Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning FO Çetin, C Ganan, M Korczynski, M Van Eeten WEIS 2017, 1-23, 2017 | 70 | 2017 |
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ... NDSS, 2019 | 68 | 2019 |
Understanding the role of sender reputation in abuse reporting and cleanup O Cetin, M Hanif Jhaveri, C Gañán, M van Eeten, T Moore Journal of Cybersecurity 2 (1), 83-98, 2016 | 66 | 2016 |
Abuse reporting and the fight against cybercrime MH Jhaveri, O Cetin, C Gañán, T Moore, MV Eeten ACM Computing Surveys (CSUR) 49 (4), 1-27, 2017 | 52 | 2017 |
An empirical analysis of zeus c&c lifetime C Gañán, O Cetin, M van Eeten Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 38 | 2015 |
Let me out! Evaluating the effectiveness of quarantining compromised users in walled gardens O Çetin, C Ganán, L Altena, S Tajalizadehkhoob, M van Eeten Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 251-263, 2018 | 37 | 2018 |
Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks O Çetin, C Gañán, L Altena, S Tajalizadehkhoob, M Van Eeten 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 326-339, 2019 | 35 | 2019 |
On the effectiveness of ransomware decryption tools B Filiz, B Arief, O Cetin, J Hernandez-Castro Computers & Security 111, 102469, 2021 | 20 | 2021 |
Investigating the impact of ransomware splash screens Y Yilmaz, O Cetin, B Arief, J Hernandez-Castro Journal of Information Security and Applications 61 (C), 2021 | 15 | 2021 |
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? OS Ozturk, E Ekmekcioglu, O Cetin, B Arief, J Hernandez-Castro EICC2023: European Interdisciplinary Cybersecurity Conference, 2023 | 14 | 2023 |
Personality types and ransomware victimisation Y Yilmaz, O Çetin, C Grigore, B Arief, J Hernandez-Castro Digital Threats: Research and Practice 4 (4), 1-25, 2023 | 8 | 2023 |
Using Eyetracker to Find Ways to Mitigate Ransomware B Arief, A Periam, O Cetin, J Hernandez-Castro ICISSP conference, 2020 | 8 | 2020 |
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.(2019) O Cetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ... | 4 | 2019 |
On ChatGPT: perspectives from software engineering students K Hanifi, O Cetin, C Yilmaz 2023 IEEE 23rd International Conference on Software Quality, Reliability …, 2023 | 2 | 2023 |
Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots JC Kocaogullar, Yekta, Cetin, Orcun, Arief, Budi, Brierley, Calvin, Pont ... STAST 2022, 2022 | 1* | 2022 |
Unveiling Cyber Threat Actors: A Hybrid Deep Learning Approach for Behavior-based Attribution E Böge, E Bilgehan, H Alptekin, O Çetin Digital Threats: Research and Practice, 2024 | | 2024 |
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs MB Ozkok, B Birinci, O Cetin, B Arief, J Hernandez-Castro European Interdisciplinary Cybersecurity Conference, 128-135, 2024 | | 2024 |
Evaluating the Impact of Conventional Code Analysis Against Large Language Models in API Vulnerability Detection R Yıldırım, K Aydın, O Çetin EİCC 2024, 2024 | | 2024 |
Dissecting Privacy Perspectives of Websites Around the World:" Aceptar Todo, Alle Akzeptieren, Accept All..." A Ogut, B Turanlioglu, DC Metiner, A Levi, C Yilmaz, O Cetin, S Uluagac 33rd USENIX Security Symposium (USENIX Security 24), 2849-2863, 2024 | | 2024 |
Using page offsets for detecting control-flow anomalies E Varan, K Hanifi, AR Erdemli, M Unal, YE Tat, D Tekinoglu, O Cetin, ... International Conference on Information Technology and Communications …, 2023 | | 2023 |