A. Nur Zincir-Heywood

According to our database1, A. Nur Zincir-Heywood authored at least 174 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Big Data in Network Anomaly Detection.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Guest Editorial: Special Issue on Novel Techniques in Big Data Analytics for Management.
IEEE Trans. Network and Service Management, 2019

User identification via neural network based language models.
Int. Journal of Network Management, 2019

Machine learning based Insider Threat Modelling and Detection.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Network Analytics for Streaming Traffic Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Darwinian malware detectors: a comparison of evolutionary solutions to android malware.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Benchmarking genetic programming in dynamic insider threat detection.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

2018
Guest Editorial: Special Section on Advances in Big Data Analytics for Management.
IEEE Trans. Network and Service Management, 2018

On botnet detection with genetic programming under streaming data label budgets and class imbalance.
Swarm and Evolutionary Computation, 2018

An Artificial Arms Race: Could it Improve Mobile Malware Detectors?
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A language model for compromised user analysis.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

How far can we push flow analysis to identify encrypted anonymity network traffic?
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Streaming Botnet traffic analysis using bio-inspired active learning.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Benchmarking evolutionary computation approaches to insider threat detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

On botnet detection with genetic programming under streaming data, label budgets and class imbalance.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

A genetic algorithm for dynamic controller placement in software defined networking.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

2017
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
Int. Journal of Network Management, 2017

Big data analytics for network and service management.
Int. Journal of Network Management, 2017

Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

An analysis of tor pluggable transports under adversarial conditions.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Effects of Shared Bandwidth on Anonymity of the I2P Network Users.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Exploring a service-based normal behaviour profiling system for botnet detection.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Evolutionary computation in network management and security: GECCO 2017 tutorial.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

On evolutionary computation for moving target defense in software defined networks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Properties of a GP active learning framework for streaming data with class imbalance.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Return-oriented programme evolution with ROPER: a proof of concept.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Weighted Factors for Evaluating Anonymity.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning.
, 2016

Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification.
IEEE Systems Journal, 2016

Data analytics on network traffic flows for botnet behaviour detection.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

How to choose from different botnet detection systems?
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Autonomous system based flow marking scheme for IP-Traceback.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Smart Phone User Behaviour Characterization Based on Autoencoders and Self Organizing Maps.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Women@GECCO 2016 Chairs' Welcome.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

On the Impact of Class Imbalance in GP Streaming Classification with Label Budgets.
Proceedings of the Genetic Programming - 19th European Conference, 2016

2015
Evolving GP Classifiers for Streaming Data Tasks with Concept Change and Label Budgets: A Benchmarking Study.
Proceedings of the Handbook of Genetic Programming Applications, 2015

How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?
J. Network Syst. Manage., 2015

EMITS: An Experience Management System for IT Management Support.
International Journal of Software Engineering and Knowledge Engineering, 2015

Probabilistic flow marking for IP traceback (PFM).
Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling, 2015

Feature selection for robust backscatter DDoS detection.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

On the Effectiveness of Different Botnet Detection Approaches.
Proceedings of the Information Security Practice and Experience, 2015

Investigating unique flow marking for tracing back DDoS attacks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A Proxy Identifier Based on Patterns in Traffic Flows.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Tapped Delay Lines for GP Streaming Data Classification with Label Budgets.
Proceedings of the Genetic Programming - 18th European Conference, 2015

Benchmarking Stream Clustering for Churn Detection in Dynamic Networks.
Proceedings of the Discovery Science - 18th International Conference, 2015

Predictive Analysis on Tracking Emails for Targeted Marketing.
Proceedings of the Discovery Science - 18th International Conference, 2015

Traffic flow analysis of tor pluggable transports.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Deterministic flow marking for IPv6 traceback (DFM6).
Proceedings of the 11th International Conference on Network and Service Management, 2015

Highlights on analyzing one-way traffic using different tools.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

2014
Can We Identify NAT Behavior by Analyzing Traffic Flows?
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

A case study for a secure and robust geo-fencing and access control framework.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

On the analysis of backscatter traffic.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014

On botnet behaviour analysis using GP and C4.5.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Data Confirmation for Botnet Traffic Analysis.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Benchmarking two techniques for Tor classification: Flow level and circuit level classification.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Supervised learning to detect DDoS attacks.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Exploring the need for visualizations in system administration tools.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

TDFA: Traceback-Based Defense against DDoS Flooding Attacks.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation.
EURASIP J. Information Security, 2013

On Evaluating IP Traceback Schemes: A Practical Perspective.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Investigating event log analysis with minimum apriori information.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Automatic optimization for a clustering based approach to support IT management.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Label free change detection on streaming data with cooperative multi-objective genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Malicious Automatically Generated Domain Name Detection Using Stateful-SBB.
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013

Beyond term clusters: assigning Wikipedia concepts to scientific documents.
Proceedings of the ACM Symposium on Document Engineering 2013, 2013

Investigating application behavior in network traffic traces.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2013

Indoor geo-fencing and access control for wireless networks.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

How far an evolutionary approach can go for protocol state analysis and discovery.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Analyzing string format-based classifiers for botnet detection: GP and SVM.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Deterministic and Authenticated Flow Marking for IP Traceback.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A Lightweight Algorithm for Message Type Extraction in System Application Logs.
IEEE Trans. Knowl. Data Eng., 2012

Spatio-temporal decomposition, clustering and identification for alert detection in system logs.
Proceedings of the ACM Symposium on Applied Computing, 2012

Interactive learning of alert signatures in High Performance Cluster system logs.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Data mining for supporting IT management.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

GP under streaming data constraints: a case for pareto archiving?
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

Network Protocol Discovery and Analysis via Live Interaction.
Proceedings of the Applications of Evolutionary Computation, 2012

Symbiotic evolutionary subspace clustering.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Robust learning intrusion detection for attacks on wireless networks.
Intell. Data Anal., 2011

Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Evolutionary Intelligence, 2011

Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
Computer Networks, 2011

Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.
Appl. Soft Comput., 2011

Multi-document summarization of scientific corpora.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Storage and retrieval of system log events using a structured schema based on message type transformation.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A next generation entropy based framework for alert detection in system logs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

An investigation on identifying SSL traffic.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2011

A Comparison of three machine learning techniques for encrypted network traffic analysis.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2011

Exploring the state space of an application protocol: A case study of SMTP.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Genetic optimization and hierarchical clustering applied to encrypted traffic identification.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Is machine learning losing the battle to produce transportable signatures against VoIP traffic?
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

System State Discovery Via Information Content Clustering of System Logs.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Topic-based web site summarization.
IJWIS, 2010

An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs.
Proceedings of the QEST 2010, 2010

Using Code Bloat to Obfuscate Evolved Network Traffic.
Proceedings of the Applications of Evolutionary Computation, 2010

Fast entropy based alert detection in super computer logs.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Bottom-up evolutionary subspace clustering.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

An analysis of clustering objectives for feature selection applied to encrypted traffic identification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Unveiling Skype encrypted tunnels using GP.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

One Size Fits None: The Importance of Detector Parameterization.
Proceedings of the ARES 2010, 2010

2009
Clustering event logs using iterative partitioning.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Classifying SSH encrypted traffic with minimum packet header features using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Testing Detector Parameterization Using Evolutionary Exploit Generation.
Proceedings of the Applications of Evolutionary Computing, 2009

An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

Evolving TCP/IP packets: A case study of port scans.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Machine learning based encrypted traffic classification: Identifying SSH and Skype.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Generating mimicry attacks using genetic programming: A benchmarking study.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Generalization of signatures for SSH encrypted traffic identification.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
LogView: Visualizing Event Log Clusters.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Investigating Two Different Approaches for Encrypted Traffic Classification.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Information Retrieval in Network Administration.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

NetPal: a dynamic network administration knowledge base.
Proceedings of the 2008 conference of the Centre for Advanced Studies on Collaborative Research, 2008

VEA-bility Security Metric: A Network Security Analysis Tool.
Proceedings of the The Third International Conference on Availability, 2008

Adaptabilty of a GP Based IDS on Wireless Networks.
Proceedings of the The Third International Conference on Availability, 2008

A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Comparative Study on Key Phrase Extraction Methods in Automatic Web Site Summarization.
JDIM, 2007

A hierarchical SOM-based intrusion detection system.
Eng. Appl. of AI, 2007

Growing recurrent self organizing map.
Proceedings of the IEEE International Conference on Systems, 2007

A flow based approach for SSH traffic detection.
Proceedings of the IEEE International Conference on Systems, 2007

Incorporating Temporal Information for Document Classification.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Evolving Buffer Overflow Attacks with Detector Feedback.
Proceedings of the Applications of Evolutinary Computing, 2007

A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Automatically Evading IDS Using GP Authored Attacks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

On the Contribution of Preamble to Information Hiding in Mimicry Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Adding more intelligence to the network routing problem: AntNet and Ga-agents.
Appl. Soft Comput., 2006

Using self-organizing maps to build an attack map for forensic analysis.
Proceedings of the 2006 International Conference on Privacy, 2006

On evolving buffer overflow attacks using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

802.11 De-authentication Attack Detection Using Genetic Programming.
Proceedings of the Genetic Programming, 9th European Conference, 2006

Genetic Programming Based WiFi Data Link Layer Attack Detection.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Modeling User Behaviors from FTP Server Logs.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Evolving Recurrent Linear-GP for Document Classification and Word Tracking.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
Training genetic programming on half a million patterns: an example from anomaly detection.
IEEE Trans. Evolutionary Computation, 2005

Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection.
Neural Processing Letters, 2005

Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources.
J. Intell. Inf. Syst., 2005

Narrative text classification for automatic key phrase extraction in web document corpora.
Proceedings of the Seventh ACM International Workshop on Web Information and Data Management (WIDM 2005), 2005

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.
Proceedings of the Third Annual Conference on Privacy, 2005

Evaluation of Two Systems on Multi-class Multi-label Document Classification.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Proceedings of the Intelligence and Security Informatics, 2005

Evolving recurrent models using linear GP.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

802.11 network intrusion detection using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Generating Representative Traffic for Intrusion Detection System Benchmarking.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

Understanding the Performance of Cooperative Web Caching Systems.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

CasGP: building cascaded hierarchical models using niching.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

Evolving Successful Stack Overflow Attacks for Vulnerability Testing.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
World Wide Web site summarization.
Web Intelligence and Agent Systems, 2004

A heuristic approach to network optimised mapping of a distributed resource discovery architecture.
IJCAT, 2004

Analyzing the Temporal Sequences for Text Categorization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs.
Proceedings of the International Conference on Artificial Intelligence, 2004

Intelligent Agents for Routing on Mobile Ad-Hoc Networks.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Intelligent Ants for Adaptive Network Routing.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Cascaded GP models for data mining.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Term-Based Clustering and Summarization of Web Page Collections.
Proceedings of the Advances in Artificial Intelligence, 2004

2003
SOM - Feature Extraction from Patient Discharge Summaries.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A Case Study of Three Open Source Security Management Tools.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

A Linear Genetic Programming Approach to Intrusion Detection.
Proceedings of the Genetic and Evolutionary Computation, 2003

Summarizing Web Sites Automatically.
Proceedings of the Advances in Artificial Intelligence, 2003

Post-supervised Template Induction for Dynamic Web Sources.
Proceedings of the Advances in Artificial Intelligence, 2003

A Uniform Continuum Model for Scaling of Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

2002
Dynamic page based crossover in linear genetic programming.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2002

Object-Orientated Design of Digital Library Platforms for Multiagent Environments.
IEEE Trans. Knowl. Data Eng., 2002

Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

2000
Digital library query clearing using clustering and fuzzy decision-making.
Inf. Process. Manage., 2000

Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search.
Int. J. Cooperative Inf. Syst., 2000

Page-based linear genetic programming.
Proceedings of the IEEE International Conference on Systems, 2000

Register Based Genetic Programming on FPGA Computing Platforms.
Proceedings of the Genetic Programming, European Conference, 2000


  Loading...