default search action
Hilmi Günes Kayacik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c23]Nur Zincir-Heywood, Günes Kayacik:
Evolutionary computation in network management and security: GECCO 2017 tutorial. GECCO (Companion) 2017: 1094-1112 - 2016
- [c22]Günes Kayacik, Frank Moore:
SecDef Workshop 2016 Chairs' Welcome & Organization. GECCO (Companion) 2016: 1069-1070 - 2015
- [j4]Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Investigating the work practices of network security professionals. Inf. Comput. Secur. 23(3): 347-367 (2015) - [c21]Nicholas Micallef, Mike Just, Lynne Baillie, Martin Halvey, Hilmi Günes Kayacik:
Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking. MobileHCI 2015: 284-294 - [c20]Nicholas Micallef, Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall:
Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices. PerCom 2015: 189-197 - 2014
- [i1]Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef:
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors. CoRR abs/1410.7743 (2014) - 2013
- [c19]Fariba Haddadi, Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Malicious Automatically Generated Domain Name Detection Using Stateful-SBB. EvoApplications 2013: 529-539 - [c18]Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Stop questioning me!: towards optimizing user involvement during data collection on mobile devices. Mobile HCI 2013: 588-593 - [c17]Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract). TRUST 2013: 271-272 - 2011
- [j3]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Appl. Soft Comput. 11(7): 4366-4383 (2011) - [j2]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evol. Intell. 4(4): 243-266 (2011) - 2010
- [c16]David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji:
A methodology for empirical analysis of permission-based security models and its application to android. CCS 2010: 73-84
2000 – 2009
- 2009
- [c15]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka:
Generating mimicry attacks using genetic programming: A benchmarking study. CICS 2009: 136-143 - [c14]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka:
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing. CISDA 2009: 1-8 - [c13]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka:
Testing Detector Parameterization Using Evolutionary Exploit Generation. EvoWorkshops 2009: 105-110 - 2008
- [c12]Hilmi Günes Kayacik, Nur Zincir-Heywood:
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? PST 2008: 213-223 - 2007
- [j1]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
A hierarchical SOM-based intrusion detection system. Eng. Appl. Artif. Intell. 20(4): 439-451 (2007) - [c11]Hilmi Günes Kayacik, Nur Zincir-Heywood:
On the Contribution of Preamble to Information Hiding in Mimicry Attacks. AINA Workshops (1) 2007: 632-638 - [c10]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Automatically Evading IDS Using GP Authored Attacks. CISDA 2007: 153-160 - [c9]Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood:
Evolving Buffer Overflow Attacks with Detector Feedback. EvoWorkshops 2007: 11-20 - 2006
- [c8]Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood:
On evolving buffer overflow attacks using genetic programming. GECCO 2006: 1667-1674 - [c7]Hilmi Günes Kayacik, Nur Zincir-Heywood:
Using self-organizing maps to build an attack map for forensic analysis. PST 2006: 33 - 2005
- [c6]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Evolving Successful Stack Overflow Attacks for Vulnerability Testing. ACSAC 2005: 225-234 - [c5]Hilmi Günes Kayacik, Nur Zincir-Heywood:
Generating Representative Traffic for Intrusion Detection System Benchmarking. CNSR 2005: 112-117 - [c4]Hilmi Günes Kayacik, Nur Zincir-Heywood:
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. ISI 2005: 362-367 - [c3]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. PST 2005 - 2004
- [c2]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection. CNSR 2004: 181-189 - 2003
- [c1]Hilmi Günes Kayacik, Nur Zincir-Heywood:
A Case Study of Three Open Source Security Management Tools. Integrated Network Management 2003: 101-104
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint