Imaging and evaluating the memory access for malware Ç Yücel, A Koltuksuz Forensic Science International: Digital Investigation 32, 200903, 2020 | 29 | 2020 |
Age and gender as cyber attribution features in keystroke dynamic-based user classification processes I Tsimperidis, C Yucel, V Katos Electronics 10 (7), 835, 2021 | 19 | 2021 |
On the assessment of completeness and timeliness of actionable cyber threat intelligence artefacts C Yucel, I Chalkias, D Mallis, E Karagiannis, D Cetinkaya, V Katos Multimedia Communications, Services and Security: 10th International …, 2020 | 10 | 2020 |
Detecting user behavior in cyber threat intelligence: Development of Honeypsy system M Odemis, C Yucel, A Koltuksuz Security and Communication Networks 2022 (1), 7620125, 2022 | 8 | 2022 |
Suggesting a honeypot design to capture hacker psychology, personality and sophistication M Odemis, C Yucel, A Koltuksuz, G Ozbilgin 13th International Conference on Cyber Warfare and Security. Academic …, 2018 | 7 | 2018 |
Education in cyber physical systems security: The case of connected autonomous vehicles S McCall, C Yucel, V Katos 2021 IEEE Global Engineering Education Conference (EDUCON), 1379-1385, 2021 | 6 | 2021 |
Trust and quality computation for cyber threat intelligence sharing platforms KB Mavzer, E Konieczna, H Alves, C Yucel, I Chalkias, D Mallis, ... 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 4 | 2021 |
MAIT: Malware Analysis and Intelligence Tool C Yucel, A Lockett, I Chalkias, D Mallis, V Katos Information & Security 50 (1), 49-65, 2021 | 4 | 2021 |
Investigating IPTV malware in the wild A Lockett, I Chalkias, C Yucel, J Henriksen-Bulmer, V Katos Future Internet 15 (10), 325, 2023 | 2 | 2023 |
An annotated bibliographical survey on cyber intelligence for cyber intelligence officers C Yucel, A Koltuksuz Journal of Information Warfare 13 (4), 1-11, 2014 | 2 | 2014 |
Privacy Essentials J Taylor, J Henriksen-Bulmer, C Yucel Electronics 13 (12), 2263, 2024 | 1 | 2024 |
An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System I Chalkias, C Yucel, D Mallis, J Rajamaki, F De Vecchis, V Katos Digital Transformation, Cyber Security and Resilience: Second International …, 2023 | 1 | 2023 |
An information geometrical evaluation of Shannon information metrics on a discrete n-dimensional digital manifold A Koltuksuz, C Yucel, AM Kademi Heliyon 9 (6), 2023 | 1 | 2023 |
Privacy Goals for the Data Lifecycle J Henriksen-Bulmer, C Yucel, S Faily, I Chalkias Future Internet 14 (11), 315, 2022 | 1 | 2022 |
Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms C Yucel, I Chalkias, D Mallis, D Cetinkaya, J Henriksen-Bulmer, A Cooper 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 1 | 2021 |
A programmable threat intelligence framework for containerized clouds Ç Yücel, A Koltuksuz, M Ödemiş, AM Kademi, G Özbilgin International Conference on Cyber Warfare and Security, 503-XVI, 2018 | 1 | 2018 |
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices R Shah, D Cemiloglu, C Yucel, R Ali, V Katos International Journal of Information Security, 1-14, 2024 | | 2024 |
Distributed and biometric signature-based identity proofing system for the maritime sector T Akbas, A Koltuksuz, C Yucel 2023 8th International Conference on Computer Science and Engineering (UBMK …, 2023 | | 2023 |
Clandestine cell based honeypot networks C Yucel, A Koltuksuz, H Yagci ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and …, 2016 | | 2016 |
Software development for transitions of graphs from discrete state into the continuous state Ç Yücel | | 2012 |