Hilmi Günes Kayacik

According to our database1, Hilmi Günes Kayacik authored at least 28 papers between 2003 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Evolutionary computation in network management and security: GECCO 2017 tutorial.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

2016
SecDef Workshop 2016 Chairs' Welcome & Organization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

2015
Investigating the work practices of network security professionals.
Inf. Comput. Secur., 2015

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

2014
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.
CoRR, 2014

2013
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Malicious Automatically Generated Domain Name Detection Using Stateful-SBB.
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013

2011
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Evol. Intell., 2011

Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.
Appl. Soft Comput., 2011

2010
A methodology for empirical analysis of permission-based security models and its application to android.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Testing Detector Parameterization Using Evolutionary Exploit Generation.
Proceedings of the Applications of Evolutionary Computing, 2009

Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Generating mimicry attacks using genetic programming: A benchmarking study.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

2007
A hierarchical SOM-based intrusion detection system.
Eng. Appl. Artif. Intell., 2007

Evolving Buffer Overflow Attacks with Detector Feedback.
Proceedings of the Applications of Evolutinary Computing, 2007

Automatically Evading IDS Using GP Authored Attacks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

On the Contribution of Preamble to Information Hiding in Mimicry Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Using self-organizing maps to build an attack map for forensic analysis.
Proceedings of the 2006 International Conference on Privacy, 2006

On evolving buffer overflow attacks using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

2005
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.
Proceedings of the Third Annual Conference on Privacy, 2005

Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Proceedings of the Intelligence and Security Informatics, 2005

Generating Representative Traffic for Intrusion Detection System Benchmarking.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

Evolving Successful Stack Overflow Attacks for Vulnerability Testing.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

2003
A Case Study of Three Open Source Security Management Tools.
Proceedings of the Integrated Network Management VII, Managing It All, 2003


  Loading...