Ahmet Okutan

Orcid: 0000-0001-6664-515X

According to our database1, Ahmet Okutan authored at least 23 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Empirical Validation of Automated Vulnerability Curation and Characterization.
IEEE Trans. Software Eng., 2023

Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework.
IEEE Secur. Priv., 2023

A Novel Approach to Identify Security Controls in Source Code.
CoRR, 2023

2022
Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework.
CoRR, 2022

A Grounded Theory Based Approach to Characterize Software Attack Surfaces.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Predicting the severity and exploitability of vulnerability reports using convolutional neural nets.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

2021
Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts.
CoRR, 2021

Constructing a Shared Infrastructure for Software Architecture Analysis and Maintenance.
Proceedings of the 18th IEEE International Conference on Software Architecture, 2021

2020
Looking for Software Defects? First Find the Nonconformists.
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

2019
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense.
Cybersecur., 2019

Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.
Cybersecur., 2018

Use of Source Code Similarity Metrics in Software Defect Prediction.
CoRR, 2018

Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities.
CoRR, 2018

Differentiating and Predicting Cyberattack Behaviors Using LSTM.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Predicting cyber attacks with bayesian networks using unconventional signals.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
A novel kernel to predict software defectiveness.
J. Syst. Softw., 2016

2014
Software defect prediction using Bayesian networks.
Empir. Softw. Eng., 2014

Bilingual Software Requirements Tracing using Vector Space Model.
Proceedings of the ICPRAM 2014, 2014

2013
A Novel Regression Method for Software Defect Prediction with Kernel Methods.
Proceedings of the ICPRAM 2013, 2013

2012
Software defect prediction using bayesian networks and kernel methods (Bayesian ağları ve çekirdek yöntemleri ile yazılım hata tahmini)
PhD thesis, 2012


  Loading...