Nur Zincir-Heywood

Orcid: 0000-0003-2796-7265

Affiliations:
  • Dalhousie University,Faculty of Computer Science, Halifax, NS, USA


According to our database1, Nur Zincir-Heywood authored at least 233 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BoostSec: Adaptive Attack Detection for Vehicular Networks.
J. Netw. Syst. Manag., March, 2024

Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files.
Int. J. Netw. Manag., 2024

ADVENT: Attack/Anomaly Detection in VANETs.
CoRR, 2024

Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks.
Proceedings of the Applications of Evolutionary Computation - 27th European Conference, 2024

2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023

Encrypted Mobile Instant Messaging Traffic Dataset.
Dataset, May, 2023

Behaviour and Bot Analysis on Online Social Networks: Twitter, Parler, and Reddit.
Int. J. Technol. Hum. Interact., 2023

Benchmarking Large Language Models for Log Analysis, Security, and Interpretation.
CoRR, 2023

Exploring Anomaly Detection Techniques for Enhancing VANET Availability.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

On the Fence: Anomaly Detection in IoT Networks.
Proceedings of the NOMS 2023, 2023

Instant Messaging Application Encrypted Traffic Generation System.
Proceedings of the NOMS 2023, 2023

Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones.
Proceedings of the NOMS 2023, 2023

Exploring Real-Time Malicious Behaviour Detection in VANETs.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023

Characterizing Cluster-Based Frailty Phenotypes in a Multicenter Prospective Cohort of Kidney Transplant Candidates.
Proceedings of the MEDINFO 2023 - The Future Is Accessible, 2023

Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

A Boosting Approach to Constructing an Ensemble Stack.
Proceedings of the Genetic Programming - 26th European Conference, 2023

Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices.
Proceedings of the 19th International Conference on Network and Service Management, 2023

MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Anomaly Detection for IoT Networks: Empirical Study.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022

Exploring syntactical features for anomaly detection in application logs.
it Inf. Technol., 2022

Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Implementation of a Decentralized Traffic Congestion Avoidance Mechanism for VANETs.
Proceedings of the 12th ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications on ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2022

Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II.
IEEE Trans. Netw. Serv. Manag., 2021

Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management.
IEEE Trans. Netw. Serv. Manag., 2021

Anomaly Detection for Insider Threats Using Unsupervised Ensembles.
IEEE Trans. Netw. Serv. Manag., 2021

Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors.
J. Netw. Syst. Manag., 2021

CNSM 2019 special issue: Embracing the new wave of artificial intelligence.
Int. J. Netw. Manag., 2021

Exploring anomalous behaviour detection and classification for insider threat identification.
Int. J. Netw. Manag., 2021

Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework.
Int. J. Inf. Comput. Secur., 2021

Scaling Multi-Objective Optimization for Clustering Malware.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Training regime influences to semi-supervised learning for insider threat detection.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Analyzing COVID-19 Tweets using Health Behaviour Theories and Machine Learning.
Proceedings of the 9th IEEE International Conference on Serious Games and Applications for Health, 2021

Anomaly Detection on Smart Meters Using Hierarchical Self Organizing Maps.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Log Abstraction for Information Security: Heuristics and Reproducibility.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Guest Editorial: Special Section on Data Analytics and Machine Learning for Network and Service Management-Part I.
IEEE Trans. Netw. Serv. Manag., 2020

Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning.
IEEE Trans. Netw. Serv. Manag., 2020

A Frontier: Dependable, Reliable and Secure Machine Learning for Network/System Management.
J. Netw. Syst. Manag., 2020

Exploring Tunneling Behaviours in Malicious Domains With Self-Organizing Maps.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Exploring an artificial arms race for malware detection.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

COUGAR: clustering of unknown malware using genetic algorithm routines.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Temporal Representations for Detecting BGP Blackjack Attacks.
Proceedings of the 16th International Conference on Network and Service Management, 2020

Exploring Adversarial Properties of Insider Threat Detection.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Exploring data leakage in encrypted payload using supervised machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Big Data in Network Anomaly Detection.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Guest Editorial: Special Issue on Novel Techniques in Big Data Analytics for Management.
IEEE Trans. Netw. Serv. Manag., 2019

Unsupervised Monitoring of Networkand Service Behaviour Using SelfOrganizing Maps.
J. Cyber Secur. Mobil., 2019

User identification via neural network based language models.
Int. J. Netw. Manag., 2019

Dynamic Insider Threat Detection Based on Adaptable Genetic Programming.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Classification of Micro-Texts Using Sub-Word Embeddings.
Proceedings of the International Conference on Recent Advances in Natural Language Processing, 2019

Integrating Machine Learning with Off-the-Shelf Traffic Flow Features for HTTP/HTTPS Traffic Classification.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Machine learning based Insider Threat Modelling and Detection.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Network Analytics for Streaming Traffic Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Darwinian malware detectors: a comparison of evolutionary solutions to android malware.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Benchmarking genetic programming in dynamic insider threat detection.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Learning From Evolving Network Data for Dependable Botnet Detection.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Exploring NAT Detection and Host Identification Using Machine Learning.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Compromised Tweet Detection Using Siamese Networks and fastText Representations.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Are There Bots even in FIFA World Cup 2018 Tweets?
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
Guest Editorial: Special Section on Advances in Big Data Analytics for Management.
IEEE Trans. Netw. Serv. Manag., 2018

On botnet detection with genetic programming under streaming data label budgets and class imbalance.
Swarm Evol. Comput., 2018

An Artificial Arms Race: Could it Improve Mobile Malware Detectors?
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A language model for compromised user analysis.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

How far can we push flow analysis to identify encrypted anonymity network traffic?
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Streaming Botnet traffic analysis using bio-inspired active learning.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Benchmarking evolutionary computation approaches to insider threat detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

A genetic algorithm for dynamic controller placement in software defined networking.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

2017
Packet Momentum for Identificationof Anonymity Networks.
J. Cyber Secur. Mobil., 2017

Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
Int. J. Netw. Manag., 2017

Big data analytics for network and service management.
Int. J. Netw. Manag., 2017

Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

An analysis of tor pluggable transports under adversarial conditions.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Effects of Shared Bandwidth on Anonymity of the I2P Network Users.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Exploring a service-based normal behaviour profiling system for botnet detection.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Evolutionary computation in network management and security: GECCO 2017 tutorial.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

On evolutionary computation for moving target defense in software defined networks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Properties of a GP active learning framework for streaming data with class imbalance.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Return-oriented programme evolution with ROPER: a proof of concept.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Weighted Factors for Evaluating Anonymity.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016

Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification.
IEEE Syst. J., 2016

Data analytics on network traffic flows for botnet behaviour detection.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

How to choose from different botnet detection systems?
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Autonomous system based flow marking scheme for IP-Traceback.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Smart Phone User Behaviour Characterization Based on Autoencoders and Self Organizing Maps.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Women@GECCO 2016 Chairs' Welcome.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

On the Impact of Class Imbalance in GP Streaming Classification with Label Budgets.
Proceedings of the Genetic Programming - 19th European Conference, 2016

2015
Evolving GP Classifiers for Streaming Data Tasks with Concept Change and Label Budgets: A Benchmarking Study.
Proceedings of the Handbook of Genetic Programming Applications, 2015

How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?
J. Netw. Syst. Manag., 2015

Identification of VoIP encrypted traffic using a machine learning approach.
J. King Saud Univ. Comput. Inf. Sci., 2015

EMITS: An Experience Management System for IT Management Support.
Int. J. Softw. Eng. Knowl. Eng., 2015

Probabilistic flow marking for IP traceback (PFM).
Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling, 2015

Feature selection for robust backscatter DDoS detection.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

On the Effectiveness of Different Botnet Detection Approaches.
Proceedings of the Information Security Practice and Experience, 2015

Investigating unique flow marking for tracing back DDoS attacks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A Proxy Identifier Based on Patterns in Traffic Flows.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Tapped Delay Lines for GP Streaming Data Classification with Label Budgets.
Proceedings of the Genetic Programming - 18th European Conference, 2015

Benchmarking Stream Clustering for Churn Detection in Dynamic Networks.
Proceedings of the Discovery Science - 18th International Conference, 2015

Predictive Analysis on Tracking Emails for Targeted Marketing.
Proceedings of the Discovery Science - 18th International Conference, 2015

Traffic flow analysis of tor pluggable transports.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Deterministic flow marking for IPv6 traceback (DFM6).
Proceedings of the 11th International Conference on Network and Service Management, 2015

Highlights on analyzing one-way traffic using different tools.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

2014
Can We Identify NAT Behavior by Analyzing Traffic Flows?
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

A case study for a secure and robust geo-fencing and access control framework.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

On the analysis of backscatter traffic.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014

On botnet behaviour analysis using GP and C4.5.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Data Confirmation for Botnet Traffic Analysis.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Benchmarking two techniques for Tor classification: Flow level and circuit level classification.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Supervised learning to detect DDoS attacks.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Exploring the need for visualizations in system administration tools.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

TDFA: Traceback-Based Defense against DDoS Flooding Attacks.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation.
EURASIP J. Inf. Secur., 2013

On Evaluating IP Traceback Schemes: A Practical Perspective.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Investigating event log analysis with minimum apriori information.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Automatic optimization for a clustering based approach to support IT management.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Label free change detection on streaming data with cooperative multi-objective genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Malicious Automatically Generated Domain Name Detection Using Stateful-SBB.
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013

Beyond term clusters: assigning Wikipedia concepts to scientific documents.
Proceedings of the ACM Symposium on Document Engineering 2013, 2013

Investigating application behavior in network traffic traces.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2013

Indoor geo-fencing and access control for wireless networks.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

How far an evolutionary approach can go for protocol state analysis and discovery.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Analyzing string format-based classifiers for botnet detection: GP and SVM.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Deterministic and Authenticated Flow Marking for IP Traceback.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A Lightweight Algorithm for Message Type Extraction in System Application Logs.
IEEE Trans. Knowl. Data Eng., 2012

Spatio-temporal decomposition, clustering and identification for alert detection in system logs.
Proceedings of the ACM Symposium on Applied Computing, 2012

Interactive learning of alert signatures in High Performance Cluster system logs.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Data mining for supporting IT management.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

GP under streaming data constraints: a case for pareto archiving?
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

Network Protocol Discovery and Analysis via Live Interaction.
Proceedings of the Applications of Evolutionary Computation, 2012

Symbiotic evolutionary subspace clustering.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Robust learning intrusion detection for attacks on wireless networks.
Intell. Data Anal., 2011

Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Evol. Intell., 2011

Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
Comput. Networks, 2011

Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.
Appl. Soft Comput., 2011

Multi-document summarization of scientific corpora.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Storage and retrieval of system log events using a structured schema based on message type transformation.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A next generation entropy based framework for alert detection in system logs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

An investigation on identifying SSL traffic.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2011

A Comparison of three machine learning techniques for encrypted network traffic analysis.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2011

Exploring the state space of an application protocol: A case study of SMTP.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Genetic optimization and hierarchical clustering applied to encrypted traffic identification.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Is machine learning losing the battle to produce transportable signatures against VoIP traffic?
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

System State Discovery Via Information Content Clustering of System Logs.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Topic-based web site summarization.
Int. J. Web Inf. Syst., 2010

An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs.
Proceedings of the QEST 2010, 2010

Using Code Bloat to Obfuscate Evolved Network Traffic.
Proceedings of the Applications of Evolutionary Computation, 2010

Fast entropy based alert detection in super computer logs.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Bottom-up evolutionary subspace clustering.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

An analysis of clustering objectives for feature selection applied to encrypted traffic identification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Unveiling Skype encrypted tunnels using GP.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

One Size Fits None: The Importance of Detector Parameterization.
Proceedings of the ARES 2010, 2010

2009
Clustering event logs using iterative partitioning.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Classifying SSH encrypted traffic with minimum packet header features using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Testing Detector Parameterization Using Evolutionary Exploit Generation.
Proceedings of the Applications of Evolutionary Computing, 2009

An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

Evolving TCP/IP packets: A case study of port scans.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Machine learning based encrypted traffic classification: Identifying SSH and Skype.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

Generating mimicry attacks using genetic programming: A benchmarking study.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Generalization of signatures for SSH encrypted traffic identification.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
LogView: Visualizing Event Log Clusters.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Investigating Two Different Approaches for Encrypted Traffic Classification.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Information Retrieval in Network Administration.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

NetPal: a dynamic network administration knowledge base.
Proceedings of the 2008 conference of the Centre for Advanced Studies on Collaborative Research, 2008

VEA-bility Security Metric: A Network Security Analysis Tool.
Proceedings of the The Third International Conference on Availability, 2008

Adaptabilty of a GP Based IDS on Wireless Networks.
Proceedings of the The Third International Conference on Availability, 2008

A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Comparative Study on Key Phrase Extraction Methods in Automatic Web Site Summarization.
J. Digit. Inf. Manag., 2007

A hierarchical SOM-based intrusion detection system.
Eng. Appl. Artif. Intell., 2007

Growing recurrent self organizing map.
Proceedings of the IEEE International Conference on Systems, 2007

A flow based approach for SSH traffic detection.
Proceedings of the IEEE International Conference on Systems, 2007

Incorporating Temporal Information for Document Classification.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Evolving Buffer Overflow Attacks with Detector Feedback.
Proceedings of the Applications of Evolutinary Computing, 2007

A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Automatically Evading IDS Using GP Authored Attacks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

On the Contribution of Preamble to Information Hiding in Mimicry Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Adding more intelligence to the network routing problem: AntNet and Ga-agents.
Appl. Soft Comput., 2006

Using self-organizing maps to build an attack map for forensic analysis.
Proceedings of the 2006 International Conference on Privacy, 2006

On evolving buffer overflow attacks using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

802.11 De-authentication Attack Detection Using Genetic Programming.
Proceedings of the Genetic Programming, 9th European Conference, 2006

Genetic Programming Based WiFi Data Link Layer Attack Detection.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Modeling User Behaviors from FTP Server Logs.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Evolving Recurrent Linear-GP for Document Classification and Word Tracking.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
Training genetic programming on half a million patterns: an example from anomaly detection.
IEEE Trans. Evol. Comput., 2005

Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection.
Neural Process. Lett., 2005

Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources.
J. Intell. Inf. Syst., 2005

Narrative text classification for automatic key phrase extraction in web document corpora.
Proceedings of the Seventh ACM International Workshop on Web Information and Data Management (WIDM 2005), 2005

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.
Proceedings of the Third Annual Conference on Privacy, 2005

Evaluation of Two Systems on Multi-class Multi-label Document Classification.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
Proceedings of the Intelligence and Security Informatics, 2005

Evolving recurrent models using linear GP.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

802.11 network intrusion detection using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Generating Representative Traffic for Intrusion Detection System Benchmarking.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

Understanding the Performance of Cooperative Web Caching Systems.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

CasGP: building cascaded hierarchical models using niching.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

Evolving Successful Stack Overflow Attacks for Vulnerability Testing.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
World Wide Web site summarization.
Web Intell. Agent Syst., 2004

A heuristic approach to network optimised mapping of a distributed resource discovery architecture.
Int. J. Comput. Appl. Technol., 2004

Analyzing the Temporal Sequences for Text Categorization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs.
Proceedings of the International Conference on Artificial Intelligence, 2004

Intelligent Agents for Routing on Mobile Ad-Hoc Networks.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Intelligent Ants for Adaptive Network Routing.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Cascaded GP models for data mining.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Term-Based Clustering and Summarization of Web Page Collections.
Proceedings of the Advances in Artificial Intelligence, 2004

2003
SOM - Feature Extraction from Patient Discharge Summaries.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A Case Study of Three Open Source Security Management Tools.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

A Linear Genetic Programming Approach to Intrusion Detection.
Proceedings of the Genetic and Evolutionary Computation, 2003

Summarizing Web Sites Automatically.
Proceedings of the Advances in Artificial Intelligence, 2003

Post-supervised Template Induction for Dynamic Web Sources.
Proceedings of the Advances in Artificial Intelligence, 2003

A Uniform Continuum Model for Scaling of Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

2002
Dynamic page based crossover in linear genetic programming.
IEEE Trans. Syst. Man Cybern. Part B, 2002

Object-Orientated Design of Digital Library Platforms for Multiagent Environments.
IEEE Trans. Knowl. Data Eng., 2002

Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

The effect of routing under local information using a social insect metaphor.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2000
Digital library query clearing using clustering and fuzzy decision-making.
Inf. Process. Manag., 2000

Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search.
Int. J. Cooperative Inf. Syst., 2000

Page-based linear genetic programming.
Proceedings of the IEEE International Conference on Systems, 2000

Register Based Genetic Programming on FPGA Computing Platforms.
Proceedings of the Genetic Programming, European Conference, 2000

1998
İnternet üzerinde yeni bir bilgi tarama sisteminin tasarımı, gerçekleştirilmesi ve başarım değerlendirmesi (The Design, development and performance analysis of a new information retriveal system over internet)
PhD thesis, 1998


  Loading...