Gökhan Kul
Gökhan Kul
Bestätigte E-Mail-Adresse bei umassd.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
IEEE 802.11 WLAN based real time indoor positioning: Literature survey and experimental investigations
G Kul, T Özyer, B Tavli
Procedia Computer Science 34, 157-164, 2014
462014
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain
V Sharma, I You, G Kul
ACM CCS MIST 2017, 2017
342017
Similarity metrics for sql query clustering
G Kul, DT Luong, T Xie, V Chandola, O Kennedy, S Upadhyaya
IEEE Transactions on Knowledge and Data Engineering, 2018
302018
Ettu: Analyzing query intents in corporate databases
G Kul, D Luong, T Xie, P Coonan, V Chandola, O Kennedy, S Upadhyaya
Proceedings of the 25th international conference companion on world wide web …, 2016
302016
Towards a Cyber Ontology for Insider Threats in the Financial Sector.
G Kul, SJ Upadhyaya
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 64-85, 2015
112015
Detecting Data Leakage from Databases on Android Apps with Concept Drift
G Kul, S Upadhyaya, V Chandola
IEEE TrustCom 2018, 2018
52018
A preliminary cyber ontology for insider threats in the financial sector
G Kul, S Upadhyaya
Proceedings of the 7th ACM CCS International Workshop on Managing Insider …, 2015
52015
Utilization of synergetic human-machine clouds: a big data cleaning case
D Iren, G Kul, S Bilgen
Proceedings of the 1st International Workshop on CrowdSourcing in Software …, 2014
52014
Complexity of Insider Attacks to Databases
G Kul, S Upadhyaya, A Hughes
ACM CCS MIST 2017, 2017
42017
An Analysis of Complexity of Insider Attacks to Databases
G Kul, S Upadhyaya, A Hughes
ACM Transactions on Management Information Systems (TMIS) 12 (1), 2020
12020
The Case for Physical Memory Pools: A Vision Paper
H Craddock, LP Konudula, K Cheng, G Kul
International Conference on Cloud Computing, 208-221, 2019
12019
Summarizing large query logs in ettu
G Kul, D Luong, T Xie, P Coonan, V Chandola, O Kennedy, S Upadhyaya
arXiv preprint arXiv:1608.01013, 2016
12016
Creating a preliminary cyber ontology for insider threats in the financial sector
G Kul, S Upadhyaya
12015
A Survey on the Challenges of Implementing Physical Memory Pools
H Craddock, LP Konudula, G Kul
Journal of Internet Services and Information Security (JISIS) 9 (2), 51-71, 2019
2019
Technical Report: Creating a Preliminary Cyber Ontology for Insider Threats in the Financial Sector
G Kul, S Upadhyaya
2015
İnsan ve Makine Bulutları Sinerjisi: Kitle Kaynaklı Çalışma ile Veri Temizleme Örnek Uygulaması
D Iren, S Kul, Gokhan, Bilgen
Turkish National Software Engineering Symposium 2014 1221, 571 - 579, 2014
2014
Crowdsourcing Ontology Design
G Kul
2012
Towards Effective Log Summarization
G Kul, D Luong, T Xie, V Chandola, O Kennedy, S Upadhyaya
Integration of DSpace with Computing Center Services
G Kul, YD İren, E Akkaya, E Bozkurt, EE Maviş
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19