Sahin Albayrak
Sahin Albayrak
Professur für Informatik, Technische Universität Berlin
Verified email at
Cited by
Cited by
An android application sandbox system for suspicious software detection
T Bläsing, L Batyuk, AD Schmidt, SA Camtepe, S Albayrak
2010 5th International Conference on Malicious and Unwanted Software, 55-62, 2010
Spectral analysis of signed graphs for clustering, prediction and visualization
J Kunegis, S Schmidt, A Lommatzsch, J Lerner, EW De Luca, S Albayrak
Proceedings of the 2010 SIAM international conference on data mining, 559-570, 2010
Static analysis of executables for collaborative malware detection on android
AD Schmidt, R Bye, HG Schmidt, J Clausen, O Kiraz, KA Yuksel, ...
2009 IEEE International Conference on Communications, 1-5, 2009
Monitoring smartphones for anomaly detection
AD Schmidt, F Peters, F Lamour, C Scheel, SA Camtepe, Ş Albayrak
Mobile Networks and Applications 14, 92-106, 2009
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
L Batyuk, M Herpich, SA Camtepe, K Raddatz, AD Schmidt, S Albayrak
2011 6th International Conference on Malicious and Unwanted Software, 66-72, 2011
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
A Messerman, T Mustafić, SA Camtepe, S Albayrak
2011 International Joint Conference on Biometrics (IJCB), 1-8, 2011
Vehicles of the future: A survey of research on safety issues
C Bila, F Sivrikaya, MA Khan, S Albayrak
IEEE Transactions on Intelligent Transportation Systems 18 (5), 1046-1065, 2016
Smartphone malware evolution revisited: Android next target?
AD Schmidt, HG Schmidt, L Batyuk, JH Clausen, SA Camtepe, S Albayrak, ...
2009 4th International conference on malicious and unwanted software …, 2009
I tag, you tag: translating tags for advanced user models
R Wetzker, C Zimmermann, C Bauckhage, S Albayrak
Proceedings of the third ACM international conference on Web search and data …, 2010
Language-independent twitter sentiment analysis
S Narr, M Hulfenhaus, S Albayrak
Knowledge discovery and machine learning (KDML), LWA, 12-14, 2012
Enhancing security of linux-based android devices
AD Schmidt, HG Schmidt, J Clausen, KA Yuksel, O Kiraz, A Camtepe, ...
Proceedings of 15th International Linux Kongress, 1-16, 2008
User-centric evaluation of a k-furthest neighbor collaborative filtering recommender algorithm
A Said, B Fields, BJ Jain, S Albayrak
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
The link prediction problem in bipartite networks
J Kunegis, EW De Luca, S Albayrak
International Conference on Information Processing and Management of …, 2010
Agent-based telematic services and telecom applications
S Fricke, K Bsufka, J Keiser, T Schmidt, R Sesseler, S Albayrak
Communications of the ACM 44 (4), 43-48, 2001
ECG arrhythmias recognition system based on independent component analysis feature extraction
X Jiang, L Zhang, Q Zhao, S Albayrak
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
Pattern recognition and classification for multivariate time series
S Spiegel, J Gaebler, A Lommatzsch, E De Luca, S Albayrak
Proceedings of the fifth international workshop on knowledge discovery from …, 2011
Detecting symbian os malware through static function call analysis
AD Schmidt, JH Clausen, A Camtepe, S Albayrak
2009 4th International Conference on Malicious and Unwanted Software …, 2009
Developing and benchmarking native linux applications on android
L Batyuk, AD Schmidt, HG Schmidt, A Camtepe, S Albayrak
MobileWireless Middleware, Operating Systems, and Applications: Second …, 2009
Agent technology for personalized information filtering: the pia-system
S Albayrak, S Wollny, N Varone, A Lommatzsch, D Milosevic
Proceedings of the 2005 ACM symposium on Applied computing, 54-59, 2005
Link prediction on evolving data using tensor factorization
S Spiegel, J Clausen, S Albayrak, J Kunegis
New Frontiers in Applied Data Mining: PAKDD 2011 International Workshops …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20