Publications
- S. Sen, A.I. Aysan, J.A. Clark, SAFEDroid: Using Structural Features for Detecting Android Malwares,Proc. of SecureComm (SePrIoT), 2017.
- O. Mintemur, S. Sen, Attack Analysis in Vehicular Ad Hoc Networks,Proc. of the 9th International Conference on Wireless, Mobile Network & Applications (WiMoA), 2017.
- F. Sakiz, S. Sen, A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV, Ad Hoc Networks, Volume 61, pp. 33-50, 2017.
- A. I. Aysan, S. Sen, "Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications,Proceedings of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 2015.
- A. I. Aysan, S. Sen, API Call and Permission Based Mobile Malware Detection, IEEE SIU, 2015.
- S. Sen, Sequence-Based Masquerada Detection for Different User Groups, Security and Communication Networks, vol. 8, issue 7, pp. 1265-1278, 2015
- S. Sen, A Survey of Intrusion Detection Systems using Evolutionary Computation, Bio-inspired Computation on Telecommunications, Chapter 4, Elseiver, February 2015
- U. Eray Tahta, S. Sen, A. Burak Can, GenTrust: A Genetic Trust Management Model for Peer-to-Peer Systems, Applied Soft Computing, vol. 34, pp. 693-704, 2015
- E. Aydogan, S. Sen, Automatic Generation of Mobile Malwares Using Genetic Programming, presented in : EvoApps 2015, Copenhagen LNCS 9028, pp. 745-756, Springer, 2015
- P. Aktaş, H. Sever and M. Aydos,A Role-Based Privacy Preserving Medical Data Publication, The 2nd International Conference on e-Health and Telemedicine, 2014.
- S. Sen, Using Instance-weighted Naive Bayes for Adapting Concept Drift in Masquerade Detection, International Journal of Information Security, vol. 13, issue 6, pp. 583-590, Springer, 2014
- U.E. Tahta, A.B. Can, S. Sen, Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming, presented in : EvoApps 2014, Granada LNCS 8602, pp. 3-14, Springer, 2014
- L. Bilge, S. Sen, D. Balzarotti, E. Kirda, C. Kruegel,EXPOSURE: a Passive DNS Analysis Service to Detect and Report Malicious Domains, ACM Transactions on Information and System Security, vol. 16, issue 4, 2014
- E. Aydogan, S. Sen, Analysis of Machine Learning Methods on Malware Detection, IEEE SIU, 2014.
- R. Abri, S. Sen, A Lightweight Threshold-Based Improvement on DSDV, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), vol. 129, pp 135-145, Springer, 2014
- S. Sen, How to Profile Users and Masquearaders,SPTM 2013, Istanbul
- A. B. Can, B. Bhargava, SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems, IEEE Transactions on Dependable and Secure Computing, Vol. 10, No. 1, pp. 14-27, Jan.-Feb. 2013
- S. Sen, E. Sezer, C. Gokceoglu, S. Yagiz, On Sampling Strategies for Small and Continuous Data with the modeling of GP and ANFIS, Journal of Intelligent and Fuzzy Systems, 2012
- L. Ertaul, G. Saldamlı, M.Aydos, Analyzing homomorphic encryption schemes in securing wireless sensor Networks, Submitted to: Computer Communications Elsevier. July 2012
- S. Sen, Z. Dogmus, Feature Selection for Detection of Ad Hoc Flooding Attacks, Advances in Intelligent and Soft Computing, Springer, 2012
- Z. Dogmus, S. Sen, Destek Vektor Makinalari ile Rota Istemi Taskinlik Saldirilarinin Tespiti, IEEE SIU, 2012.
- H. Akın, G. Saldamlı and M. Aydos. Comparing partial and Full Return Spectral Methods, Pamukkale University Journal of Engineering Sciences. October 2012 pages:47-53
- K. Sarıkaya, A. B. Can, Password-based Client Authentication for SSL/TLS Using ElGamal and Chebyshev Polynomials, AICT 2011
- S. Sen, J.A. Clark, J.E. Tapiador, Security Threats in Mobile Ad Hoc Networks,Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, CRC Press, 2011
- S. Sen, J.A. Clark, J.E. Tapiador, Power-Aware Intrusion Detection on Mobile Ad Hoc Networks, AdhocNets 2009, Niagara Falls
- S. Sen, J.A. Clark, Evolutionary Computation Techniques for Intrusion Detection in Mobile Ad Hoc Networks, Computer Networks, Volume 55, Issue 15, pp. 3441-3457, 2011
- A.B. Can, B. Bhargava, Anonymous Access to Trust Information Using k-anonymity Chord, The Second International Conference on Advances in P2P Systems (AP2PS), 2010
- H. Temucin, A.B. Can, File Encryption and Decryption using Graphics Processor Units, 4th International Information Security and Cryptology Conference, 2010
- S. Sen, J.A. Clark, A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks, ACM WiSec, Zurich ,2009
- M. Önkol, M.Ö. Efe, Experimental Model Based Nonlinear Control Algorithms for a Quadrotor Unmanned Vehicle, 2nd Int. Symposium on Unmanned Aerial Vehicles, June 8-10, Reno, Nevada, U.S.A., 2009.
- M. Çetin ve M. Aydos, Using IEEE 802.1x Standart in Security of Electronic Health Records, Submitted to: 5th International Symposium on Electrical and Computer Systems, 2008
Hacettepe University Information Security Research Lab.
06800 Beytepe Ankara