Follow
Sevil Sen
Title
Cited by
Cited by
Year
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
F Sakiz, S Sen
Ad Hoc Networks 61, 33-50, 2017
4902017
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
4052014
Intrusion detection in mobile ad hoc networks
S Şen, JA Clark
Guide to wireless ad hoc networks, 427-454, 2009
1512009
Electric fish optimization: a new heuristic algorithm inspired by electrolocation
S Yilmaz, S Sen
Neural Computing and Applications 32 (15), 11543-11578, 2020
1002020
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
S Sen, JA Clark
Computer Networks 55 (15), 3441-3457, 2011
942011
Coevolution of mobile malware and anti-malware
S Sen, E Aydogan, AI Aysan
IEEE Transactions on Information Forensics and Security 13 (10), 2563-2574, 2018
912018
Security threats in mobile ad hoc networks
S Sen, JA Clark, JE Tapiador
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach …, 2010
792010
Load balancing for RPL-based Internet of Things: A review
D Pancaroglu, S Sen
Ad Hoc Networks 116, 102491, 2021
552021
A central intrusion detection system for rpl-based industrial internet of things
E Aydogan, S Yilmaz, S Sen, I Butun, S Forsström, M Gidlund
2019 15th IEEE International Workshop on Factory Communication Systems (WFCS …, 2019
552019
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
S Şen, JA Clark
Proceedings of the second ACM conference on Wireless network security, 95-102, 2009
512009
A survey of intrusion detection systems using evolutionary computation
S Sen
Bio-inspired computation in telecommunications, 73-94, 2015
502015
GenTrust: A genetic trust management model for peer-to-peer systems
UE Tahta, S Sen, AB Can
Applied Soft Computing 34, 693-704, 2015
492015
A transfer learning approach for securing resource-constrained IoT devices
S Yilmaz, E Aydogan, S Sen
IEEE Transaction on Information Forensics and Security, 2021
442021
Threat modelling for mobile ad hoc and sensor networks
JA Clark, J Murdoch, JA McDermid, S Sen, H Chivers, O Worthington, ...
Annual Conference of ITA, 25-27, 2007
392007
Power-aware intrusion detection in mobile ad hoc networks
S Şen, JA Clark, JE Tapiador
Ad Hoc Networks: First International Conference, ADHOCNETS 2009, Niagara …, 2010
372010
Automatic generation of mobile malwares using genetic programming
E Aydogan, S Sen
Applications of Evolutionary Computation: 18th European Conference …, 2015
352015
A cross-layer intrusion detection system for RPL-based Internet of Things
E Canbalaban, S Sen
Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad …, 2020
342020
Updroid: Updated android malware and its familial classification
K Aktas, S Sen
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018
242018
SAFEDroid: Using Structural Features for Detecting Android Malwares
S Sen, AI Aysan, JA Clark
242018
On sampling strategies for small and continuous data with the modeling of genetic programming and adaptive neuro-fuzzy inference system
S Sen, EA Sezer, C Gokceoglu, S Yagiz
Journal of Intelligent and Fuzzy Systems 23 (6), 297-304, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20