scispace - formally typeset
S

Sevil Sen

Researcher at Hacettepe University

Publications -  53
Citations -  1277

Sevil Sen is an academic researcher from Hacettepe University. The author has contributed to research in topics: Intrusion detection system & Mobile ad hoc network. The author has an hindex of 14, co-authored 43 publications receiving 961 citations. Previous affiliations of Sevil Sen include University of York & Akdeniz University.

Papers
More filters
Journal ArticleDOI

Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains

TL;DR: The Exposure system, a system designed to detect malicious domains in real time, by applying 15 unique features grouped in four categories, is presented and the results and lessons learned from 17 months of its operation are described.
Journal ArticleDOI

A survey of attacks and detection mechanisms on intelligent transportation systems

TL;DR: This paper aims to survey possible attacks against VANETs and the corresponding detection mechanisms that are proposed in the literature, and presents a holistic view of the solutions surveyed.
Book ChapterDOI

Intrusion Detection in Mobile Ad Hoc Networks

TL;DR: In this paper, an intrusion detection system (IDS) is used to monitor system activities and detect intrusions in mobile ad-hoc networks (MANETs) in the absence of a fixed infrastructure.
Book Chapter

Security Threats in Mobile Ad Hoc Networks

TL;DR: This chapter provides a comprehensive survey of attacks against a specific type of target, namely the routing protocols used by MANETs, and presents a detailed classification of the attacks/attackers against these complex distributed systems.
Journal ArticleDOI

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

TL;DR: This paper explores the use of evolutionary computation techniques, particularly genetic programming and grammatical evolution, to evolve intrusion detection programs for such challenging environments and analyses the power consumption of evolved programs to discover optimal trade-offs between intrusion detection ability and power consumption.