1. 2020
  2. Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics

    van Wegberg, R., Miedema, F., Akyazi, U., Noroozian, A., Klievink, B. & van Eeten, M., 2020, Proceedings of The Web Conference (WWW). Association for Computing Machinery (ACM), p. 816-826 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  3. 2018
  4. Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

    van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M., 15 Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  5. 2014
  6. Possible Scenarios and Maneuvers for Cyber Operational Area

    Akyazi, U., 2014, Proceedings of the13th European Conference on Cyber Warfare and Security. 13th European Conference on Cyber Warfare and Security, p. 1-7 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  7. 2013
  8. Measures in the Context of International Cyber Security Strategy and Doctrines (Uluslararasi Siber Guvenlik Stratejileri ve Doktrinleri kapsaminda alinabilecek tedbirler)

    Akyazi, U., 2013, 6th International Conference on Information Security and Cryptology (6. Uluslararasi Bilgi Guvenligi ve Kriptoloji Konferansi).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  9. 2012
  10. Distributed Detection of DDoS Attacks During the Intermediate Phase Through Mobile Agents

    Akyazi, U. & Uyar, A. S., 2012, In : Computing and Informatics. 31, 4, p. 759-778 20 p.

    Research output: Contribution to journalArticleScientificpeer-review

  11. 2010
  12. A Hybrid Multiobjective Evolutionary Algorithm for Anomaly Intrusion Detection

    Akyazi, U. & Uyar, A. S., 2010, Distributed Computing and Artificial Intelligence. Vol. 79. p. 509-516 (Advances in Intelligent and Soft Computing).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  13. Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm

    Akyazi, U. & Uyar, A. S., 2010, European Conference on Evolutionary Computation in Combinatorial Optimization. Vol. 6025. p. 1-10 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  14. 2008
  15. Distributed Intrusion Detection using Mobile Agents against DDoS Attacks

    Akyazi, U. & Uyar, A. S. E., 2008, 23rd International Symposium on Computer and Information Sciences. p. 1-6

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

ID: 33030560