
Dr Cagatay Yucel
- cyucel at bournemouth dot ac dot uk
- Lecturer in Computer Science
- Poole House P418, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top
Journal Articles
- Henriksen-Bulmer, J., Yucel, C., Faily, S. and Chalkias, I., 2022. Privacy Goals for the Data Lifecycle. FUTURE INTERNET, 14 (11).
- Odemis, M., Yucel, C. and Koltuksuz, A., 2022. Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System. Security and Communication Networks, 2022.
- Tsimperidis, I., Yucel, C. and Katos, V., 2021. Age and gender as cyber attribution features in keystroke dynamic-based user classification processes. Electronics (Switzerland), 10 (7).
- Yücel, Ç. and Koltuksuz, A., 2020. Imaging and evaluating the memory access for malware. Forensic Science International: Digital Investigation, 32.
- Koltuksuz, A. and Yücel, C., 2014. Software development for transitions of graphs from discrete state into the continuous state. Applied Mathematics and Information Sciences, 8 (6), 2929-2935.
- Yucel, C. and Koltuksuz, A., 2014. An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers. Journal of Information Warfare, 13, 1-11.
Chapters
- Koltuksuz, A. and Yucel, C., 2022. The Current Mechanisms for Malware Detection and Response. Horizons in Computer Science Research. Nova Science Publishers.
Conferences
- Yucel, C., Chalkias, I., Mallis, D., Cetinkaya, D., Henriksen-Bulmer, J. and Cooper, A., 2021. Data sanitisation and redaction for cyber threat intelligence sharing platforms. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, 343-347.
- Mavzer, K.B., Konieczna, E., Alves, H., Yucel, C., Chalkias, I., Mallis, D., Cetinkaya, D. and Sanchez, L.A.G., 2021. Trust and quality computation for cyber threat intelligence sharing platforms. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, 360-365.
- McCall, S., Yucel, C. and Katos, V., 2021. Education in cyber physical systems security: The case of connected autonomous vehicles. IEEE Global Engineering Education Conference, EDUCON, 2021-April, 1379-1385.
- Yucel, C., Chalkias, I., Mallis, D., Karagiannis, E., Cetinkaya, D. and Katos, V., 2020. On the assessment of completeness and timeliness of actionable cyber threat intelligence artefacts. Communications in Computer and Information Science, 1284 CCIS, 51-66.
- Yücel, Ç., Koltuksuz, A., Ödemiş, M., Kademi, A.M. and Özbilgin, G., 2018. A programmable threat intelligence framework for containerized clouds. Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018, 2018-March, 503-510.
- Odemis, M., Yucel, C., Koltuksuz, A. and Ozbilgin, G., 2018. Suggesting a Honeypot Design to Capture Hacker Psychology, Personality and Sophistication. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 432-438.
- Yaǧci, H., Yüce, Ç. and Koltuksuz, A., 2017. A parallel cyber universe: Botnet implementations over TOR-like networks. European Conference on Information Warfare and Security, ECCWS, 537-543.
- Yucel, C., Koltuksuz, A. and Yagci, H., 2016. Clandestine cell based honeypot networks. European Conference on Information Warfare and Security, ECCWS, 2016-January, 295-302.
- Yucel, C. and Koltuksuz, A., 2014. An annotated bibliographical survey on cyber intelligence for cyber intelligence officers. European Conference on Information Warfare and Security, ECCWS, 2014-January, 213-220.