关注
Ali A. Ghorbani
Ali A. Ghorbani
Professor and Canada Research Chair in Cybersecurity
在 unb.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A detailed analysis of the KDD CUP 99 data set
M Tavallaee, E Bagheri, W Lu, AA Ghorbani
2009 IEEE symposium on computational intelligence for security and defense …, 2009
54052009
Toward generating a new intrusion detection dataset and intrusion traffic characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
ICISSp 1, 108-116, 2018
35512018
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani
computers & security 31 (3), 357-374, 2012
14152012
An overview of online fake news: Characterization, detection, and discussion
X Zhang, AA Ghorbani
Information Processing & Management 57 (2), 102025, 2020
9302020
Weighted pagerank algorithm
W Xing, A Ghorbani
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
9092004
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani
2019 international carnahan conference on security technology (ICCST), 1-8, 2019
8602019
Characterization of tor traffic using time based features
AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani
International Conference on Information Systems Security and Privacy 2, 253-262, 2017
7872017
Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani
Proceedings of the 2nd international conference on information systems …, 2016
7622016
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE access 5, 3302-3312, 2017
5092017
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
computers & security 39, 2-16, 2013
4552013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust …, 2011
3982011
Toward credible evaluation of anomaly-based intrusion-detection methods
M Tavallaee, N Stakhanova, AA Ghorbani
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
3952010
A survey of visualization systems for network security
H Shiravi, A Shiravi, AA Ghorbani
IEEE Transactions on visualization and computer graphics 18 (8), 1313-1329, 2011
3862011
Research on intrusion detection and response: A survey.
P Kabiri, AA Ghorbani
Int. J. Netw. Secur. 1 (2), 84-102, 2005
3732005
Network intrusion detection and prevention: concepts and techniques
AA Ghorbani, W Lu, M Tavallaee
Springer Science & Business Media, 2009
3642009
Towards effective feature selection in machine learning-based botnet detection approaches
EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani
2014 IEEE Conference on Communications and Network Security, 247-255, 2014
3482014
Toward developing a systematic approach to generate benchmark android malware datasets and classification
AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani
2018 International Carnahan conference on security technology (ICCST), 1-7, 2018
3102018
Application of deep learning to cybersecurity: A survey
S Mahdavifar, AA Ghorbani
Neurocomputing 347, 149-176, 2019
3092019
Towards a reliable intrusion detection benchmark dataset
I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani
Software Networking 2018 (1), 177-200, 2018
3092018
Y-means: A clustering method for intrusion detection
Y Guan, AA Ghorbani, N Belacel
CCECE 2003-Canadian Conference on Electrical and Computer Engineering …, 2003
3082003
系统目前无法执行此操作,请稍后再试。
文章 1–20