Kaan Onarlioglu
Orcid: 0009-0003-7832-5884
According to our database1,
Kaan Onarlioglu
authored at least 26 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010