Personal information

Activities

Works (44)

Analysis of Routing Attacks in FANETs

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2022 | Book
EID:

2-s2.0-85127712613

Part of ISSN: 1867822X 18678211
Contributors: Ceviz, O.; Sadioglu, P.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks

Computer Networks
2022 | Journal article
EID:

2-s2.0-85135400481

Part of ISSN: 13891286
Contributors: Gedikli, A.M.; Koseoglu, M.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries

International Journal of Information Security
2022 | Journal article
EID:

2-s2.0-85135358336

Part of ISSN: 16155270 16155262
Contributors: Cevik, B.; Altiparmak, N.; Aksu, M.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A Transfer Learning Approach for Securing Resource-Constrained IoT Devices

IEEE Transactions on Information Forensics and Security
2021 | Journal article
EID:

2-s2.0-85114807338

Part of ISSN: 15566021 15566013
Contributors: Yilmaz, S.; Aydogan, E.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Android security using NLP techniques: A review

arXiv
2021 | Other
EID:

2-s2.0-85111209821

Part of ISSN: 23318422
Contributors: Sen, S.; Can, B.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Attention: there is an inconsistency between android permissions and application metadata!

International Journal of Information Security
2021 | Journal article
EID:

2-s2.0-85099105158

Part of ISSN: 16155270 16155262
Contributors: Alecakir, H.; Can, B.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Load balancing for RPL-based Internet of Things: A review

Ad Hoc Networks
2021 | Journal article
EID:

2-s2.0-85102976502

Part of ISSN: 15708705
Contributors: Pancaroglu, D.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85093844706

Part of ISSN: 16113349 03029743
Contributors: Canbalaban, E.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Classification with the Electric Fish Optimization Algorithm,Elektrik Baligi Optimizasyonu Algoritmasi ile Siniflandirma

2020 28th Signal Processing and Communications Applications Conference, SIU 2020 - Proceedings
2020 | Conference paper
EID:

2-s2.0-85100293264

Contributors: Yilmaz, S.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Discovering Inconsistencies between Requested Permissions and Application Metadata by using Deep Learning

2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings
2020 | Conference paper
EID:

2-s2.0-85101140137

Contributors: Alecakir, H.; Kabukcu, M.; Can, B.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Electric fish optimization: a new heuristic algorithm inspired by electrolocation

Neural Computing and Applications
2020 | Journal article
EID:

2-s2.0-85075980806

Part of ISSN: 14333058 09410643
Contributors: Yilmaz, S.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Familial Classification of Android Malware using Hybrid Analysis

2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings
2020 | Conference paper
EID:

2-s2.0-85101176249

Contributors: Faruk Turan Cavli, O.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A Central Intrusion Detection System for RPL-Based Industrial Internet of Things

IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS
2019 | Conference paper
EID:

2-s2.0-85070092698

Contributors: Aydogan, E.; Yilmaz, S.; Sen, S.; Butun, I.; Forsstrom, S.; Gidlund, M.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A novel multi-featured metric for adaptive routing in mobile ad hoc networks

Applied Intelligence
2019 | Journal article
EID:

2-s2.0-85061246597

Part of ISSN: 15737497 0924669X
Contributors: Hasdemir, S.; Yilmaz, S.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Analysis of dynamic code updating in Android with security perspective

IET Information Security
2019 | Journal article
EID:

2-s2.0-85064253659

Part of ISSN: 17518717 17518709
Contributors: Aysan, A.I.; Sakiz, F.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Early detection of botnet activities using grammatical evolution

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019 | Book
EID:

2-s2.0-85065735190

Part of ISSN: 16113349 03029743
Contributors: Yilmaz, S.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Efficient Evolutionary Fuzzing for Android Application Installation Process

Proceedings - 19th IEEE International Conference on Software Quality, Reliability and Security, QRS 2019
2019 | Conference paper
EID:

2-s2.0-85073797355

Contributors: Hatas, V.; Sen, S.; Clark, J.A.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Evolving trust formula to evaluate data trustworthiness in VANETs using genetic programming

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2019 | Book
EID:

2-s2.0-85065737067

Part of ISSN: 16113349 03029743
Contributors: Aslan, M.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Android malware detection based on runtime behaviour,Çalişma zamani davranişlarina dayali android zararli yazilim tespiti

26th IEEE Signal Processing and Communications Applications Conference, SIU 2018
2018 | Conference paper
EID:

2-s2.0-85050790202

Contributors: Aktas, K.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Coevolution of Mobile Malware and Anti-Malware

IEEE Transactions on Information Forensics and Security
2018 | Journal article
EID:

2-s2.0-85045217741

Part of ISSN: 15566013
Contributors: Sen, S.; Aydogan, E.; Aysan, A.I.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

SAFEDroid: Using structural features for detecting android malwares

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2018 | Book
EID:

2-s2.0-85046537231

Part of ISSN: 18678211
Contributors: Sen, S.; Aysan, A.I.; Clark, J.A.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

UpDroid: Updated Android Malware and Its Familial Classification

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Book
EID:

2-s2.0-85057389490

Part of ISSN: 16113349 03029743
Contributors: Aktas, K.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV

Ad Hoc Networks
2017 | Journal article
EID:

2-s2.0-85017598555

Part of ISSN: 15708705
Contributors: Sakiz, F.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

"do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications

Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015
2016 | Conference paper
EID:

2-s2.0-84962910833

Contributors: Aysan, A.I.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Security Threats in Mobile Ad Hoc Networks

Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
2016 | Book chapter
EID:

2-s2.0-85138332238

Contributors: Şen, S.; Clark, J.A.; Tapiador, J.E.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A Survey of Intrusion Detection Systems Using Evolutionary Computation

Bio-Inspired Computation in Telecommunications
2015 | Book chapter
EID:

2-s2.0-84934967653

Contributors: Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

API call and permission based mobile malware detection (in english),Mobil Cihazlarda API Çaʇri ve Izin Tabanli Zararli Yazilim Tespiti (Türkçe)

2015 23rd Signal Processing and Communications Applications Conference, SIU 2015 - Proceedings
2015 | Conference paper
EID:

2-s2.0-84939193979

Contributors: Aysan, A.I.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Automatic generation of mobile malwares using genetic programming

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84925882762

Part of ISSN: 16113349 03029743
Contributors: Aydogan, E.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

GenTrust: A genetic trust management model for peer-to-peer systems

Applied Soft Computing Journal
2015 | Journal article
EID:

2-s2.0-84934975848

Part of ISSN: 15684946
Contributors: Tahta, U.E.; Sen, S.; Can, A.B.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Internet of Things security and privacy: Design methods and optimization

Ad Hoc Networks
2015 | Journal article
EID:

2-s2.0-84930746620

Part of ISSN: 15708705
Contributors: Challal, Y.; Natalizio, E.; Sen, S.; Vegni, A.M.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Sequence-based masquerade detection for different user groups

Security and Communication Networks
2015 | Journal article
EID:

2-s2.0-84925361008

Part of ISSN: 19390122 19390114
Contributors: Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A lightweight threshold-based improvement on DSDV

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2014 | Book
EID:

2-s2.0-84943277747

Part of ISSN: 18678211
Contributors: Abri, R.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Analysis of machine learning methods on malware detection,Kötücül yazilimlarin tespitinde makine öǧrenmesi yöntemlerinin analizi

2014 22nd Signal Processing and Communications Applications Conference, SIU 2014 - Proceedings
2014 | Conference paper
EID:

2-s2.0-84903759121

Contributors: Aydogan, E.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Evolving a trust model for peer-to-peer networks using genetic programming

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84915745168

Part of ISSN: 16113349 03029743
Contributors: Tahta, U.E.; Can, A.B.; Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

EXPOSURE: A passive DNS analysis service to detect and report malicious domains

ACM Transactions on Information and System Security
2014 | Journal article
EID:

2-s2.0-84900328882

Part of ISSN: 15577406 10949224
Contributors: Bilge, L.; Sen, S.; Balzarotti, D.; Kirda, E.; Kruegel, C.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Using instance-weighted naive Bayes for adapting concept drift in masquerade detection

International Journal of Information Security
2014 | Journal article
EID:

2-s2.0-84919463067

Part of ISSN: 16155270 16155262
Contributors: Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A new approach for detection of insider attacks,Içsaldirilarin tespiti için yeni bir yaklasim

2013 21st Signal Processing and Communications Applications Conference, SIU 2013
2013 | Conference paper
EID:

2-s2.0-84880870715

Contributors: Sen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Feature selection for detection of ad hoc flooding attacks

Advances in Intelligent Systems and Computing
2012 | Book
EID:

2-s2.0-84868310418

Part of ISSN: 21945357
Contributors: Sen, S.; Dogmus, Z.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

On sampling strategies for small and continuous data with the modeling of genetic programming and adaptive neuro-fuzzy inference system

Journal of Intelligent and Fuzzy Systems
2012 | Journal article
EID:

2-s2.0-84872313045

Part of ISSN: 10641246 18758967
Contributors: Sen, S.; Sezer, E.A.; Gokceoglu, C.; Yagiz, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

SVM-based detection of ad hoc flooding attacks,Destek vektör maki̇neleri̇ i̇le rota i̇stemi̇ taşkinlik saldirilarinin tespi̇ti̇

2012 20th Signal Processing and Communications Applications Conference, SIU 2012, Proceedings
2012 | Conference paper
EID:

2-s2.0-84863442432

Contributors: Doǧmuş, Z.; Şen, S.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

Computer Networks
2011 | Journal article
EID:

2-s2.0-80052488466

Part of ISSN: 13891286
Contributors: Sen, S.; Clark, J.A.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Power-aware intrusion detection in mobile ad hoc networks

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2010 | Book
EID:

2-s2.0-84856352171

Part of ISSN: 18678211
Contributors: Şen, S.; Clark, J.A.; Tapiador, J.E.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

A grammatical evolution approach to intrusion detection on mobile ad hoc networks

Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
2009 | Conference paper
EID:

2-s2.0-70349104194

Contributors: Şen, S.; Clark, J.A.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Evolving intrusion detection rules on mobile ad hoc networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-59349102011

Part of ISSN: 03029743 16113349
Contributors: Şen, S.; Clark, J.A.
Source: Self-asserted source
Sevil Sen via Scopus - Elsevier

Peer review (18 reviews for 9 publications/grants)

Review activity for Ad hoc networks. (1)
Review activity for Applied soft computing. (1)
Review activity for Computers & electrical engineering. (1)
Review activity for Computers & security. (5)
Review activity for Future generation computer systems. (1)
Review activity for Intelligent systems with applications. (2)
Review activity for Internet of things. (4)
Review activity for Vehicular communications. (1)
Review activity for Wireless networks. (2)