default search action
Hayretdin Bahsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Tarmo Korõtko:
Threat modeling of industrial control systems: A systematic literature review. Comput. Secur. 136: 103543 (2024) - [j20]Muaan ur Rehman, Hayretdin Bahsi:
Process-aware security monitoring in industrial control systems: A systematic review and future directions. Int. J. Crit. Infrastructure Prot. 47: 100719 (2024) - [j19]Rajesh Kalakoti, Hayretdin Bahsi, Sven Nõmm:
Improving IoT Security With Explainable AI: Quantitative Evaluation of Explainability for IoT Botnet Detection. IEEE Internet Things J. 11(10): 18237-18254 (2024) - [j18]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
Experts still needed: boosting long-term android malware detection with active learning. J. Comput. Virol. Hacking Tech. 20(4): 901-918 (2024) - [c29]Rajesh Kalakoti, Sven Nõmm, Hayretdin Bahsi:
Enhancing IoT Botnet Attack Detection in SOCs with an Explainable Active Learning Framework. AIIoT 2024: 265-272 - [c28]Rajesh Kalakoti, Hayretdin Bahsi, Sven Nõmm:
Explainable Federated Learning for Botnet Detection in IoT Networks. CSR 2024: 1-8 - [c27]Zhe Deng, Arthur Hubert, Sadok Ben Yahia, Hayretdin Bahsi:
Active Learning-Based Mobile Malware Detection Utilizing Auto-Labeling and Data Drift Detection. CSR 2024: 146-151 - [c26]Gabor Visky, Aleksei Siganov, Muaan ur Rehman, Risto Vaarandi, Hayretdin Bahsi, Leonidas Tsiopoulos:
Hybrid Cybersecurity Research and Education Environment for Maritime Sector. CSR 2024: 644-651 - [c25]Pavel Chikul, Hayretdin Bahsi, Olaf Maennel:
The Design and Implementation of a Semantic Web Framework for the Event-Centric Digital Forensics Analysis. ICISSP 2024: 570-581 - [i2]Karl Tamberg, Hayretdin Bahsi:
Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study. CoRR abs/2405.15614 (2024) - [i1]Risto Vaarandi, Hayretdin Bahsi:
Using Large Language Models for Template Detection from Security Event Logs. CoRR abs/2409.05045 (2024) - 2023
- [j17]Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Risto Vaarandi, Wissem Inoubli:
Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking. IEEE Access 11: 140428-140442 (2023) - [j16]Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Henry Ochieng' Dola, Tarmo Korõtko, Kieran McLaughlin, Vahur Kotkas:
Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System. Comput. Secur. 124: 102950 (2023) - [j15]Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757. Comput. Secur. 124: 102998 (2023) - [j14]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the application of active learning for efficient and effective IoT botnet detection. Future Gener. Comput. Syst. 141: 40-53 (2023) - [j13]Taofeek Mobolarinwa Balogun, Hayretdin Bahsi, Omer F. Keskin, Unal Tatar:
A comparative framework for cyber threat modelling: case of healthcare and industrial control systems. Int. J. Crit. Infrastructures 19(5): 405-431 (2023) - [j12]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Marcin Luckner:
Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. J. Comput. Virol. Hacking Tech. 19(1): 65-96 (2023) - [c24]Mohammad Reza Heidari Iman, Pavel Chikul, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri:
Anomalous File System Activity Detection Through Temporal Association Rule Mining. ICISSP 2023: 733-740 - [c23]Rajesh Kalakoti, Sven Nõmm, Hayretdin Bahsi:
Improving Transparency and Explainability of Deep Learning Based IoT Botnet Detection Using Explainable Artificial Intelligence (XAI). ICMLA 2023: 595-601 - 2022
- [j11]Rajesh Kalakoti, Sven Nõmm, Hayretdin Bahsi:
In-Depth Feature Selection for the Statistical Machine Learning-Based Botnet Detection in IoT Networks. IEEE Access 10: 94518-94535 (2022) - [j10]Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection. Comput. Secur. 120: 102757 (2022) - [j9]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection. Comput. Secur. 122: 102835 (2022) - [j8]Faisal Sumaila, Hayretdin Bahsi:
Digital forensic analysis of mobile automotive maintenance applications. Digit. Investig. 43(Supplement): 301440 (2022) - [j7]Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Android malware concept drift using system calls: Detection, characterization and challenges. Expert Syst. Appl. 206: 117200 (2022) - [j6]Ulrik Franke, Even Langfeldt Friberg, Hayretdin Bahsi:
Maritime cyber-insurance: the Norwegian case. Int. J. Crit. Infrastructures 18(3): 267-286 (2022) - [c22]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the Application of Active Learning to Handle Data Evolution in Android Malware Detection. ICDF2C 2022: 256-273 - [c21]Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Wissem Inbouli:
Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks. ICDF2C 2022: 341-354 - [c20]Hayretdin Bahsi, Henry Ochieng' Dola, Shaymaa Mamdouh Khalil, Tarmo Korõtko:
A Cyber Attack Taxonomy for Microgrid Systems. SoSE 2022: 324-331 - 2021
- [j5]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization. Comput. Secur. 110: 102399 (2021) - [j4]Joanna Rose Del Mar-Raave, Hayretdin Bahsi, Leo Mrsic, Kresimir Hausknecht:
A machine learning-based forensic tool for image classification - A design science approach. Digit. Investig. 38: 301265 (2021) - [c19]Pavel Chikul, Hayretdin Bahsi, Olaf Maennel:
An Ontology Engineering Case Study for Advanced Digital Forensic Analysis. MEDI 2021: 67-74 - 2020
- [j3]Hayretdin Bahsi, Ulrik Franke, Even Langfeldt Friberg:
The cyber-insurance market in Norway. Inf. Comput. Secur. 28(1): 54-67 (2020) - [c18]Leonidas Tsiopoulos, Alar Kuusik, Jüri Vain, Hayretdin Bahsi:
Model-Based Analysis of Secure and Patient-Dependent Pacemaker Monitoring System. BODYNETS 2020: 77-91 - [c17]Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm:
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. ICISSP 2020: 207-218 - [c16]Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm:
Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems. ICISSP (Revised Selected Papers) 2020: 222-243
2010 – 2019
- 2019
- [c15]Hayretdin Bahsi, Veiko Dieves, Taivo Kangilaski, Peeter Laud, Leo Motus, Jaan Murumets, Illimar Ploom, Jaan Priisalu, Mari Seeba, Ermo Täks, Kaide Tammel, Piia Tammpuu, Kuldar Taveter, Avo Trumm, Tiia-Triin Truusa, Triin Vihalemm:
Mapping the Information Flows for the Architecture of a Nationwide Situation Awareness System : (Poster). CogSIMA 2019: 152-157 - [c14]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
Hybrid Feature Selection Models for Machine Learning Based Botnet Detection in IoT Networks. CW 2019: 324-327 - [c13]Terézia Mézesová, Hayretdin Bahsi:
Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. Cyber Security 2019: 1-8 - [c12]Alejandro Guerra-Manzanares, Sven Nõmm, Hayretdin Bahsi:
In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware. ICISSP 2019: 274-283 - [c11]Sven Nomm, Alejandro Guerra-Manzanares, Hayretdin Bahsi:
Towards the Integration of a Post-Hoc Interpretation Step into the Machine Learning Workflow for IoT Botnet Detection. ICMLA 2019: 1162-1169 - [c10]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
Differences in Android Behavior Between Real Device and Emulator: A Malware Detection Perspective. IoTSMS 2019: 399-404 - 2018
- [c9]Hayretdin Bahsi, Sven Nomm, Fabio Benedetto La Torre:
Dimensionality Reduction for Machine Learning Based IoT Botnet Detection. ICARCV 2018: 1857-1862 - [c8]Raquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-Lopez:
Forensics Analysis of an On-line Game over Steam Platform. ICDF2C 2018: 106-127 - [c7]Sven Nomm, Hayretdin Bahsi:
Unsupervised Anomaly Based Botnet Detection in IoT Networks. ICMLA 2018: 1048-1053 - 2016
- [c6]Unal Tatar, Hayretdin Bahsi, Adrian V. Gheorghe:
Impact assessment of cyber attacks: A quantification study on power generation systems. SoSE 2016: 1-6 - 2015
- [c5]Hayretdin Bahsi, Olaf Manuel Maennel:
A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures. NordSec 2015: 3-10 - 2013
- [j2]Erdem Alparslan, Adem Karahoca, Hayretdin Bahsi:
Security-level classification for confidential documents by using adaptive neuro-fuzzy inference systems. Expert Syst. J. Knowl. Eng. 30(3): 233-242 (2013) - 2011
- [c4]Hayretdin Bahsi, Albert Levi:
Preserving organizational privacy in intrusion detection log sharing. CyCon 2011: 1-14 - [c3]Erdem Alparslan, Adem Karahoca, Hayretdin Bahsi:
Classification of confidential documents by using adaptive neurofuzzy inference systems. WCIT 2011: 1412-1417 - 2010
- [b1]Hayretdin Bahsi:
Privacy preserving data collection framework for user centric network applications (Günümüz kullanıcı eksenli ağ uygulamaları için kişisel gizliliği sağlayan bilgi toplama anaçatısı). Sabancı University, Turkey, 2010 - [j1]Hayretdin Bahsi, Albert Levi:
Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures. Sensors 10(9): 8375-8397 (2010)
2000 – 2009
- 2009
- [c2]Hayretdin Bahsi, Albert Levi:
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks. CSA 2009: 1-8 - [c1]Erdem Alparslan, Hayretdin Bahsi:
Security Level Classification of Confidential Documents Written in Turkish. UCMedia 2009: 329-334
Coauthor Index
aka: Sven Nõmm
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint