Gunes Kayacik
Gunes Kayacik
Aruba Networks
Verified email at hpe.com - Homepage
Title
Cited by
Cited by
Year
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6142010
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
4162005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Neural Networks, 2003. Proceedings of the International Joint Conference on …, 2003
2102003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
1682007
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
Mobile Security Technologies (MoST) Workshop, Held as part of the IEEE …, 2014
802014
Why aren't users using protection? investigating the usability of smartphone locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
Proceedings of the 17th International Conference on Human-Computer …, 2015
482015
On evolving buffer overflow attacks using genetic programming
HG Kayacik, M Heywood, N Zincir-Heywood
Proceedings of the 8th annual conference on Genetic and evolutionary …, 2006
472006
Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
HG Kayacık, N Zincir-Heywood
International Conference on Intelligence and Security Informatics, 362-367, 2005
432005
Mimicry attacks demystified: What can attackers do to evade detection?
HG Kayacik, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 213-223, 2008
312008
Understanding data leak prevention
P Raman, HG Kayacık, A Somayaji
6th Annual Symposium on Information Assurance (ASIA’11), 27, 2011
272011
Evolving successful stack overflow attacks for vulnerability testing
HG Kayacik, AN Zincir-Heywood, M Heywood
21st Annual Computer Security Applications Conference (ACSAC'05), 8 pp.-234, 2005
252005
Automatically evading IDS using GP authored attacks
HG Kayacik, AN Zincir-Heywood, MI Heywood
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
212007
Using self-organizing maps to build an attack map for forensic analysis
HG Kayacik, AN Zincir-Heywood
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
212006
Malicious automatically generated domain name detection using stateful-SBB
F Haddadi, HG Kayacik, AN Zincir-Heywood, MI Heywood
European Conference on the Applications of Evolutionary Computation, 529-539, 2013
202013
Generating mimicry attacks using genetic programming: a benchmarking study
HG Kayacik, AN Zincir-Heywood, MI Heywood, S Burschka
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 136-143, 2009
192009
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
International Conference on Pervasive Computing and Communications, 2015
172015
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing
HG Kayacık, AN Zincir-Heywood, MI Heywood
Evolutionary Intelligence 4 (4), 243-266, 2011
172011
Generating representative traffic for intrusion detection system benchmarking
HG Kayacik, N Zincir-Heywood
3rd Annual Communication Networks and Services Research Conference (CNSR'05 …, 2005
162005
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race
HG Kayacık, AN Zincir-Heywood, MI Heywood
Applied Soft Computing 11 (7), 4366-4383, 2011
152011
On dataset biases in a learning system with minimum a priori information for intrusion detection
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
152004
The system can't perform the operation now. Try again later.
Articles 1–20