University of Massachusetts Dartmouth · College of Engineering Department of CIS Cybersecurity Center

Publications

Peer-reviewed work from the lab and earlier collaborations. PI's name is highlighted; clickable titles link to publisher or preprint.

For the most up-to-date listing, see Google Scholar · DBLP.

Journal Papers 11 entries

  1. Chidera Biringa, Gokhan Kul.
    Detecting Hard-Coded Credentials in Software Repositories via LLMs
    ACM Digital Threats: Research and Practice, 2025, DOI: 10.1145/3744756. 2025
  2. Priscila Silva, Gaspard Baye, Mindy Hotchkiss, Gokhan Kul, Nathaniel D. Bastian, Lance Fiondella.
    Regression and Time Series Mixture Approaches to Predict System Performance and Assess Resilience
    IEEE Transactions on Reliability, 2024, DOI: 10.1109/TR.2024.3471409. 2024
  3. Pahalavan Rajkumar Dheivanayahi, Ryan Berry, Nicholas Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul.
    Explainability of Network Intrusion Detection using Transformers: A Packet-Level Approach
    IEEE Access, 2025, DOI: 10.1109/ACCESS.2024.3525008. 2025
  4. Zakaria Faddi, Karen da Mata, Priscila Silva, Vidhyashree Nagaraju, Susmita Ghosh, Gokhan Kul, Lance Fiondella.
    Quantitative Assessment of Machine Learning Reliability and Resilience
    Risk Analysis (Wiley), 2024, DOI: 10.1111/risa.14666. 2024
  5. Chidera Biringa, Gokhan Kul.
    PACE: A Program Analysis Framework for Continuous Performance Prediction
    ACM Transactions on Software Engineering and Methodology (TOSEM), 33(4), 2024, DOI: 10.1145/3637230. 2024
  6. Gokhan Kul, Shambhu Upadhyaya, Andrew Hughes.
    An Analysis of Complexity of Insider Attacks to Databases
    ACM Transactions on Management Information Systems (TMIS), 2021, DOI: 10.1145/3391231. 2021
  7. Akash Sundararaj, Gokhan Kul.
    Impact Analysis of Training Data Characteristics for Phishing Email Classification
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2021, DOI: 10.22667/JOWUA.2021.06.30.085. 2021
  8. Heather Craddock, Lakshmi Prasanna Konudula, Gokhan Kul.
    A Survey on the Challenges of Implementing Physical Memory Pools
    Journal of Internet Services and Information Security (JISIS), 2019. 2019
  9. Gokhan Kul, Duc Luong, Ting Xie, Varun Chandola, Oliver Kennedy, Shambhu Upadhyaya.
    Similarity Metrics for SQL Query Clustering
    IEEE Transactions on Knowledge and Data Engineering (TKDE), 2018, DOI: 10.1109/TKDE.2018.2831214. 2018
  10. Gokhan Kul, Shambhu Upadhyaya.
    Towards Cyber Ontology for Insider Threats in the Financial Sector
    JoWUA, 6(4): 64–85, 2015, DOI: 10.22667/JOWUA.2015.12.31.064. 2015
  11. Gokhan Kul, Tansel Ozyer, Bulent Tavli.
    IEEE 802.11 WLAN based Real Time Indoor Positioning: Literature Survey and Experimental Investigations
    Procedia Computer Science, 34:157–164, 2014, DOI: 10.1016/j.procs.2014.07.078. 2014

Book Chapters 2 entries

  1. Lars Schmitt, Gokhan Kul.
    Anti-Forensic Measures and Their Impact on Forensic Investigations
    Adversarial Multimedia Forensics (Springer), 2023, DOI: 10.1007/978-3-031-49803-9_10. 2023
  2. Gokhan Kul, Chidera Biringa.
    Forensics in Cyber-Physical Systems
    A Practical Guide to Security and Privacy in Cyber-Physical Systems (World Scientific), 2023, DOI: 10.1142/9789811273551_0003. 2023

Conference Papers 28 entries

  1. Chidera Biringa, Ajmal Abbas, Vishnu Selvaraj, Gokhan Kul.
    VulStyle: A Multi-Modal Pre-Training for Code Stylometry-Augmented Vulnerability Detection
    IEEE/IFIP DSN, 2026, to appear. 2026
  2. Shreyash Tiwari, Nathaniel D. Bastian, Gokhan Kul.
    DQN-IDS: A Deep Reinforcement Learning Approach for Open Set-Enabled Intrusion Detection
    NDSS SDIoTSec Workshop, 2026, to appear. 2026
  3. Adam Trott, Henry Thompson, Gokhan Kul.
    Model Evaluation for Radio-Frequency Signal Modulation Classifiers in the Existence of Novel Samples
    HICSS, 2026, Identifier: https://hdl.handle.net/10125/112278. 2026
  4. Alexandre Broggi, Nathaniel D. Bastian, Lance Fiondella, Gokhan Kul.
    Scaling Through Pruning for Resource-Aware Embedded Intrusion Detection on the Edge
    IEEE MILCOM, 2025, to appear. 2025
  5. Nicholas Costagliola, Goktug Ekinci, Nathaniel D. Bastian, Lance Fiondella, Gokhan Kul.
    Replay or Regret: Evaluating Continual Learning Methods for Robust Intrusion Detection
    IEEE MILCOM, 2025, to appear. 2025
  6. Priscila Silva, Gaspard Baye, Nicholas Costagliola, Nathaniel D. Bastian, Gokhan Kul, Lance Fiondella.
    Repair-Time Trigger for Cyberattack Classifiers
    IEEE MILCOM, 2025, to appear. 2025
  7. Pooja Chigurupati, Ashok Kumar Patel, Gokhan Kul.
    Transfer Learning in Adversarial Attacks Across Graph Neural Networks
    IEEE MILCOM, 2025, to appear. 2025
  8. Alexandre Broggi, Gaspard Baye, Priscila Silva, Nicholas Costagliola, Nathaniel Bastian, Lance Fiondella, Gokhan Kul.
    varMax: Uncertainty and Novelty Management in Deep Neural Networks
    HICSS, 2025, Identifier: https://hdl.handle.net/10125/109750. 2025
  9. Karen da Mata, Zakaria Faddi, Priscila Silva, Vidhyashree Nagaraju, Susmita Ghosh, Gokhan Kul, Lance Fiondella.
    Reliability Evaluation of CNN-enabled Systems in Adversarial Scenarios
    IEEE ICAA, 2024, DOI: 10.1109/ICAA64256.2024.00020. 2024
  10. Gaspard Baye, Priscila Silva, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul.
    varMax: Towards Confidence-Based Zero-Day Attack Recognition
    IEEE MILCOM, 2024, DOI: 10.1109/MILCOM61039.2024.10773707. 2024
  11. Goktug Ekinci, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul.
    Adaptive Network Intrusion Detection Systems Against Performance Degradation via Model Agnostic Meta-Learning
    ACM CCS AACD Workshop, 2024, DOI: 10.1145/3689935.3690396. 2024
  12. Tim Fischer, Denis Hirn, Gokhan Kul.
    (Tutorial) A Reproducible Tutorial on Reproducibility in Database Systems Research
    VLDB, 2024, DOI: 10.14778/3685800.3685840. 2024
  13. Priscila Silva, Gaspard Baye, Alexandre Broggi, Nathaniel D. Bastian, Gokhan Kul, Lance Fiondella.
    Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems
    IEEE ICCCN Workshop, 2024, DOI: 10.1109/ICCCN61486.2024.10637544. 2024
  14. Gaspard Baye, Priscila Silva, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul.
    Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems
    IEEE/IFIP NOMS, 2023, DOI: 10.1109/NOMS56928.2023.10154410. 2023
  15. Kevin Montambault, Gokhan Kul.
    Image Attribute Estimation for Forensic Image Reconstruction from Fragments
    HICSS, 2023, Identifier: https://hdl.handle.net/10125/103436. 2023
  16. Chidera Biringa, Gokhan Kul.
    Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
    HASP, 2022, DOI: 10.1145/3569562.3569589. 2022
  17. Julia Sorrentino, Priscila Silva, Gaspard Baye, Gokhan Kul, Lance Fiondella.
    Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test and Evaluation
    IEEE ISSRE, 2022, DOI: 10.1109/ISSRE55969.2022.00025. 2022
  18. Jack D'Agostino, Gokhan Kul.
    Toward Pinpointing Data Leakage from Advanced Persistent Threats
    IEEE IDS, 2021, DOI: 10.1109/BigDataSecurityHPSCIDS52275.2021.00038. 2021
  19. Chidera Biringa, Gokhan Kul.
    Automated User Experience Testing through Multi-Dimensional Performance Impact Analysis
    IEEE/ACM AST, 2021, DOI: 10.1109/AST52587.2021.00024. 2021
  20. Prinkle Sharma, Umesh Siddanagaiah, Gokhan Kul.
    Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles
    IEEE SPW Workshop, 2020, DOI: 10.1109/SPW50608.2020.00055. 2020
  21. Heather Craddock, Lakshmi Prasanna Konudula, Kun Cheng, Gokhan Kul.
    The Case for Physical Memory Pools: A Vision Paper
    IEEE CLOUD, 2019, DOI: 10.1007/978-3-030-23502-4_15. 2019
  22. Gokhan Kul, Shambhu Upadhyaya, Varun Chandola.
    Detecting Data Leakage from Databases on Android Apps with Concept Drift
    IEEE TrustCom, 2018, DOI: 10.1109/TrustCom/BigDataSE.2018.00129. 2018
  23. Gokhan Kul, Shambhu Upadhyaya, Andrew Hughes.
    Complexity of Insider Attacks to Databases
    ACM CCS MIST, 2017, DOI: 10.1145/3139923.3139927. 2017
  24. Vishal Sharma, Ilsun You, Gokhan Kul.
    Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks Using Blockchain
    ACM CCS MIST, 2017, DOI: 10.1145/3139923.3139932. 2017
  25. Gokhan Kul, Duc Luong, Ting Xie, Patrick Coonan, Varun Chandola, Oliver Kennedy, Shambhu Upadhyaya.
    Ettu: Analyzing Query Intents in Corporate Databases
    WWW Companion, 2016, DOI: 10.1145/2872518.2888608. 2016
  26. Gokhan Kul, Shambhu Upadhyaya.
    A Preliminary Cyber Ontology for Insider Threats in the Financial Sector
    ACM CCS MIST, 2015, DOI: 10.1145/2808783.2808793. 2015
  27. Deniz Iren, Gokhan Kul, Semih Bilgen.
    Utilization of Synergetic Human-Machine Clouds: A Big Data Cleaning Case
    ICSE CSI-SE Workshop, 2014, DOI: 10.1145/2593728.2593733. 2014
  28. Deniz Iren, Gokhan Kul, Semih Bilgen.
    Insan ve Makine Bulutlari Sinerjisi: Kitle Kaynakli Calisma ile Veri Temizleme Ornek Uygulamasi
    UYMS, 2014. 2014