Year |
Citation |
Score |
2017 |
Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling Computer Networks. 121: 25-36. DOI: 10.1016/J.Comnet.2017.03.018 |
0.409 |
|
2015 |
Mantas G, Stakhanova N, Gonzalez H, Jazi HH, Ghorbani AA. Application-layer denial of service attacks: taxonomy and survey International Journal of Information and Computer Security. 7: 216-239. DOI: 10.1504/Ijics.2015.073028 |
0.341 |
|
2013 |
Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6 |
0.336 |
|
2012 |
Stakhanova N, Strasburg C, Basu S, Wong JS. Towards cost-sensitive assessment of intrusion response selection Journal of Computer Security. 20: 169-198. DOI: 10.3233/Jcs-2011-0436 |
0.556 |
|
2010 |
Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection Computers and Security. 29: 253-268. DOI: 10.1016/J.Cose.2009.08.007 |
0.552 |
|
2009 |
Strasburg C, Stakhanova N, Basu S, Wong JS. Intrusion response cost assessment methodology Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 388-391. DOI: 10.1145/1533057.1533112 |
0.363 |
|
2009 |
Strasburg C, Stakhanova N, Basu S, Wong JS. A Framework for Cost Sensitive Assessment of Intrusion Response Selection Proceedings - International Computer Software and Applications Conference. 1: 355-360. DOI: 10.1109/COMPSAC.2009.54 |
0.374 |
|
2008 |
Stakhanova N, Strasburg C, Basu S, Wong JS. On evaluation of response cost for intrusion response systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 390-391. DOI: 10.1007/978-3-540-87403-4_21 |
0.417 |
|
2007 |
Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184. DOI: 10.1504/Ijics.2007.012248 |
0.565 |
|
2007 |
Helmer G, Wong J, Slagell M, Honavar V, Miller L, Wang Y, Wang X, Stakhanova N. Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems International Journal of Information and Computer Security. 1: 109. DOI: 10.1504/Ijics.2007.012246 |
0.394 |
|
2007 |
Stakhanova N, Basu S, Wong J. A cost-sensitive model for preemptive intrusion response systems Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 428-435. DOI: 10.1109/AINA.2007.9 |
0.395 |
|
2007 |
Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184. |
0.356 |
|
Show low-probability matches. |