Natalia Stakhanova, Ph.D. - Publications

Affiliations: 
2007 Computer Science Iowa State University, Ames, IA, United States 
Area:
Model Checking

12/28 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling Computer Networks. 121: 25-36. DOI: 10.1016/J.Comnet.2017.03.018  0.409
2015 Mantas G, Stakhanova N, Gonzalez H, Jazi HH, Ghorbani AA. Application-layer denial of service attacks: taxonomy and survey International Journal of Information and Computer Security. 7: 216-239. DOI: 10.1504/Ijics.2015.073028  0.341
2013 Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6  0.336
2012 Stakhanova N, Strasburg C, Basu S, Wong JS. Towards cost-sensitive assessment of intrusion response selection Journal of Computer Security. 20: 169-198. DOI: 10.3233/Jcs-2011-0436  0.556
2010 Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection Computers and Security. 29: 253-268. DOI: 10.1016/J.Cose.2009.08.007  0.552
2009 Strasburg C, Stakhanova N, Basu S, Wong JS. Intrusion response cost assessment methodology Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 388-391. DOI: 10.1145/1533057.1533112  0.363
2009 Strasburg C, Stakhanova N, Basu S, Wong JS. A Framework for Cost Sensitive Assessment of Intrusion Response Selection Proceedings - International Computer Software and Applications Conference. 1: 355-360. DOI: 10.1109/COMPSAC.2009.54  0.374
2008 Stakhanova N, Strasburg C, Basu S, Wong JS. On evaluation of response cost for intrusion response systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 390-391. DOI: 10.1007/978-3-540-87403-4_21  0.417
2007 Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184. DOI: 10.1504/Ijics.2007.012248  0.565
2007 Helmer G, Wong J, Slagell M, Honavar V, Miller L, Wang Y, Wang X, Stakhanova N. Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems International Journal of Information and Computer Security. 1: 109. DOI: 10.1504/Ijics.2007.012246  0.394
2007 Stakhanova N, Basu S, Wong J. A cost-sensitive model for preemptive intrusion response systems Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 428-435. DOI: 10.1109/AINA.2007.9  0.395
2007 Stakhanova N, Basu S, Wong J. A taxonomy of intrusion response systems International Journal of Information and Computer Security. 1: 169-184.  0.356
Low-probability matches (unlikely to be authored by this person)
2009 Stakhanova N, Li Y, Ghorbani AA. Classification and discovery of rule misconfigurations in intrusion detection and response devices Congress 2009 - 2009 World Congress On Privacy, Security, Trust and the Management of E-Business. 29-37. DOI: 10.1109/CONGRESS.2009.12  0.293
2019 Kalgutkar V, Kaur R, Gonzalez H, Stakhanova N, Matyukhina A. Code Authorship Attribution: Methods and Challenges Acm Computing Surveys. 52: 3. DOI: 10.1145/3292577  0.277
2015 Gonzalez H, Stakhanova N, Ghorbani AA. Droidkin: Lightweight detection of android apps similarity Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 436-453. DOI: 10.1007/978-3-319-23829-6_30  0.248
2014 Beigi EB, Jazi HH, Stakhanova N, Ghorbani AA. Towards effective feature selection in machine learning-based botnet detection approaches 2014 Ieee Conference On Communications and Network Security, Cns 2014. 247-255. DOI: 10.1109/CNS.2014.6997492  0.244
2010 Tavallaee M, Stakhanova N, Ghorbani AA. Toward credible evaluation of anomaly-based intrusion-detection methods Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 516-524. DOI: 10.1109/TSMCC.2010.2048428  0.234
2016 Mamun MSI, Ghorbani AA, Stakhanova N. An entropy based encrypted traffic classifier Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9543: 282-294. DOI: 10.1007/978-3-319-29814-6_23  0.194
2010 Stakhanova N, Ghorbani AA. Managing intrusion detection rule sets Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 29-35. DOI: 10.1145/1752046.1752051  0.178
2011 Stakhanova N, Couture M, Ghorbani AA. Exploring network-based malware classification Proceedings of the 2011 6th International Conference On Malicious and Unwanted Software, Malware 2011. 14-19. DOI: 10.1109/MALWARE.2011.6112321  0.143
2010 Ren H, Stakhanova N, Ghorbani AA. An online adaptive approach to alert correlation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6201: 153-172. DOI: 10.1007/978-3-642-14215-4_9  0.134
2006 Stakhanova N, Basu S, Lutz RR, Johnny W. Automated caching of behavioral patterns for efficient run-time monitoring Proceedings - 2nd Ieee International Symposium On Dependable, Autonomic and Secure Computing, Dasc 2006. 333-340. DOI: 10.1109/DASC.2006.23  0.133
2007 Stakhanova N, Basu S, Zhang W, Wang X, Wong J. Specification synthesis for monitoring and analysis of MANET protocols Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 183-187. DOI: 10.1109/AINAW.2007.342  0.114
2008 Stakhanova N, Stakhanov O, Ghorbani AA. A behavioral model of ideologically-motivated "snowball" attacks Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. 88-95. DOI: 10.1109/ARES.2008.57  0.097
2015 Gonzalez H, Kadir AA, Stakhanova N, Alzahrani N, Ghorbani AA. Exploring reverse engineering symptoms in android apps Proceedings of the 8th European Workshop On System Security, Eurosec 2015. DOI: 10.1145/2751323.2751330  0.046
2015 Abdul Kadir AF, Stakhanova N, Ghorbani AA. Android Botnets: What URLs are telling us Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 78-91. DOI: 10.1007/978-3-319-25645-0_6  0.039
2015 Gosselin-Lavigne MA, Gonzalez H, Stakhanova N, Ghorbani AA. A performance evaluation of hash functions for IP reputation lookup using bloom filters Proceedings - 10th International Conference On Availability, Reliability and Security, Ares 2015. 516-521. DOI: 10.1109/ARES.2015.101  0.034
2011 Stakhanova N, Ren H, Ghorbani AA. Selective regular expression matching Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 226-240. DOI: 10.1007/978-3-642-18178-8-20  0.028
Hide low-probability matches.