A detailed analysis of the KDD CUP 99 data set M Tavallaee, E Bagheri, W Lu, AA Ghorbani 2009 IEEE symposium on computational intelligence for security and defense …, 2009 | 5405 | 2009 |
Toward generating a new intrusion detection dataset and intrusion traffic characterization. I Sharafaldin, AH Lashkari, AA Ghorbani ICISSp 1, 108-116, 2018 | 3551 | 2018 |
Toward developing a systematic approach to generate benchmark datasets for intrusion detection A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani computers & security 31 (3), 357-374, 2012 | 1415 | 2012 |
An overview of online fake news: Characterization, detection, and discussion X Zhang, AA Ghorbani Information Processing & Management 57 (2), 102025, 2020 | 930 | 2020 |
Weighted pagerank algorithm W Xing, A Ghorbani Proceedings. Second Annual Conference on Communication Networks and Services …, 2004 | 909 | 2004 |
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani 2019 international carnahan conference on security technology (ICCST), 1-8, 2019 | 860 | 2019 |
Characterization of tor traffic using time based features AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani International Conference on Information Systems Security and Privacy 2, 253-262, 2017 | 787 | 2017 |
Characterization of encrypted and vpn traffic using time-related G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani Proceedings of the 2nd international conference on information systems …, 2016 | 762 | 2016 |
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT R Lu, K Heung, AH Lashkari, AA Ghorbani IEEE access 5, 3302-3312, 2017 | 509 | 2017 |
Botnet detection based on traffic behavior analysis and flow intervals D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant computers & security 39, 2-16, 2013 | 455 | 2013 |
Detecting P2P botnets through network behavior analysis and machine learning S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian 2011 Ninth annual international conference on privacy, security and trust …, 2011 | 398 | 2011 |
Toward credible evaluation of anomaly-based intrusion-detection methods M Tavallaee, N Stakhanova, AA Ghorbani IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 395 | 2010 |
A survey of visualization systems for network security H Shiravi, A Shiravi, AA Ghorbani IEEE Transactions on visualization and computer graphics 18 (8), 1313-1329, 2011 | 386 | 2011 |
Research on intrusion detection and response: A survey. P Kabiri, AA Ghorbani Int. J. Netw. Secur. 1 (2), 84-102, 2005 | 373 | 2005 |
Network intrusion detection and prevention: concepts and techniques AA Ghorbani, W Lu, M Tavallaee Springer Science & Business Media, 2009 | 364 | 2009 |
Towards effective feature selection in machine learning-based botnet detection approaches EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani 2014 IEEE Conference on Communications and Network Security, 247-255, 2014 | 348 | 2014 |
Toward developing a systematic approach to generate benchmark android malware datasets and classification AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani 2018 International Carnahan conference on security technology (ICCST), 1-7, 2018 | 310 | 2018 |
Application of deep learning to cybersecurity: A survey S Mahdavifar, AA Ghorbani Neurocomputing 347, 149-176, 2019 | 309 | 2019 |
Towards a reliable intrusion detection benchmark dataset I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani Software Networking 2018 (1), 177-200, 2018 | 309 | 2018 |
Y-means: A clustering method for intrusion detection Y Guan, AA Ghorbani, N Belacel CCECE 2003-Canadian Conference on Electrical and Computer Engineering …, 2003 | 308 | 2003 |