1. 2018
  2. Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

    van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M., 15 Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. 2014
  4. Possible Scenarios and Maneuvers for Cyber Operational Area

    Akyazi, U., 2014, Proceedings of the13th European Conference on Cyber Warfare and Security. 13th European Conference on Cyber Warfare and Security, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. 2013
  6. Measures in the Context of International Cyber Security Strategy and Doctrines (Uluslararasi Siber Guvenlik Stratejileri ve Doktrinleri kapsaminda alinabilecek tedbirler)

    Akyazi, U., 2013, 6th International Conference on Information Security and Cryptology (6. Uluslararasi Bilgi Guvenligi ve Kriptoloji Konferansi).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. 2012
  8. Distributed Detection of DDoS Attacks During the Intermediate Phase Through Mobile Agents

    Akyazi, U. & Uyar, A. S., 2012, In : Computing and Informatics. 31, 4, p. 759-778 20 p.

    Research output: Contribution to journalArticleScientificpeer-review

  9. 2010
  10. A Hybrid Multiobjective Evolutionary Algorithm for Anomaly Intrusion Detection

    Akyazi, U. & Uyar, A. S., 2010, Distributed Computing and Artificial Intelligence. Vol. 79. p. 509-516 (Advances in Intelligent and Soft Computing).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  11. Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm

    Akyazi, U. & Uyar, A. S., 2010, European Conference on Evolutionary Computation in Combinatorial Optimization. Vol. 6025. p. 1-10 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  12. 2008
  13. Distributed Intrusion Detection using Mobile Agents against DDoS Attacks

    Akyazi, U. & Uyar, A. S. E., 2008, 23rd International Symposium on Computer and Information Sciences. p. 1-6

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

ID: 33030560