Gunes Kayacik
Gunes Kayacik
Aruba Networks
Verified email at hpe.com - Homepage
Title
Cited by
Cited by
Year
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6002010
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
3752005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Neural Networks, 2003. Proceedings of the International Joint Conference on …, 2003
2052003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
1632007
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
Mobile Security Technologies (MoST) Workshop, Held as part of the IEEE …, 2014
732014
On evolving buffer overflow attacks using genetic programming
HG Kayacik, M Heywood, N Zincir-Heywood
Proceedings of the 8th annual conference on Genetic and evolutionary …, 2006
442006
Why aren't users using protection? investigating the usability of smartphone locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
Proceedings of the 17th International Conference on Human-Computer …, 2015
422015
Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
HG Kayacık, N Zincir-Heywood
International Conference on Intelligence and Security Informatics, 362-367, 2005
422005
Mimicry attacks demystified: What can attackers do to evade detection?
HG Kayacik, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 213-223, 2008
312008
Evolving successful stack overflow attacks for vulnerability testing
HG Kayacik, AN Zincir-Heywood, M Heywood
21st Annual Computer Security Applications Conference (ACSAC'05), 8 pp.-234, 2005
252005
Understanding data leak prevention
P Raman, HG Kayacık, A Somayaji
6th Annual Symposium on Information Assurance (ASIA’11), 27, 2011
242011
Selecting features for intrusion detection: a feature relevance analysis on KDD 99 benchmark
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the Third Annual Conference on Privacy, Security and Trust, 12-14, 2005
222005
Using self-organizing maps to build an attack map for forensic analysis
HG Kayacik, AN Zincir-Heywood
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
212006
Automatically evading IDS using GP authored attacks
HG Kayacik, AN Zincir-Heywood, MI Heywood
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
202007
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
International Conference on Pervasive Computing and Communications, 2015
162015
Malicious automatically generated domain name detection using stateful-SBB
F Haddadi, HG Kayacik, AN Zincir-Heywood, MI Heywood
European Conference on the Applications of Evolutionary Computation, 529-539, 2013
162013
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing
HG Kayacık, AN Zincir-Heywood, MI Heywood
Evolutionary Intelligence 4 (4), 243-266, 2011
162011
Generating mimicry attacks using genetic programming: a benchmarking study
HG Kayacik, AN Zincir-Heywood, MI Heywood, S Burschka
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 136-143, 2009
162009
Generating representative traffic for intrusion detection system benchmarking
HG Kayacik, N Zincir-Heywood
3rd Annual Communication Networks and Services Research Conference (CNSR'05 …, 2005
162005
On dataset biases in a learning system with minimum a priori information for intrusion detection
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
152004
The system can't perform the operation now. Try again later.
Articles 1–20