Sevil Sen

Orcid: 0000-0001-5814-9973

According to our database1, Sevil Sen authored at least 51 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Semi-Decentralized PKI Based on Blockchain With a Stake-Based Reward-Punishment Mechanism.
IEEE Access, 2024

Android Authorship Attribution Using Source Code-Based Features.
IEEE Access, 2024

CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024

2023
A dynamic trust management model for vehicular ad hoc networks.
Veh. Commun., 2023

A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks.
CoRR, 2023

A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions.
CoRR, 2023

Exploring placement of intrusion detection systems in rpl-based internet of things.
CoRR, 2023

Assessing the Impact of Mobile Attackers on RPL-based Internet of Things.
CoRR, 2023

Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning.
Proceedings of the International Conference on Smart Applications, 2023

Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023

2022
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries.
Int. J. Inf. Sec., 2022

Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks.
Comput. Networks, 2022

Analysis of RPL Objective Functions with Security Perspective.
Proceedings of the 11th International Conference on Sensor Networks, 2022

2021
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Attention: there is an inconsistency between android permissions and application metadata!
Int. J. Inf. Sec., 2021

Android Security using NLP Techniques: A Review.
CoRR, 2021

Load balancing for RPL-based Internet of Things: A review.
Ad Hoc Networks, 2021

Analysis of Routing Attacks in FANETs.
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021

2020
Electric fish optimization: a new heuristic algorithm inspired by electrolocation.
Neural Comput. Appl., 2020

A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2019
Analysis of dynamic code updating in Android with security perspective.
IET Inf. Secur., 2019

A novel multi-featured metric for adaptive routing in mobile ad hoc networks.
Appl. Intell., 2019

A Central Intrusion Detection System for RPL-Based Industrial Internet of Things.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019

Efficient Evolutionary Fuzzing for Android Application Installation Process.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Early Detection of Botnet Activities Using Grammatical Evolution.
Proceedings of the Applications of Evolutionary Computation, 2019

Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming.
Proceedings of the Applications of Evolutionary Computation, 2019

2018
Coevolution of Mobile Malware and Anti-Malware.
IEEE Trans. Inf. Forensics Secur., 2018

Android malware detection based on runtime behaviour.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

UpDroid: Updated Android Malware and Its Familial Classification.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV.
Ad Hoc Networks, 2017

SAFEDroid: Using Structural Features for Detecting Android Malwares.
Proceedings of the Security and Privacy in Communication Networks, 2017

2015
Sequence-based masquerade detection for different user groups.
Secur. Commun. Networks, 2015

GenTrust: A genetic trust management model for peer-to-peer systems.
Appl. Soft Comput., 2015

Internet of Things security and privacy: Design methods and optimization.
Ad Hoc Networks, 2015

API call and permission based mobile malware detection (in english).
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Automatic Generation of Mobile Malwares Using Genetic Programming.
Proceedings of the Applications of Evolutionary Computation - 18th European Conference, 2015

"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains.
ACM Trans. Inf. Syst. Secur., 2014

Using instance-weighted naive Bayes for adapting concept drift in masquerade detection.
Int. J. Inf. Sec., 2014

Analysis of machine learning methods on malware detection.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming.
Proceedings of the Applications of Evolutionary Computation - 17th European Conference, 2014

2013
A new approach for detection of insider attacks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

A Lightweight Threshold-Based Improvement on DSDV.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013

2012
On sampling strategies for small and continuous data with the modeling of genetic programming and adaptive neuro-fuzzy inference system.
J. Intell. Fuzzy Syst., 2012

SVM-based detection of ad hoc flooding attacks.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

Feature Selection for Detection of Ad Hoc Flooding Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks.
Comput. Networks, 2011

2009
Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

A grammatical evolution approach to intrusion detection on mobile ad hoc networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Power-Aware Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008


  Loading...