Ilker Özçelik

Orcid: 0000-0002-2032-1640

According to our database1, Ilker Özçelik authored at least 14 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion.
DTRAP, 2023

2022
Distributed Denial of Service (DDoS): A History.
IEEE Ann. Hist. Comput., 2022

The Effects of Autoencoders on the Robustness of Deep Learning Models.
Proceedings of the 30th Signal Processing and Communications Applications Conference, 2022

2021
CAPEN: Cryptographic Accumulator based Privacy Preserving Exposure Notification.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

An Overview of Cryptographic Accumulators.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

CryptoRevocate: A Cryptographic Accumulator based Distributed Certificate Revocation List.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
An Overview of Machine Learning Based Approaches in DDoS Detection.
Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020

MARS: Machine learning based Adaptable and Robust Network Management for Software-defined Networks.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2017
Stealthy Domain Generation Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017

2015
Deceiving entropy based DoS detection.
Comput. Secur., 2015

2013
DoS Detection is Easier Now.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Operational system testing for designed in security.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Noise tolerant symbolic learning of Markov models of tunneled protocols.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Security experimentation using operational systems.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011


  Loading...