Ahmet Okutan
Ahmet Okutan
Verified email at
Cited by
Cited by
Software defect prediction using Bayesian networks
A Okutan, OT Yıldız
Empirical Software Engineering 19, 154-181, 2014
Predicting cyber attacks with bayesian networks using unconventional signals
A Okutan, SJ Yang, K McConky
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data
A Okutan, G Werner, SJ Yang, K McConky
Cybersecurity 1, 1-16, 2018
Differentiating and predicting cyberattack behaviors using lstm
I Perry, L Li, C Sweet, SH Su, FY Cheng, SJ Yang, A Okutan
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
Forecasting cyber attacks with imbalanced data sets and different time granularities
A Okutan, SJ Yang, K McConky
arXiv preprint arXiv:1803.09560, 2018
POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE)
A Okutan, G Werner, K McConky, S Yang, Jay
2017 ACM SIGSAC Conference on Computer and Communications Security, 2563-2565, 2017
Constructing a shared infrastructure for software architecture analysis and maintenance
J Garcia, M Mirakhorli, L Xiao, Y Zhao, I Mujhid, K Pham, A Okutan, ...
2021 IEEE 18th International Conference on Software Architecture (ICSA), 150-161, 2021
Capture: cyberattack forecasting using non-stationary features with time lags
A Okutan, SJ Yang, K McConky, G Werner
2019 IEEE Conference on Communications and Network Security (CNS), 205-213, 2019
ASSERT: Attack Synthesis and Separation with Entropy Redistribution towards Predictive Cyber Defense
A Okutan, SJ Yang
Cybersecurity 2, 15, 2019
A novel kernel to predict software defectiveness
A Okutan, OT Yildiz
Journal of Systems and Software 119, 109-121, 2016
A Novel Regression Method for Software Defect Prediction with Kernel Methods.
A Okutan, OT Yildiz
ICPRAM, 216-221, 2013
Forecasting cyberattacks as time series with different aggregation granularity
G Werner, A Okutan, S Yang, K McConky
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
Use of source code similarity metrics in software defect prediction
A Okutan
arXiv preprint arXiv:1808.10033, 2018
A grounded theory based approach to characterize software attack surfaces
S Moshtari, A Okutan, M Mirakhorli
Proceedings of the 44th International Conference on Software Engineering, 13-24, 2022
Predicting the severity and exploitability of vulnerability reports using convolutional neural nets
A Okutan, M Mirakhorli
Proceedings of the 3rd International Workshop on Engineering and …, 2022
Software defect prediction using bayesian networks and kernel methods
A Okutan
Işık Üniversitesi, 2012
Looking for software defects? First find the nonconformists
S Moshtari, JCS Santos, M Mirakhorli, A Okutan
2020 IEEE 20th International Working Conference on Source Code Analysis and …, 2020
Empirical validation of automated vulnerability curation and characterization
A Okutan, P Mell, M Mirakhorli, I Khokhlov, JCS Santos, D Gonzalez, ...
IEEE Transactions on Software Engineering, 2023
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework
M Fazelnia, A Okutan, M Mirakhorli
IEEE Security & Privacy 21 (1), 37-48, 2022
Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts
SJ Yang, A Okutan, G Werner, SH Su, A Goel, ND Cahill
arXiv preprint arXiv:2103.13902, 2021
The system can't perform the operation now. Try again later.
Articles 1–20