Hayretdin Bahsi

Orcid: 0000-0001-8882-4095

According to our database1, Hayretdin Bahsi authored at least 44 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Threat modeling of industrial control systems: A systematic literature review.
Comput. Secur., January, 2024

The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
On the application of active learning for efficient and effective IoT botnet detection.
Future Gener. Comput. Syst., April, 2023

Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection.
J. Comput. Virol. Hacking Tech., March, 2023

A comparative framework for cyber threat modelling: case of healthcare and industrial control systems.
Int. J. Crit. Infrastructures, 2023

Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System.
Comput. Secur., 2023

Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757.
Comput. Secur., 2023

Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking.
IEEE Access, 2023

Improving Transparency and Explainability of Deep Learning Based IoT Botnet Detection Using Explainable Artificial Intelligence (XAI).
Proceedings of the International Conference on Machine Learning and Applications, 2023

Anomalous File System Activity Detection Through Temporal Association Rule Mining.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Maritime cyber-insurance: the Norwegian case.
Int. J. Crit. Infrastructures, 2022

Android malware concept drift using system calls: Detection, characterization and challenges.
Expert Syst. Appl., 2022

Digital forensic analysis of mobile automotive maintenance applications.
Digit. Investig., 2022

On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection.
Comput. Secur., 2022

Concept drift and cross-device behavior: Challenges and implications for effective android malware detection.
Comput. Secur., 2022

In-Depth Feature Selection for the Statistical Machine Learning-Based Botnet Detection in IoT Networks.
IEEE Access, 2022

A Cyber Attack Taxonomy for Microgrid Systems.
Proceedings of the 17th Annual System of Systems Engineering Conference, 2022

Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

On the Application of Active Learning to Handle Data Evolution in Android Malware Detection.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2021
A machine learning-based forensic tool for image classification - A design science approach.
Digit. Investig., 2021

KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization.
Comput. Secur., 2021

An Ontology Engineering Case Study for Advanced Digital Forensic Analysis.
Proceedings of the Model and Data Engineering - 10th International Conference, 2021

2020
The cyber-insurance market in Norway.
Inf. Comput. Secur., 2020

Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Model-Based Analysis of Secure and Patient-Dependent Pacemaker Monitoring System.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health, 2020

2019
Differences in Android Behavior Between Real Device and Emulator: A Malware Detection Perspective.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Towards the Integration of a Post-Hoc Interpretation Step into the Machine Learning Workflow for IoT Botnet Detection.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Hybrid Feature Selection Models for Machine Learning Based Botnet Detection in IoT Networks.
Proceedings of the 2019 International Conference on Cyberworlds, 2019

Mapping the Information Flows for the Architecture of a Nationwide Situation Awareness System : (Poster).
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2019

2018
Unsupervised Anomaly Based Botnet Detection in IoT Networks.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Forensics Analysis of an On-line Game over Steam Platform.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

Dimensionality Reduction for Machine Learning Based IoT Botnet Detection.
Proceedings of the 15th International Conference on Control, 2018

2016
Impact assessment of cyber attacks: A quantification study on power generation systems.
Proceedings of the 11th System of Systems Engineering Conference, 2016

2015
A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

2013
Security-level classification for confidential documents by using adaptive neuro-fuzzy inference systems.
Expert Syst. J. Knowl. Eng., 2013

2011
Classification of confidential documents by using adaptive neurofuzzy inference systems.
Proceedings of the First World Conference on Information Technology, 2011

Preserving organizational privacy in intrusion detection log sharing.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011

2010
Privacy preserving data collection framework for user centric network applications (Günümüz kullanıcı eksenli ağ uygulamaları için kişisel gizliliği sağlayan bilgi toplama anaçatısı)
PhD thesis, 2010

Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures.
Sensors, 2010

2009
Security Level Classification of Confidential Documents Written in Turkish.
Proceedings of the User Centric Media - First International Conference, 2009

Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009


  Loading...