Toward credible evaluation of anomaly-based intrusion-detection methods M Tavallaee, N Stakhanova, AA Ghorbani IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 264 | 2010 |
A taxonomy of intrusion response systems N Stakhanova, S Basu, J Wong International Journal of Information and Computer Security 1 (1-2), 169-184, 2007 | 254 | 2007 |
Towards effective feature selection in machine learning-based botnet detection approaches EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani 2014 IEEE Conference on Communications and Network Security, 247-255, 2014 | 180 | 2014 |
A cost-sensitive model for preemptive intrusion response systems N Stakhanova, S Basu, J Wong 21st International Conference on Advanced Information Networking and …, 2007 | 114 | 2007 |
Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems G Helmer, J Wong, M Slagell, V Honavar, L Miller, Y Wang, X Wang, ... International Journal of Information and Computer Security 1 (1-2), 109-142, 2007 | 110 | 2007 |
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani Computer Networks 121, 25-36, 2017 | 72 | 2017 |
An online adaptive approach to alert correlation H Ren, N Stakhanova, AA Ghorbani International Conference on Detection of Intrusions and Malware, and …, 2010 | 71 | 2010 |
Android botnets: What urls are telling us AFA Kadir, N Stakhanova, AA Ghorbani International Conference on Network and System Security, 78-91, 2015 | 65 | 2015 |
Droidkin: Lightweight detection of android apps similarity H Gonzalez, N Stakhanova, AA Ghorbani International Conference on Security and Privacy in Communication Networks …, 2014 | 55 | 2014 |
A framework for cost sensitive assessment of intrusion response selection C Strasburg, N Stakhanova, S Basu, JS Wong 2009 33rd Annual IEEE international computer software and applications …, 2009 | 49 | 2009 |
Trust framework for p2p networks using peer-profile based anomaly technique N Stakhanova, S Basu, J Wong, O Stakhanov 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 43 | 2005 |
Detecting malicious urls using lexical analysis MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani International Conference on Network and System Security, 467-482, 2016 | 41 | 2016 |
On the symbiosis of specification-based and anomaly-based detection N Stakhanova, S Basu, J Wong computers & security 29 (2), 253-268, 2010 | 39 | 2010 |
Intrusion response cost assessment methodology C Strasburg, N Stakhanova, S Basu, JS Wong Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 38 | 2009 |
A Reputation-based Trust Management in Peer-to-Peer Network Systems. N Stakhanova, S Ferrero, JS Wong, Y Cai ISCA PDCS 4, 510-515, 2004 | 35 | 2004 |
Exploring reverse engineering symptoms in Android apps H Gonzalez, AA Kadir, N Stakhanova, AJ Alzahrani, AA Ghorbani Proceedings of the Eighth European Workshop on System Security, 1-7, 2015 | 34 | 2015 |
Application-layer denial of service attacks: taxonomy and survey G Mantas, N Stakhanova, H Gonzalez, HH Jazi, AA Ghorbani International Journal of Information and Computer Security 7 (2-4), 216-239, 2015 | 25 | 2015 |
Enriching reverse engineering through visual exploration of Android binaries A Jain, H Gonzalez, N Stakhanova Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015 | 22 | 2015 |
Code authorship attribution: Methods and challenges V Kalgutkar, R Kaur, H Gonzalez, N Stakhanova, A Matyukhina ACM Computing Surveys (CSUR) 52 (1), 1-36, 2019 | 21 | 2019 |
Towards cost-sensitive assessment of intrusion response selection N Stakhanova, C Strasburg, S Basu, JS Wong Journal of computer security 20 (2-3), 169-198, 2012 | 19 | 2012 |