dblp.uni-trier.dewww.uni-trier.de

Hilmi Günes Kayacik

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
12EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka: Testing Detector Parameterization Using Evolutionary Exploit Generation. EvoWorkshops 2009: 105-110
2008
11EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? PST 2008: 213-223
2007
10EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: On the Contribution of Preamble to Information Hiding in Mimicry Attacks. AINA Workshops (1) 2007: 632-638
9EEHilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood: Evolving Buffer Overflow Attacks with Detector Feedback. EvoWorkshops 2007: 11-20
2006
8EEHilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood: On evolving buffer overflow attacks using genetic programming. GECCO 2006: 1667-1674
7EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Using self-organizing maps to build an attack map for forensic analysis. PST 2006: 33
2005
6EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood: Evolving Successful Stack Overflow Attacks for Vulnerability Testing. ACSAC 2005: 225-234
5EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Generating Representative Traffic for Intrusion Detection System Benchmarking. CNSR 2005: 112-117
4EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. ISI 2005: 362-367
3EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood: Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. PST 2005
2004
2EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood: On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection. CNSR 2004: 181-189
2003
1 Hilmi Günes Kayacik, A. Nur Zincir-Heywood: A Case Study of Three Open Source Security Management Tools. Integrated Network Management 2003: 101-104

Coauthor Index

1Stefan Burschka [12]
2Malcolm I. Heywood [2] [3] [6] [8] [9] [12]
3A. Nur Zincir-Heywood [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)