Serdar Boztas
Serdar Boztas
School of Mathematical and Geospatial Sciences, RMIT University
Verified email at
Cited by
Cited by
4-phase sequences with near-optimum correlation properties
S Boztas, R Hammons, PY Kumar
IEEE Transactions on Information Theory 38 (3), 1101-1113, 1992
Binary sequences with Gold-like correlation but larger linear span
S Boztas, PV Kumar
IEEE Transactions on Information Theory 40 (2), 532-537, 1994
Pattern recognition techniques for the classification of malware packers
L Sun, S Versteeg, S Boztaş, T Yann
Australasian Conference on Information Security and Privacy, 370-390, 2010
Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study
L Sun, S Versteeg, S Boztas, A Rao
arXiv preprint arXiv:1609.06676, 2016
Nonbinary sequences with perfect and nearly perfect autocorrelations
S Boztaş, U Parampalli
2010 IEEE International Symposium on Information Theory, 1300-1304, 2010
A graph based framework for malicious insider threat detection
A Gamachchi, L Sun, S Boztas
arXiv preprint arXiv:1809.00141, 2018
Comments on" An inequality on guessing and its application to sequential decoding"
S Boztas
IEEE Transactions on Information Theory 43 (6), 2062-2063, 1997
On independence and sensitivity of statistical randomness tests
MS Turan, A DoĞanaksoy, S Boztaş
International Conference on Sequences and Their Applications, 18-29, 2008
Entropies, Guessing, and Cryptography
S Boztas
RMIT University Research Report Series 6, 1999
Constructions of Optimal and Near-Optimal Quasi-Complementary Sequence Sets from Singer Difference Sets
Z Liu, U Parampalli, Y Guan, S Boztas
IEEE Wireless Communications Letters, 2013
Community detection in bipartite networks using random walks
T Alzahrani, KJ Horadam, S Boztas
Complex Networks V, 157-165, 2014
An automatic anti-anti-VMware technique applicable for multi-stage packed malware
L Sun, T Ebringer, S Boztas
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
Hump-and-dump: Efficient generic unpacking using an ordered address execution histogram
L Sun
2nd International Computer Anti-Virus Researchers Organization (CARO …, 2008
Entropy of the retina template
A Arakala, JS Culpepper, J Jeffers, A Turpin, S Boztaş, KJ Horadam, ...
International Conference on Biometrics, 1250-1259, 2009
A fast randomness test that preserves local detail
T Ebringer, L Sun, S Boztas
Virus Bulletin 2008, 34-42, 2008
New lower bounds on aperiodic cross-correlation of codes over nth roots of unity
S Boztas
Research Report 13, 1998
Balancing sets of non-binary vectors
A Baliga, S Boztas
Proceedings IEEE International Symposium on Information Theory,, 300, 2002
Robust multi-priority topology-independent transmission schedules for packet radio networks
S Boztas, FJW Symons
IEEE International Symposium on Information Theory, 1994, 1994
Near-optimal four-phase sequences for CDMA
S Boztas
Proceedings of IEEE International Symposium on Information Theory, Jan. 1991, 1991
Some estimates of the average number of guesses to determine a random variable
SS Dragomir, S Boztas
Proceedings of IEEE International Symposium on Information Theory, 159, 1997
The system can't perform the operation now. Try again later.
Articles 1–20