Year |
Citation |
Score |
2017 |
Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling Computer Networks. 121: 25-36. DOI: 10.1016/J.Comnet.2017.03.018 |
0.409 |
|
2015 |
Mantas G, Stakhanova N, Gonzalez H, Jazi HH, Ghorbani AA. Application-layer denial of service attacks: taxonomy and survey International Journal of Information and Computer Security. 7: 216-239. DOI: 10.1504/Ijics.2015.073028 |
0.341 |
|
2013 |
Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6 |
0.336 |
|
2012 |
Stakhanova N, Strasburg C, Basu S, Wong JS. Towards cost-sensitive assessment of intrusion response selection Journal of Computer Security. 20: 169-198. DOI: 10.3233/Jcs-2011-0436 |
0.556 |
|
2010 |
Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection Computers and Security. 29: 253-268. DOI: 10.1016/J.Cose.2009.08.007 |
0.552 |
|
2009 |
Strasburg C, Stakhanova N, Basu S, Wong JS. Intrusion response cost assessment methodology Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 388-391. DOI: 10.1145/1533057.1533112 |
0.363 |
|
2009 |
Strasburg C, Stakhanova N, Basu S, Wong JS. A Framework for Cost Sensitive Assessment of Intrusion Response Selection Proceedings - International Computer Software and Applications Conference. 1: 355-360. DOI: 10.1109/COMPSAC.2009.54 |
0.374 |
|
2008 |
Stakhanova N, Strasburg C, Basu S, Wong JS. On evaluation of response cost for intrusion response systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 390-391. DOI: 10.1007/978-3-540-87403-4_21 |
0.417 |
|
2007 |
Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184. DOI: 10.1504/Ijics.2007.012248 |
0.565 |
|
2007 |
Helmer G, Wong J, Slagell M, Honavar V, Miller L, Wang Y, Wang X, Stakhanova N. Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems International Journal of Information and Computer Security. 1: 109. DOI: 10.1504/Ijics.2007.012246 |
0.394 |
|
2007 |
Stakhanova N, Basu S, Wong J. A cost-sensitive model for preemptive intrusion response systems Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 428-435. DOI: 10.1109/AINA.2007.9 |
0.395 |
|
2007 |
Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184. |
0.356 |
|
Low-probability matches (unlikely to be authored by this person) |
2009 |
Stakhanova N, Li Y, Ghorbani AA. Classification and discovery of rule misconfigurations in intrusion detection and response devices Congress 2009 - 2009 World Congress On Privacy, Security, Trust and the Management of E-Business. 29-37. DOI: 10.1109/CONGRESS.2009.12 |
0.293 |
|
2019 |
Kalgutkar V, Kaur R, Gonzalez H, Stakhanova N, Matyukhina A. Code Authorship Attribution: Methods and Challenges Acm Computing Surveys. 52: 3. DOI: 10.1145/3292577 |
0.277 |
|
2015 |
Gonzalez H, Stakhanova N, Ghorbani AA. Droidkin: Lightweight detection of android apps similarity Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 436-453. DOI: 10.1007/978-3-319-23829-6_30 |
0.248 |
|
2014 |
Beigi EB, Jazi HH, Stakhanova N, Ghorbani AA. Towards effective feature selection in machine learning-based botnet detection approaches 2014 Ieee Conference On Communications and Network Security, Cns 2014. 247-255. DOI: 10.1109/CNS.2014.6997492 |
0.244 |
|
2010 |
Tavallaee M, Stakhanova N, Ghorbani AA. Toward credible evaluation of anomaly-based intrusion-detection methods Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 516-524. DOI: 10.1109/TSMCC.2010.2048428 |
0.234 |
|
2016 |
Mamun MSI, Ghorbani AA, Stakhanova N. An entropy based encrypted traffic classifier Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9543: 282-294. DOI: 10.1007/978-3-319-29814-6_23 |
0.194 |
|
2010 |
Stakhanova N, Ghorbani AA. Managing intrusion detection rule sets Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 29-35. DOI: 10.1145/1752046.1752051 |
0.178 |
|
2011 |
Stakhanova N, Couture M, Ghorbani AA. Exploring network-based malware classification Proceedings of the 2011 6th International Conference On Malicious and Unwanted Software, Malware 2011. 14-19. DOI: 10.1109/MALWARE.2011.6112321 |
0.143 |
|
2010 |
Ren H, Stakhanova N, Ghorbani AA. An online adaptive approach to alert correlation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 153-172. DOI: 10.1007/978-3-642-14215-4_9 |
0.134 |
|
2006 |
Stakhanova N, Basu S, Lutz RR, Johnny W. Automated caching of behavioral patterns for efficient run-time monitoring Proceedings - 2nd Ieee International Symposium On Dependable, Autonomic and Secure Computing, Dasc 2006. 333-340. DOI: 10.1109/DASC.2006.23 |
0.133 |
|
2007 |
Stakhanova N, Basu S, Zhang W, Wang X, Wong J. Specification synthesis for monitoring and analysis of MANET protocols Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 183-187. DOI: 10.1109/AINAW.2007.342 |
0.114 |
|
2008 |
Stakhanova N, Stakhanov O, Ghorbani AA. A behavioral model of ideologically-motivated "snowball" attacks Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. 88-95. DOI: 10.1109/ARES.2008.57 |
0.097 |
|
2015 |
Gonzalez H, Kadir AA, Stakhanova N, Alzahrani N, Ghorbani AA. Exploring reverse engineering symptoms in android apps Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751330 |
0.046 |
|
2015 |
Abdul Kadir AF, Stakhanova N, Ghorbani AA. Android Botnets: What URLs are telling us Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 78-91. DOI: 10.1007/978-3-319-25645-0_6 |
0.039 |
|
2015 |
Gosselin-Lavigne MA, Gonzalez H, Stakhanova N, Ghorbani AA. A performance evaluation of hash functions for IP reputation lookup using bloom filters Proceedings - 10th International Conference On Availability, Reliability and Security, Ares 2015. 516-521. DOI: 10.1109/ARES.2015.101 |
0.034 |
|
2011 |
Stakhanova N, Ren H, Ghorbani AA. Selective regular expression matching Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 226-240. DOI: 10.1007/978-3-642-18178-8-20 |
0.028 |
|
Hide low-probability matches. |