Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Orçun Çetin
@inproceedings{DBLP:conf/eicc/OzturkECAH23, author = {Omer Said Ozturk and Emre Ekmekcioglu and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Aleksandra Mileva and Steffen Wendzel and Virginia N. L. Franqueira}, title = {New Tricks to Old Codes: Can {AI} Chatbots Replace Static Code Analysis Tools?}, booktitle = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, {EICC} 2023, Stavanger, Norway, June 14-15, 2023}, pages = {13--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590777.3590780}, doi = {10.1145/3590777.3590780}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eicc/OzturkECAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/HanifiCY23, author = {Khadija Hanifi and Or{\c{c}}un {\c{C}}etin and Cemal Yilmaz}, title = {On ChatGPT: Perspectives from Software Engineering Students}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023}, pages = {196--205}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS60937.2023.00028}, doi = {10.1109/QRS60937.2023.00028}, timestamp = {Tue, 23 Jan 2024 09:45:31 +0100}, biburl = {https://dblp.org/rec/conf/qrs/HanifiCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/VaranHEUTTCFY23, author = {Engincan Varan and Khadija Hanifi and Aysegul Rana Erdemli and Musa Unal and Yunus Emre Tat and Dilara Tekinoglu and Or{\c{c}}un {\c{C}}etin and Ramin Fuladi and Cemal Yilmaz}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {Using Page Offsets for Detecting Control-Flow Anomalies}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {13--25}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_2}, doi = {10.1007/978-3-031-52947-4\_2}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/VaranHEUTTCFY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FilizACH21, author = {Burak Filiz and Budi Arief and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {On the Effectiveness of Ransomware Decryption Tools}, journal = {Comput. Secur.}, volume = {111}, pages = {102469}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102469}, doi = {10.1016/J.COSE.2021.102469}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FilizACH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YilmazCAH21, author = {Yagiz Yilmaz and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Investigating the impact of ransomware splash screens}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102934}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102934}, doi = {10.1016/J.JISA.2021.102934}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YilmazCAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AriefPCH20, author = {Budi Arief and Andy Periam and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Using Eyetracker to Find Ways to Mitigate Ransomware}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {448--456}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008956004480456}, doi = {10.5220/0008956004480456}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AriefPCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/CetinGATE19, author = {Or{\c{c}}un {\c{C}}etin and Carlos Ga{\~{n}}{\'{a}}n and Lisette Altena and Samaneh Tajalizadehkhoob and Michel van Eeten}, title = {Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {326--339}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00032}, doi = {10.1109/EUROSP.2019.00032}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/CetinGATE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CetinGAKITTYE19, author = {Or{\c{c}}un {\c{C}}etin and Carlos Ga{\~{n}}{\'{a}}n and Lisette Altena and Takahiro Kasama and Daisuke Inoue and Kazuki Tamiya and Ying Tie and Katsunari Yoshioka and Michel van Eeten}, title = {Cleaning Up the Internet of Evil Things: Real-World Evidence on {ISP} and Consumer Efforts to Remove Mirai}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/cleaning-up-the-internet-of-evil-things-real-world-evidence-on-isp-and-consumer-efforts-to-remove-mirai/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CetinGAKITTYE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/CetinGATE18, author = {Or{\c{c}}un {\c{C}}etin and Carlos Ga{\~{n}}{\'{a}}n and Lisette Altena and Samaneh Tajalizadehkhoob and Michel van Eeten}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {251--263}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/cetin}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/CetinGATE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/JhaveriCGME17, author = {Mohammad Hanif Jhaveri and Or{\c{c}}un {\c{C}}etin and Carlos Ga{\~{n}}{\'{a}}n and Tyler Moore and Michel van Eeten}, title = {Abuse Reporting and the Fight Against Cybercrime}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {4}, pages = {68:1--68:27}, year = {2017}, url = {https://doi.org/10.1145/3003147}, doi = {10.1145/3003147}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/JhaveriCGME17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CetinJGEM16, author = {Or{\c{c}}un {\c{C}}etin and Mohammad Hanif Jhaveri and Carlos Ga{\~{n}}{\'{a}}n and Michel van Eeten and Tyler Moore}, title = {Understanding the role of sender reputation in abuse reporting and cleanup}, journal = {J. Cybersecur.}, volume = {2}, number = {1}, pages = {83--98}, year = {2016}, url = {https://doi.org/10.1093/cybsec/tyw005}, doi = {10.1093/CYBSEC/TYW005}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/CetinJGEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GananCE15, author = {Carlos Ga{\~{n}}{\'{a}}n and Or{\c{c}}un {\c{C}}etin and Michel van Eeten}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {An Empirical Analysis of ZeuS C{\&}C Lifetime}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {97--108}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714579}, doi = {10.1145/2714576.2714579}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GananCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/CetinJGEM15, author = {Or{\c{c}}un {\c{C}}etin and Mohammad Hanif Jhaveri and Carlos Ga{\~{n}}{\'{a}}n and Michel van Eeten and Tyler Moore}, title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_cetin.pdf}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/CetinJGEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.