Sevil Şen's home > Publications

My Profile at Google Scholar.


Journals, International Conferences & Book Chapters

  1. Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning
    H. Arslan, S. Yilmaz, S. Sen
    presented at SmartNets 2023
     
  2. A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions
    O. Ceviz, P. Sadioglu, S. Sen
    arXiv:2306.14281, 2023
     
  3. A Dynamic Trust Management Model for Vehicular Ad Hoc Networks
    M. Aslan, S. Sen
    Vehicular Communications (Q1), vol. 41, 2023
     
  4. Exploring Placement of Intrusion Detection Systems in RPL-Based Internet of Things
    S. Yilmaz, E. Aydogan, S. Sen
    arXiv:2303.16561, 2023
     
  5. Assessing the Impact of Mobile Attackers on RPL-Based Internet of Things
    C. Dogan, S. Yilmaz, S. Sen
    arXiv:2303.16499, 2023
     
  6. Evolving Lightweight Intrusion Detection Systems for RPL-based Internet of Things
    A. Deveci, S. Yilmaz, S. Sen
    presented at EvoApps 2023
     
  7. Metaheuristic Approaches for Solving Multiobjective Optimization Problems
    S. Yilmaz, S. Sen
    Comprehensive Metaheuristics: Algorithms and Applications, Chapter 2, 2023
     
  8. Deep Reinforcement Learning Based Flexible Preamble Allocation for RAN Slicing in 5G Networks
    A.M. Gedikli, M. Koseoglu, S. Sen
    Computer Networks (Q1), 2022
     
  9. Lib2Desc: Automatic Generation of Security-Centric Android App Descriptions using Third-party Libraries
    B. Cevik, N. Altiparmak, M. Aksu, S. Sen
    International Journal of Information Security (Q2), 2022
     
  10. Analysis of RPL Objective Functions with Security Respective
    C. Dogan, S. Yilmaz, S. Sen
    presented at SensorNets 2022
    In Proc. of the 11th International Conf. on Sensor Networks, pp. 71-80, 2022

     
  11. Analysis of Routing Attacks in FANETs
    O. Ceviz, P. Sadioglu, S. Sen
    presented at AdhocNets 2022
    LNICSTE 428, Springer, 2022

     
  12. A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    S. Yilmaz, E. Aydogan, S. Sen
    IEEE Transactions on Information Forensics and Security (Q1), 2021
     
  13. Android Security using NLP Techniques: A Review
    S. Sen, B. Can
    arXiV:2107.03072, 2021
     
  14. Load Balancing for RPL-Based Internet of Things: A Review
    D. Pancaroglu, S. Sen
    Ad Hoc Networks (Q1), vol. 116, 2021
     
  15. Attention: There is an Inconsistency between Android Permissions and Application Metadata!
    H. Alecakir, B. Can, S. Sen
    International Journal of Information Security (Q2), 2021 Dataset
     
  16. Familial Classification of Android Malware using Hybrid Analysis
    O.F.T. Cavli, S. Sen
    presented at ISCTurkey 2020, IEEE
     
  17. Discovering Inconsistencies between Requested Permissions and Application Metadata by using Deep Learning
    H. Alecakir, M. Kabukcu, B. Can, S. Sen
    presented at ISCTurkey 2020, IEEE
     
  18. A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things
    E. Canbalaban, S. Sen
    presented at AdHoc-Now 2020, IEEE Dataset
     
  19. Electric Fish Optimization: A New Heuristic Algorithm Inspired by Electrolocation
    S. Yilmaz, S. Sen
    Neural Computing and Applications (Q1), vol. 32, pp. 11543-11578, 2020 Source Code
     
  20. Efficient Evolutionary Fuzzing for Android Application Installation Process
    V. Hatas, S. Sen
    presented at QRS 2019, IEEE  Link
     
  21. A Central Intrusion Detection System for RPL-Based Industrial Internet of Things
    E. Aydogan, S. Yilmaz, S. Sen, I. Butun, S. Forsstrom, M. Gidlund
    presented at IEEE WFCS 2019, IEEE  Link
     
  22. Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs using Genetic Programming
    M. Aslan, S. Sen
    presented at EvoApps 2019
    LNCS 11454, pp. 413-429, Springer, 2019
    Link
     
  23. Early Detection of Botnet Activities using Grammatical Evolution
    S. Yilmaz, S. Sen
    presented at EvoApps 2019
    LNCS 11454, pp. 395-404, Springer, 2019
    Link
     
  24. A Novel Multi-Featured Metric for Adaptive Routing in Mobile Ad Hoc Networks
    S. Hasdemir, S. Yilmaz, S. Sen
    Applied Intelligence, 2019 Link
     
  25. Analysis of Dynamic Code Updating in Android with Security Perspective
    A. I. Aysan, F. Sakiz, S. Sen
    IET Information Security, Volume 13, Issue 3, pp. 269-277, 2019 Link
     
  26. Analysis of Adversarial Attacks against Traditional Spam Filters
    H. B. Ozkan, S. Sen, B. Can
    presented at AdhocNets A2CS 2019
     
  27. UpDroid: Updated Android Malware and Its Familial Classification
    K. Aktas, S. Sen
    Proc. of the 23rd Nordic Conference on Secure IT Systems(NordSec 2018) Dataset
     
  28. Certificate Transparency Conformity Assessment of Top 500 Websites
    E. Turan, T. Ergun, S. Sen
    Proc. of the 11th International Conference on Information Security & Cryptology (ISCTurkey 2018)
     
  29. An Analysis of the Current State of Security in the Internet of Things
    D. Pancaroglu, S. Sen
    Proc. of the International Conference on Cyber Security and Computer Science (ICONCS 2018)
     
  30. Coevolution of Mobile Malware and Anti-Malware
    S. Sen, E. Aydogan, A.I. Aysan
    IEEE Transactions on Information Forensics and Security, 2018 Link
     
  31. SAFEDroid: Using Structural Features for Detecting Android Malwares
    S. Sen, A.I. Aysan, J.A. Clark
    Proc. of SecureComm 2017, LNICST, vol. 239, pp.255-270, Springer, 2018 Link
     
  32. Attack Analysis in Vehicular Ad Hoc Networks
    O. Mintemur, S. Sen
    Proc. of the 9th International Conference on Wireless, Mobile Network & Applications (WiMoA), 2017
     
  33. A Survey of Attacks and Detection Mechanisms on Intelligent Transportation Systems: VANETs and IoV
    F. Sakiz, S. Sen
    Ad Hoc Networks, Volume 61, pp. 33-50, 2017 Link
     
  34. "Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications
    A.I. Aysan, S. Sen
    Proc. of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 2015
     
  35. GenTrust: A Genetic Trust Management Model for Peer-to-Peer Systems
    U. Eray Tahta, S. Sen, A. Burak Can
    Applied Soft Computing, vol. 34, pp. 693-70, 2015 Link
     
  36. Automatic Generation of Mobile Malwares Using Genetic Programming
    E. Aydogan, S. Sen
    presented in : EvoApps 2015, Copenhagen
    LNCS 9028, pp. 745-756, Springer, 2015
    Link
     
  37. A Survey of Intrusion Detection Systems using Evolutionary Computation
    S. Sen
    Bio-inspired Computation on Telecommunications, Chapter 4, Elseiver, February 2015 Link
     
  38. Sequence-Based Masquerada Detection for Different User Groups
    S. Sen
    Security and Communication Networks, vol. 8, issue 7, pp. 1265-1278, 2015 Link
     
  39. Using Instance-weighted Naive Bayes for Adapting Concept Drift in Masquerade Detection
    S. Sen
    International Journal of Information Security, vol. 13, issue 6, pp. 583-590, Springer, 2014 Link
     
  40. Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming
    U.E. Tahta, A.B. Can, S. Sen
    presented in : EvoApps 2014, Granada
    LNCS 8602, pp. 3-14, Springer, 2014

     
  41. EXPOSURE: a Passive DNS Analysis Service to Detect and Report Malicious Domains
    L. Bilge, S. Sen, D. Balzarotti, E. Kirda, C. Kruegel
    ACM Transactions on Information and System Security, vol. 16, issue 4, 2014
     
  42. A Lightweight Threshold-Based Improvement on DSDV
    R. Abri, S. Sen
    LNICST, vol. 129, pp 135-145, Springer, 2014 Link
    presented in : AdhocNets 2013, Barcelona
     
  43. How to Profile Users and Masquearaders
    S. Sen
    presented in : SPTM 2013, Istanbul
     
  44. Feature Selection for Detection of Ad Hoc Flooding Attacks
    S. Sen, Z. Dogmus
    Advances in Intelligent and Soft Computing, Springer, 2012 Link
     
  45. On Sampling Strategies for Small and Continuous Data with the modeling of GP and ANFIS
    S. Sen, E. Sezer, C. Gokceoglu, S. Yagiz
    Journal of Intelligent and Fuzzy Systems, 2012 Link
     
  46. Evolutionary Computation Techniques for Intrusion Detection in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    Computer Networks, Volume 55, Issue 15, pp. 3441-3457, 2011 Link
     
  47. Security Threats in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark, J.E. Tapiador
    Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Auerbach Publications, CRC Press, 2011. Book
     
  48. Power-Aware Intrusion Detection on Mobile Ad Hoc Networks
    S. Sen, J.A. Clark, J.E. Tapiador
    presented in : AdhocNets 2009, Niagara Falls
    Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
    Volume 28, Part 1, pp. 224-239, Springer, 2010

     
  49. A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    presented in : ACM WiSec, Zurich
    in : Proceedings of ACM WiSec, pp. 95-102, 2009. Link

     
  50. Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    presented in : PRICAI 2008, Hanoi
    LNAI 5351, pp. 1053-1058, Springer, 2008

     
  51. Intrusion Detection in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark
    in : Chapter 17, Guide to Wireless Ad Hoc Networks, Springer, 2008. Book
     
  52. Threat Modeling for Mobile Ad Hoc Networks
    J.A. Clark, J. Murdoch, J.A. McDermid, S. Sen, H.R. Chivers, Worthington,
    Prceedings of the Annual Conference of ITA, 2007.
     
  53. Polynomial Reduction Rules to Decrease the Number of Dummy Arcs in an AoA network
    M. Ege, S. Sen
    Technical Report, Department of Computer Engineering, Hacettepe University, 2005.
     


National Conferences

  1. Classification with the Electric Fish Optimization Algorithm
    S. Yilmaz, S. Sen
    IEEE SIU, 2020.
     
  2. Android Malware Detection Based on Runtime Behaviour
    K. Aktas, S. Sen
    IEEE SIU, 2018.
     
  3. API Call and Permission Based Mobile Malware Detection
    A. I. Aysan, S. Sen
    IEEE SIU, 2015.
     
  4. Analysis of Machine Learning Methods on Malware Detection
    E. Aydogan, S. Sen
    IEEE SIU, 2014.
     
  5. A New Approach for Detection of Insider Threats
    S. Sen
    IEEE SIU, 2013.
     
  6. Destek Vektor Makinalari ile Rota Istemi Taskinlik Saldirilarinin Tespiti
    Z. Dogmus, S. Sen
    IEEE SIU, 2012.Android Malware Detection Based on Runtime Behaviour
     
  7. Mobil Tasarsiz Aglarda Saldiri Tespiti
    S. Sen, J.A. Clark
    3. Ag ve Bilgi Guvenligi Ulusal Sempozyumu, 2010.
     


Copyright notice:

The documents contained here are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.