No profile picture available

Dr Cagatay Yucel

  • cyucel at bournemouth dot ac dot uk
  • Lecturer in Computer Science
  • Poole House P418, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Biography

Dr Çagatay Yücel is a Lecturer in Computer Science (Cybersecurity) in the Department of Computing & Informatics at Bournemouth University. Prior to this post, he worked as a Postdoctoral researcher and Threat Intelligence Analyst at Bournemouth University CERT. Yucel received his PhD in 2019 with the thesis titled “Imaging and Evaluating the Memory Access for Malware”. He has specialised and published in the fields of malware analysis, reverse engineering and cyber threat intelligence.

Journal Articles

Chapters

  • Chalkias, I., Yucel, C., Mallis, D., Rajamaki, J., De Vecchis, F., Hagstrom, P. and Katos, V., 2024. An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System. 23-40.
  • Koltuksuz, A. and Yucel, C., 2022. The Current Mechanisms for Malware Detection and Response. Horizons in Computer Science Research. Nova Science Publishers.

Conferences

  • Akbas, T., Koltuksuz, A. and Yucel, C., 2023. Distributed and Biometric Signature-Based Identity Proofing System for the Maritime Sector. UBMK 2023 - Proceedings: 8th International Conference on Computer Science and Engineering, 11-16.
  • Yucel, C., Chalkias, I., Mallis, D., Cetinkaya, D., Henriksen-Bulmer, J. and Cooper, A., 2021. Data sanitisation and redaction for cyber threat intelligence sharing platforms. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, 343-347.
  • Mavzer, K.B., Konieczna, E., Alves, H., Yucel, C., Chalkias, I., Mallis, D., Cetinkaya, D. and Sanchez, L.A.G., 2021. Trust and quality computation for cyber threat intelligence sharing platforms. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, 360-365.
  • McCall, S., Yucel, C. and Katos, V., 2021. Education in cyber physical systems security: The case of connected autonomous vehicles. IEEE Global Engineering Education Conference, EDUCON, 2021-April, 1379-1385.
  • Yucel, C., Chalkias, I., Mallis, D., Karagiannis, E., Cetinkaya, D. and Katos, V., 2020. On the assessment of completeness and timeliness of actionable cyber threat intelligence artefacts. Communications in Computer and Information Science, 1284 CCIS, 51-66.
  • Yücel, Ç., Koltuksuz, A., Ödemiş, M., Kademi, A.M. and Özbilgin, G., 2018. A programmable threat intelligence framework for containerized clouds. Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018, 2018-March, 503-510.
  • Odemis, M., Yucel, C., Koltuksuz, A. and Ozbilgin, G., 2018. Suggesting a Honeypot Design to Capture Hacker Psychology, Personality and Sophistication. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 432-438.
  • Yaǧci, H., Yüce, Ç. and Koltuksuz, A., 2017. A parallel cyber universe: Botnet implementations over TOR-like networks. European Conference on Information Warfare and Security, ECCWS, 0, 537-543.
  • Yucel, C., Koltuksuz, A. and Yagci, H., 2016. Clandestine cell based honeypot networks. European Conference on Information Warfare and Security, ECCWS, 2016-January, 295-302.
  • Yucel, C. and Koltuksuz, A., 2014. An annotated bibliographical survey on cyber intelligence for cyber intelligence officers. European Conference on Information Warfare and Security, ECCWS, 2014-January, 213-220.

Profile of Teaching UG

  • L5 - Ethical Hacking & Countermeasures
  • L7 - Security Information and Event Management