Follow
Gökhan Kul
Title
Cited by
Cited by
Year
IEEE 802.11 WLAN based real time indoor positioning: Literature survey and experimental investigations
G Kul, T Özyer, B Tavli
Procedia Computer Science 34, 157-164, 2014
702014
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain
V Sharma, I You, G Kul
ACM CCS MIST 2017, 2017
622017
Similarity metrics for sql query clustering
G Kul, DT Luong, T Xie, V Chandola, O Kennedy, S Upadhyaya
IEEE Transactions on Knowledge and Data Engineering, 2018
612018
Ettu: Analyzing query intents in corporate databases
G Kul, D Luong, T Xie, P Coonan, V Chandola, O Kennedy, S Upadhyaya
Proceedings of the 25th international conference companion on world wide web …, 2016
432016
Towards a Cyber Ontology for Insider Threats in the Financial Sector.
G Kul, SJ Upadhyaya
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 64-85, 2015
182015
Detecting Data Leakage from Databases on Android Apps with Concept Drift
G Kul, S Upadhyaya, V Chandola
IEEE TrustCom 2018, 2018
142018
A preliminary cyber ontology for insider threats in the financial sector
G Kul, S Upadhyaya
Proceedings of the 7th ACM CCS International Workshop on Managing Insider …, 2015
122015
Towards an AI-based after-collision forensic analysis protocol for autonomous vehicles
P Sharma, U Siddanagaiah, G Kul
2020 IEEE Security and Privacy Workshops (SPW), 240-243, 2020
9*2020
Utilization of synergetic human-machine clouds: a big data cleaning case
D Iren, G Kul, S Bilgen
Proceedings of the 1st International Workshop on CrowdSourcing in Software …, 2014
92014
Impact Analysis of Training Data Characteristics for Phishing Email Classification
A Sundararaj, G Kul
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2021
82021
Performance analysis of deep-learning based open set recognition algorithms for network intrusion detection systems
G Baye, P Silva, A Broggi, L Fiondella, ND Bastian, G Kul
NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2023
72023
Complexity of Insider Attacks to Databases
G Kul, S Upadhyaya, A Hughes
ACM CCS MIST 2017, 2017
72017
Automated user experience testing through multi-dimensional performance impact analysis
C Biringa, G Kul
2021 IEEE/ACM International Conference on Automation of Software Test (AST …, 2021
52021
An Analysis of Complexity of Insider Attacks to Databases
G Kul, S Upadhyaya, A Hughes
ACM Transactions on Management Information Systems (TMIS) 12 (1), 2020
42020
Toward Pinpointing Data Leakage from Advanced Persistent Threats
J D'Agostino, G Kul
2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2021
32021
Quantitative assessment of machine learning reliability and resilience
Z Faddi, K da Mata, P Silva, V Nagaraju, S Ghosh, G Kul, L Fiondella
Risk Analysis, 2024
22024
Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report)
J Sorrentino, P Silva, G Baye, G Kul, L Fiondella
2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022
22022
A Survey on the Challenges of Implementing Physical Memory Pools
H Craddock, LP Konudula, G Kul
Journal of Internet Services and Information Security (JISIS) 9 (2), 51-71, 2019
22019
The Case for Physical Memory Pools: A Vision Paper
H Craddock, LP Konudula, K Cheng, G Kul
Cloud Computing–CLOUD 2019: 12th International Conference, Held as Part of …, 2019
22019
Summarizing large query logs in ettu
G Kul, D Luong, T Xie, P Coonan, V Chandola, O Kennedy, S Upadhyaya
arXiv preprint arXiv:1608.01013, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20