Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Çamtepe, Seyit Ahmet
add a person with the name Çamtepe, Seyit Ahmet
 

Other publications of authors with the same name

Monitoring Smartphones for Anomaly Detection., , , , , and . MONET, 14 (1): 92-106 (2009)Decentralized Detector Generation in Cooperative Intrusion Detection Systems., , , , , and . SSS, volume 4838 of Lecture Notes in Computer Science, page 37-51. Springer, (2007)A Tool for Internet Chatroom Surveillance., , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 252-265. Springer, (2004)Detecting Symbian OS malware through static function call analysis., , , and . MALWARE, page 15-22. IEEE Computer Society, (2009)Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications., , , , , and . MALWARE, page 66-72. IEEE Computer Society, (2011)Application-level Simulation for Network Security., , , , , and . Simulation, 86 (5-6): 311-330 (2010)A lightweight biometric signature scheme for user authentication over networks., , , , , and . SecureComm, page 33. ACM, (2008)Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics., , , and . IJCB, page 1-8. IEEE Computer Society, (2011)Modeling and Multiway Analysis of Chatroom Tensors., , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 256-268. Springer, (2005)Collective Sampling and Analysis of High Order Tensors for Chatroom Communications., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 213-224. Springer, (2006)