Ali Ghorbani
Ali Ghorbani
Professor and Canada Research Chair in Cybersecurity, University of New Brunswick, Canada
Verified email at unb.ca - Homepage
TitleCited byYear
A detailed analysis of the KDD CUP 99 data set
M Tavallaee, E Bagheri, W Lu, AA Ghorbani
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
17652009
Weighted pagerank algorithm
W Xing, A Ghorbani
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
5472004
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani
computers & security 31 (3), 357-374, 2012
5042012
Research on intrusion detection and response: A survey.
P Kabiri, AA Ghorbani
IJ Network Security 1 (2), 84-102, 2005
2792005
Y-means: A clustering method for intrusion detection
Y Guan, AA Ghorbani, N Belacel
CCECE 2003-Canadian Conference on Electrical and Computer Engineering …, 2003
2632003
A survey of visualization systems for network security
H Shiravi, A Shiravi, AA Ghorbani
IEEE Transactions on visualization and computer graphics 18 (8), 1313-1329, 2011
2462011
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
Computers & Security 39, 2-16, 2013
2212013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust …, 2011
2112011
Network anomaly detection based on wavelet analysis
W Lu, AA Ghorbani
EURASIP Journal on Advances in Signal Processing 2009, 4, 2009
1902009
Toward credible evaluation of anomaly-based intrusion-detection methods
M Tavallaee, N Stakhanova, AA Ghorbani
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
1862010
Network intrusion detection and prevention: concepts and techniques
AA Ghorbani, W Lu, M Tavallaee
Springer Science & Business Media, 2009
1812009
Reputation formalization for an information–sharing multi–agent system
J Carter, E Bitting, AA Ghorbani
Computational Intelligence 18 (4), 515-534, 2002
1582002
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
ICISSP, 108-116, 2018
1412018
Alert correlation for extracting attack strategies
B Zhu, AA Ghorbani
IJ Network Security 3 (3), 244-258, 2006
1392006
Alert correlation survey: framework and techniques
R Sadoddin, A Ghorbani
Proceedings of the 2006 international conference on privacy, security and …, 2006
1382006
Network intrusion detection using an improved competitive learning neural network
JZ Lei, A Ghorbani
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
1302004
Towards effective feature selection in machine learning-based botnet detection approaches
EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani
2014 IEEE Conference on Communications and Network Security, 247-255, 2014
1152014
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE Access 5, 3302-3312, 2017
1122017
A multiagent system for optimizing urban traffic
J France, AA Ghorbani
IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT …, 2003
972003
Clustering botnet communication traffic based on n-gram feature selection
W Lu, G Rammidi, AA Ghorbani
Computer Communications 34 (3), 502-514, 2011
962011
The system can't perform the operation now. Try again later.
Articles 1–20