Follow
Serdar Boztas
Serdar Boztas
University Research Foundation, Maryland; and Discipline of Mathematical Sciences , RMIT, Australia
Verified email at urf.com
Title
Cited by
Cited by
Year
4-phase sequences with near-optimum correlation properties
S Boztas, R Hammons, PY Kumar
IEEE Transactions on Information Theory 38 (3), 1101-1113, 1992
3371992
Binary sequences with Gold-like correlation but larger linear span
S Boztas, PV Kumar
IEEE Transactions on Information Theory 40 (2), 532-537, 1994
1291994
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study
L Sun, S Versteeg, S Boztas, A Rao
arXiv preprint arXiv:1609.06676, 2016
782016
Pattern recognition techniques for the classification of malware packers
L Sun, S Versteeg, S Boztaş, T Yann
Information Security and Privacy: 15th Australasian Conference, ACISP 2010 …, 2010
632010
A graph based framework for malicious insider threat detection
A Gamachchi, L Sun, S Boztas
arXiv preprint arXiv:1809.00141, 2018
512018
Nonbinary sequences with perfect and nearly perfect autocorrelations
S Boztaş, U Parampalli
2010 IEEE International Symposium on Information Theory, 1300-1304, 2010
472010
On independence and sensitivity of statistical randomness tests
M Sönmez Turan, A DoĞanaksoy, S Boztaş
Sequences and Their Applications-SETA 2008: 5th International Conference …, 2008
432008
Comments on" An inequality on guessing and its application to sequential decoding"
S Boztas
IEEE Transactions on Information Theory 43 (6), 2062-2063, 1997
401997
Constructions of Optimal and Near-Optimal Quasi-Complementary Sequence Sets from Singer Difference Sets
Z Liu, U Parampalli, Y Guan, S Boztas
IEEE Wireless Communications Letters, 2013
382013
Entropies, Guessing, and Cryptography
S Boztas
RMIT University Research Report Series 6, 1999
321999
Community detection in bipartite networks using random walks
T Alzahrani, KJ Horadam, S Boztas
Complex Networks V: Proceedings of the 5th Workshop on Complex Networks …, 2014
252014
Insider threat detection through attributed graph clustering
A Gamachchi, S Boztas
2017 ieee trustcom/bigdatase/icess, 112-119, 2017
232017
An automatic anti-anti-VMware technique applicable for multi-stage packed malware
L Sun, T Ebringer, S Boztas
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
232008
A fast randomness test that preserves local detail
T Ebringer, L Sun, S Boztas
Virus Bulletin 2008, 34-42, 2008
222008
Entropy of the retina template
A Arakala, JS Culpepper, J Jeffers, A Turpin, S Boztaş, KJ Horadam, ...
Advances in Biometrics: Third International Conference, ICB 2009, Alghero …, 2009
202009
Hump-and-dump: Efficient generic unpacking using an ordered address execution histogram
L Sun, T Ebringer, S Boztas
Journal. Retrieved from http://www. datasecurityevent. com/uploads/hump_dump …, 2008
202008
New lower bounds on aperiodic cross-correlation of codes over nth roots of unity
S Boztas
Research Report 13, 1998
191998
Near-optimal four-phase sequences for CDMA
S Boztas
Proceedings of IEEE International Symposium on Information Theory, Jan. 1991, 1991
161991
Balancing sets of non-binary vectors
A Baliga, S Boztas
Proceedings IEEE International Symposium on Information Theory,, 300, 2002
152002
Robust multi-priority topology-independent transmission schedules for packet radio networks
S Boztas, FJW Symons
IEEE International Symposium on Information Theory, 1994, 1994
151994
The system can't perform the operation now. Try again later.
Articles 1–20