Sevil Şen's home > Publications
My Profile at Google Scholar.
Journals, International Conferences & Book Chapters
-
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning
H. Arslan, S. Yilmaz, S. Sen
presented at SmartNets 2023
-
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions
O. Ceviz, P. Sadioglu, S. Sen
arXiv:2306.14281, 2023
-
A Dynamic Trust Management Model for Vehicular Ad Hoc Networks
M. Aslan, S. Sen
Vehicular Communications (Q1), vol. 41, 2023
-
Exploring Placement of Intrusion Detection Systems in RPL-Based Internet of Things
S. Yilmaz, E. Aydogan, S. Sen
arXiv:2303.16561, 2023
-
Assessing the Impact of Mobile Attackers on RPL-Based Internet of Things
C. Dogan, S. Yilmaz, S. Sen
arXiv:2303.16499, 2023
-
Evolving Lightweight Intrusion Detection Systems for RPL-based Internet of Things
A. Deveci, S. Yilmaz, S. Sen
presented at EvoApps 2023
-
Metaheuristic Approaches for Solving Multiobjective Optimization Problems
S. Yilmaz, S. Sen
Comprehensive Metaheuristics: Algorithms and Applications, Chapter 2, 2023
-
Deep Reinforcement Learning Based Flexible Preamble Allocation for RAN Slicing in 5G Networks
A.M. Gedikli, M. Koseoglu, S. Sen
Computer Networks (Q1), 2022
-
Lib2Desc: Automatic Generation of Security-Centric Android App Descriptions using Third-party Libraries
B. Cevik, N. Altiparmak, M. Aksu, S. Sen
International Journal of Information Security (Q2), 2022
-
Analysis of RPL Objective Functions with Security Respective
C. Dogan, S. Yilmaz, S. Sen
presented at SensorNets 2022
In Proc. of the 11th International Conf. on Sensor Networks, pp. 71-80, 2022
-
Analysis of Routing Attacks in FANETs
O. Ceviz, P. Sadioglu, S. Sen
presented at AdhocNets 2022
LNICSTE 428, Springer, 2022
-
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
S. Yilmaz, E. Aydogan, S. Sen
IEEE Transactions on Information Forensics and Security (Q1), 2021
-
Android Security using NLP Techniques: A Review
S. Sen, B. Can
arXiV:2107.03072, 2021
-
Load Balancing for RPL-Based Internet of Things: A Review
D. Pancaroglu, S. Sen
Ad Hoc Networks (Q1), vol. 116, 2021
-
Attention: There is an Inconsistency between Android Permissions and Application Metadata!
H. Alecakir, B. Can, S. Sen
International Journal of Information Security (Q2), 2021 Dataset
-
Familial Classification of Android Malware using Hybrid Analysis
O.F.T. Cavli, S. Sen
presented at ISCTurkey 2020, IEEE
-
Discovering Inconsistencies between Requested Permissions and Application Metadata by using Deep Learning
H. Alecakir, M. Kabukcu, B. Can, S. Sen
presented at ISCTurkey 2020, IEEE
-
A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things
E. Canbalaban, S. Sen
presented at AdHoc-Now 2020, IEEE Dataset
-
Electric Fish Optimization: A New Heuristic Algorithm Inspired by Electrolocation
S. Yilmaz, S. Sen
Neural Computing and Applications (Q1), vol. 32, pp. 11543-11578, 2020 Source Code
-
Efficient Evolutionary Fuzzing for Android Application Installation Process
V. Hatas, S. Sen
presented at QRS 2019, IEEE Link
-
A Central Intrusion Detection System for RPL-Based Industrial Internet of Things
E. Aydogan, S. Yilmaz, S. Sen, I. Butun, S. Forsstrom, M. Gidlund
presented at IEEE WFCS 2019, IEEE Link
-
Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs using Genetic Programming
M. Aslan, S. Sen
presented at EvoApps 2019
LNCS 11454, pp. 413-429, Springer, 2019 Link
-
Early Detection of Botnet Activities using Grammatical Evolution
S. Yilmaz, S. Sen
presented at EvoApps 2019
LNCS 11454, pp. 395-404, Springer, 2019 Link
-
A Novel Multi-Featured Metric for Adaptive Routing in Mobile Ad Hoc Networks
S. Hasdemir, S. Yilmaz, S. Sen
Applied Intelligence, 2019 Link
-
Analysis of Dynamic Code Updating in Android with Security Perspective
A. I. Aysan, F. Sakiz, S. Sen
IET Information Security, Volume 13, Issue 3, pp. 269-277, 2019 Link
-
Analysis of Adversarial Attacks against Traditional Spam Filters
H. B. Ozkan, S. Sen, B. Can
presented at AdhocNets A2CS 2019
-
UpDroid: Updated Android Malware and Its Familial Classification
K. Aktas, S. Sen
Proc. of the 23rd Nordic Conference on Secure IT Systems(NordSec 2018) Dataset
-
Certificate Transparency Conformity Assessment of Top 500 Websites
E. Turan, T. Ergun, S. Sen
Proc. of the 11th International Conference on Information Security & Cryptology (ISCTurkey 2018)
-
An Analysis of the Current State of Security in the Internet of Things
D. Pancaroglu, S. Sen
Proc. of the International Conference on Cyber Security and Computer Science (ICONCS 2018)
-
Coevolution of Mobile Malware and Anti-Malware
S. Sen, E. Aydogan, A.I. Aysan
IEEE Transactions on Information Forensics and Security, 2018 Link
-
SAFEDroid: Using Structural Features for Detecting Android Malwares
S. Sen, A.I. Aysan, J.A. Clark
Proc. of SecureComm 2017, LNICST, vol. 239, pp.255-270, Springer, 2018 Link
-
Attack Analysis in Vehicular Ad Hoc Networks
O. Mintemur, S. Sen
Proc. of the 9th International Conference on Wireless, Mobile Network & Applications (WiMoA), 2017
-
A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV
F. Sakiz, S. Sen
Ad Hoc Networks, Volume 61, pp. 33-50, 2017 Link
-
"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications
A.I. Aysan, S. Sen
Proc. of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 2015
-
GenTrust: A Genetic Trust Management Model for Peer-to-Peer Systems
U. Eray Tahta, S. Sen, A. Burak Can
Applied Soft Computing, vol. 34, pp. 693-70, 2015 Link
-
Automatic Generation of Mobile Malwares Using Genetic Programming
E. Aydogan, S. Sen
presented in : EvoApps 2015, Copenhagen
LNCS 9028, pp. 745-756, Springer, 2015 Link
-
A Survey of Intrusion Detection Systems using Evolutionary Computation
S. Sen
Bio-inspired Computation on Telecommunications, Chapter 4, Elseiver, February 2015 Link
-
Sequence-Based Masquerada Detection for Different User Groups
S. Sen
Security and Communication Networks, vol. 8, issue 7, pp. 1265-1278, 2015 Link
-
Using Instance-weighted Naive Bayes for Adapting Concept Drift in Masquerade Detection
S. Sen
International Journal of Information Security, vol. 13, issue 6, pp. 583-590, Springer, 2014 Link
-
Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming
U.E. Tahta, A.B. Can, S. Sen
presented in : EvoApps 2014, Granada
LNCS 8602, pp. 3-14, Springer, 2014
-
EXPOSURE: a Passive DNS Analysis Service to Detect and Report Malicious Domains
L. Bilge, S. Sen, D. Balzarotti, E. Kirda, C. Kruegel
ACM Transactions on Information and System Security, vol. 16, issue 4, 2014
-
A Lightweight Threshold-Based Improvement on DSDV
R. Abri, S. Sen
LNICST, vol. 129, pp 135-145, Springer, 2014 Link
presented in : AdhocNets 2013, Barcelona
-
How to Profile Users and Masquearaders
S. Sen
presented in : SPTM 2013, Istanbul
-
Feature Selection for Detection of Ad Hoc Flooding Attacks
S. Sen, Z. Dogmus
Advances in Intelligent and Soft Computing, Springer, 2012 Link
-
On Sampling Strategies for Small and Continuous Data with the modeling of GP and ANFIS
S. Sen, E. Sezer, C. Gokceoglu, S. Yagiz
Journal of Intelligent and Fuzzy Systems, 2012 Link
-
Evolutionary Computation Techniques for Intrusion Detection in Mobile Ad Hoc Networks
S. Sen, J.A. Clark
Computer Networks, Volume 55, Issue 15, pp. 3441-3457, 2011 Link
-
Security Threats in Mobile Ad Hoc Networks
S. Sen, J.A. Clark, J.E. Tapiador
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Auerbach Publications, CRC Press, 2011. Book
-
Power-Aware Intrusion Detection on Mobile Ad Hoc Networks
S. Sen, J.A. Clark, J.E. Tapiador
presented in : AdhocNets 2009, Niagara Falls
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Volume 28, Part 1, pp. 224-239, Springer, 2010
-
A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks
S. Sen, J.A. Clark
presented in : ACM WiSec, Zurich
in : Proceedings of ACM WiSec, pp. 95-102, 2009. Link
-
Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
S. Sen, J.A. Clark
presented in : PRICAI 2008, Hanoi
LNAI 5351, pp. 1053-1058, Springer, 2008
-
Intrusion Detection in Mobile Ad Hoc Networks
S. Sen, J.A. Clark
in : Chapter 17, Guide to Wireless Ad Hoc Networks, Springer, 2008. Book
-
Threat Modeling for Mobile Ad Hoc Networks
J.A. Clark, J. Murdoch, J.A. McDermid, S. Sen, H.R. Chivers, Worthington,
Prceedings of the Annual Conference of ITA, 2007.
-
Polynomial Reduction Rules to Decrease the Number of Dummy Arcs in an AoA network
M. Ege, S. Sen
Technical Report, Department of Computer Engineering, Hacettepe University, 2005.
National Conferences
-
Classification with the Electric Fish Optimization Algorithm
S. Yilmaz, S. Sen
IEEE SIU, 2020.
-
Android Malware Detection Based on Runtime Behaviour
K. Aktas, S. Sen
IEEE SIU, 2018.
-
API Call and Permission Based Mobile Malware Detection
A. I. Aysan, S. Sen
IEEE SIU, 2015.
-
Analysis of Machine Learning Methods on Malware Detection
E. Aydogan, S. Sen
IEEE SIU, 2014.
-
A New Approach for Detection of Insider Threats
S. Sen
IEEE SIU, 2013.
-
Destek Vektor Makinalari ile Rota Istemi Taskinlik Saldirilarinin Tespiti
Z. Dogmus, S. Sen
IEEE SIU, 2012.Android Malware Detection Based on Runtime Behaviour
-
Mobil Tasarsiz Aglarda Saldiri Tespiti
S. Sen, J.A. Clark
3. Ag ve Bilgi Guvenligi Ulusal Sempozyumu, 2010.
Copyright notice:
The documents contained here are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
|