关注
Orcun Cetin
Orcun Cetin
其他姓名Orçun Çetin
Sabancı University, University of Kent
在 sabanciuniv.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning
FO Çetin, C Ganan, M Korczynski, M Van Eeten
WEIS 2017, 1-23, 2017
702017
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
NDSS, 2019
682019
Understanding the role of sender reputation in abuse reporting and cleanup
O Cetin, M Hanif Jhaveri, C Gañán, M van Eeten, T Moore
Journal of Cybersecurity 2 (1), 83-98, 2016
662016
Abuse reporting and the fight against cybercrime
MH Jhaveri, O Cetin, C Gañán, T Moore, MV Eeten
ACM Computing Surveys (CSUR) 49 (4), 1-27, 2017
522017
An empirical analysis of zeus c&c lifetime
C Gañán, O Cetin, M van Eeten
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
382015
Let me out! Evaluating the effectiveness of quarantining compromised users in walled gardens
O Çetin, C Ganán, L Altena, S Tajalizadehkhoob, M van Eeten
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 251-263, 2018
372018
Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks
O Çetin, C Gañán, L Altena, S Tajalizadehkhoob, M Van Eeten
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 326-339, 2019
352019
On the effectiveness of ransomware decryption tools
B Filiz, B Arief, O Cetin, J Hernandez-Castro
Computers & Security 111, 102469, 2021
202021
Investigating the impact of ransomware splash screens
Y Yilmaz, O Cetin, B Arief, J Hernandez-Castro
Journal of Information Security and Applications 61 (C), 2021
152021
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
OS Ozturk, E Ekmekcioglu, O Cetin, B Arief, J Hernandez-Castro
EICC2023: European Interdisciplinary Cybersecurity Conference, 2023
142023
Personality types and ransomware victimisation
Y Yilmaz, O Çetin, C Grigore, B Arief, J Hernandez-Castro
Digital Threats: Research and Practice 4 (4), 1-25, 2023
82023
Using Eyetracker to Find Ways to Mitigate Ransomware
B Arief, A Periam, O Cetin, J Hernandez-Castro
ICISSP conference, 2020
82020
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.(2019)
O Cetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
42019
On ChatGPT: perspectives from software engineering students
K Hanifi, O Cetin, C Yilmaz
2023 IEEE 23rd International Conference on Software Quality, Reliability …, 2023
22023
Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots
JC Kocaogullar, Yekta, Cetin, Orcun, Arief, Budi, Brierley, Calvin, Pont ...
STAST 2022, 2022
1*2022
Unveiling Cyber Threat Actors: A Hybrid Deep Learning Approach for Behavior-based Attribution
E Böge, E Bilgehan, H Alptekin, O Çetin
Digital Threats: Research and Practice, 2024
2024
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs
MB Ozkok, B Birinci, O Cetin, B Arief, J Hernandez-Castro
European Interdisciplinary Cybersecurity Conference, 128-135, 2024
2024
Evaluating the Impact of Conventional Code Analysis Against Large Language Models in API Vulnerability Detection
R Yıldırım, K Aydın, O Çetin
EİCC 2024, 2024
2024
Dissecting Privacy Perspectives of Websites Around the World:" Aceptar Todo, Alle Akzeptieren, Accept All..."
A Ogut, B Turanlioglu, DC Metiner, A Levi, C Yilmaz, O Cetin, S Uluagac
33rd USENIX Security Symposium (USENIX Security 24), 2849-2863, 2024
2024
Using page offsets for detecting control-flow anomalies
E Varan, K Hanifi, AR Erdemli, M Unal, YE Tat, D Tekinoglu, O Cetin, ...
International Conference on Information Technology and Communications …, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20