Nur Zincir-Heywood
Orcid: 0000-0003-2796-7265Affiliations:
- Dalhousie University,Faculty of Computer Science, Halifax, NS, USA
According to our database1,
Nur Zincir-Heywood
authored at least 243 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Large language models and unsupervised feature learning: implications for log analysis.
Ann. des Télécommunications, December, 2024
Ann. des Télécommunications, December, 2024
J. Netw. Syst. Manag., July, 2024
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence.
IEEE Trans. Netw. Serv. Manag., June, 2024
J. Netw. Syst. Manag., March, 2024
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files.
Int. J. Netw. Manag., 2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks.
Proceedings of the Applications of Evolutionary Computation - 27th European Conference, 2024
Improving Real-Time Anomaly Detection using Multiple Instances of Micro-Cluster Detection.
Proceedings of the 20th International Conference on Network and Service Management, 2024
Proceedings of the 20th International Conference on Network and Service Management, 2024
Proceedings of the 20th International Conference on Network and Service Management, 2024
2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023
Int. J. Technol. Hum. Interact., 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the NOMS 2023, 2023
Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones.
Proceedings of the NOMS 2023, 2023
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023
Characterizing Cluster-Based Frailty Phenotypes in a Multicenter Prospective Cohort of Kidney Transplant Candidates.
Proceedings of the MEDINFO 2023 - The Future Is Accessible, 2023
Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the Genetic Programming - 26th European Conference, 2023
Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices.
Proceedings of the 19th International Conference on Network and Service Management, 2023
MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection.
Proceedings of the 19th International Conference on Network and Service Management, 2023
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023
2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022
it Inf. Technol., 2022
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the 12th ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications on ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2022
Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II.
IEEE Trans. Netw. Serv. Manag., 2021
Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Serv. Manag., 2021
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors.
J. Netw. Syst. Manag., 2021
Int. J. Netw. Manag., 2021
Exploring anomalous behaviour detection and classification for insider threat identification.
Int. J. Netw. Manag., 2021
Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework.
Int. J. Inf. Comput. Secur., 2021
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the 9th IEEE International Conference on Serious Games and Applications for Health, 2021
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Guest Editorial: Special Section on Data Analytics and Machine Learning for Network and Service Management-Part I.
IEEE Trans. Netw. Serv. Manag., 2020
Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning.
IEEE Trans. Netw. Serv. Manag., 2020
A Frontier: Dependable, Reliable and Secure Machine Learning for Network/System Management.
J. Netw. Syst. Manag., 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Guest Editorial: Special Issue on Novel Techniques in Big Data Analytics for Management.
IEEE Trans. Netw. Serv. Manag., 2019
J. Cyber Secur. Mobil., 2019
Int. J. Netw. Manag., 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the International Conference on Recent Advances in Natural Language Processing, 2019
Integrating Machine Learning with Off-the-Shelf Traffic Flow Features for HTTP/HTTPS Traffic Classification.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Darwinian malware detectors: a comparison of evolutionary solutions to android malware.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Proceedings of the 15th International Conference on Network and Service Management, 2019
Proceedings of the 15th International Conference on Network and Service Management, 2019
Proceedings of the 15th International Conference on Network and Service Management, 2019
Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection.
Proceedings of the 15th International Conference on Network and Service Management, 2019
Proceedings of the 15th International Conference on Network and Service Management, 2019
2018
IEEE Trans. Netw. Serv. Manag., 2018
On botnet detection with genetic programming under streaming data label budgets and class imbalance.
Swarm Evol. Comput., 2018
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018
Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the Genetic and Evolutionary Computation Conference, 2018
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018
2017
J. Cyber Secur. Mobil., 2017
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
Int. J. Netw. Manag., 2017
Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Properties of a GP active learning framework for streaming data with class imbalance.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
2016
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016
Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification.
IEEE Syst. J., 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Smart Phone User Behaviour Characterization Based on Autoencoders and Self Organizing Maps.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016
Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016
Proceedings of the Genetic and Evolutionary Computation Conference, 2016
Proceedings of the Genetic Programming - 19th European Conference, 2016
2015
Evolving GP Classifiers for Streaming Data Tasks with Concept Change and Label Budgets: A Benchmarking Study.
Proceedings of the Handbook of Genetic Programming Applications, 2015
J. Netw. Syst. Manag., 2015
J. King Saud Univ. Comput. Inf. Sci., 2015
Int. J. Softw. Eng. Knowl. Eng., 2015
Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling, 2015
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015
Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Genetic Programming - 18th European Conference, 2015
Proceedings of the Discovery Science - 18th International Conference, 2015
Proceedings of the Discovery Science - 18th International Conference, 2015
Proceedings of the 11th International Conference on Network and Service Management, 2015
Proceedings of the 11th International Conference on Network and Service Management, 2015
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014
Proceedings of the Genetic and Evolutionary Computation Conference, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Benchmarking two techniques for Tor classification: Flow level and circuit level classification.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation.
EURASIP J. Inf. Secur., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Label free change detection on streaming data with cooperative multi-objective genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013
Proceedings of the ACM Symposium on Document Engineering 2013, 2013
Proceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2013
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013
Proceedings of the IEEE Congress on Evolutionary Computation, 2013
Proceedings of the IEEE Congress on Evolutionary Computation, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Spatio-temporal decomposition, clustering and identification for alert detection in system logs.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Proceedings of the Genetic and Evolutionary Computation Conference, 2012
Proceedings of the Applications of Evolutionary Computation, 2012
Proceedings of the IEEE Congress on Evolutionary Computation, 2012
2011
Intell. Data Anal., 2011
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Evol. Intell., 2011
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
Comput. Networks, 2011
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.
Appl. Soft Comput., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Storage and retrieval of system log events using a structured schema based on message type transformation.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2011
A Comparison of three machine learning techniques for encrypted network traffic analysis.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
Genetic optimization and hierarchical clustering applied to encrypted traffic identification.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
Is machine learning losing the battle to produce transportable signatures against VoIP traffic?
Proceedings of the IEEE Congress on Evolutionary Computation, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs.
Proceedings of the QEST 2010, 2010
Proceedings of the Applications of Evolutionary Computation, 2010
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype.
Proceedings of the 6th International Conference on Network and Service Management, 2010
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
An analysis of clustering objectives for feature selection applied to encrypted traffic identification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009
Classifying SSH encrypted traffic with minimum packet header features using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Applications of Evolutionary Computing, 2009
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008
Proceedings of the 2008 conference of the Centre for Advanced Studies on Collaborative Research, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set.
Proceedings of the The Third International Conference on Availability, 2008
2007
A Comparative Study on Key Phrase Extraction Methods in Automatic Web Site Summarization.
J. Digit. Inf. Manag., 2007
Proceedings of the IEEE International Conference on Systems, 2007
Proceedings of the IEEE International Conference on Systems, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Applications of Evolutinary Computing, 2007
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Appl. Soft Comput., 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Genetic Programming, 9th European Conference, 2006
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
Training genetic programming on half a million patterns: an example from anomaly detection.
IEEE Trans. Evol. Comput., 2005
Neural Process. Lett., 2005
Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources.
J. Intell. Inf. Syst., 2005
Narrative text classification for automatic key phrase extraction in web document corpora.
Proceedings of the Seventh ACM International Workshop on Web Information and Data Management (WIDM 2005), 2005
Proceedings of the Third Annual Conference on Privacy, 2005
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the IEEE International Joint Conference on Neural Networks, 2005
Comparison of a SOM based sequence analysis system and naive Bayesian classifier for spam filtering.
Proceedings of the IEEE International Joint Conference on Neural Networks, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Proceedings of the IEEE Congress on Evolutionary Computation, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
A heuristic approach to network optimised mapping of a distributed resource discovery architecture.
Int. J. Comput. Appl. Technol., 2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs.
Proceedings of the International Conference on Artificial Intelligence, 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
Proceedings of the Advances in Artificial Intelligence, 2004
2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
A Case Study of Three Open Source Security Management Tools.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of the Genetic and Evolutionary Computation, 2003
Proceedings of the Advances in Artificial Intelligence, 2003
Proceedings of the Advances in Artificial Intelligence, 2003
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003
2002
IEEE Trans. Syst. Man Cybern. Part B, 2002
IEEE Trans. Knowl. Data Eng., 2002
Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
2000
Inf. Process. Manag., 2000
Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search.
Int. J. Cooperative Inf. Syst., 2000
Proceedings of the IEEE International Conference on Systems, 2000
Proceedings of the Genetic Programming, European Conference, 2000
1998
İnternet üzerinde yeni bir bilgi tarama sisteminin tasarımı, gerçekleştirilmesi ve başarım değerlendirmesi (The Design, development and performance analysis of a new information retriveal system over internet)
PhD thesis, 1998