Follow
Gökhan Kul
Title
Cited by
Cited by
Year
IEEE 802.11 WLAN based real time indoor positioning: Literature survey and experimental investigations
G Kul, T Özyer, B Tavli
Procedia Computer Science 34, 157-164, 2014
682014
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain
V Sharma, I You, G Kul
ACM CCS MIST 2017, 2017
582017
Similarity metrics for sql query clustering
G Kul, DT Luong, T Xie, V Chandola, O Kennedy, S Upadhyaya
IEEE Transactions on Knowledge and Data Engineering, 2018
562018
Ettu: Analyzing query intents in corporate databases
G Kul, D Luong, T Xie, P Coonan, V Chandola, O Kennedy, S Upadhyaya
Proceedings of the 25th international conference companion on world wide web …, 2016
412016
Towards a Cyber Ontology for Insider Threats in the Financial Sector.
G Kul, SJ Upadhyaya
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 64-85, 2015
172015
Detecting Data Leakage from Databases on Android Apps with Concept Drift
G Kul, S Upadhyaya, V Chandola
IEEE TrustCom 2018, 2018
132018
A preliminary cyber ontology for insider threats in the financial sector
G Kul, S Upadhyaya
Proceedings of the 7th ACM CCS International Workshop on Managing Insider …, 2015
92015
Utilization of synergetic human-machine clouds: a big data cleaning case
D Iren, G Kul, S Bilgen
Proceedings of the 1st International Workshop on CrowdSourcing in Software …, 2014
92014
Impact Analysis of Training Data Characteristics for Phishing Email Classification
A Sundararaj, G Kul
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2021
72021
Complexity of Insider Attacks to Databases
G Kul, S Upadhyaya, A Hughes
ACM CCS MIST 2017, 2017
72017
Towards an AI-based after-collision forensic analysis protocol for autonomous vehicles
P Sharma, U Siddanagaiah, G Kul
2020 IEEE Security and Privacy Workshops (SPW), 240-243, 2020
62020
Automated User Experience Testing through Multi-Dimensional Performance Impact Analysis
C Biringa, G Kul
2021 IEEE/ACM International Conference on Automation of Software Test (AST …, 2021
42021
An Analysis of Complexity of Insider Attacks to Databases
G Kul, S Upadhyaya, A Hughes
ACM Transactions on Management Information Systems (TMIS) 12 (1), 2020
42020
Toward Pinpointing Data Leakage from Advanced Persistent Threats
J D'Agostino, G Kul
2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2021
22021
The Case for Physical Memory Pools: A Vision Paper
H Craddock, LP Konudula, K Cheng, G Kul
Cloud Computing–CLOUD 2019: 12th International Conference, Held as Part of …, 2019
22019
Summarizing large query logs in ettu
G Kul, D Luong, T Xie, P Coonan, V Chandola, O Kennedy, S Upadhyaya
arXiv preprint arXiv:1608.01013, 2016
22016
Performance analysis of deep-learning based open set recognition algorithms for network intrusion detection systems
G Baye, P Silva, A Broggi, L Fiondella, ND Bastian, G Kul
NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2023
12023
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
C Biringa, B Gaspard, G Kul
Proceedings of the 11th International Workshop on Hardware and Architectural …, 2022
12022
Guest Editorial: Special Issue on Advances in Insider Threat Detection.
I Agrafiotis, G Kul
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 1-2, 2021
12021
Creating a preliminary cyber ontology for insider threats in the financial sector
G Kul, S Upadhyaya
12015
The system can't perform the operation now. Try again later.
Articles 1–20