Ziya Alper Genç
Ziya Alper Genç
Adresse e-mail validée de uni.lu - Page d'accueil
Titre
Citée par
Citée par
Année
Examination of a New Defense Mechanism: Honeywords
ZA Genc, S Kardas, MS Kiraz
33*
No random, no ransom: a key to stop cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
International Conference on Detection of Intrusions and Malware, and …, 2018
112018
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
MS Kiraz, ZA Genç, S Kardas
Security and Communication Networks 8 (18), 4123-4135, 2015
92015
Next generation cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
Nordic Conference on Secure IT Systems, 385-401, 2018
52018
The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
ZA Genç, G Lenzini, P Ryan
Advances in Cybersecurity 2017, 2017
52017
“The simplest protocol for oblivious transfer” revisited
ZA Genç, V Iovino, A Rial
Information Processing Letters, 105975, 2020
42020
Security analysis of key acquiring strategies used by cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018
42018
Detecting large integer arithmetic for defense against crypto ransomware
MS Kiraz, ZA Genç, E Öztürk
Cr yptology ePrint Archive, Report 558, 2017, 2017
42017
On Deception-Based Protection Against Cryptographic Ransomware
ZA Genç, G Lenzini, D Sgandurra
International Conference on Detection of Intrusions and Malware, and …, 2019
32019
Security attacks and enhancements to chaotic map-based RFID authentication protocols
S Kardaş, ZA Genç
Wireless Personal Communications 98 (1), 1135-1154, 2018
32018
A security analysis, and a fix, of a code-corrupted honeywords system
ZA Genç, G Lenzini, P Ryan, I Vazquez Sandoval
Proceedings of the 4th International Conference on Information Systems …, 2018
22018
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware
ZA Genç, G Lenzini, PYA Ryan
International Workshop on Emerging Technologies for Authorization and …, 2019
12019
Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the 6th International Conference on Information Systems …, 2020
2020
A Game of “Cut and Mouse”
ZA Genç, G Lenzini, D Sgandurra
2019
A game of" Cut and Mouse" bypassing antivirus by simulating user inputs
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
2019
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the Third Central European Cybersecurity Conference, 1-4, 2019
2019
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
ZA Genç, G Lenzini, PYA Ryan, IV Sandoval
International Conference on Information Systems Security and Privacy, 125-151, 2018
2018
Crypren Decryptor
ZA Genç
2018
Secure and efficient biometric authentication based on advanced cryptographic primitives
ZA Genç
2016
The second Central European Cybersecurity Conference–CECC 2018 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central …
S Wendzel, D Eller, W Mazurczyk, T Bajtoš, P Sokol, T Mézešová, ...
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20