Gunes Kayacik
Gunes Kayacik
Bekræftet mail på okta.com - Startside
Citeret af
Citeret af
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Intrusion Detection Systems
HG Kayacik, AN Zincir-Heywood, MI Heywood
Encyclopedia of Multimedia Technology and Networking, 494-499, 2005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Neural Networks, 2003. Proceedings of the International Joint Conference on …, 2003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
Mobile Security Technologies (MoST) Workshop, Held as part of the IEEE …, 2014
Why aren't users using protection? investigating the usability of smartphone locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
Proceedings of the 17th International Conference on Human-Computer …, 2015
Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
HG Kayacık, N Zincir-Heywood
International Conference on Intelligence and Security Informatics, 362-367, 2005
On evolving buffer overflow attacks using genetic programming
HG Kayacik, M Heywood, N Zincir-Heywood
Proceedings of the 8th annual conference on Genetic and evolutionary …, 2006
Understanding data leak prevention
P Raman, HG Kayacık, A Somayaji
6th Annual Symposium on Information Assurance (ASIA’11), 27, 2011
Mimicry attacks demystified: What can attackers do to evade detection?
HG Kayacik, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 213-223, 2008
Automatically evading IDS using GP authored attacks
HG Kayacik, AN Zincir-Heywood, MI Heywood
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
Evolving successful stack overflow attacks for vulnerability testing
HG Kayacik, AN Zincir-Heywood, M Heywood
21st Annual Computer Security Applications Conference (ACSAC'05), 8 pp.-234, 2005
Using self-organizing maps to build an attack map for forensic analysis
HG Kayacik, AN Zincir-Heywood
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
Generating mimicry attacks using genetic programming: a benchmarking study
HG Kayacik, AN Zincir-Heywood, MI Heywood, S Burschka
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 136-143, 2009
Malicious automatically generated domain name detection using stateful-SBB
F Haddadi, HG Kayacik, AN Zincir-Heywood, MI Heywood
European Conference on the Applications of Evolutionary Computation, 529-539, 2013
On dataset biases in a learning system with minimum a priori information for intrusion detection
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing
HG Kayacık, AN Zincir-Heywood, MI Heywood
Evolutionary Intelligence 4 (4), 243-266, 2011
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race
HG Kayacık, AN Zincir-Heywood, MI Heywood
Applied Soft Computing 11 (7), 4366-4383, 2011
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
International Conference on Pervasive Computing and Communications, 2015
Generating representative traffic for intrusion detection system benchmarking
HG Kayacik, N Zincir-Heywood
3rd Annual Communication Networks and Services Research Conference (CNSR'05 …, 2005
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20