​
Login / Signup
Ahmet Okutan
ORCID
Publication Activity (10 Years)
Years Active: 2013-2023
Publications (10 Years): 20
Top Topics
Empirical Validation
Vector Space
Cyber Attacks
Imbalanced Data
Top Venues
CoRR
ICPRAM
Cybersecur.
SCAM
</>
Publications
</>
Mohamad Fazelnia
,
Ahmet Okutan
,
Mehdi Mirakhorli
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework.
IEEE Secur. Priv.
21 (1) (2023)
Ahmet Okutan
,
Ali Shokri
,
Viktoria Koscinski
,
Mohamad Fazelnia
,
Mehdi Mirakhorli
A Novel Approach to Identify Security Controls in Source Code.
CoRR
(2023)
Ahmet Okutan
,
Peter Mell
,
Mehdi Mirakhorli
,
Igor Khokhlov
,
Joanna C. S. Santos
,
Danielle Gonzalez
,
Steven Simmons
Empirical Validation of Automated Vulnerability Curation and Characterization.
IEEE Trans. Software Eng.
49 (5) (2023)
Mohamad Fazelnia
,
Ahmet Okutan
,
Mehdi Mirakhorli
Supporting AI/ML Security Workers through an Adversarial Techniques, Tools, and Common Knowledge (AI/ML ATT&CK) Framework.
CoRR
(2022)
Ahmet Okutan
,
Mehdi Mirakhorli
Predicting the severity and exploitability of vulnerability reports using convolutional neural nets.
EnCyCriS@ICSE
(2022)
Sara Moshtari
,
Ahmet Okutan
,
Mehdi Mirakhorli
A Grounded Theory Based Approach to Characterize Software Attack Surfaces.
ICSE
(2022)
Joshua Garcia
,
Mehdi Mirakhorli
,
Lu Xiao
,
Yutong Zhao
,
Ibrahim Mujhid
,
Khoi Pham
,
Ahmet Okutan
,
Sam Malek
,
Rick Kazman
,
Yuanfang Cai
,
Nenad Medvidovic
Constructing a Shared Infrastructure for Software Architecture Analysis and Maintenance.
ICSA
(2021)
Shanchieh Jay Yang
,
Ahmet Okutan
,
Gordon Werner
,
Shao-Hsuan Su
,
Ayush Goel
,
Nathan D. Cahill
Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts.
CoRR
(2021)
Sara Moshtari
,
Ahmet Okutan
,
Mehdi Mirakhorli
A Grounded Theory Based Approach to Characterize Software Attack Surfaces.
CoRR
(2021)
Sara Moshtari
,
Joanna C. S. Santos
,
Mehdi Mirakhorli
,
Ahmet Okutan
Looking for Software Defects? First Find the Nonconformists.
SCAM
(2020)
Ahmet Okutan
,
Shanchieh Jay Yang
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense.
Cybersecur.
2 (1) (2019)
Ahmet Okutan
,
Shanchieh Jay Yang
,
Katie McConky
,
Gordon Werner
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags.
CNS
(2019)
Ahmet Okutan
,
Fu-Yuan Cheng
,
Shao-Hsuan Su
,
Shanchieh Jay Yang
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features.
MILCOM
(2019)
Ahmet Okutan
,
Shanchieh Jay Yang
,
Katie McConky
Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities.
CoRR
(2018)
Ahmet Okutan
Use of Source Code Similarity Metrics in Software Defect Prediction.
CoRR
(2018)
Ian Perry
,
Lutzu Li
,
Christopher Sweet
,
Shao-Hsuan Su
,
Fu-Yuan Cheng
,
Shanchieh Jay Yang
,
Ahmet Okutan
Differentiating and Predicting Cyberattack Behaviors Using LSTM.
DSC
(2018)
Ahmet Okutan
,
Gordon Werner
,
Shanchieh Jay Yang
,
Katie McConky
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.
Cybersecur.
1 (1) (2018)
Ahmet Okutan
,
Shanchieh Jay Yang
,
Katie McConky
Predicting cyber attacks with bayesian networks using unconventional signals.
CISRC
(2017)
Ahmet Okutan
,
Gordon Werner
,
Katie McConky
,
Shanchieh Jay Yang
POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
CCS
(2017)
Ahmet Okutan
,
Olcay Taner Yildiz
A novel kernel to predict software defectiveness.
J. Syst. Softw.
119 (2016)
Olcay Taner Yildiz
,
Ahmet Okutan
,
Ercan Solak
Bilingual Software Requirements Tracing using Vector Space Model.
ICPRAM
(2014)
Ahmet Okutan
,
Olcay Taner Yildiz
Software defect prediction using Bayesian networks.
Empir. Softw. Eng.
19 (1) (2014)
Ahmet Okutan
,
Olcay Taner Yildiz
A Novel Regression Method for Software Defect Prediction with Kernel Methods.
ICPRAM
(2013)