Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på forfatter "Catak, Ferhat Özgur"
-
Classification of Methamorphic Malware with Deep Learning (LSTM)
Catak, Ferhat Özgur; Yazi, Ahmet Faruk; Gul, Ensar (IEEE Conference Publication;, Chapter, 2019)Nowadays, anti-virus applications using traditional signature-based detection methods fail to detect metamorphic malware. For this reason, recent studies on the detection and classification of malicious software address ... -
Classification with Extreme Learning Machine and ensemble algorithms over randomly partitioned data
Catak, Ferhat Özgur (Chapter, 2015)In this age of Big Data, machine learning based data mining methods are extensively used to inspect large scale data sets. Deriving applicable predictive modeling from these type of data sets is a challenging obstacle ... -
Deep learning based Sequential model for malware analysis using Windows exe API Calls
Catak, Ferhat Özgur; Yazi, Ahmet Faruk; Elezaj, Ogerta; Ahmed, Javed (Peer reviewed; Journal article, 2020)Malware development has seen diversity in terms of architecture and features. This advancement in the competencies of malware poses a severe threat and opens new research dimensions in malware detection. This study is ... -
Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks
Catak, Ferhat Özgur; Yildirim Yayilgan, Sule (Journal article, 2021) -
Incrementing Adversarial Robustness with Autoencoding for Machine Learning Model Attacks
Catak, Ferhat Özgur; Sivaslioglu, Samed; Gul, Ensar (Chapter, 2019)Nowadays, machine learning is being used widely. There have also been attacks towards machine learning process. In this study, robustness against machine learning model attacks which cause many results such as misclassification, ... -
Password‐based encryption approach for securing sensitive data
Mustacoglu, Ahmet Fatih; Catak, Ferhat Özgur (Journal article, 2020)The direction of computing is affected and lead by several trends. First, we have the Data Overwhelm from Commercial sources (eg, Amazon), Community sources (eg, Twitter), and Scientific applications (eg, Genomics). Next, ... -
Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm
Catak, Ferhat Özgur; Aydin, Ismail; Elezaj, Ogerta; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2020)The protection and processing of sensitive data in big data systems are common problems as the increase in data size increases the need for high processing power. Protection of the sensitive data on a system that contains ... -
Preventing Data Poisoning Attacks By Using Generative Models
Aladag, Merve; Catak, Ferhat Özgur; Gul, Ensar (Chapter; Peer reviewed, 2019)At the present time, machine learning methods have been becoming popular and the usage areas of these methods have also increased with this popularity. The machine learning methods are expected to increase in the cyber ...