default search action
Gökhan Kul
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Tim Fischer, Denis Hirn, Gökhan Kul:
A Reproducible Tutorial on Reproducibility in Database Systems Research. Proc. VLDB Endow. 17(12): 4221-4224 (2024) - [j7]Chidera Biringa, Gökhan Kul:
PACE: A Program Analysis Framework for Continuous Performance Prediction. ACM Trans. Softw. Eng. Methodol. 33(4): 85:1-85:23 (2024) - [c18]Priscila Silva, Gaspard Baye, Alexandre Broggi, Nathaniel D. Bastian, Gökhan Kul, Lance Fiondella:
Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems. ICCCN 2024: 1-6 - 2023
- [c17]Kevin Montambault, Gökhan Kul:
Image Attribute Estimation for Forensic Image Reconstruction from Fragments. HICSS 2023: 6633-6642 - [c16]Gaspard Baye, Priscila Silva, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gökhan Kul:
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems. NOMS 2023: 1-6 - [i6]Chidera Biringa, Gökhan Kul:
PACE: A Program Analysis Framework for Continuous Performance Prediction. CoRR abs/2312.00918 (2023) - 2022
- [c15]Chidera Biringa, Gaspard Baye, Gökhan Kul:
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks. HASP@MICRO 2022: 53-57 - [c14]Julia Sorrentino, Priscila Silva, Gaspard Baye, Gökhan Kul, Lance Fiondella:
Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report). ISSRE 2022: 157-168 - [c13]Chidera Biringa, Gökhan Kul:
A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. SIN 2022: 1-4 - [i5]Chidera Biringa, Gökhan Kul:
A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks. CoRR abs/2210.12877 (2022) - [i4]Chidera Biringa, Gaspard Baye, Gökhan Kul:
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks. CoRR abs/2210.14452 (2022) - 2021
- [j6]Ioannis Agrafiotis, Gökhan Kul:
Guest Editorial: Special Issue on Advances in Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 1-2 (2021) - [j5]Akash Sundararaj, Gökhan Kul:
Impact Analysis of Training Data Characteristics for Phishing Email Classification. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 85-98 (2021) - [j4]Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes:
An Analysis of Complexity of Insider Attacks to Databases. ACM Trans. Manag. Inf. Syst. 12(1): 4:1-4:18 (2021) - [c12]Chidera Biringa, Gökhan Kul:
Automated User Experience Testing through Multi-Dimensional Performance Impact Analysis. AST@ICSE 2021: 125-128 - [c11]Jack D'Agostino, Gökhan Kul:
Toward Pinpointing Data Leakage from Advanced Persistent Threats. BigDataSecurity 2021: 157-162 - [i3]Chidera Biringa, Gökhan Kul:
Automated User Experience Testing through Multi-Dimensional Performance Impact Analysis. CoRR abs/2104.03453 (2021) - 2020
- [c10]Prinkle Sharma, Umesh Siddanagaiah, Gökhan Kul:
Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles. SP (Workshops) 2020: 240-243
2010 – 2019
- 2019
- [j3]Heather Craddock, Lakshmi Prasanna Konudula, Gökhan Kul:
A Survey on the Challenges of Implementing Physical Memory Pools. J. Internet Serv. Inf. Secur. 9(2): 57-71 (2019) - [c9]Heather Craddock, Lakshmi Prasanna Konudula, Kun Cheng, Gökhan Kul:
The Case for Physical Memory Pools: A Vision Paper. CLOUD 2019: 208-221 - 2018
- [b1]Gökhan Kul:
Insider Threat on Databases: Modeling and Mitigation Techniques. University at Buffalo, New York, USA, 2018 - [j2]Gökhan Kul, Duc Thanh Anh Luong, Ting Xie, Varun Chandola, Oliver Kennedy, Shambhu J. Upadhyaya:
Similarity Metrics for SQL Query Clustering. IEEE Trans. Knowl. Data Eng. 30(12): 2408-2420 (2018) - [c8]Gökhan Kul, Shambhu J. Upadhyaya, Varun Chandola:
Detecting Data Leakage from Databases on Android Apps with Concept Drift. TrustCom/BigDataSE 2018: 905-913 - [i2]Gökhan Kul, Shambhu J. Upadhyaya, Varun Chandola:
Detecting Data Leakage from Databases on Android Apps with Concept Drift. CoRR abs/1805.11780 (2018) - 2017
- [c7]Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes:
Complexity of Insider Attacks to Databases. MIST@CCS 2017: 25-32 - [c6]Vishal Sharma, Ilsun You, Gökhan Kul:
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain. MIST@CCS 2017: 81-84 - 2016
- [c5]Gökhan Kul, Duc Luong, Ting Xie, Patrick Coonan, Varun Chandola, Oliver Kennedy, Shambhu J. Upadhyaya:
Ettu: Analyzing Query Intents in Corporate Databases. WWW (Companion Volume) 2016: 463-466 - [i1]Gökhan Kul, Duc Luong, Ting Xie, Patrick Coonan, Varun Chandola, Oliver Kennedy, Shambhu J. Upadhyaya:
Summarizing Large Query Logs in Ettu. CoRR abs/1608.01013 (2016) - 2015
- [j1]Gökhan Kul, Shambhu J. Upadhyaya:
Towards a Cyber Ontology for Insider Threats in the Financial Sector. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 64-85 (2015) - [c4]Gökhan Kul, Shambhu J. Upadhyaya:
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. MIST@CCS 2015: 75-78 - 2014
- [c3]Gökhan Kul, Tansel Özyer, Bülent Tavli:
IEEE 802.11 WLAN based Real Time Indoor Positioning: Literature Survey and Experimental Investigations. FNC/MobiSPC 2014: 157-164 - [c2]Deniz Iren, Gökhan Kul, Semih Bilgen:
Utilization of synergetic human-machine clouds: a big data cleaning case. CSI-SE 2014: 15-18 - [c1]Deniz Iren, Gökhan Kul, Semih Bilgen:
İnsan ve Makine Bulutları Sinerjisi: Kitle Kaynaklı Çalışma ile Veri Temizleme Örnek Uygulaması. UYMS 2014
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint