervisor: Prof. Hanne Riis Nielson (DTU), MSc. Supervisor: Prof. Mehmet Bülent Örencik (ITU), 2007. [DTU]

BSc
  1. [03Yuk] - E. Yüksel.
    Virtual Private Network Design and Implementation.
    BSc Thesis,
        Istanbul Technical University, Supervisor: Prof. Mehmet Bülent Örencik (ITU), 2003.