Ziya Alper Genç

Orcid: 0000-0001-7198-7437

According to our database1, Ziya Alper Genç authored at least 17 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Practical Exchange for Unique Digital Goods.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

2020
Analysis, Detection, and Prevention of Cryptographic Ransomware.
PhD thesis, 2020

"The simplest protocol for oblivious transfer" revisited.
Inf. Process. Lett., 2020

Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

On Deception-Based Protection Against Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique.
Proceedings of the Third Central European Cybersecurity Conference, 2019

A game of "Cut and Mouse": bypassing antivirus by simulating user inputs.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols.
Wirel. Pers. Commun., 2018

Next Generation Cryptographic Ransomware.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

No Random, No Ransom: A Key to Stop Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware.
Proceedings of the Advances in Cybersecurity, 2017

2015
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer.
Secur. Commun. Networks, 2015

2013
Examination of a New Defense Mechanism: Honeywords.
IACR Cryptol. ePrint Arch., 2013


  Loading...