Home > IJCNS>

Dr. Arif Sari

Girne American University, Cyprus

Email: arifsari@gau.edu.tr


2013  Ph.D., Girne American University, CYPRUS

2010  M.B.A, European University of Lefke, CYPRUS

2008  B.S.c, European University of Lefke, CYPRUS

Publications (selected)

  1. Sari, A., (2015), “Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks”, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, (pp. 66-94). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-7. April 2015.
  2. Sari, A., Necat, B. (2012); “Securing Mobile Ad Hoc Networks Against Jamming Attacks Through Unified Security Mechanism”, International Journal of Ad Hoc, Sensor & Ubiquitous Computing, Vol. 3, No.3, June 2012, ISSN: 0976-1764, DOI: 10.5121/ijasuc2012.3306, pp. 79 – 94.
  3. Sari, A. (2014); “Security Approaches in IEEE 802.11 MANET – Performance Evaluation of USM and RAS”, International Journal of Communications, Network, and System Sciences, Vol.7, No.9, pp. 365-372, ISSN: 1913-3723; ISSN-P: 1913-3715, DOI: http://dx.doi.org/10.4236/ijcns.2014.79038.
  4. Sari, A. (2014); “Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks”, Transactions on Networks & Communications, Society for Science and Education, United Kingdom, Vol.2, No.5, pp. 1-6,  ISSN: 2054-7420, DOI: http://dx.doi.org/10.14738/tnc.25.431.
  5. Sari, A., Rahnama, B., Caglar, E., (2014); “Ultra-Fast Lithium Cell Charging for Mission Critical Applications”, Transactions on Machine Learning and Artificial Intelligence, United Kingdom, Vol.2, No.5, pp. 11-18,  ISSN: 2054-7390, DOI: http://dx.doi.org/10.14738/tmlai.25.430.
  6. Sari, A. (2015) “Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks”. International Journal of Communications, Network and System Sciences, 8, 19-28. doi: http://dx.doi.org/10.4236/ijcns.2015.83003.
  7. Sari, A. (2015) “Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite”. International Journal of Communications", Network and System Sciences, 8, 29-42. doi: http://dx.doi.org/10.4236/ijcns.2015.83004.
  8. Sari, A. (2015) “A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security”, 6, 142-154. doi: http://dx.doi.org/10.4236/jis.2015.62015.
  9. Obasuyi, G. and Sari, A. (2015) “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences”, 8, 260-273. doi: http://dx.doi.org/10.4236/ijcns.2015.87026.
  10. Sari, A. , Karaduman, A. and Firat, A. (2015) “Deployment Challenges of Offshore Renewable Energy Systems for Sustainability in Developing Countries”. Journal of Geographic Information System, 7, 465-477. http://dx.doi.org/10.4236/jgis.2015.75037.
  11. Sari, A., Çağlar, E. (2015) “Performance Simulation of Gossip Relay Protocol in Multi-hop Wireless Networks”, Social and Applied Sciences Journal, Girne American University, Vol.7, No.11, pp.145-148.
  12. Sari, A. and Akkaya, M. (2015) Security and Optimization Challenges of Green Data Centers. International Journal of Communications, Network and System Sciences, 8, 492-500. doi: http://10.4236/ijcns.2015.812044.
  13. Sari, A. and Karay, M. (2015) Comparative Analysis of Wireless Security Protocols: WEP vs WPA. International Journal of Communications, Network and System Sciences, 8, 483-491. doi: http://10.4236/ijcns.2015.812043.
  14. Sari, A. and Akkaya, M. (2015) Fault Tolerance Mechanisms in Distributed Systems. International Journal of Communications, Network and System Sciences, 8, 471-482. doi: http://10.4236/ijcns.2015.812042.
  15. Akkaya, M., Agdelen, Z., Haydar, A. and Sari, A. (2015) Resolution of Relationship between Organizational Performance and Human Resource Management through Nonlinear Modeling. Int. J. Communications, Network and System Sciences, 8, 510-522. http://dx.doi.org/10.4236/ijcns.2015.812046
  16. Rahnama, B.; Sari, A.; Makvandi, R., "Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect," Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on, vol., no., pp.579,582, 9-11 May 2013 doi: http://doi.acm.org/10.1109/TAEECE.2013.6557339.
  17. Sari, A.; Rahnama, B., (2013) "Simulation of 802.11 Physical Layer Attacks in MANET," Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on, vol., no., pp.334, 337, 5-7 June 2013, http://dx.doi.org/10.1109/CICSYN.2013.79 .
  18. Rahnama, B., Sari, A., Ghafour, M. (2015), “Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation”, Network Security Attacks and Countermeasures, Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8761-5,  Accepted, Corrected, Release date: September 2015.
  19. Sari, A., Rahnama, B (2013). “Addressing security challenges in WiMAX environment”. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13). ACM, New York, NY, USA, 454-456. DOI=10.1145/2523514.2523586 http://doi.acm.org/10.1145/2523514.2523586