Güneş Kayacık

Menu

Publications

The articles linked here are pre-print versions, which are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Journal Papers

  1. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "Evolutionary Computation as an Artificial Attacker: Generating Evasion Attacks for Detector Vulnerability Testing", Evolutionary Intelligence Journal, ISSN: 1864-5909, Springer, 2011.
  2. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "Can a Good Offense be a Good Defense? Vulnerability Testing of Anomaly Detectors Through an Artificial Arms Race", Applied Soft Computing Journal, ISSN:1568-4946, Elsevier, 2010.
  3. Kayacik G. H., Zincir-Heywood A. N., Heywood M. I.,"Intrusion Detection Systems", The Encyclopaedia of Multimedia Technology and Networking, Idea Group, April 2005, ISBN 1-59140-561-0.<
  4. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I.,"A Hierarchical SOM-based Intrusion Detection System", International Scientific Journal Engineering Applications of Artificial Intelligence, ISSN:0952-1976, Volume 20, Issue 4, Pages 439-451, Elsevier, June 2007.

Conference Papers

  1. Micallef N., Kayacik H. G., Just M., Baillie L., Aspinall D., "Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices", Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom-2015), March 2015.
  2. Kayacik H. G., Just M., Baillie L., Aspinall D., Micallef N., "Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors", Proceedings of the 3rd Mobile Security Technologies Workshop , Held as part of the IEEE S&P Symposium, (MoST-2014), May 2014.
  3. Micallef N., Just M., Baillie L., Kayacik H. G., "Stop Questioning Me!: Towards Optimizing User Involvement During Data Collection on Mobile Devices", Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services (MobileHCI-2013), August 2013.
  4. Micallef N., Just M., Baillie L., Kayacik H. G., "Non-intrusive and Transparent Authentication on Smart Phones", Proceedings of the 6th International Conference on Trust and Trustworthy Computing (TRUST-2013), Lecture Notes in Computer Science Volume 7904, June 2013. Received Best Poster Award
  5. Haddadi F., Zincir-Heywood A. N., Heywood M. I., Kayacik H. G., "Malicious Automatically Generated Domain Name Detection Using Stateful-SBB", European Conference on the Applications of Evolutionary Computation 2013
  6. Raman P., Kayacik H. G., Somayaji A., "Understanding Data Leak Prevention", Proceedings of the 6th Annual Symposium on Information Assurance (ASIA-2011), Albany, USA, June 2011.
  7. Barrera D., Kayacik H. G., Van Oorschot P. C., Somayaji A., "A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android", Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS-2010), Chicago, USA, October 2010.
  8. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., Burschka S., "Optimizing Anomaly Detector Deployment under Evolutionary Black-box Vulnerability Testing", Proceedings of the IEEE Computational Intelligence for Security and Defense Applications (CISDA-2009), Ottawa, Ontario, Canada, July 2009.
  9. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., Burschka S., "Testing Detector Parameterization using Evolutionary Exploit Generation", Proceedings of the 6th European Workshop on the Application of Nature inspired Techniques for Telecommunication Networks and other Parallel and Distributed Systems (EvoCOMNET-2009), Germany, April 2009.
  10. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., Burschka S., "Generating Mimicry Attacks using Genetic Programming: A Benchmarking Study", Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security (CICS-2009), Tennessee, USA, March 2009.
  11. Kayacik H. G., Zincir-Heywood A. N., "Mimicry Attacks Demystified: What Can Attackers Do To Evade Detection?", Proceedings of the IEEE 6th International Conference on Privacy, Security and Trust (PST-2008), Fredericton, New Brunswick, Canada, October 2008. Received Best Paper Award
  12. Kayacik H. G., Zincir-Heywood A. N., "On the Contribution of Preamble to Information Hiding in Mimicry Attacks", Proceedings of the 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS-07), Niagara Falls, Canada, April 2007.
  13. Kayacik H. G., Heywood M. I., Zincir-Heywood A. N., "Evolving Buffer Overflow Attacks with Detector Feedback", Proceedings of the 4th European Workshop on the application of Nature-inspired techniques to Telecommunication Networks and other Connected Systems (EvoCOMNET-2007), Valencia, Spain, April 2007.
  14. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "Automatically Evading IDS Using GP Authored Attacks", Proceedings of the IEEE Computational Intelligence for Security and Defense Applications (CISDA-2007), April 2007.
  15. Kayacik H. G., Heywood M. I., Zincir-Heywood A. N., "On Evolving Buffer Overflow Attacks using Genetic Programming", Proceedings of the 11th Genetic and Evolutionary Computation Conference (GECCO-2006), Seattle, USA, July 2006.
  16. Kayacik H. G., Zincir-Heywood A. N., "Using Self-Organizing Maps to Build an Attack Map for Forensic Analysis", Proceedings of the ACM 3rd International Conference on Privacy, Security and Trust (PST-2006), Markham, Ontario, Canada, October 2006.
  17. Kayacik H. G., Heywood M. I., Zincir-Heywood A. N., "Evolving Successful Stack Overflow Attacks for Vulnerability Testing", Proceedings of the IEEE 21st Annual Computer Security Applications Conference (ACSAC-2005), December 2005.
  18. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets", Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST-2005), October 2005.
  19. Kayacik H. G., Zincir-Heywood A. N., "Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms", Proceedings of the IEEE Intelligence and Security Informatics Conference (ISI-2005), May 2005.
  20. Kayacik H. G., Zincir-Heywood, A. N., "Generating Representative Traffic for Intrusion Detection System Benchmarking", Proceedings of the IEEE Communication Networks and Services Research Conference (CNSR-2005), May 2005.
  21. Kayacik, H. G., Zincir-Heywood A. N., Heywood M. I., "On Dataset Biases in a Learning System with Minimum a Priori Information Intrusion Detection", Proceedings of the IEEE Communication Networks and Services Research (CNSR-2004), May 2004. Received Best Paper Award
  22. Kayacik H. G., Zincir-Heywood A. N., "Case study of three open source security management tools", Proceedings of the IFIP/IEEE Eighth International Symposium on Integrated Network Management (IM-2003), July 2003.
  23. Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "On the capability of SOM based intrusion detection systems", Proceedings of the 2003 IEEE International Joint Conference on Neural Networks (IJCNN-2003), July 2003
  24. Kayacik H. G., Atakan F., "Application of Mobile Agents in Business to Business E-Commerce and Supply Chain Management", Proceedings of the 7th Internet in Turkey Conference (INET-TR-2001), November 2001.
  25. Kayacik H. G., Atakan F., Zincir-Heywood N., Eren S., "E-Commerce: What makes the difference for developing countries?", Proceedings of the International Management Development Association, Tenth Annual World Business Congress (IMDA-2001), July 2001.
  26. Kayacik H. G., Atakan F., Zincir-Heywood N., Eren S., "E-Commerce: A Case Study of Turkey", Proceedings of the 3rd International Conference on Telecommunications and Electronic Commerce (ICTEC-2000), November 2000.