His primary areas of investigation include World Wide Web, Intrusion detection system, Malware, Computer security and Android. His work on Recommender system and Social search is typically connected to Meaning as part of general World Wide Web study, connecting several disciplines of science. His Intrusion detection system study integrates concerns from other disciplines, such as Distributed computing, Anomaly detection, Network security and Executable.
His Malware research is multidisciplinary, incorporating perspectives in Embedded system, Mobile computing and Mobile telephony. The concepts of his Computer security study are interwoven with issues in Identity and Usability. His study explores the link between Android and topics such as Java that cross with problems in Android Beam, File system, Decision tree and Market share.
His primary scientific interests are in Artificial intelligence, Human–computer interaction, Distributed computing, Computer security and World Wide Web. The study incorporates disciplines such as Machine learning, Pattern recognition, Computer vision and Natural language processing in addition to Artificial intelligence. He combines subjects such as User interface and Multimedia with his study of Human–computer interaction.
His Distributed computing research incorporates themes from Multi-agent system and Computer network. His Android research extends to the thematically linked field of Computer security. Sahin Albayrak works in the field of World Wide Web, namely Recommender system.
Sahin Albayrak mostly deals with Human–computer interaction, Artificial intelligence, Control, Machine learning and Robot. His work carried out in the field of Human–computer interaction brings together such families of science as Purchasing, Task, Service and Online and offline. His Self-organization and Robotics study, which is part of a larger body of work in Artificial intelligence, is frequently linked to Interaction device and Ring, bridging the gap between disciplines.
His study on Convolutional neural network and Time series is often connected to Battery storage as part of broader study in Machine learning. His Factor study combines topics from a wide range of disciplines, such as Recommender system and World Wide Web. His work in World Wide Web is not limited to one particular discipline; it also encompasses Information retrieval.
His main research concerns Artificial intelligence, Convolutional neural network, Control, Planner and Robotic systems. His Artificial intelligence research is multidisciplinary, relying on both Energy supply and Human–computer interaction. His research in Human–computer interaction intersects with topics in Human behavior and Task.
The various areas that Sahin Albayrak examines in his Control study include Control engineering and Systems architecture. His research investigates the connection between Planner and topics such as Robot operating system that intersect with problems in Layer and Software engineering. His studies in Machine learning integrate themes in fields like Motion and Mel-frequency cepstrum.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An Android Application Sandbox system for suspicious software detection
Thomas Blasing;Leonid Batyuk;Aubrey-Derrick Schmidt;Seyit Ahmet Camtepe.
international conference on malicious and unwanted software (2010)
Static Analysis of Executables for Collaborative Malware Detection on Android
A.-D. Schmidt;R. Bye;H.-G. Schmidt;J. Clausen.
international conference on communications (2009)
Spectral Analysis of Signed Graphs for Clustering, Prediction and Visualization.
Jérôme Kunegis;Stephan Schmidt;Andreas Lommatzsch;Jürgen Lerner.
siam international conference on data mining (2010)
Monitoring smartphones for anomaly detection
Aubrey-Derrick Schmidt;Frank Peters;Florian Lamour;Christian Scheel.
Mobile Networks and Applications (2009)
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
Leonid Batyuk;Markus Herpich;Seyit Ahmet Camtepe;Karsten Raddatz.
international conference on malicious and unwanted software (2011)
Smartphone malware evolution revisited: Android next target?
Aubrey-Derrick Schmidt;Hans-Gunther Schmidt;Leonid Batyuk;Jan Hendrik Clausen.
international conference on malicious and unwanted software (2009)
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
Arik Messerman;Tarik Mustafic;Seyit Ahmet Camtepe;Sahin Albayrak.
International Journal of Central Banking (2011)
Enhancing security of linux-based android devices
Aubrey-Derrick Schmidt;Hans-Gunterh Schmidt;Jan Clausen;Kamer Ail Yuksel.
School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty (2008)
I tag, you tag: translating tags for advanced user models
Robert Wetzker;Carsten Zimmermann;Christian Bauckhage;Sahin Albayrak.
web search and data mining (2010)
User-centric evaluation of a K-furthest neighbor collaborative filtering recommender algorithm
Alan Said;Ben Fields;Brijnesh J. Jain;Sahin Albayrak.
conference on computer supported cooperative work (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: