Publications
Peer-reviewed work from the lab and earlier collaborations. PI's name is highlighted; clickable titles link to publisher or preprint.
For the most up-to-date listing, see Google Scholar · DBLP.
Journal Papers 11 entries
-
Detecting Hard-Coded Credentials in Software Repositories via LLMsACM Digital Threats: Research and Practice, 2025, DOI: 10.1145/3744756. 2025
-
Regression and Time Series Mixture Approaches to Predict System Performance and Assess ResilienceIEEE Transactions on Reliability, 2024, DOI: 10.1109/TR.2024.3471409. 2024
-
Explainability of Network Intrusion Detection using Transformers: A Packet-Level ApproachIEEE Access, 2025, DOI: 10.1109/ACCESS.2024.3525008. 2025
-
Quantitative Assessment of Machine Learning Reliability and ResilienceRisk Analysis (Wiley), 2024, DOI: 10.1111/risa.14666. 2024
-
PACE: A Program Analysis Framework for Continuous Performance PredictionACM Transactions on Software Engineering and Methodology (TOSEM), 33(4), 2024, DOI: 10.1145/3637230. 2024
-
An Analysis of Complexity of Insider Attacks to DatabasesACM Transactions on Management Information Systems (TMIS), 2021, DOI: 10.1145/3391231. 2021
-
Impact Analysis of Training Data Characteristics for Phishing Email ClassificationJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2021, DOI: 10.22667/JOWUA.2021.06.30.085. 2021
-
A Survey on the Challenges of Implementing Physical Memory PoolsJournal of Internet Services and Information Security (JISIS), 2019. 2019
-
Similarity Metrics for SQL Query ClusteringIEEE Transactions on Knowledge and Data Engineering (TKDE), 2018, DOI: 10.1109/TKDE.2018.2831214. 2018
-
Towards Cyber Ontology for Insider Threats in the Financial SectorJoWUA, 6(4): 64–85, 2015, DOI: 10.22667/JOWUA.2015.12.31.064. 2015
-
IEEE 802.11 WLAN based Real Time Indoor Positioning: Literature Survey and Experimental InvestigationsProcedia Computer Science, 34:157–164, 2014, DOI: 10.1016/j.procs.2014.07.078. 2014
Book Chapters 2 entries
-
Anti-Forensic Measures and Their Impact on Forensic InvestigationsAdversarial Multimedia Forensics (Springer), 2023, DOI: 10.1007/978-3-031-49803-9_10. 2023
-
Forensics in Cyber-Physical SystemsA Practical Guide to Security and Privacy in Cyber-Physical Systems (World Scientific), 2023, DOI: 10.1142/9789811273551_0003. 2023
Conference Papers 28 entries
-
VulStyle: A Multi-Modal Pre-Training for Code Stylometry-Augmented Vulnerability DetectionIEEE/IFIP DSN, 2026, to appear. 2026
-
DQN-IDS: A Deep Reinforcement Learning Approach for Open Set-Enabled Intrusion DetectionNDSS SDIoTSec Workshop, 2026, to appear. 2026
-
Model Evaluation for Radio-Frequency Signal Modulation Classifiers in the Existence of Novel SamplesHICSS, 2026, Identifier: https://hdl.handle.net/10125/112278. 2026
-
Scaling Through Pruning for Resource-Aware Embedded Intrusion Detection on the EdgeIEEE MILCOM, 2025, to appear. 2025
-
Replay or Regret: Evaluating Continual Learning Methods for Robust Intrusion DetectionIEEE MILCOM, 2025, to appear. 2025
-
Repair-Time Trigger for Cyberattack ClassifiersIEEE MILCOM, 2025, to appear. 2025
-
Transfer Learning in Adversarial Attacks Across Graph Neural NetworksIEEE MILCOM, 2025, to appear. 2025
-
varMax: Uncertainty and Novelty Management in Deep Neural NetworksHICSS, 2025, Identifier: https://hdl.handle.net/10125/109750. 2025
-
Reliability Evaluation of CNN-enabled Systems in Adversarial ScenariosIEEE ICAA, 2024, DOI: 10.1109/ICAA64256.2024.00020. 2024
-
varMax: Towards Confidence-Based Zero-Day Attack RecognitionIEEE MILCOM, 2024, DOI: 10.1109/MILCOM61039.2024.10773707. 2024
-
Adaptive Network Intrusion Detection Systems Against Performance Degradation via Model Agnostic Meta-LearningACM CCS AACD Workshop, 2024, DOI: 10.1145/3689935.3690396. 2024
-
(Tutorial) A Reproducible Tutorial on Reproducibility in Database Systems ResearchVLDB, 2024, DOI: 10.14778/3685800.3685840. 2024
-
Predicting F1-Scores of Classifiers in Network Intrusion Detection SystemsIEEE ICCCN Workshop, 2024, DOI: 10.1109/ICCCN61486.2024.10637544. 2024
-
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection SystemsIEEE/IFIP NOMS, 2023, DOI: 10.1109/NOMS56928.2023.10154410. 2023
-
Image Attribute Estimation for Forensic Image Reconstruction from FragmentsHICSS, 2023, Identifier: https://hdl.handle.net/10125/103436. 2023
-
Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and AttacksHASP, 2022, DOI: 10.1145/3569562.3569589. 2022
-
Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test and EvaluationIEEE ISSRE, 2022, DOI: 10.1109/ISSRE55969.2022.00025. 2022
-
Toward Pinpointing Data Leakage from Advanced Persistent ThreatsIEEE IDS, 2021, DOI: 10.1109/BigDataSecurityHPSCIDS52275.2021.00038. 2021
-
Automated User Experience Testing through Multi-Dimensional Performance Impact AnalysisIEEE/ACM AST, 2021, DOI: 10.1109/AST52587.2021.00024. 2021
-
Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous VehiclesIEEE SPW Workshop, 2020, DOI: 10.1109/SPW50608.2020.00055. 2020
-
The Case for Physical Memory Pools: A Vision PaperIEEE CLOUD, 2019, DOI: 10.1007/978-3-030-23502-4_15. 2019
-
Detecting Data Leakage from Databases on Android Apps with Concept DriftIEEE TrustCom, 2018, DOI: 10.1109/TrustCom/BigDataSE.2018.00129. 2018
-
Complexity of Insider Attacks to DatabasesACM CCS MIST, 2017, DOI: 10.1145/3139923.3139927. 2017
-
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks Using BlockchainACM CCS MIST, 2017, DOI: 10.1145/3139923.3139932. 2017
-
Ettu: Analyzing Query Intents in Corporate DatabasesWWW Companion, 2016, DOI: 10.1145/2872518.2888608. 2016
-
A Preliminary Cyber Ontology for Insider Threats in the Financial SectorACM CCS MIST, 2015, DOI: 10.1145/2808783.2808793. 2015
-
Utilization of Synergetic Human-Machine Clouds: A Big Data Cleaning CaseICSE CSI-SE Workshop, 2014, DOI: 10.1145/2593728.2593733. 2014
-
Insan ve Makine Bulutlari Sinerjisi: Kitle Kaynakli Calisma ile Veri Temizleme Ornek UygulamasiUYMS, 2014. 2014