Natalia Stakhanova, Ph.D. - Publications

Affiliations: 
2007 Computer Science Iowa State University, Ames, IA, United States 
Area:
Model Checking

24 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Mamun MSI, Ghorbani AA, Stakhanova N. An entropy based encrypted traffic classifier Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9543: 282-294. DOI: 10.1007/978-3-319-29814-6_23  0.72
2015 Gonzalez H, Kadir AA, Stakhanova N, Alzahrani N, Ghorbani AA. Exploring reverse engineering symptoms in android apps Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751330  0.72
2015 Gosselin-Lavigne MA, Gonzalez H, Stakhanova N, Ghorbani AA. A performance evaluation of hash functions for IP reputation lookup using bloom filters Proceedings - 10th International Conference On Availability, Reliability and Security, Ares 2015. 516-521. DOI: 10.1109/ARES.2015.101  0.72
2015 Abdul Kadir AF, Stakhanova N, Ghorbani AA. Android Botnets: What URLs are telling us Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 78-91. DOI: 10.1007/978-3-319-25645-0_6  0.72
2015 Gonzalez H, Stakhanova N, Ghorbani AA. Droidkin: Lightweight detection of android apps similarity Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 436-453. DOI: 10.1007/978-3-319-23829-6_30  0.72
2014 Beigi EB, Jazi HH, Stakhanova N, Ghorbani AA. Towards effective feature selection in machine learning-based botnet detection approaches 2014 Ieee Conference On Communications and Network Security, Cns 2014. 247-255. DOI: 10.1109/CNS.2014.6997492  0.72
2013 Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6  0.72
2012 Stakhanova N, Strasburg C, Basu S, Wong JS. Towards cost-sensitive assessment of intrusion response selection Journal of Computer Security. 20: 169-198. DOI: 10.3233/Jcs-2011-0436  0.72
2011 Stakhanova N, Couture M, Ghorbani AA. Exploring network-based malware classification Proceedings of the 2011 6th International Conference On Malicious and Unwanted Software, Malware 2011. 14-19. DOI: 10.1109/MALWARE.2011.6112321  0.72
2011 Stakhanova N, Ren H, Ghorbani AA. Selective regular expression matching Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 226-240. DOI: 10.1007/978-3-642-18178-8-20  0.72
2010 Stakhanova N, Ghorbani AA. Managing intrusion detection rule sets Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 29-35. DOI: 10.1145/1752046.1752051  0.72
2010 Tavallaee M, Stakhanova N, Ghorbani AA. Toward credible evaluation of anomaly-based intrusion-detection methods Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 516-524. DOI: 10.1109/TSMCC.2010.2048428  0.72
2010 Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection Computers and Security. 29: 253-268. DOI: 10.1016/J.Cose.2009.08.007  0.72
2010 Ren H, Stakhanova N, Ghorbani AA. An online adaptive approach to alert correlation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 153-172. DOI: 10.1007/978-3-642-14215-4_9  0.72
2009 Strasburg C, Stakhanova N, Basu S, Wong JS. Intrusion response cost assessment methodology Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 388-391. DOI: 10.1145/1533057.1533112  0.72
2009 Stakhanova N, Li Y, Ghorbani AA. Classification and discovery of rule misconfigurations in intrusion detection and response devices Congress 2009 - 2009 World Congress On Privacy, Security, Trust and the Management of E-Business. 29-37. DOI: 10.1109/CONGRESS.2009.12  0.72
2009 Strasburg C, Stakhanova N, Basu S, Wong JS. A Framework for Cost Sensitive Assessment of Intrusion Response Selection Proceedings - International Computer Software and Applications Conference. 1: 355-360. DOI: 10.1109/COMPSAC.2009.54  0.72
2008 Stakhanova N, Stakhanov O, Ghorbani AA. A behavioral model of ideologically-motivated "snowball" attacks Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. 88-95. DOI: 10.1109/ARES.2008.57  0.72
2008 Stakhanova N, Strasburg C, Basu S, Wong JS. On evaluation of response cost for intrusion response systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 390-391. DOI: 10.1007/978-3-540-87403-4_21  0.72
2007 Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184. DOI: 10.1504/Ijics.2007.012248  0.72
2007 Stakhanova N, Basu S, Zhang W, Wang X, Wong J. Specification synthesis for monitoring and analysis of MANET protocols Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 183-187. DOI: 10.1109/AINAW.2007.342  0.72
2007 Stakhanova N, Basu S, Wong J. A cost-sensitive model for preemptive intrusion response systems Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 428-435. DOI: 10.1109/AINA.2007.9  0.72
2007 Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184.  0.72
2006 Stakhanova N, Basu S, Lutz RR, Johnny W. Automated caching of behavioral patterns for efficient run-time monitoring Proceedings - 2nd Ieee International Symposium On Dependable, Autonomic and Secure Computing, Dasc 2006. 333-340. DOI: 10.1109/DASC.2006.23  0.72
Show low-probability matches.