Follow
Ziya Alper GenÁ
Ziya Alper GenÁ
Research Associate, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Examination of a New Defense Mechanism: Honeywords
ZA Genc, S Kardas, MS Kiraz
61*
No random, no ransom: a key to stop cryptographic ransomware
ZA GenÁ, G Lenzini, PYA Ryan
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th†…, 2018
482018
On deception-based protection against cryptographic ransomware
ZA GenÁ, G Lenzini, D Sgandurra
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th†…, 2019
382019
Next generation cryptographic ransomware
ZA GenÁ, G Lenzini, PYA Ryan
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway†…, 2018
242018
“The simplest protocol for oblivious transfer” revisited
ZA GenÁ, V Iovino, A Rial
Information Processing Letters 161, 105975, 2020
182020
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
MS Kiraz, ZA GenÁ, S Kardas
Security and Communication Networks 8 (18), 4123-4135, 2015
182015
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware
ZA GenÁ, G Lenzini, PYA Ryan
Emerging Technologies for Authorization and Authentication: Second†…, 2020
142020
Detecting large integer arithmetic for defense against crypto ransomware
MS Kiraz, ZA GenÁ, E ÷ztŁrk
Cryptology ePrint Archive, 2017
142017
Security analysis of key acquiring strategies used by cryptographic ransomware
ZA GenÁ, G Lenzini, PYA Ryan
Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018
132018
The cipher, the random and the ransom: a survey on current and future ransomware
ZA GenÁ, G Lenzini, P Ryan
Central European Cybersecurity Conference, 2017
132017
Analysis, detection, and prevention of cryptographic ransomware
ZA GenÁ
Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2020
72020
A security analysis, and a fix, of a code-corrupted honeywords system
ZA GenÁ, G Lenzini, P Ryan, I Vazquez Sandoval
4th International Conference on Information Systems Security and Privacy, 2018
72018
A game of" Cut and Mouse" bypassing antivirus by simulating user inputs
ZA GenÁ, G Lenzini, D Sgandurra
Proceedings of the 35th Annual Computer Security Applications Conference†…, 2019
52019
A critical security analysis of the password-based authentication honeywords system under code-corruption attack
ZA GenÁ, G Lenzini, PYA Ryan, I Vazquez Sandoval
Information Systems Security and Privacy: 4th International Conference†…, 2019
52019
Practical exchange for unique digital goods
O Ersoy, ZA GenÁ, Z Erkin, M Conti
2021 IEEE International Conference on Decentralized Applications and†…, 2021
42021
Security attacks and enhancements to chaotic map-based RFID authentication protocols
S Kardaş, ZA GenÁ
Wireless Personal Communications 98, 1135-1154, 2018
42018
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
ZA GenÁ, G Lenzini
6th International Conference on Information Systems Security and Privacy†…, 2020
32020
Method for preventing ransomware attacks on computing systems
ZA Genc, G Lenzini, PYA Ryan
US Patent 11,620,380, 2023
22023
Cut-and-mouse and ghost control: Exploiting antivirus software with synthesized inputs
ZA GenÁ, G Lenzini, D Sgandurra
Digital Threats: Research and Practice 2 (1), 1-23, 2021
22021
A game of “cut and mouse”
ZA GenÁ, G Lenzini, D Sgandurra
Proceedings of the 35th Annual Computer Security Applications Conference, ACM, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20