Toward credible evaluation of anomaly-based intrusion-detection methods M Tavallaee, N Stakhanova, AA Ghorbani IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 395 | 2010 |
Towards effective feature selection in machine learning-based botnet detection approaches EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani 2014 IEEE Conference on Communications and Network Security, 247-255, 2014 | 348 | 2014 |
A taxonomy of intrusion response systems N Stakhanova, S Basu, J Wong International journal of information and computer security 1 (1-2), 169-184, 2007 | 279 | 2007 |
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani Computer Networks 121, 25-36, 2017 | 216 | 2017 |
Detecting malicious urls using lexical analysis MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016 | 204 | 2016 |
A cost-sensitive model for preemptive intrusion response systems N Stakhanova, S Basu, J Wong 21st International Conference on Advanced Information Networking and …, 2007 | 130 | 2007 |
Android botnets: What urls are telling us AF Abdul Kadir, N Stakhanova, AA Ghorbani Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 123 | 2015 |
Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems G Helmer, J Wong, M Slagell, V Honavar, L Miller, Y Wang, X Wang, ... International Journal of Information and Computer Security 1 (1-2), 109-142, 2007 | 116 | 2007 |
Code authorship attribution: Methods and challenges V Kalgutkar, R Kaur, H Gonzalez, N Stakhanova, A Matyukhina ACM Computing Surveys (CSUR) 52 (1), 1-36, 2019 | 98 | 2019 |
Droidkin: Lightweight detection of android apps similarity H Gonzalez, N Stakhanova, AA Ghorbani International Conference on Security and Privacy in Communication Networks …, 2015 | 84 | 2015 |
An online adaptive approach to alert correlation H Ren, N Stakhanova, AA Ghorbani Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 84 | 2010 |
A framework for cost sensitive assessment of intrusion response selection C Strasburg, N Stakhanova, S Basu, JS Wong 2009 33rd Annual IEEE international computer software and applications …, 2009 | 59 | 2009 |
Application-layer denial of service attacks: taxonomy and survey G Mantas, N Stakhanova, H Gonzalez, HH Jazi, AA Ghorbani International Journal of Information and Computer Security 7 (2-4), 216-239, 2015 | 49 | 2015 |
Intrusion response cost assessment methodology C Strasburg, N Stakhanova, S Basu, JS Wong Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 48 | 2009 |
Exploring reverse engineering symptoms in Android apps H Gonzalez, AA Kadir, N Stakhanova, AJ Alzahrani, AA Ghorbani Proceedings of the Eighth European Workshop on System Security, 1-7, 2015 | 46 | 2015 |
On the symbiosis of specification-based and anomaly-based detection N Stakhanova, S Basu, J Wong computers & security 29 (2), 253-268, 2010 | 44 | 2010 |
Trust framework for p2p networks using peer-profile based anomaly technique N Stakhanova, S Basu, J Wong, O Stakhanov 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 43 | 2005 |
A Reputation-based Trust Management in Peer-to-Peer Network Systems. N Stakhanova, S Ferrero, JS Wong, Y Cai PDCS, 510-515, 2004 | 39 | 2004 |
Scalable privacy-preserving query processing over ethereum blockchain S Linoy, H Mahdikhani, S Ray, R Lu, N Stakhanova, A Ghorbani 2019 IEEE International Conference on Blockchain (Blockchain), 398-404, 2019 | 36 | 2019 |
Enriching reverse engineering through visual exploration of Android binaries A Jain, H Gonzalez, N Stakhanova Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015 | 34 | 2015 |