Hilmi Günes Kayacik
According to our database1,
Hilmi Günes Kayacik
authored at least 28 papers
between 2003 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on kayacik.ca
-
on dl.acm.org
On csauthors.net:
Bibliography
2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
2016
Proceedings of the Genetic and Evolutionary Computation Conference, 2016
2015
Inf. Comput. Secur., 2015
Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015
Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015
2014
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.
CoRR, 2014
2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013
2011
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Evol. Intell., 2011
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.
Appl. Soft Comput., 2011
2010
A methodology for empirical analysis of permission-based security models and its application to android.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Applications of Evolutionary Computing, 2009
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
2007
Proceedings of the Applications of Evolutinary Computing, 2007
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
2005
Proceedings of the Third Annual Conference on Privacy, 2005
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
2003
A Case Study of Three Open Source Security Management Tools.
Proceedings of the Integrated Network Management VII, Managing It All, 2003