Sevil Şen's home > Publications

My Profile at Google Scholar.


Journals, International Conferences & Book Chapters

  1. A Novel Federated Learning-Based IDS for Enhancing UAVs Privacy and Security
    O. Ceviz, S. Sen, P. Sadioglu
    Internet of Things (Q1), Elseiver, 2025
     
  2. Exploring and Enhancing Placement of IDS in RPL: A Federated Learning-Based Approach
    S. Yilmaz, S. Sen, E. Aydogan
    IEEE Internet of Things (Q1), 2025
     
  3. Distributed Intrusion Detection in Dynamic Networks of UAVs using Few-Shot Federated Learning
    O. Ceviz, S. Sen, P. Sadioglu
    presented at SecureComm 2024
     
  4. A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions.
    O. Ceviz, S. Sen, P. Sadioglu
    IEEE Communications Surveys & Tutorials (Q1), 2024
     
  5. CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution
    A. Deveci, S. Yilmaz, S., S. Sen
    presented at IOTSMS 2024
     
  6. A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism
    E. Turan, S. Sen, T. Ergun
    IEEE Access, 2024
     
  7. Android Authorship Attribution Using Source Code-Based Features
    E. Aydogan, S. Sen
    IEEE Access, 12, 6569-6589, 2024
     
  8. Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning
    H. Arslan, S. Yilmaz, S. Sen
    presented at SmartNets 2023
     
  9. A Dynamic Trust Management Model for Vehicular Ad Hoc Networks
    M. Aslan, S. Sen
    Vehicular Communications (Q1), vol. 41, 2023
     
  10. Assessing the Impact of Mobile Attackers on RPL-Based Internet of Things
    C. Dogan, S. Yilmaz, S. Sen
    arXiv:2303.16499, 2023
     
  11. Evolving Lightweight Intrusion Detection Systems for RPL-based Internet of Things
    A. Deveci, S. Yilmaz, S. Sen
    presented at EvoApps 2023
     
  12. Metaheuristic Approaches for Solving Multiobjective Optimization Problems
    S. Yilmaz, S. Sen
    Comprehensive Metaheuristics: Algorithms and Applications, Chapter 2, 2023
     
  13. Deep Reinforcement Learning Based Flexible Preamble Allocation for RAN Slicing in 5G Networks
    A.M. Gedikli, M. Koseoglu, S. Sen
    Computer Networks (Q1), 2022
     
  14. Lib2Desc: Automatic Generation of Security-Centric Android App Descriptions using Third-party Libraries
    B. Cevik, N. Altiparmak, M. Aksu, S. Sen
    International Journal of Information Security (Q2), 2022
     
  15. Analysis of RPL Objective Functions with Security Respective
    C. Dogan, S. Yilmaz, S. Sen
    presented at SensorNets 2022
    In Proc. of the 11th International Conf. on Sensor Networks, pp. 71-80, 2022

     
  16. Analysis of Routing Attacks in FANETs
    O. Ceviz, P. Sadioglu, S. Sen
    presented at AdhocNets 2022
    LNICSTE 428, Springer, 2022

     
  17. A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    S. Yilmaz, E. Aydogan, S. Sen
    IEEE Transactions on Information Forensics and Security (Q1), 2021
     
  18. Android Security using NLP Techniques: A Review
    S. Sen, B. Can
    arXiV:2107.03072, 2021
     
  19. Load Balancing for RPL-Based Internet of Things: A Review
    D. Pancaroglu, S. Sen
    Ad Hoc Networks (Q1), vol. 116, 2021
     
  20. Attention: There is an Inconsistency between Android Permissions and Application Metadata!
    H. Alecakir, B. Can, S. Sen
    International Journal of Information Security (Q2), 2021 Dataset
     
  21. Familial Classification of Android Malware using Hybrid Analysis
    O.F.T. Cavli, S. Sen
    presented at ISCTurkey 2020, IEEE
     
  22. Discovering Inconsistencies between Requested Permissions and Application Metadata by using Deep Learning
    H. Alecakir, M. Kabukcu, B. Can, S. Sen
    presented at ISCTurkey 2020, IEEE
     
  23. A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things
    E. Canbalaban, S. Sen
    presented at AdHoc-Now 2020, IEEE Dataset
     
  24. Electric Fish Optimization: A New Heuristic Algorithm Inspired by Electrolocation
    S. Yilmaz, S. Sen
    Neural Computing and Applications (Q1), vol. 32, pp. 11543-11578, 2020 Source Code
     
  25. Efficient Evolutionary Fuzzing for Android Application Installation Process
    V. Hatas, S. Sen
    presented at QRS 2019, IEEE  Link
     
  26. A Central Intrusion Detection System for RPL-Based Industrial Internet of Things
    E. Aydogan, S. Yilmaz, S. Sen, I. Butun, S. Forsstrom, M. Gidlund
    presented at IEEE WFCS 2019, IEEE  Link
     
  27. Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs using Genetic Programming
    M. Aslan, S. Sen
    presented at EvoApps 2019
    LNCS 11454, pp. 413-429, Springer, 2019
    Link
     
  28. Early Detection of Botnet Activities using Grammatical Evolution
    S. Yilmaz, S. Sen
    presented at EvoApps 2019
    LNCS 11454, pp. 395-404, Springer, 2019
    Link
     
  29. A Novel Multi-Featured Metric for Adaptive Routing in Mobile Ad Hoc Networks
    S. Hasdemir, S. Yilmaz, S. Sen
    Applied Intelligence, 2019 Link
     
  30. Analysis of Dynamic Code Updating in Android with Security Perspective
    A. I. Aysan, F. Sakiz, S. Sen
    IET Information Security, Volume 13, Issue 3, pp. 269-277, 2019 Link
     
  31. Analysis of Adversarial Attacks against Traditional Spam Filters
    H. B. Ozkan, S. Sen, B. Can
    presented at AdhocNets A2CS 2019
     
  32. UpDroid: Updated Android Malware and Its Familial Classification
    K. Aktas, S. Sen
    Proc. of the 23rd Nordic Conference on Secure IT Systems(NordSec 2018) Dataset
     
  33. Certificate Transparency Conformity Assessment of Top 500 Websites
    E. Turan, T. Ergun, S. Sen
    Proc. of the 11th International Conference on Information Security & Cryptology (ISCTurkey 2018)
     
  34. An Analysis of the Current State of Security in the Internet of Things
    D. Pancaroglu, S. Sen
    Proc. of the International Conference on Cyber Security and Computer Science (ICONCS 2018)
     
  35. Coevolution of Mobile Malware and Anti-Malware
    S. Sen, E. Aydogan, A.I. Aysan
    IEEE Transactions on Information Forensics and Security, 2018 Link
     
  36. SAFEDroid: Using Structural Features for Detecting Android Malwares
    S. Sen, A.I. Aysan, J.A. Clark
    Proc. of SecureComm 2017, LNICST, vol. 239, pp.255-270, Springer, 2018 Link
     
  37. Attack Analysis in Vehicular Ad Hoc Networks
    O. Mintemur, S. Sen
    Proc. of the 9th International Conference on Wireless, Mobile Network & Applications (WiMoA), 2017
     
  38. A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV
    F. Sakiz, S. Sen
    Ad Hoc Networks, Volume 61, pp. 33-50, 2017 Link
     
  39. "Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications
    A.I. Aysan, S. Sen
    Proc. of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 2015
     
  40. GenTrust: A Genetic Trust Management Model for Peer-to-Peer Systems
    U. Eray Tahta, S. Sen, A. Burak Can
    Applied Soft Computing, vol. 34, pp. 693-70, 2015 Link
     
  41. Automatic Generation of Mobile Malwares Using Genetic Programming
    E. Aydogan, S. Sen
    presented in : EvoApps 2015, Copenhagen
    LNCS 9028, pp. 745-756, Springer, 2015
    Link
     
  42. A Survey of Intrusion Detection Systems using Evolutionary Computation
    S. Sen
    Bio-inspired Computation on Telecommunications, Chapter 4, Elseiver, February 2015 Link
     
  43. Sequence-Based Masquerada Detection for Different User Groups
    S. Sen
    Security and Communication Networks, vol. 8, issue 7, pp. 1265-1278, 2015 Link
     
  44. Using Instance-weighted Naive Bayes for Adapting Concept Drift in Masquerade Detection
    S. Sen
    International Journal of Information Security, vol. 13, issue 6, pp. 583-590, Springer, 2014 Link
     
  45. Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming
    U.E. Tahta, A.B. Can, S. Sen
    presented in : EvoApps 2014, Granada
    LNCS 8602, pp. 3-14, Springer, 2014

     
  46. EXPOSURE: a Passive DNS Analysis Service to Detect and Report Malicious Domains
    L. Bilge, S. Sen, D. Balzarotti, E. Kirda, C. Kruegel
    ACM Transactions on Information and System Security, vol. 16, issue 4, 2014
     
  47. A Lightweight Threshold-Based Improvement on DSDV
    R. Abri, S. Sen
    LNICST, vol. 129, pp 135-145, Springer, 2014 Link
    presented in : AdhocNets 2013, Barcelona
     
  48. How to Profile Users and Masquearaders
    S. Sen
    presented in : SPTM 2013, Istanbul
     
  49. Feature Selection for Detection of Ad Hoc Flooding Attacks
    S. Sen, Z. Dogmus
    Advances in Intelligent and Soft Computing, Springer, 2012 Link
     
  50. On Sampling Strategies for Small and Continuous Data with the modeling of GP and ANFIS
    S. Sen, E. Sezer, C. Gokceoglu, S. Yagiz
    Journal of Intelligent and Fuzzy Systems, 2012 Link
     
  51. Evolutionary Computation Techniques for Intrusion Detection in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    Computer Networks, Volume 55, Issue 15, pp. 3441-3457, 2011 Link
     
  52. Security Threats in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark, J.E. Tapiador
    Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Auerbach Publications, CRC Press, 2011. Book
     
  53. Power-Aware Intrusion Detection on Mobile Ad Hoc Networks
    S. Sen, J.A. Clark, J.E. Tapiador
    presented in : AdhocNets 2009, Niagara Falls
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
    Volume 28, Part 1, pp. 224-239, Springer, 2010

     
  54. A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    presented in : ACM WiSec, Zurich
    in : Proceedings of ACM WiSec, pp. 95-102, 2009. Link

     
  55. Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    presented in : PRICAI 2008, Hanoi
    LNAI 5351, pp. 1053-1058, Springer, 2008

     
  56. Intrusion Detection in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    in : Chapter 17, Guide to Wireless Ad Hoc Networks, Springer, 2008. Book
     
  57. Threat Modeling for Mobile Ad Hoc Networks
    J.A. Clark, J. Murdoch, J.A. McDermid, S. Sen, H.R. Chivers, Worthington,
    Prceedings of the Annual Conference of ITA, 2007.
     
  58. Polynomial Reduction Rules to Decrease the Number of Dummy Arcs in an AoA network
    M. Ege, S. Sen
    Technical Report, Department of Computer Engineering, Hacettepe University, 2005.
     


National Conferences

  1. Classification with the Electric Fish Optimization Algorithm
    S. Yilmaz, S. Sen
    IEEE SIU, 2020.
     
  2. Android Malware Detection Based on Runtime Behaviour
    K. Aktas, S. Sen
    IEEE SIU, 2018.
     
  3. API Call and Permission Based Mobile Malware Detection
    A. I. Aysan, S. Sen
    IEEE SIU, 2015.
     
  4. Analysis of Machine Learning Methods on Malware Detection
    E. Aydogan, S. Sen
    IEEE SIU, 2014.
     
  5. A New Approach for Detection of Insider Threats
    S. Sen
    IEEE SIU, 2013.
     
  6. Destek Vektor Makinalari ile Rota Istemi Taskinlik Saldirilarinin Tespiti
    Z. Dogmus, S. Sen
    IEEE SIU, 2012.Android Malware Detection Based on Runtime Behaviour
     
  7. Mobil Tasarsiz Aglarda Saldiri Tespiti
    S. Sen, J.A. Clark
    3. Ag ve Bilgi Guvenligi Ulusal Sempozyumu, 2010.
     


Copyright notice:

The documents contained here are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.