Department of Cyber Security Graduate Programs 2nd Group Interviews Announcement

Related to the 2019-2020 Fall applications for Cyber Security (MS-Non Thesis) programs:

Interviews for MS with Non Thesis in Cyber Security will be held on September 05, 2019 at 09:30 a.m..

Note: Candidates who attended to interview on June 27 don’t have obligation to attend the interview again.

Candidates listed below are expected to be present at Classroom II-02.

Soyadı Adı
AVCI EMRAH
BEKTAS BARIŞ
ÇETINKAYA SERBAY
DEMİREL ABDULLAH
DİNÇ DENİZ GÖRKEM
Ergin Umut
GÜLDEN ÇINAR
GÜLTEKİN MERTCAN
GÜRCAN MEHMET
KAPI METİN
KAYA HAZAL
KESKİN UMUR CAN
MUTLU EMRE
PEHLİVAN VOLKAN
SAĞIRSOY ORÇUN
SEHLİKOĞLU MUSTAFA EMİR
SELVİTOPU UTKU
ŞAHİN HİLAL
ŞAHİN NAZENİN
ŞEN SEÇKİN
TOKSAVUL MURAT
ÜNAL ERCAN
YILDIRIM FATİH AYKUT

Announcement Category

Fatma Mutlu : The Right Person to the Right Job: Developing a Two-Sided Matching Methodology Based on Real Employee Data

Msc. Candidate: Fatma Mutlu

Program: Information Systems

Date: 03.09.2019 14:00 p.m

Place: A-108

Abstract: Talented employees is one of the most important factors that carries companies to success in today's business world. However, making employees work in the right position so that it is compatible with their ability, nature and capacity is a much more important factor for success. Ignoring this situation poses an obstacle to work in an efficient and effective way for the companies. The objective of this thesis is to provide a methodology to match employees with the right position by considering both technical and behavioral competencies. In this study, both the needs of the employees and requirements of positions are taken into considerations and weights of them are calculated. Then a multi objective optimization model is developed to make both employee and position satisfactory degree the most. Results of this study are used for the purpose of achieving high job satisfaction and productivity by improving bilateral matching evaluation of both workers and positions. This study also may be used as guidance in the planning of businesses related training and development activities. To show the applicability and contribution of the methodology developed, it is validated using real life data.

Announcement Category

Bilgin Aksoy, Perceptual Quality Preserving Adversarial Attacks

Image based CAPTCHA systems are being used to validate if the candidate user is a human or a bot. Several DNN based systems have been achieved to fail this validation process. As a result, the reliability of CAPTCHA has become controversial. Adversarial image is a sample that is intentionally modified by adding non-random noise to deceive DNNs, and recently has been used to deceive DNNs to make CAPTCHA system more reliable. But the adversarial process degrades the image quality which makes it also difficult for humans to classify images and recognize objects. The proposed method preserves perceptual quality of adversarial images and still generates adversarial images which have 100% attack accuracy.

Date: 02.09.2019 / 10:00 Place: A-212Bilgin Aksoy, Perceptual Quality Preserving Adversarial Attacks

English

Gürol Canbek : Multi-Perspective Analysis and Systematic Benchmarking for Binary-Classification Performance Evaluation Instruments

PhD. Candidate: Gürol Canbek

Program: Information Systems

Date: 02.09.2019 13:00 p.m

Place: Conference Hall 01

Abstract: This thesis proposes novel methods to analyze and benchmark binary-classification performance evaluation instruments. It addresses critical problems found in the literature, clarifies terminology and distinguishes instruments as measure, metric, and as a new category indicator for the first time. The multi-perspective analysis introduces novel concepts such as canonical form, geometry, duality, complementation, dependency, and leveling with formal definitions as well as two new basic instruments. An indicator named Accuracy Barrier is also proposed and tested in re-evaluating performances of surveyed machine-learning classifications. An exploratory table is designed to represent all the concepts for over 50 instruments. The table’s real use cases such as domain-specific metrics reporting are demonstrated. Furthermore, this thesis proposes a systematic benchmarking method comprising 3 stages to assess metrics’ robustness over new concepts such as meta-metrics (metrics about metrics) and metric-space. Benchmarking 13 metrics reveals critical issues especially in accuracy, F1, and normalized mutual information conventional metrics and identifies Matthews Correlation Coefficient as the most robust metric. The benchmarking method is evaluated with the literature. Additionally, this thesis formally demonstrates publication and confirmation biases due to reporting non-robust metrics. Finally, this thesis gives recommendations on precise and concise performance evaluation, comparison, and reporting. The developed software library, analysis/benchmarking platform, visualization and calculator/dashboard tools, and datasets were also released online. This research is expected to re-establish and facilitate classification performance evaluation domain as well as contribute towards responsible open research in performance evaluation to use the most robust and objective instruments.

Announcement Category

Mustafa Mert Karataş : Malicious User Input Detection on Web-Based Attacks with the Negative Selection Algorithm

Msc. Candidate: Mustafa Mert Karataş

Program: Cyber Security

Date: 09.09.2019 13:00 p.m

Place: A-212

Abstract: The human body is exposed to several pathogens during its lifetime. HIS(Human Immune System) is responsible to protect the body from different pathogens. HIS has two distinct response systems to these outsiders, which are; innate and adaptive immune systems. While the innate system takes general actions to the intruding pathogens, the adaptive immune system eradicates them by its special cells. T-Cells, one of the defined adaptive immunity cells, are created in the thymus. The generation of these cells is constant and continued to the end of the human life span. T-Cells protects the human body with the use of its distinct self and non-self discrimination ability. In the computer science domain, self/non-self discrimination of the T-Cells are studied and applied in the subject of AIS (Artificial Immune System). A model observed from the HIS while creating these cells, Negative Selection, is added as an algorithm to this subject. The ability to discriminate self from non-self is thought to be useful for the detection of any malicious activity in a computer or a computer network. In this thesis, the Negative Selection Algorithm of the T-Cells is applied in order to detect malicious user input that is submitted from HTTP GET parameters. Detection is done through detectors strings with varying lengths. Detectors are constructed with randomly chosen n-gram strings generated from the training dataset. The number of n-gram strings to form a single detector is determined with the use of Poisson Probability. Detection rates, number of attempts needed for generating a single detector, average detection rates for each detector, the lengths of the detectors and number of detectors that can be generated over a course of time are calculated and presented.

Announcement Category

Muhsin Aldemir : Social Network Analysis of Malicious Websites for Detection and Characterization

Msc. Candidate: Muhsin Aldemir

Program: Information Systems

Date: 02.09.2019 15:30 p.m

Place: A-108

Abstract: Malicious websites pose major risks to users and businesses including economic damages, privacy breaches and loss of valuable data. Malicious actors use websites as a spreading medium for their motives. Analyzing the relationships between malicious websites and comparing them to benign ones can help understand the problem better, and enable detection and prevention of these websites more accurately. This thesis focuses on detection and characterization of malicious websites using Social Network Analysis (SNA). SNA provides powerful methodologies for discovering and visualizing the relationships between actors. By utilizing the links in between and among malicious and benign websites, graphs were constituted, whose nodes were websites and ties were hyperlinks between them. For this purpose, the data which included the snapshot of the pairwise links amongst millions of websites, the list of malicious websites and their types were obtained from the web. First, the same size networks of malicious and benign websites were characterised and compared using their descriptive properties. Then, using these networks new analyses were carried out to determine malicious websites and their types based on their network structures and link similarities. Results were presented showing the detection accuracies of applied methods.

Announcement Category

Multimedia Informatics 2nd Group PhD and MS Programs Interview Announcement

Related to the applications made to the Department of Modelling and Simulation Multimedia Informatics PhD and MS Programs for 2019-2020 Acadeic Year Fall Term, 2nd group interviews will be held on Tuesday, September 3, 2019.

Candidates listed below are expected to be present in front of Classroom II-01 (S-01) 15 minutes before of their scheduled time of interview.

 

SIRA NO

ADI

SOYADI

MÜLAKAT SAATİ

PROGRAM

1

Faraz

Badalı Naghadeh

10.00

Yüksek Lisans

2

Murat

Balcı

10.15

3

Damla Kıvılcım

Demir

10.30

4

Alperen

İnci

10.45

5

Osman

Kayataş

11.00

6

Bağışcan

Üzmez

11.15

7

Volkan

Pehlivan

11.30

8

Ayhan

Taşyurt

11.45

9

Kemal Aytuğ

Temizöz

12.00

10

Abbas

Türkoğlu

12.15

11

Muhammed Faruk

Uğurcalı

13.30

12

Burak

Kök

13.45

1

Nevin

Eryılmaz

14.00

Doktora

2

Nazire Merve

Önder

14.15


  

Announcement Category

Samet Albayrak , Semantic/Pragmatic Processing in Turkish Propositional Attitude Verbs: The Case of "Zannet"

Investigation of the Theory of Mind was conducted in a verbal setting. This setting is constructed with help of some cognitive propositional attitude verbs (bil, düşün, and zannet) because they are used for referring to mental states as ToM is used for inferring mental states. In addition to the evaluation of verbs, participants’ ability to process pragmatic inferences were measured and these two sets of data were investigated for any relationship between them.

Date: 09.09.2019 / 10:00 Place: A-108

English

Ahmet Serhat Demir : A Fully Decentralized Framework for Securely Sharing Digital Contents

Msc. Candidate: Ahmet Serhat Demir

Program: Cyber Security

Date: 04.09.2019 15:00 p.m

Place: A-212

Abstract: Blockchain technology is first known as the secure, immutable, distributed public ledger of the Bitcoin network, which enables value transfer without the need of a trusted third party. Besides cryptocurrencies and finance, blockchain technology has the potential to disrupt several industries, which is made possible with the advance of the smart contracts and decentralized applications. This thesis explores the blockchain technology, Ethereum smart contracts, and investigates the potential of Ethereum Web 3.0 stack for secure information and file sharing in a fully decentralized architecture. It is aimed to discard the need of a central authority in every layer of the application, and cope with the drawbacks of centralized content exchange platforms. Accordingly, a proof-of-concept of a decentralized application is designed. This design is implemented in Ethereum Web 3.0 stack using blockchain for the immutable distributed ledger, Ether for cash transfers, and smart contracts for application logic. Since data storage in blockchain is expensive, Swarm is used for decentralized reliable content storage system. Nevertheless, according to our research, permissionless systems in the Ethereum ecosystem lack necessary data privacy, which causes a risk for secure information exchange. In order to provide a secure way of content exchange, public key encryption is utilized to enable sensitive content delivery without the need of a pre-shared secret. Also, to protect both buyer and seller, a double escrow functionality is implemented. According to the validation and evaluation of our proof-of-concept, we successfully show that Ethereum Web 3.0 stack is applicable for securely sharing digital contents.

Announcement Category

Pages

Subscribe to Graduate School of Informatics RSS