Gökhan Kul

Orcid: 0000-0001-6467-1979

According to our database1, Gökhan Kul authored at least 29 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Reproducible Tutorial on Reproducibility in Database Systems Research.
Proc. VLDB Endow., August, 2024

PACE: A Program Analysis Framework for Continuous Performance Prediction.
ACM Trans. Softw. Eng. Methodol., May, 2024

Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Reliability Evaluation of CNN-enabled Systems in Adversarial Scenarios.
Proceedings of the International Conference on Assured Autonomy, 2024

2023
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems.
Proceedings of the NOMS 2023, 2023

Image Attribute Estimation for Forensic Image Reconstruction from Fragments.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks.
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022

2021
An Analysis of Complexity of Insider Attacks to Databases.
ACM Trans. Manag. Inf. Syst., 2021

Impact Analysis of Training Data Characteristics for Phishing Email Classification.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Guest Editorial: Special Issue on Advances in Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Toward Pinpointing Data Leakage from Advanced Persistent Threats.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

Automated User Experience Testing through Multi-Dimensional Performance Impact Analysis.
Proceedings of the 2nd IEEE/ACM International Conference on Automation of Software Test, 2021

2020
Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
A Survey on the Challenges of Implementing Physical Memory Pools.
J. Internet Serv. Inf. Secur., 2019

The Case for Physical Memory Pools: A Vision Paper.
Proceedings of the Cloud Computing - CLOUD 2019, 2019

2018
Insider Threat on Databases: Modeling and Mitigation Techniques.
PhD thesis, 2018

Similarity Metrics for SQL Query Clustering.
IEEE Trans. Knowl. Data Eng., 2018

Detecting Data Leakage from Databases on Android Apps with Concept Drift.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Complexity of Insider Attacks to Databases.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Summarizing Large Query Logs in Ettu.
CoRR, 2016

Ettu: Analyzing Query Intents in Corporate Databases.
Proceedings of the 25th International Conference on World Wide Web, 2016

2015
Towards a Cyber Ontology for Insider Threats in the Financial Sector.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

A Preliminary Cyber Ontology for Insider Threats in the Financial Sector.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
İnsan ve Makine Bulutları Sinerjisi: Kitle Kaynaklı Çalışma ile Veri Temizleme Örnek Uygulaması.
Proceedings of the 8th Turkish National Software Engineering Symposium, 2014

Utilization of synergetic human-machine clouds: a big data cleaning case.
Proceedings of the 1st International Workshop on CrowdSourcing in Software Engineering, 2014

IEEE 802.11 WLAN based Real Time Indoor Positioning: Literature Survey and Experimental Investigations.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014


  Loading...