Ensar Seker

Ensar Seker
The Scientific & Technological Research Council of Turkey | TUBITAK · BILGEM

PhD Student

About

12
Publications
17,882
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
63
Citations
Additional affiliations
September 2016 - September 2018
NATO - North Atlantic Treaty Organisation
Position
  • Researcher
April 2015 - present
The Scientific & Technological Research Council of Turkey
Position
  • Senior Researcher
Education
January 2017 - December 2023
Tallinn University of Technology
Field of study
  • Information and Communication Technologies - Information Security
September 2010 - May 2012
New York Institute of Technology
Field of study
  • Electrical and Computer Engineering
September 2007 - June 2010
New York Institute of Technology
Field of study
  • Electrical and Computer Engineering

Publications

Publications (12)
Article
Full-text available
Cyber defense exercises (CDXs) are excellent testbed platforms to test and assess IT and OT systems. They (CDXs) are also very important tools when it comes to enhancing the safety awareness of cyberspace, testing an organization"s ability to put up resistance and respond to different cyber events to establish the secure environment, gathering empi...
Preprint
Full-text available
In this paper, we explain our methodology to identify replacement patterns. The main purpose of this article is to show that with replacement methods on plain texts, it is possible to have more success rates when trying to recovering hashed passwords.
Technical Report
Full-text available
The primary objective with this project is to create a paper covering how virtual private networks (VPNs) can be compromised, the most popular attack vectors being used to compromise networks during this crisis, how security operations center (SOC) analysts are coping with the situation, and recommendations on how to better secure one's corporate n...
Article
Full-text available
Threat intelligence is proved based information, including setting, instruments, pointers, suggestions and noteworthy guidance, around a current or developing threat or risk to assets (such as unauthorized access, unauthorized use of assets, discloses sensitive information, unauthorized changes to an asset, deny access). Studying advanced adversary...
Technical Report
Full-text available
This publication is part of a series of country reports offering a comprehensive overview of national cyber security governance by nation. The aim is to improve awareness of cyber security management in the varied national settings, support nations enhancing their own cyber security governance, encourage the spread of best practices, and contribute...
Poster
Full-text available
Enterprise password policies require the use of complex passwords that contain lowercase and uppercase letters, numbers and symbols. Considering this common requirement, end-users tend to create complex (!) passwords containing certain patterns which make such passwords guessable and therefore insecure. Replacement pattern is one of these pattern-t...
Preprint
This paper discusses the concept of cyber defence exercises -CDX- that are very important tool when it comes to enhancing the safety awareness of cyberspace, testing an organization's ability to put up resistance and respond to different cyber events to establish the secure environment, gathering empirical data related to security, and looking at t...
Poster
Full-text available
Nowadays, considering the speed of the processes and the amount of data used in cyber defense, it cannot be expected to have an effective defense by using only human power without the help of automation systems. However, for the effective defense against dynamically evolving attacks on networks, it is difficult to develop software with conventional...
Conference Paper
Full-text available
This paper discusses the concept of cyber defence exercises (CDX) that are very important tool when it comes to enhancing the safety awareness of cyberspace, testing an organization's ability to put up resistance and respond to different cyber events to establish the secure environment, gathering empirical data related to security, and looking at t...
Conference Paper
Full-text available
Enterprise password policies require the use of complex passwords that contain lowercase and uppercase letters , numbers and symbols. Considering this common requirement , end-users tend to create complex (!) passwords containing certain patterns which make such passwords guessable and therefore insecure. Replacement pattern is one of these pattern...
Conference Paper
Full-text available
In recent years cloud computing is getting more and more attention every day. While outsourcing the hardware and software resources, still being able to manage them remotely with benefits like high computing power, competitiveness, cost efficiency, scalability, flexibility, accessibility and availability are revolutionary. For all of its advantages...
Conference Paper
Full-text available
Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore internati...

Questions

Question (1)

Network

Cited By

Projects

Projects (2)
Archived project
Archived project