Volgen
Nur Zincir-Heywood
Nur Zincir-Heywood
Professor of Computer Science, Dalhousie University
Geverifieerd e-mailadres voor cs.dal.ca - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
5502005
Clustering event logs using iterative partitioning
AAO Makanju, AN Zincir-Heywood, EE Milios
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
3562009
Machine learning based encrypted traffic classification: Identifying ssh and skype
R Alshammari, AN Zincir-Heywood
2009 IEEE symposium on computational intelligence for security and defense …, 2009
2732009
On the capability of an SOM based intrusion detection system
HG Kayacık, AN Zincir-Heywood, MI Heywood
IEEE-INNS International Joint Conference on Neural Networks. Pp 1808-1813, 2003., 2003
2282003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
2172007
Host-based intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
2042002
Training genetic programming on half a million patterns: an example from anomaly detection
D Song, MI Heywood, AN Zincir-Heywood
IEEE transactions on evolutionary computation 9 (3), 225-239, 2005
1982005
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
R Alshammari, AN Zincir-Heywood
Computer networks 55 (6), 1326-1350, 2011
1832011
A lightweight algorithm for message type extraction in system application logs
A Makanju, AN Zincir-Heywood, EE Milios
IEEE Transactions on Knowledge and Data Engineering 24 (11), 1921-1936, 2011
1612011
World wide web site summarization
Y Zhang, N Zincir-Heywood, E Milios
Web intelligence and agent systems: an international journal 2 (1), 39-53, 2004
1292004
NetPal: A Dynamic Network Administration Knowledge Base
A George, A Makanju, E Milios, N Zincir-Heywood, M Latzel, ...
Proceedings of the 2008 conference of the center for advanced studies on …, 2008
1122008
Dynamic intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
The 14th Annual Canadian Information Technology Security Symposium (CITSS), 1-5, 2002
1072002
Analyzing data granularity levels for insider threat detection using machine learning
DC Le, N Zincir-Heywood, MI Heywood
IEEE Transactions on Network and Service Management 17 (1), 30-44, 2020
1022020
Evaluation of two systems on multi-class multi-label document classification
X Luo, AN Zincir-Heywood
International Symposium on Methodologies for Intelligent Systems, 161-169, 2005
942005
A flow based approach for SSH traffic detection
R Alshammari, AN Zincir-Heywood
2007 IEEE international conference on systems, man and cybernetics, 296-301, 2007
912007
Logview: Visualizing event log clusters
A Makanju, S Brooks, AN Zincir-Heywood, EE Milios
2008 Sixth Annual Conference on Privacy, Security and Trust, 99-108, 2008
902008
Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification
F Haddadi, AN Zincir-Heywood
IEEE Systems journal 10 (4), 1390-1401, 2014
832014
Narrative text classification for automatic key phrase extraction in web document corpora
Y Zhang, N Zincir-Heywood, E Milios
Proceedings of the 7th annual ACM international workshop on Web information …, 2005
832005
A linear genetic programming approach to intrusion detection
D Song, MI Heywood, AN Zincir-Heywood
Genetic and Evolutionary Computation—GECCO 2003: Genetic and Evolutionary …, 2003
832003
Investigating two different approaches for encrypted traffic classification
R Alshammari, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 156-166, 2008
722008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20