Gunes Kayacik
Gunes Kayacik
Okta
Verified email at okta.com - Homepage
Title
Cited by
Cited by
Year
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6812010
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
4582005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Neural Networks, 2003. Proceedings of the International Joint Conference on …, 2003
2162003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
1872007
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
Mobile Security Technologies (MoST) Workshop, Held as part of the IEEE …, 2014
942014
Why aren't users using protection? investigating the usability of smartphone locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
Proceedings of the 17th International Conference on Human-Computer …, 2015
532015
On evolving buffer overflow attacks using genetic programming
HG Kayacik, M Heywood, N Zincir-Heywood
Proceedings of the 8th annual conference on Genetic and evolutionary …, 2006
482006
Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
HG Kayacık, N Zincir-Heywood
International Conference on Intelligence and Security Informatics, 362-367, 2005
462005
Mimicry attacks demystified: What can attackers do to evade detection?
HG Kayacik, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 213-223, 2008
342008
Understanding data leak prevention
P Raman, HG Kayacık, A Somayaji
6th Annual Symposium on Information Assurance (ASIA’11), 27, 2011
322011
Evolving successful stack overflow attacks for vulnerability testing
HG Kayacik, AN Zincir-Heywood, M Heywood
21st Annual Computer Security Applications Conference (ACSAC'05), 8 pp.-234, 2005
252005
Automatically evading IDS using GP authored attacks
HG Kayacik, AN Zincir-Heywood, MI Heywood
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
232007
Using self-organizing maps to build an attack map for forensic analysis
HG Kayacik, AN Zincir-Heywood
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
212006
Generating mimicry attacks using genetic programming: a benchmarking study
HG Kayacik, AN Zincir-Heywood, MI Heywood, S Burschka
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 136-143, 2009
202009
Malicious automatically generated domain name detection using stateful-SBB
F Haddadi, HG Kayacik, AN Zincir-Heywood, MI Heywood
European Conference on the Applications of Evolutionary Computation, 529-539, 2013
182013
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing
HG Kayacık, AN Zincir-Heywood, MI Heywood
Evolutionary Intelligence 4 (4), 243-266, 2011
172011
On dataset biases in a learning system with minimum a priori information for intrusion detection
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
172004
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
International Conference on Pervasive Computing and Communications, 2015
162015
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race
HG Kayacık, AN Zincir-Heywood, MI Heywood
Applied Soft Computing 11 (7), 4366-4383, 2011
162011
Evolving buffer overflow attacks with detector feedback
HG Kayacik, MI Heywood, AN Zincir-Heywood
Workshops on Applications of Evolutionary Computation, 11-20, 2007
142007
The system can't perform the operation now. Try again later.
Articles 1–20