Share This Author
A methodology for empirical analysis of permission-based security models and its application to android
- David Barrera, H. G. Kayacik, P. V. Oorschot, Anil Somayaji
- Computer ScienceCCS '10
- 4 October 2010
TLDR
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer SciencePST
- 2005
TLDR
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
- H. G. Kayacik, Mike Just, L. Baillie, D. Aspinall, Nicholas Micallef
- Computer ScienceArXiv
- 28 October 2014
TLDR
Intrusion Detection Systems
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer Science
- 2008
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC ©…
A hierarchical SOM-based intrusion detection system
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer ScienceEng. Appl. Artif. Intell.
- 1 June 2007
On evolving buffer overflow attacks using genetic programming
- H. G. Kayacik, M. Heywood, A. N. Zincir-Heywood
- Computer ScienceGECCO '06
- 8 July 2006
TLDR
Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking
- Nicholas Micallef, Mike Just, L. Baillie, M. Halvey, H. G. Kayacik
- Computer ScienceMobileHCI
- 24 August 2015
TLDR
Using self-organizing maps to build an attack map for forensic analysis
- H. G. Kayacik, A. N. Zincir-Heywood
- Computer SciencePST
- 30 October 2006
TLDR
Automatically Evading IDS Using GP Authored Attacks
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer ScienceIEEE Symposium on Computational Intelligence in…
- 1 April 2007
TLDR
Understanding Data Leak Prevention
- Preeti Raman, H. G. Kayacik, Anil Somayaji
- Computer Science
- 2011
TLDR
...
...