Gunes Kayacik
Gunes Kayacik
Verified email at - Homepage
Cited by
Cited by
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Neural Networks, 2003. Proceedings of the International Joint Conference on …, 2003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
HG Kayacık, M Just, L Baillie, D Aspinall, N Micallef
Mobile Security Technologies (MoST) Workshop, Held as part of the IEEE …, 2014
Why aren't users using protection? investigating the usability of smartphone locking
N Micallef, M Just, L Baillie, M Halvey, HG Kayacik
Proceedings of the 17th International Conference on Human-Computer …, 2015
Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
HG Kayacık, N Zincir-Heywood
International Conference on Intelligence and Security Informatics, 362-367, 2005
On evolving buffer overflow attacks using genetic programming
HG Kayacik, M Heywood, N Zincir-Heywood
Proceedings of the 8th annual conference on Genetic and evolutionary …, 2006
Understanding data leak prevention
P Raman, HG Kayacık, A Somayaji
6th Annual Symposium on Information Assurance (ASIA’11), 27, 2011
Mimicry attacks demystified: What can attackers do to evade detection?
HG Kayacik, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 213-223, 2008
Evolving successful stack overflow attacks for vulnerability testing
HG Kayacik, AN Zincir-Heywood, M Heywood
21st Annual Computer Security Applications Conference (ACSAC'05), 8 pp.-234, 2005
Automatically evading IDS using GP authored attacks
HG Kayacik, AN Zincir-Heywood, MI Heywood
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
Using self-organizing maps to build an attack map for forensic analysis
HG Kayacik, AN Zincir-Heywood
Proceedings of the 2006 international conference on privacy, security and …, 2006
Generating mimicry attacks using genetic programming: a benchmarking study
HG Kayacik, AN Zincir-Heywood, MI Heywood, S Burschka
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 136-143, 2009
Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices
N Micallef, HG Kayacık, M Just, L Baillie, D Aspinall
International Conference on Pervasive Computing and Communications, 2015
Malicious automatically generated domain name detection using stateful-SBB
F Haddadi, HG Kayacik, AN Zincir-Heywood, MI Heywood
Applications of Evolutionary Computation: 16th European Conference …, 2013
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing
HG Kayacık, AN Zincir-Heywood, MI Heywood
Evolutionary Intelligence 4, 243-266, 2011
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race
HG Kayacık, AN Zincir-Heywood, MI Heywood
Applied Soft Computing 11 (7), 4366-4383, 2011
On dataset biases in a learning system with minimum a priori information for intrusion detection
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
Hierarchical self-organizing map-based IDS on KDD benchmark.
HG Kayacik
The system can't perform the operation now. Try again later.
Articles 1–20