2009 |
12 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood,
Malcolm I. Heywood,
Stefan Burschka:
Testing Detector Parameterization Using Evolutionary Exploit Generation.
EvoWorkshops 2009: 105-110 |
2008 |
11 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood:
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
PST 2008: 213-223 |
2007 |
10 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood:
On the Contribution of Preamble to Information Hiding in Mimicry Attacks.
AINA Workshops (1) 2007: 632-638 |
9 | EE | Hilmi Günes Kayacik,
Malcolm I. Heywood,
A. Nur Zincir-Heywood:
Evolving Buffer Overflow Attacks with Detector Feedback.
EvoWorkshops 2007: 11-20 |
2006 |
8 | EE | Hilmi Günes Kayacik,
Malcolm I. Heywood,
A. Nur Zincir-Heywood:
On evolving buffer overflow attacks using genetic programming.
GECCO 2006: 1667-1674 |
7 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood:
Using self-organizing maps to build an attack map for forensic analysis.
PST 2006: 33 |
2005 |
6 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood,
Malcolm I. Heywood:
Evolving Successful Stack Overflow Attacks for Vulnerability Testing.
ACSAC 2005: 225-234 |
5 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood:
Generating Representative Traffic for Intrusion Detection System Benchmarking.
CNSR 2005: 112-117 |
4 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood:
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
ISI 2005: 362-367 |
3 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood,
Malcolm I. Heywood:
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.
PST 2005 |
2004 |
2 | EE | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood,
Malcolm I. Heywood:
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
CNSR 2004: 181-189 |
2003 |
1 | | Hilmi Günes Kayacik,
A. Nur Zincir-Heywood:
A Case Study of Three Open Source Security Management Tools.
Integrated Network Management 2003: 101-104 |