A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV F Sakiz, S Sen Ad Hoc Networks 61, 33-50, 2017 | 459 | 2017 |
Exposure: A passive dns analysis service to detect and report malicious domains L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014 | 384 | 2014 |
Intrusion detection in mobile ad hoc networks S Şen, JA Clark Guide to wireless ad hoc networks, 427-454, 2009 | 147 | 2009 |
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks S Sen, JA Clark Computer Networks 55 (15), 3441-3457, 2011 | 92 | 2011 |
Electric fish optimization: a new heuristic algorithm inspired by electrolocation S Yilmaz, S Sen Neural Computing and Applications 32 (15), 11543-11578, 2020 | 90 | 2020 |
Coevolution of mobile malware and anti-malware S Sen, E Aydogan, AI Aysan IEEE Transactions on Information Forensics and Security 13 (10), 2563-2574, 2018 | 87 | 2018 |
Security threats in mobile ad hoc networks S Sen, JA Clark, JE Tapiador Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach …, 2010 | 78 | 2010 |
Load balancing for RPL-based Internet of Things: A review D Pancaroglu, S Sen Ad Hoc Networks 116, 102491, 2021 | 50 | 2021 |
A survey of intrusion detection systems using evolutionary computation S Sen Bio-inspired computation in telecommunications, 73-94, 2015 | 50 | 2015 |
A grammatical evolution approach to intrusion detection on mobile ad hoc networks S Şen, JA Clark Proceedings of the second ACM conference on Wireless network security, 95-102, 2009 | 49 | 2009 |
A central intrusion detection system for rpl-based industrial internet of things E Aydogan, S Yilmaz, S Sen, I Butun, S Forsström, M Gidlund 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019 | 48 | 2019 |
GenTrust: A genetic trust management model for peer-to-peer systems UE Tahta, S Sen, AB Can Applied Soft Computing 34, 693-704, 2015 | 48 | 2015 |
Threat modelling for mobile ad hoc and sensor networks JA Clark, J Murdoch, JA McDermid, S Sen, H Chivers, O Worthington, ... Annual Conference of ITA, 25-27, 2007 | 39 | 2007 |
Power-aware intrusion detection in mobile ad hoc networks S Şen, JA Clark, JE Tapiador Ad Hoc Networks: First International Conference, ADHOCNETS 2009, Niagara …, 2010 | 38 | 2010 |
A transfer learning approach for securing resource-constrained IoT devices S Yilmaz, E Aydogan, S Sen IEEE Transaction on Information Forensics and Security, 2021 | 36 | 2021 |
Automatic generation of mobile malwares using genetic programming E Aydogan, S Sen Applications of Evolutionary Computation: 18th European Conference …, 2015 | 34 | 2015 |
A cross-layer intrusion detection system for RPL-based Internet of Things E Canbalaban, S Sen Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad …, 2020 | 31 | 2020 |
SAFEDroid: Using Structural Features for Detecting Android Malwares S Sen, AI Aysan, JA Clark | 24 | 2018 |
Updroid: Updated android malware and its familial classification K Aktas, S Sen Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018 | 23 | 2018 |
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection S Sen International Journal of Information Security 13, 583-590, 2014 | 20 | 2014 |