Seyit A. Camtepe
Seyit A. Camtepe
Principal Research Scientist / CSIRO Data61
Adresse e-mail validée de ieee.org - Page d'accueil
Titre
Citée par
Citée par
Année
Key distribution mechanisms for wireless sensor networks: a survey
SA Camtepe, B Yener
Rensselaer Polytechnic Institute, Troy, New York, Technical Report, 05-07, 2005
5752005
An android application sandbox system for suspicious software detection
T Bläsing, L Batyuk, AD Schmidt, SA Camtepe, S Albayrak
2010 5th International Conference on Malicious and Unwanted Software, 55-62, 2010
5472010
Static analysis of executables for collaborative malware detection on android
AD Schmidt, R Bye, HG Schmidt, J Clausen, O Kiraz, KA Yuksel, ...
2009 IEEE International Conference on Communications, 1-5, 2009
3352009
Combinatorial design of key distribution mechanisms for wireless sensor networks
SA Çamtepe, B Yener
IEEE/ACM Transactions on networking 15 (2), 346-358, 2007
3262007
Combinatorial design of key distribution mechanisms for wireless sensor networks
SA Camtepe, B Yener
European Symposium on Research in Computer Security, 293-308, 2004
3042004
Monitoring smartphones for anomaly detection
AD Schmidt, F Peters, F Lamour, C Scheel, SA Çamtepe, Ş Albayrak
Mobile Networks and Applications 14 (1), 92-106, 2009
2092009
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
L Batyuk, M Herpich, SA Camtepe, K Raddatz, AD Schmidt, S Albayrak
2011 6th International Conference on Malicious and Unwanted Software, 66-72, 2011
1652011
Modeling and multiway analysis of chatroom tensors
E Acar, SA Çamtepe, MS Krishnamoorthy, B Yener
International Conference on Intelligence and Security Informatics, 256-268, 2005
1502005
Enhancing security of linux-based android devices
AD Schmidt, HG Schmidt, J Clausen, KA Yuksel, O Kiraz, A Camtepe, ...
Proceedings of 15th International Linux Kongress, 1-16, 2008
1272008
Smartphone malware evolution revisited: Android next target?
AD Schmidt, HG Schmidt, L Batyuk, JH Clausen, SA Camtepe, S Albayrak, ...
2009 4th International conference on malicious and unwanted software …, 2009
1262009
Key management in wireless sensor networks
SA Çamtepe, B Yener
Wireless sensor network security (J López, J Zhou) - IOS Press, 2008
120*2008
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
A Messerman, T Mustafić, SA Camtepe, S Albayrak
2011 International Joint Conference on Biometrics (IJCB), 1-8, 2011
1182011
Identity theft, computers and behavioral biometrics
R Moskovitch, C Feher, A Messerman, N Kirschnick, T Mustafic, ...
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
902009
Detecting symbian os malware through static function call analysis
AD Schmidt, JH Clausen, A Camtepe, S Albayrak
2009 4th International Conference on Malicious and Unwanted Software …, 2009
802009
Modeling and detection of complex attacks
SA Camtepe, B Yener
2007 Third International Conference on Security and Privacy in …, 2007
792007
Collective sampling and analysis of high order tensors for chatroom communications
E Acar, SA Camtepe, B Yener
International Conference on Intelligence and Security Informatics, 213-224, 2006
712006
Developing and benchmarking native linux applications on android
L Batyuk, AD Schmidt, HG Schmidt, A Camtepe, S Albayrak
MobileWireless Middleware, Operating Systems, and Applications, 381-392, 2009
702009
A survey and analysis of the GNSS spoofing threat and countermeasures
D Schmidt, K Radke, S Camtepe, E Foo, M Ren
ACM Computing Surveys (CSUR) 48 (4), 1-31, 2016
532016
Expander graph based key distribution mechanisms in wireless sensor networks
SA Camtepe, B Yener, M Yung
2006 IEEE international conference on communications 5, 2262-2267, 2006
502006
Securing DNP3 broadcast communications in SCADA systems
R Amoah, S Camtepe, E Foo
IEEE Transactions on Industrial Informatics 12 (4), 1474-1485, 2016
422016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20