S
Sevil Sen
Researcher at Hacettepe University
Publications - 53
Citations - 1277
Sevil Sen is an academic researcher from Hacettepe University. The author has contributed to research in topics: Intrusion detection system & Mobile ad hoc network. The author has an hindex of 14, co-authored 43 publications receiving 961 citations. Previous affiliations of Sevil Sen include University of York & Akdeniz University.
Papers
More filters
Journal ArticleDOI
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains
TL;DR: The Exposure system, a system designed to detect malicious domains in real time, by applying 15 unique features grouped in four categories, is presented and the results and lessons learned from 17 months of its operation are described.
Journal ArticleDOI
A survey of attacks and detection mechanisms on intelligent transportation systems
Fatih Sakiz,Sevil Sen +1 more
TL;DR: This paper aims to survey possible attacks against VANETs and the corresponding detection mechanisms that are proposed in the literature, and presents a holistic view of the solutions surveyed.
Book ChapterDOI
Intrusion Detection in Mobile Ad Hoc Networks
Sevil Sen,John A. Clark +1 more
TL;DR: In this paper, an intrusion detection system (IDS) is used to monitor system activities and detect intrusions in mobile ad-hoc networks (MANETs) in the absence of a fixed infrastructure.
Book Chapter
Security Threats in Mobile Ad Hoc Networks
TL;DR: This chapter provides a comprehensive survey of attacks against a specific type of target, namely the routing protocols used by MANETs, and presents a detailed classification of the attacks/attackers against these complex distributed systems.
Journal ArticleDOI
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Sevil Sen,John A. Clark +1 more
TL;DR: This paper explores the use of evolutionary computation techniques, particularly genetic programming and grammatical evolution, to evolve intrusion detection programs for such challenging environments and analyses the power consumption of evolved programs to discover optimal trade-offs between intrusion detection ability and power consumption.