Hilmi Günes Kayacik
According to our database1, Hilmi Günes Kayacik authored at least 27 papers between 2003 and 2017.
Legend:Book In proceedings Article PhD thesis Other
Evolutionary computation in network management and security: GECCO 2017 tutorial.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
SecDef Workshop 2016 Chairs' Welcome & Organization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016
Investigating the work practices of network security professionals.
Inf. & Comput. Security, 2015
Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015
Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Malicious Automatically Generated Domain Name Detection Using Stateful-SBB.
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Evolutionary Intelligence, 2011
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.
Appl. Soft Comput., 2011
A methodology for empirical analysis of permission-based security models and its application to android.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Testing Detector Parameterization Using Evolutionary Exploit Generation.
Proceedings of the Applications of Evolutionary Computing, 2009
Generating mimicry attacks using genetic programming: A benchmarking study.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
A hierarchical SOM-based intrusion detection system.
Eng. Appl. Artif. Intell., 2007
Evolving Buffer Overflow Attacks with Detector Feedback.
Proceedings of the Applications of Evolutinary Computing, 2007
Automatically Evading IDS Using GP Authored Attacks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
On the Contribution of Preamble to Information Hiding in Mimicry Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Using self-organizing maps to build an attack map for forensic analysis.
Proceedings of the 2006 International Conference on Privacy, 2006
On evolving buffer overflow attacks using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.
Proceedings of the Third Annual Conference on Privacy, 2005
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Proceedings of the Intelligence and Security Informatics, 2005
Generating Representative Traffic for Intrusion Detection System Benchmarking.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Evolving Successful Stack Overflow Attacks for Vulnerability Testing.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
A Case Study of Three Open Source Security Management Tools.
Proceedings of the Integrated Network Management VII, Managing It All, 2003