Ali A. Ghorbani

According to our database1, Ali A. Ghorbani authored at least 213 papers between 1995 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
KeyShield: A Scalable and Quantum-Safe Key Management Scheme.
IEEE Open J. Commun. Soc., 2021

Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency.
CoRR, 2021

Classifying and clustering malicious advertisement uniform resource locators using deep learning.
Comput. Intell., 2021

2020
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms.
Sensors, 2020

An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.
Secur. Priv., 2020

DeNNeS: deep embedded neural network expert system for detecting cyber attacks.
Neural Comput. Appl., 2020

An overview of online fake news: Characterization, detection, and discussion.
Inf. Process. Manag., 2020

Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS.
IEEE Internet Things J., 2020

Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020

Improved Fault Analysis on SIMECK Ciphers.
IACR Cryptol. ePrint Arch., 2020

A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour.
Digit. Investig., 2020

A game-theoretic defensive approach for forensic investigators against rootkits.
Digit. Investig., 2020

Memory-Efficient Random Order Exponentiation Algorithm.
IEEE Access, 2020

Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

On The Generation of Unrestricted Adversarial Examples.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Ensemble of Hierarchical Temporal Memory for Anomaly Detection.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs).
Proceedings of the IEEE Intl Conf on Dependable, 2020

Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Financial Fraud Detection using Deep Support Vector Data Description.
Proceedings of the IEEE International Conference on Big Data, 2020

2019
A Survey on User Profiling Model forAnomaly Detection in Cyberspace.
J. Cyber Secur. Mobil., 2019

Neural embedding-based indices for semantic search.
Inf. Process. Manag., 2019

The reflection of offline activities on users' online social behavior: An observational study.
Inf. Process. Manag., 2019

Application of deep learning to cybersecurity: A survey.
Neurocomputing, 2019

Towards insider threats detection in smart grid communication systems.
IET Commun., 2019

DDH-based Multisignatures with Public Key Aggregation.
IACR Cryptol. ePrint Arch., 2019

An evaluation framework for network security visualizations.
Comput. Secur., 2019

Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT.
IEEE Access, 2019

Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A New Multisignature Scheme with Public Key Aggregation for Blockchain.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Competitive Selfish Mining.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Generating Phishing Emails Using Graph Database.
Proceedings of the Information Security Practice and Experience, 2019

Scalable Privacy-Preserving Query Processing over Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

On the causal relation between users' real-world activities and their affective processes.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges.
J. Cyber Secur. Mobil., 2018

OTP-IoT: An ownership transfer protocol for the Internet of Things.
J. Inf. Secur. Appl., 2018

SupAUTH: A new approach to supply chain authentication for the IoT.
Comput. Intell., 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

EagleEye: A Novel Visual Anomaly Detection Method.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A Detailed Analysis of the CICIDS2017 Data Set.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

Authorship Attribution of Android Apps.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Efficient indexing for semantic search.
Expert Syst. Appl., 2017

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling.
Comput. Networks, 2017

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017

A Lightweight Online Advertising Classification System using Lexical-based Features.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Towards a Network-Based Framework for Android Malware Detection and Characterization.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

DNA-Droid: A Real-Time Android Ransomware Detection Framework.
Proceedings of the Network and System Security - 11th International Conference, 2017

Characterization of Tor Traffic using Time based Features.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

BotViz: A memory forensic-based botnet detection and visualization approach.
Proceedings of the International Carnahan Conference on Security Technology, 2017

CIC-AB: Online ad blocker for browsers.
Proceedings of the International Carnahan Conference on Security Technology, 2017

A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

EfficientPMM: Finite Automata Based Efficient Pattern Matching Machine.
Proceedings of the International Conference on Computational Science, 2017

2016
SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents.
J. Cyber Secur. Mobil., 2016

Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content.
Int. J. Semantic Comput., 2016

A network based document management model to prevent data extrusion.
Comput. Secur., 2016

Context Free Frequently Asked Questions Detection Using Machine Learning Techniques.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Dynamic graph-based malware classifier.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Measuring code reuse in Android apps.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Detecting Malicious URLs Using Lexical Analysis.
Proceedings of the Network and System Security - 10th International Conference, 2016

Towards Android malware detection using intelligent agents.
Proceedings of the 2nd International Symposium on Agent, Multi-Agent Systems and Robotics, 2016

SMS-Based Mobile Botnet Detection Module.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Characterization of Encrypted and VPN Traffic using Time-related Features.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Application-layer denial of service attacks: taxonomy and survey.
Int. J. Inf. Comput. Secur., 2015

Semantic Annotation of Quantitative Textual Content.
Proceedings of the Third International Workshop on Linked Data for Information Extraction (LD4IE2015) co-located with the 14th International Semantic Web Conference (ISWC 2015), 2015

Real-time signature-based detection approach for SMS botnet.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Android Botnets: What URLs are Telling Us.
Proceedings of the Network and System Security - 9th International Conference, 2015

An Entropy Based Encrypted Traffic Classifier.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Exploring reverse engineering symptoms in Android apps.
Proceedings of the Eighth European Workshop on System Security, 2015

A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management.
J. Comput. Virol. Hacking Tech., 2014

Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones.
J. Cyber Secur. Mobil., 2014

DroidKin: Lightweight Detection of Android Apps Similarity.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Towards effective feature selection in machine learning-based botnet detection approaches.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Botnet detection based on traffic behavior analysis and flow intervals.
Comput. Secur., 2013

Sentence Subjectivity Analysis in Social Domains.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

A Structure for Opinion in Social Domains.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Automated malware classification based on network behavior.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Lexical-Syntactical Patterns for Subjectivity Analysis of Social Issues.
Proceedings of the Active Media Technology - 9th International Conference, 2013

Classifying Organizational Roles Using Email Social Networks.
Proceedings of the Advances in Artificial Intelligence, 2013

2012
A Survey of Visualization Systems for Network Security.
IEEE Trans. Vis. Comput. Graph., 2012

Improved competitive learning neural networks for network intrusion and fraud detection.
Neurocomputing, 2012

Toward developing a systematic approach to generate benchmark datasets for intrusion detection.
Comput. Secur., 2012

Multi-layer episode filtering for the multi-step attack detection.
Comput. Commun., 2012

Verb Oriented Sentiment Classification.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Sentiment Analysis of Social Issues.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Peer to Peer Botnet Detection Based on Flow Intervals.
Proceedings of the Information Security and Privacy Research, 2012

A New Framework for Publishing and Sharing Network and Security Datasets.
Proceedings of the 2012 SC Companion: High Performance Computing, 2012

Group Behavior Metrics for P2P Botnet Detection.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Estimating botnet virulence within mathematical models of botnet propagation dynamics.
Comput. Secur., 2011

Clustering botnet communication traffic based on n-gram feature selection.
Comput. Commun., 2011

Detecting P2P botnets through network behavior analysis and machine learning.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Exploring network-based malware classification.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

VisVerND: Visual Verification of Network Traffic Dataset.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

A statistical approach to botnet virulence estimation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Network Intrusion Detection and Prevention - Concepts and Techniques
Advances in Information Security 47, Springer, ISBN: 978-0-387-88770-8, 2010

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods.
IEEE Trans. Syst. Man Cybern. Part C, 2010

A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games.
IEEE Trans. Syst. Man Cybern. Part A, 2010

The analysis and management of non-canonical requirement specifications through a belief integration game.
Knowl. Inf. Syst., 2010

UML-CI: A reference model for profiling critical infrastructure systems.
Inf. Syst. Frontiers, 2010

An exploratory classification of applications in the realm of collaborative modeling and design.
Inf. Syst. E Bus. Manag., 2010

Selective Regular Expression Matching.
Proceedings of the Information Security - 13th International Conference, 2010

IDS Alert Visualization and Monitoring through Heuristic Host Selection.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Y-Means: An Autonomous Clustering Algorithm.
Proceedings of the Hybrid Artificial Intelligence Systems, 5th International Conference, 2010

Managing intrusion detection rule sets.
Proceedings of the Third European Workshop on System Security, 2010

An Online Adaptive Approach to Alert Correlation.
Proceedings of the Detection of Intrusions and Malware, 2010

Automatic Discovery of Network Applications: A Hybrid Approach.
Proceedings of the Advances in Artificial Intelligence, 2010

2009
Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology.
IEEE Trans. Syst. Man Cybern. Part A, 2009

A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models.
J. Syst. Softw., 2009

SWAMI: A Multiagent, Active Representation of a User's Browsing Interests.
Int. J. Inf. Technol. Web Eng., 2009

Network Anomaly Detection Based on Wavelet Analysis.
EURASIP J. Adv. Signal Process., 2009

An incremental frequent structure mining framework for real-time alert correlation.
Comput. Secur., 2009

Hybrid Traffic Classification Approach Based on Decision Tree.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Online Classification of Network Flows.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

BotCop: An Online Botnet Traffic Classifier.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

A detailed analysis of the KDD CUP 99 data set.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Automatic discovery of botnet communities on large-scale communication networks.
Proceedings of the 2009 ACM Symposium on Information, 2009

An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering.
Proceedings of the Advances in Artificial Intelligence, 2009

2008
A language for high-level description of adaptive web systems.
J. Syst. Softw., 2008

Guest Editors' Introduction.
J. Comput. Secur., 2008

Approximate autoregressive modeling for network attack detection.
J. Comput. Secur., 2008

The state of the art in critical infrastructure protection: a framework for convergence.
Int. J. Crit. Infrastructures, 2008

An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics.
Comput. Intell., 2008

Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

On the Definition of Essential and Contingent Properties of Subjective Belief Bases.
Proceedings of the MICAI 2008: Advances in Artificial Intelligence, 2008

An Empirical Analysis on the Stability of Clustering Algorithms.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Oracle Clustering: Dynamic Partitioning Based on Random Observations.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Botnets Detection Based on IRC-Community.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process.
Proceedings of the Software Architecture, Second European Conference, 2008

A Novel Covariance Matrix Based Approach for Detecting Network Anomalies.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Critical Episode Mining in Intrusion Detection Alerts.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Detecting Network Anomalies Using Different Wavelet Basis Functions.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

A Novel Approach for Social Behavior Analysis of the Blogosphere.
Proceedings of the Advances in Artificial Intelligence , 2008

A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals.
Proceedings of the Advances in Artificial Intelligence , 2008

A Belief-Theoretic Reputation Estimation Model for Multi-context Communities.
Proceedings of the Advances in Artificial Intelligence , 2008

Real-time Alert Correlation Using Stream Data Mining Techniques.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

A Behavioral Model of Ideologically-motivated "Snowball" Attacks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Feature Classification Scheme For Network Intrusion Detection.
Int. J. Netw. Secur., 2007

A Rule-based Temporal Alert Correlation System.
Int. J. Netw. Secur., 2007

A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems.
Int. J. Inf. Sec., 2007

An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis.
Int. J. Bus. Process. Integr. Manag., 2007

SVision: A novel visual network-anomaly identification technique.
Comput. Secur., 2007

A Fuzzy Markov Model Approach for Predicting User Navigation.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

On Query Completion in Web Search Engines Based on Query Stream Mining.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

On the Collaborative Development of Para-Consistent Conceptual Models.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

A framework for distributed collaborative conceptual model development.
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.
Proceedings of the Information Security, 10th International Conference, 2007

Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications.
Proceedings of the Trust Management, 2007

GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

ConnectA! : An Intelligent Search Engine based on Authors' Connectivity.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
Putting labs online with Web services.
IT Prof., 2006

Alert Correlation for Extracting Attack Strategies.
Int. J. Netw. Secur., 2006

A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines.
Proceedings of the Algorithms and Models for the Web-Graph, Fourth International Workshop, 2006

An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems.
Proceedings of the 2006 International Conference on Privacy, 2006

Alert correlation survey: framework and techniques.
Proceedings of the 2006 International Conference on Privacy, 2006

Design and implementation of a behavioral difference analyzer for network intrusion detection.
Proceedings of the 2006 International Conference on Privacy, 2006

Trust-based contextual information filtering.
Proceedings of the 2006 International Conference on Privacy, 2006

Towards an MDA-oriented UML profile for critical infrastructure modeling.
Proceedings of the 2006 International Conference on Privacy, 2006

Behavior analysis through reputation propagation in a multi-context environment.
Proceedings of the 2006 International Conference on Privacy, 2006

Toward A Feature Classification Scheme For Network Intrusion Detection.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

2005
Incremental communication for adaptive resonance theory networks.
IEEE Trans. Neural Networks, 2005

Research on Intrusion Detection and Response: A Survey.
Int. J. Netw. Secur., 2005

Information Domain Modeling for Adaptive Web Systems.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

SVision: A Network Host-Centered Anomaly Visualization Technique.
Proceedings of the Information Security, 8th International Conference, 2005

Agent-oriented Design for Network Survivability.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Value-Centric Trust Model with Improved Familiarity Measurement.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Using Web Services to Control Remote Instruments for Online Experiment Systems.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

A Presentation Description Language for Adaptive Web Systems.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

PENS: A Personalized Electronic News System.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

ARAS: Adaptive Recommender for Academic Scheduling.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

SWAMI: Searching the Web Using Agents with Mobility and Intelligence.
Proceedings of the Advances in Artificial Intelligence, 2005

2004
Towards a formalization of value-centric trust in agent societies.
Web Intell. Agent Syst., 2004

Protecting e-commerce agents from defamation.
Electron. Commer. Res. Appl., 2004

Introduction to Special Issue on Agent Technologies for Electronic Business.
Comput. Intell., 2004

On the Evaluation of Adaptive Web Systems.
Proceedings of the 2nd International Workshop on Web-based Support Systems, 2004

Familiarity and Trust: Measuring Familiarity with a Web Site.
Proceedings of the Second Annual Conference on Privacy, 2004

Application of Belief-Desire-Intention Agents in Intrusion Detection & Response.
Proceedings of the Second Annual Conference on Privacy, 2004

A novel visualization technique for network anomaly detection.
Proceedings of the Second Annual Conference on Privacy, 2004

Cooperative Multiagent Systems for the Optimization of Urban Traffic.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Weighted PageRank Algorithm.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Improving the Referrer-Based Web Log Session Reconstruction.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Network Intrusion Detection Using an Improved Competitive Learning Neural Network.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

The Reconstruction of the Interleaved Sessions from a Server Log.
Proceedings of the Advances in Artificial Intelligence, 2004

2003
The ACORN multi-agent system.
Web Intell. Agent Syst., 2003

Value Centric Trust in Multiagent Systems.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

Using Fuzzy System to Manage False Alarms in Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

A Multiagent System for Optimizing Urban Traffic.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

Accent Classification Using Support Vector Machine and Hidden Markov Model.
Proceedings of the Advances in Artificial Intelligence, 2003

An Unsupervised Clustering Algorithm for Intrusion Detection.
Proceedings of the Advances in Artificial Intelligence, 2003

2002
Architectural Components of Information-Sharing Societies.
Comput. Intell., 2002

Reputation Formalization for an Information-Sharing Multi-Agent System.
Comput. Intell., 2002

Just-in-time information sharing architectures in multiagent systems.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
The Bottom-Up Freezing: An Approach to Neural Engineering.
Proceedings of the Advances in Artificial Intelligence, 2001

2000
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture.
Proceedings of the Mobile Agents for Telecommunication Applications, 2000

Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm.
Proceedings of the Advances in Artificial Intelligence, 2000

1998
Incremental communication for multilayer neural networks: error analysis.
IEEE Trans. Neural Networks, 1998

1996
Limited precision incremental communication: error analysis.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

1995
Incremental communication for multilayer neural networks.
IEEE Trans. Neural Networks, 1995


  Loading...