A detailed analysis of the KDD CUP 99 data set M Tavallaee, E Bagheri, W Lu, AA Ghorbani 2009 IEEE symposium on computational intelligence for security and defense …, 2009 | 5405 | 2009 |
Botnet detection based on traffic behavior analysis and flow intervals D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant computers & security 39, 2-16, 2013 | 455 | 2013 |
Detecting P2P botnets through network behavior analysis and machine learning S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian 2011 Ninth annual international conference on privacy, security and trust …, 2011 | 398 | 2011 |
Network intrusion detection and prevention: concepts and techniques AA Ghorbani, W Lu, M Tavallaee Network intrusion detection and prevention: concepts and techniques 47, 2009 | 364 | 2009 |
Network anomaly detection based on wavelet analysis W Lu, AA Ghorbani EURASIP Journal on Advances in Signal processing 2009, 1-16, 2008 | 298 | 2008 |
Detecting new forms of network intrusion using genetic programming W Lu, I Traore The 2003 Congress on Evolutionary Computation 3, 2165-2172, 2003 | 235 | 2003 |
Clustering botnet communication traffic based on n-gram feature selection W Lu, G Rammidi, AA Ghorbani Computer Communications 34 (3), 502-514, 2011 | 134 | 2011 |
Automatic discovery of botnet communities on large-scale communication networks W Lu, M Tavallaee, AA Ghorbani Proceedings of the 4th international symposium on information, computer, and …, 2009 | 106 | 2009 |
Peer to peer botnet detection based on flow intervals D Zhao, I Traore, A Ghorbani, B Sayed, S Saad, W Lu Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 86 | 2012 |
BotCop: An online botnet traffic classifier W Lu, M Tavallaee, G Rammidi, AA Ghorbani 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 77 | 2009 |
Nsl-kdd dataset M Tavallaee, E Bagheri, W Lu, AA Ghorbani Available on http://www. unb. ca/research/iscx/dataset/iscx-NSL-KDD-dataset …, 2012 | 60 | 2012 |
A novel covariance matrix based approach for detecting network anomalies M Tavallaee, W Lu, SA Iqbal, AA Ghorbani 6th annual communication networks and services research conference (cnsr …, 2008 | 45 | 2008 |
Detecting network anomalies using different wavelet basis functions W Lu, M Tavallaee, AA Ghorbani 6th annual communication networks and services research conference (CNSR …, 2008 | 39 | 2008 |
Botnets detection based on irc-community W Lu, AA Ghorbani IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 38 | 2008 |
A new unsupervised anomaly detection framework for detecting network attacks in real-time W Lu, I Traore International Conference on Cryptology and Network Security, 96-109, 2005 | 37 | 2005 |
Detecting network anomalies using CUSUM and EM clustering W Lu, H Tong Advances in Computation and Intelligence: 4th International Symposium, ISICA …, 2009 | 35 | 2009 |
Online classification of network flows M Tavallaee, W Lu, AA Ghorbani 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 33 | 2009 |
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm W Lu, I Traore International Journal of Information and Computer Security 2 (2), 107-139, 2008 | 32 | 2008 |
An unsupervised approach for detecting DDoS attacks based on traffic-based metrics W Lu, I Traore PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and …, 2005 | 30 | 2005 |
Determining the optimal number of clusters using a new evolutionary algorithm W Lu, I Traore 17th IEEE International Conference on Tools with Artificial Intelligence …, 2005 | 29 | 2005 |