Ali A. Ghorbani

Orcid: 0000-0001-9189-6268

Affiliations:
  • University of New Brunswick, Canada


According to our database1, Ali A. Ghorbani authored at least 288 papers between 1995 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications.
Comput. Secur., 2025

2024
A Graph Learning-Based Approach for Lateral Movement Detection.
IEEE Trans. Netw. Serv. Manag., October, 2024

CapsRule: Explainable Deep Learning for Classifying Network Attacks.
IEEE Trans. Neural Networks Learn. Syst., September, 2024

MEFaND: A Multimodel Framework for Early Fake News Detection.
IEEE Trans. Comput. Soc. Syst., August, 2024

The Largest Social Media Ground-Truth Dataset for Real/Fake Content: TruthSeeker.
IEEE Trans. Comput. Soc. Syst., June, 2024

A survey on run-time packers and mitigation techniques.
Int. J. Inf. Sec., April, 2024

Multimodal Fake News Analysis Based on Image-Text Similarity.
IEEE Trans. Comput. Soc. Syst., February, 2024

Social Alignment Contagion in Online Social Networks.
IEEE Trans. Comput. Soc. Syst., February, 2024

Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
Inf., February, 2024

Evaluation Framework for Electric Vehicle Security Risk Assessment.
IEEE Trans. Intell. Transp. Syst., January, 2024

Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification.
IEEE Internet Things J., January, 2024

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective.
Comput. Commun., January, 2024

Area in circle: A novel evaluation metric for object detection.
Knowl. Based Syst., 2024

CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus.
Internet Things, 2024

CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT.
Internet Things, 2024

Privacy-Preserving for Images in Satellite Communications: A Comprehensive Review of Chaos-Based Encryption.
CoRR, 2024

CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment.
CoRR, 2024

Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure.
CoRR, 2024

Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration.
CoRR, 2024

IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks.
Comput. Secur., 2024

Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure.
Comput. Secur., 2024

Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
Sensors, July, 2023

IoT Zigbee device security: A comprehensive review.
Internet Things, July, 2023

Security issues in Internet of Vehicles (IoV): A comprehensive survey.
Internet Things, July, 2023

Internet of Things (IoT) security dataset evolution: Challenges and future directions.
Internet Things, July, 2023

A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems.
Appl. Soft Comput., April, 2023

Evaluating Label Flipping Attack in Deep Learning-Based NIDS.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
A Survey on IoT Profiling, Fingerprinting, and Identification.
ACM Trans. Internet Things, 2022

Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

A Trust-Influenced Smart Grid: A Survey and a Proposal.
J. Sens. Actuator Networks, 2022

Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder.
J. Netw. Syst. Manag., 2022

Improved fault analysis on SIMECK ciphers.
J. Cryptogr. Eng., 2022

Preventing proof-of-work mining attacks.
Inf. Sci., 2022

FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022

An entity matching-based image topic verification framework for online fact-checking.
Int. J. Multim. Intell. Secur., 2022

Data breach: analysis, countermeasures and challenges.
Int. J. Inf. Comput. Secur., 2022

An evaluation framework for industrial control system cyber incidents.
Int. J. Crit. Infrastructure Prot., 2022

The sound of intrusion: A novel network intrusion detection system.
Comput. Electr. Eng., 2022

Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders.
IEEE Access, 2022

QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution.
IEEE Access, 2022

Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Towards the Development of a Realistic Multidimensional IoT Profiling Dataset.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Threshold based Technique to Detect Anomalies using Log Files.
Proceedings of the ICMLT 2022: 7th International Conference on Machine Learning Technologies, Rome, Italy, March 11, 2022

Evaluating Deep Learning-based NIDS in Adversarial Settings.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints.
Proceedings of the IEEE International Conference on Communications, 2022

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

2021
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud.
IEEE Trans. Serv. Comput., 2021

KeyShield: A Scalable and Quantum-Safe Key Management Scheme.
IEEE Open J. Commun. Soc., 2021

On the causal relation between real world activities and emotional expressions of social media users.
J. Assoc. Inf. Sci. Technol., 2021

Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021

Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021

A memory-based game-theoretic defensive approach for digital forensic investigators.
Digit. Investig., 2021

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency.
CoRR, 2021

Classifying and clustering malicious advertisement uniform resource locators using deep learning.
Comput. Intell., 2021

A real-time hostile activities analyses and detection system.
Appl. Soft Comput., 2021

Towards Query-efficient Black-box Adversarial Attack on Text Classification Models.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

A Novel Trust Model In Detecting Final-Phase Attacks in Substations.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021

RiskISM: A Risk Assessment Tool for Substations.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

Recommending Location for Placing Data Collector in the OPC Classic.
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021

Alternative Difficulty Adjustment Algorithms for Preventing Selfish Mining Attack.
Proceedings of the Blockchain - ICBC 2021, 2021

Behavioural Monitoring and Security Profiling in the Internet of Things (IoT).
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021

Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A feature exploration approach for IoT attack type classification.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Verification Based Scheme to Restrict IoT Attacks.
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021

2020
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms.
Sensors, 2020

An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.
Secur. Priv., 2020

DeNNeS: deep embedded neural network expert system for detecting cyber attacks.
Neural Comput. Appl., 2020

An overview of online fake news: Characterization, detection, and discussion.
Inf. Process. Manag., 2020

Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS.
IEEE Internet Things J., 2020

Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020

A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour.
Digit. Investig., 2020

A game-theoretic defensive approach for forensic investigators against rootkits.
Digit. Investig., 2020

Memory-Efficient Random Order Exponentiation Algorithm.
IEEE Access, 2020

Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

On The Generation of Unrestricted Adversarial Examples.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Ensemble of Hierarchical Temporal Memory for Anomaly Detection.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs).
Proceedings of the IEEE Intl Conf on Dependable, 2020

Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Financial Fraud Detection using Deep Support Vector Data Description.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
A Survey on User Profiling Model forAnomaly Detection in Cyberspace.
J. Cyber Secur. Mobil., 2019

Neural embedding-based indices for semantic search.
Inf. Process. Manag., 2019

The reflection of offline activities on users' online social behavior: An observational study.
Inf. Process. Manag., 2019

Application of deep learning to cybersecurity: A survey.
Neurocomputing, 2019

Towards insider threats detection in smart grid communication systems.
IET Commun., 2019

DDH-based Multisignatures with Public Key Aggregation.
IACR Cryptol. ePrint Arch., 2019

An evaluation framework for network security visualizations.
Comput. Secur., 2019

Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT.
IEEE Access, 2019

Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A New Multisignature Scheme with Public Key Aggregation for Blockchain.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Competitive Selfish Mining.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Generating Phishing Emails Using Graph Database.
Proceedings of the Information Security Practice and Experience, 2019

Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

Scalable Privacy-Preserving Query Processing over Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

On the causal relation between users' real-world activities and their affective processes.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges.
J. Cyber Secur. Mobil., 2018

OTP-IoT: An ownership transfer protocol for the Internet of Things.
J. Inf. Secur. Appl., 2018

SupAUTH: A new approach to supply chain authentication for the IoT.
Comput. Intell., 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

EagleEye: A Novel Visual Anomaly Detection Method.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A Detailed Analysis of the CICIDS2017 Data Set.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

Authorship Attribution of Android Apps.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Efficient indexing for semantic search.
Expert Syst. Appl., 2017

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling.
Comput. Networks, 2017

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017

A Lightweight Online Advertising Classification System using Lexical-based Features.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Towards a Network-Based Framework for Android Malware Detection and Characterization.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

DNA-Droid: A Real-Time Android Ransomware Detection Framework.
Proceedings of the Network and System Security - 11th International Conference, 2017

Characterization of Tor Traffic using Time based Features.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

BotViz: A memory forensic-based botnet detection and visualization approach.
Proceedings of the International Carnahan Conference on Security Technology, 2017

CIC-AB: Online ad blocker for browsers.
Proceedings of the International Carnahan Conference on Security Technology, 2017

A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

EfficientPMM: Finite Automata Based Efficient Pattern Matching Machine.
Proceedings of the International Conference on Computational Science, 2017

2016
SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents.
J. Cyber Secur. Mobil., 2016

Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content.
Int. J. Semantic Comput., 2016

A network based document management model to prevent data extrusion.
Comput. Secur., 2016

Context Free Frequently Asked Questions Detection Using Machine Learning Techniques.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Dynamic graph-based malware classifier.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Measuring code reuse in Android apps.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Detecting Malicious URLs Using Lexical Analysis.
Proceedings of the Network and System Security - 10th International Conference, 2016

Towards Android malware detection using intelligent agents.
Proceedings of the 2nd International Symposium on Agent, Multi-Agent Systems and Robotics, 2016

SMS-Based Mobile Botnet Detection Module.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Characterization of Encrypted and VPN Traffic using Time-related Features.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Application-layer denial of service attacks: taxonomy and survey.
Int. J. Inf. Comput. Secur., 2015

Semantic Annotation of Quantitative Textual Content.
Proceedings of the Third International Workshop on Linked Data for Information Extraction (LD4IE2015) co-located with the 14th International Semantic Web Conference (ISWC 2015), 2015

Real-time signature-based detection approach for SMS botnet.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Android Botnets: What URLs are Telling Us.
Proceedings of the Network and System Security - 9th International Conference, 2015

An Entropy Based Encrypted Traffic Classifier.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Exploring reverse engineering symptoms in Android apps.
Proceedings of the Eighth European Workshop on System Security, 2015

A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management.
J. Comput. Virol. Hacking Tech., 2014

Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones.
J. Cyber Secur. Mobil., 2014

DroidKin: Lightweight Detection of Android Apps Similarity.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Towards effective feature selection in machine learning-based botnet detection approaches.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Using Artificial Immune System and Fuzzy Logic for Alert Correlation.
Int. J. Netw. Secur., 2013

Botnet detection based on traffic behavior analysis and flow intervals.
Comput. Secur., 2013

Sentence Subjectivity Analysis in Social Domains.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

A Structure for Opinion in Social Domains.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Automated malware classification based on network behavior.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Lexical-Syntactical Patterns for Subjectivity Analysis of Social Issues.
Proceedings of the Active Media Technology - 9th International Conference, 2013

Classifying Organizational Roles Using Email Social Networks.
Proceedings of the Advances in Artificial Intelligence, 2013

2012
A Survey of Visualization Systems for Network Security.
IEEE Trans. Vis. Comput. Graph., 2012

Improved competitive learning neural networks for network intrusion and fraud detection.
Neurocomputing, 2012

Alert correlation using artificial immune recognition system.
Int. J. Bio Inspired Comput., 2012

Toward developing a systematic approach to generate benchmark datasets for intrusion detection.
Comput. Secur., 2012

Multi-layer episode filtering for the multi-step attack detection.
Comput. Commun., 2012

Verb Oriented Sentiment Classification.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Sentiment Analysis of Social Issues.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Peer to Peer Botnet Detection Based on Flow Intervals.
Proceedings of the Information Security and Privacy Research, 2012

A New Framework for Publishing and Sharing Network and Security Datasets.
Proceedings of the 2012 SC Companion: High Performance Computing, 2012

Group Behavior Metrics for P2P Botnet Detection.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Estimating botnet virulence within mathematical models of botnet propagation dynamics.
Comput. Secur., 2011

Clustering botnet communication traffic based on n-gram feature selection.
Comput. Commun., 2011

Detecting P2P botnets through network behavior analysis and machine learning.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Exploring network-based malware classification.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

VisVerND: Visual Verification of Network Traffic Dataset.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

A statistical approach to botnet virulence estimation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues.
Proceedings of the Brain Informatics - International Conference, 2011

2010
Network Intrusion Detection and Prevention - Concepts and Techniques
Advances in Information Security 47, Springer, ISBN: 978-0-387-88770-8, 2010

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods.
IEEE Trans. Syst. Man Cybern. Part C, 2010

A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games.
IEEE Trans. Syst. Man Cybern. Part A, 2010

The analysis and management of non-canonical requirement specifications through a belief integration game.
Knowl. Inf. Syst., 2010

UML-CI: A reference model for profiling critical infrastructure systems.
Inf. Syst. Frontiers, 2010

An exploratory classification of applications in the realm of collaborative modeling and design.
Inf. Syst. E Bus. Manag., 2010

Selective Regular Expression Matching.
Proceedings of the Information Security - 13th International Conference, 2010

IDS Alert Visualization and Monitoring through Heuristic Host Selection.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Y-Means: An Autonomous Clustering Algorithm.
Proceedings of the Hybrid Artificial Intelligence Systems, 5th International Conference, 2010

Managing intrusion detection rule sets.
Proceedings of the Third European Workshop on System Security, 2010

An Online Adaptive Approach to Alert Correlation.
Proceedings of the Detection of Intrusions and Malware, 2010

Automatic Discovery of Network Applications: A Hybrid Approach.
Proceedings of the Advances in Artificial Intelligence, 2010

2009
Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology.
IEEE Trans. Syst. Man Cybern. Part A, 2009

A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models.
J. Syst. Softw., 2009

SWAMI: A Multiagent, Active Representation of a User's Browsing Interests.
Int. J. Inf. Technol. Web Eng., 2009

Network Anomaly Detection Based on Wavelet Analysis.
EURASIP J. Adv. Signal Process., 2009

An incremental frequent structure mining framework for real-time alert correlation.
Comput. Secur., 2009

Hybrid Traffic Classification Approach Based on Decision Tree.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Online Classification of Network Flows.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

BotCop: An Online Botnet Traffic Classifier.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

A detailed analysis of the KDD CUP 99 data set.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Automatic discovery of botnet communities on large-scale communication networks.
Proceedings of the 2009 ACM Symposium on Information, 2009

An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering.
Proceedings of the Advances in Artificial Intelligence, 2009

2008
A language for high-level description of adaptive web systems.
J. Syst. Softw., 2008

Guest Editors' Introduction.
J. Comput. Secur., 2008

Approximate autoregressive modeling for network attack detection.
J. Comput. Secur., 2008

The state of the art in critical infrastructure protection: a framework for convergence.
Int. J. Crit. Infrastructures, 2008

An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics.
Comput. Intell., 2008

Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

On the Definition of Essential and Contingent Properties of Subjective Belief Bases.
Proceedings of the MICAI 2008: Advances in Artificial Intelligence, 2008

An Empirical Analysis on the Stability of Clustering Algorithms.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Oracle Clustering: Dynamic Partitioning Based on Random Observations.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Botnets Detection Based on IRC-Community.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process.
Proceedings of the Software Architecture, Second European Conference, 2008

A Novel Covariance Matrix Based Approach for Detecting Network Anomalies.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Critical Episode Mining in Intrusion Detection Alerts.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Detecting Network Anomalies Using Different Wavelet Basis Functions.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

A Novel Approach for Social Behavior Analysis of the Blogosphere.
Proceedings of the Advances in Artificial Intelligence , 2008

A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals.
Proceedings of the Advances in Artificial Intelligence , 2008

A Belief-Theoretic Reputation Estimation Model for Multi-context Communities.
Proceedings of the Advances in Artificial Intelligence , 2008

Real-time Alert Correlation Using Stream Data Mining Techniques.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

A Behavioral Model of Ideologically-motivated "Snowball" Attacks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Feature Classification Scheme For Network Intrusion Detection.
Int. J. Netw. Secur., 2007

A Rule-based Temporal Alert Correlation System.
Int. J. Netw. Secur., 2007

A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems.
Int. J. Inf. Sec., 2007

An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis.
Int. J. Bus. Process. Integr. Manag., 2007

SVision: A novel visual network-anomaly identification technique.
Comput. Secur., 2007

A Fuzzy Markov Model Approach for Predicting User Navigation.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

On Query Completion in Web Search Engines Based on Query Stream Mining.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

On the Collaborative Development of Para-Consistent Conceptual Models.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

A framework for distributed collaborative conceptual model development.
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.
Proceedings of the Information Security, 10th International Conference, 2007

Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications.
Proceedings of the Trust Management, 2007

GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

ConnectA! : An Intelligent Search Engine based on Authors' Connectivity.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
Putting labs online with Web services.
IT Prof., 2006

Alert Correlation for Extracting Attack Strategies.
Int. J. Netw. Secur., 2006

A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines.
Proceedings of the Algorithms and Models for the Web-Graph, Fourth International Workshop, 2006

An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems.
Proceedings of the 2006 International Conference on Privacy, 2006

Alert correlation survey: framework and techniques.
Proceedings of the 2006 International Conference on Privacy, 2006

Design and implementation of a behavioral difference analyzer for network intrusion detection.
Proceedings of the 2006 International Conference on Privacy, 2006

Trust-based contextual information filtering.
Proceedings of the 2006 International Conference on Privacy, 2006

Towards an MDA-oriented UML profile for critical infrastructure modeling.
Proceedings of the 2006 International Conference on Privacy, 2006

Behavior analysis through reputation propagation in a multi-context environment.
Proceedings of the 2006 International Conference on Privacy, 2006

Toward A Feature Classification Scheme For Network Intrusion Detection.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

2005
Incremental communication for adaptive resonance theory networks.
IEEE Trans. Neural Networks, 2005

Research on Intrusion Detection and Response: A Survey.
Int. J. Netw. Secur., 2005

Information Domain Modeling for Adaptive Web Systems.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

SVision: A Network Host-Centered Anomaly Visualization Technique.
Proceedings of the Information Security, 8th International Conference, 2005

Agent-oriented Design for Network Survivability.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Value-Centric Trust Model with Improved Familiarity Measurement.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Using Web Services to Control Remote Instruments for Online Experiment Systems.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

A Presentation Description Language for Adaptive Web Systems.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

PENS: A Personalized Electronic News System.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

ARAS: Adaptive Recommender for Academic Scheduling.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

SWAMI: Searching the Web Using Agents with Mobility and Intelligence.
Proceedings of the Advances in Artificial Intelligence, 2005

2004
Towards a formalization of value-centric trust in agent societies.
Web Intell. Agent Syst., 2004

Protecting e-commerce agents from defamation.
Electron. Commer. Res. Appl., 2004

Introduction to Special Issue on Agent Technologies for Electronic Business.
Comput. Intell., 2004

On the Evaluation of Adaptive Web Systems.
Proceedings of the 2nd International Workshop on Web-based Support Systems, 2004

Familiarity and Trust: Measuring Familiarity with a Web Site.
Proceedings of the Second Annual Conference on Privacy, 2004

Application of Belief-Desire-Intention Agents in Intrusion Detection & Response.
Proceedings of the Second Annual Conference on Privacy, 2004

A novel visualization technique for network anomaly detection.
Proceedings of the Second Annual Conference on Privacy, 2004

Cooperative Multiagent Systems for the Optimization of Urban Traffic.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Weighted PageRank Algorithm.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Improving the Referrer-Based Web Log Session Reconstruction.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Network Intrusion Detection Using an Improved Competitive Learning Neural Network.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

The Reconstruction of the Interleaved Sessions from a Server Log.
Proceedings of the Advances in Artificial Intelligence, 2004

2003
The ACORN multi-agent system.
Web Intell. Agent Syst., 2003

Value Centric Trust in Multiagent Systems.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

Using Fuzzy System to Manage False Alarms in Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

A Multiagent System for Optimizing Urban Traffic.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

Accent Classification Using Support Vector Machine and Hidden Markov Model.
Proceedings of the Advances in Artificial Intelligence, 2003

An Unsupervised Clustering Algorithm for Intrusion Detection.
Proceedings of the Advances in Artificial Intelligence, 2003

2002
Architectural Components of Information-Sharing Societies.
Comput. Intell., 2002

Reputation Formalization for an Information-Sharing Multi-Agent System.
Comput. Intell., 2002

Just-in-time information sharing architectures in multiagent systems.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
The Bottom-Up Freezing: An Approach to Neural Engineering.
Proceedings of the Advances in Artificial Intelligence, 2001

2000
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture.
Proceedings of the Mobile Agents for Telecommunication Applications, 2000

Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm.
Proceedings of the Advances in Artificial Intelligence, 2000

1998
Incremental communication for multilayer neural networks: error analysis.
IEEE Trans. Neural Networks, 1998

1996
Limited precision incremental communication: error analysis.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

1995
Incremental communication for multilayer neural networks.
IEEE Trans. Neural Networks, 1995


  Loading...