default search action
Sevil Sen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Emre Aydogan, Sevil Sen:
Android Authorship Attribution Using Source Code-Based Features. IEEE Access 12: 6569-6589 (2024) - [j19]Erhan Turan, Sevil Sen, Tamer Ergun:
A Semi-Decentralized PKI Based on Blockchain With a Stake-Based Reward-Punishment Mechanism. IEEE Access 12: 60705-60721 (2024) - [c25]Ali Deveci, Selim Yilmaz, Sevil Sen:
CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution. IOTSMS 2024: 98-105 - 2023
- [j18]Mehmet Aslan, Sevil Sen:
A dynamic trust management model for vehicular ad hoc networks. Veh. Commun. 41: 100608 (2023) - [c24]Ali Deveci, Selim Yilmaz, Sevil Sen:
Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things. EvoApplications@EvoStar 2023: 177-193 - [c23]Halil Arslan, Selim Yilmaz, Sevil Sen:
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning. SmartNets 2023: 1-8 - [i5]Cansu Dogan, Selim Yilmaz, Sevil Sen:
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things. CoRR abs/2303.16499 (2023) - [i4]Selim Yilmaz, Emre Aydogan, Sevil Sen:
Exploring placement of intrusion detection systems in rpl-based internet of things. CoRR abs/2303.16561 (2023) - [i3]Ozlem Ceviz, Pinar Sadioglu, Sevil Sen:
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions. CoRR abs/2306.14281 (2023) - [i2]Ozlem Ceviz, Pinar Sadioglu, Sevil Sen, Vassilios G. Vassilakis:
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks. CoRR abs/2312.04135 (2023) - 2022
- [j17]Ahmet Melih Gedikli, Mehmet Köseoglu, Sevil Sen:
Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks. Comput. Networks 215: 109202 (2022) - [j16]Beyza Cevik, Nur Altiparmak, Murat Aksu, Sevil Sen:
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries. Int. J. Inf. Sec. 21(5): 1107-1125 (2022) - [c22]Cansu Dogan, Selim Yilmaz, Sevil Sen:
Analysis of RPL Objective Functions with Security Perspective. SENSORNETS 2022: 71-80 - 2021
- [j15]Doruk Pancaroglu, Sevil Sen:
Load balancing for RPL-based Internet of Things: A review. Ad Hoc Networks 116: 102491 (2021) - [j14]Huseyin Alecakir, Burcu Can, Sevil Sen:
Attention: there is an inconsistency between android permissions and application metadata! Int. J. Inf. Sec. 20(6): 797-815 (2021) - [j13]Selim Yilmaz, Emre Aydogan, Sevil Sen:
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices. IEEE Trans. Inf. Forensics Secur. 16: 4405-4418 (2021) - [c21]Ozlem Ceviz, Pinar Sadioglu, Sevil Sen:
Analysis of Routing Attacks in FANETs. ADHOCNETS/TRIDENTCOM 2021: 3-17 - [i1]Sevil Sen, Burcu Can:
Android Security using NLP Techniques: A Review. CoRR abs/2107.03072 (2021) - 2020
- [j12]Selim Yilmaz, Sevil Sen:
Electric fish optimization: a new heuristic algorithm inspired by electrolocation. Neural Comput. Appl. 32(15): 11543-11578 (2020) - [c20]Erdem Canbalaban, Sevil Sen:
A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things. ADHOC-NOW 2020: 214-227
2010 – 2019
- 2019
- [j11]Songul Hasdemir, Selim Yilmaz, Sevil Sen:
A novel multi-featured metric for adaptive routing in mobile ad hoc networks. Appl. Intell. 49(8): 2823-2841 (2019) - [j10]Ahmet Ilhan Aysan, Fatih Sakiz, Sevil Sen:
Analysis of dynamic code updating in Android with security perspective. IET Inf. Secur. 13(3): 269-277 (2019) - [c19]Selim Yilmaz, Sevil Sen:
Early Detection of Botnet Activities Using Grammatical Evolution. EvoApplications 2019: 395-404 - [c18]Mehmet Aslan, Sevil Sen:
Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming. EvoApplications 2019: 413-429 - [c17]Veysel Hatas, Sevil Sen, John A. Clark:
Efficient Evolutionary Fuzzing for Android Application Installation Process. QRS 2019: 62-68 - [c16]Emre Aydogan, Selim Yilmaz, Sevil Sen, Ismail Butun, Stefan Forsström, Mikael Gidlund:
A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. WFCS 2019: 1-5 - 2018
- [j9]Sevil Sen, Emre Aydogan, Ahmet Ilhan Aysan:
Coevolution of Mobile Malware and Anti-Malware. IEEE Trans. Inf. Forensics Secur. 13(10): 2563-2574 (2018) - [c15]Kursat Aktas, Sevil Sen:
UpDroid: Updated Android Malware and Its Familial Classification. NordSec 2018: 352-368 - [c14]Kursat Aktas, Sevil Sen:
Android malware detection based on runtime behaviour. SIU 2018: 1-4 - 2017
- [j8]Fatih Sakiz, Sevil Sen:
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61: 33-50 (2017) - [c13]Sevil Sen, Ahmet Ilhan Aysan, John A. Clark:
SAFEDroid: Using Structural Features for Detecting Android Malwares. ATCS/SePrIoT@SecureComm 2017: 255-270 - 2015
- [j7]Yacine Challal, Enrico Natalizio, Sevil Sen, Anna Maria Vegni:
Internet of Things security and privacy: Design methods and optimization. Ad Hoc Networks 32: 1-2 (2015) - [j6]Ugur Eray Tahta, Sevil Sen, Ahmet Burak Can:
GenTrust: A genetic trust management model for peer-to-peer systems. Appl. Soft Comput. 34: 693-704 (2015) - [j5]Sevil Sen:
Sequence-based masquerade detection for different user groups. Secur. Commun. Networks 8(7): 1265-1278 (2015) - [c12]Ahmet Ilhan Aysan, Sevil Sen:
"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications. CSCloud 2015: 181-186 - [c11]Emre Aydogan, Sevil Sen:
Automatic Generation of Mobile Malwares Using Genetic Programming. EvoApplications 2015: 745-756 - [c10]Ahmet Ilhan Aysan, Sevil Sen:
API call and permission based mobile malware detection (in english). SIU 2015: 2400-2403 - 2014
- [j4]Sevil Sen:
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection. Int. J. Inf. Sec. 13(6): 583-590 (2014) - [j3]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [c9]Ugur Eray Tahta, Ahmet Burak Can, Sevil Sen:
Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming. EvoApplications 2014: 3-14 - [c8]Emre Aydogan, Sevil Sen:
Analysis of machine learning methods on malware detection. SIU 2014: 2066-2069 - 2013
- [c7]Rahem Abri, Sevil Sen:
A Lightweight Threshold-Based Improvement on DSDV. ADHOCNETS 2013: 135-145 - [c6]Sevil Sen:
A new approach for detection of insider attacks. SIU 2013: 1-4 - 2012
- [j2]Sevil Sen, Ebru Akcapinar Sezer, Candan Gokceoglu, Saffet Yagiz:
On sampling strategies for small and continuous data with the modeling of genetic programming and adaptive neuro-fuzzy inference system. J. Intell. Fuzzy Syst. 23(6): 297-304 (2012) - [c5]Sevil Sen, Zeynep Dogmus:
Feature Selection for Detection of Ad Hoc Flooding Attacks. ACITY (1) 2012: 507-513 - [c4]Zeynep Dogmus, Sevil Sen:
SVM-based detection of ad hoc flooding attacks. SIU 2012: 1-4 - 2011
- [j1]Sevil Sen, John A. Clark:
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput. Networks 55(15): 3441-3457 (2011)
2000 – 2009
- 2009
- [c3]Sevil Sen, John A. Clark, Juan E. Tapiador:
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. ADHOCNETS 2009: 224-239 - [c2]Sevil Sen, John Andrew Clark:
A grammatical evolution approach to intrusion detection on mobile ad hoc networks. WISEC 2009: 95-102 - [p1]Sevil Sen, John Andrew Clark:
Intrusion Detection in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 427-454 - 2008
- [c1]Sevil Sen, John A. Clark:
Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. PRICAI 2008: 1053-1058
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint