Year |
Citation |
Score |
2023 |
Mahdavifar S, Ghorbani AA. CapsRule: Explainable Deep Learning for Classifying Network Attacks. Ieee Transactions On Neural Networks and Learning Systems. PMID 37053064 DOI: 10.1109/TNNLS.2023.3262981 |
0.349 |
|
2020 |
Daghmehchi Firoozjaei M, Ghorbani A, Kim H, Song J. Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms. Sensors (Basel, Switzerland). 20. PMID 32050570 DOI: 10.3390/S20030928 |
0.353 |
|
2020 |
Mahdikhani H, Lu R, Zheng Y, Shao J, Ghorbani AA. Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT Ieee Internet of Things Journal. 7: 5220-5232. DOI: 10.1109/Jiot.2020.2977253 |
0.334 |
|
2020 |
Zhang X, Ghorbani AA. An overview of online fake news: Characterization, detection, and discussion Information Processing and Management. 57: 102025. DOI: 10.1016/J.Ipm.2019.03.004 |
0.343 |
|
2020 |
Mahdavifar S, Ghorbani AA. DeNNeS: deep embedded neural network expert system for detecting cyber attacks Neural Computing and Applications. DOI: 10.1007/S00521-020-04830-W |
0.468 |
|
2019 |
Mahdikhani H, Mahdavifar S, Lu R, Zhu H, Ghorbani AA. Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT Ieee Access. 7: 184438-184447. DOI: 10.1109/Access.2019.2961270 |
0.382 |
|
2019 |
Li B, Lu R, Xiao G, Bao H, Ghorbani AA. Towards insider threats detection in smart grid communication systems Iet Communications. 13: 1728-1736. DOI: 10.1049/Iet-Com.2018.5736 |
0.334 |
|
2019 |
Mahdavifar S, Ghorbani AA. Application of deep learning to cybersecurity: A survey Neurocomputing. 347: 149-176. DOI: 10.1016/J.Neucom.2019.02.056 |
0.381 |
|
2019 |
Falavarjani SAM, Zarrinkalam F, Jovanovic J, Bagheri E, Ghorbani AA. The reflection of offline activities on users’ online social behavior: An observational study Information Processing and Management. 56: 102070. DOI: 10.1016/J.Ipm.2019.102070 |
0.311 |
|
2019 |
Lashkari F, Bagheri E, Ghorbani AA. Neural embedding-based indices for semantic search Information Processing and Management. 56: 733-755. DOI: 10.1016/J.Ipm.2018.10.015 |
0.354 |
|
2019 |
Sharafaldin I, Lashkari AH, Ghorbani AA. An evaluation framework for network security visualizations Computers & Security. 84: 70-92. DOI: 10.1016/J.Cose.2019.03.005 |
0.448 |
|
2018 |
Yang X, Lu R, Shao J, Tang X, Ghorbani A. Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2018.2881147 |
0.316 |
|
2018 |
Guo W, Shao J, Lu R, Liu Y, Ghorbani AA. A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment Ieee Access. 6: 48946-48957. DOI: 10.1109/Access.2018.2866971 |
0.304 |
|
2017 |
Lu R, Heung K, Lashkari AH, Ghorbani AA. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT Ieee Access. 5: 3302-3312. DOI: 10.1109/Access.2017.2677520 |
0.377 |
|
2017 |
Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling Computer Networks. 121: 25-36. DOI: 10.1016/J.Comnet.2017.03.018 |
0.463 |
|
2016 |
Ghashghaei M, Bagheri E, Cuzzola J, Ghorbani AA, Noorian Z. Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content International Journal of Semantic Computing. 10: 121-142. DOI: 10.1142/S1793351X16500021 |
0.35 |
|
2016 |
Morovati K, Kadam S, Ghorbani A. A network based document management model to prevent data extrusion Computers and Security. 59: 71-91. DOI: 10.1016/J.Cose.2016.02.003 |
0.452 |
|
2015 |
Mantas G, Stakhanova N, Gonzalez H, Jazi HH, Ghorbani AA. Application-layer denial of service attacks: taxonomy and survey International Journal of Information and Computer Security. 7: 216-239. DOI: 10.1504/Ijics.2015.073028 |
0.378 |
|
2015 |
Alzahrani AJ, Ghorbani AA. Real-time signature-based detection approach for SMS botnet 2015 13th Annual Conference On Privacy, Security and Trust, Pst 2015. 157-164. DOI: 10.1109/PST.2015.7232968 |
0.306 |
|
2014 |
Alzahrani AJ, Ghorbani AA. SMS mobile botnet detection using a multi-agent system: Research in progress Acm International Conference Proceeding Series. DOI: 10.1145/2602945.2602950 |
0.309 |
|
2014 |
Rrushi JL, Ghorbani AA. A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management Journal in Computer Virology. 10: 29-51. DOI: 10.1007/S11416-013-0190-7 |
0.456 |
|
2013 |
Bateni M, Baraani A, Ghorbani AA. Using artificial immune system and fuzzy logic for alert correlation International Journal of Network Security. 15: 160-174. DOI: 10.6633/Ijns.201305.15(3).05 |
0.346 |
|
2013 |
Nari S, Ghorbani AA. Automated malware classification based on network behavior 2013 International Conference On Computing, Networking and Communications, Icnc 2013. 642-647. DOI: 10.1109/ICCNC.2013.6504162 |
0.338 |
|
2013 |
Zhao D, Traore I, Sayed B, Lu W, Saad S, Ghorbani A, Garant D. Botnet detection based on traffic behavior analysis and flow intervals Computers and Security. 39: 2-16. DOI: 10.1016/J.Cose.2013.04.007 |
0.493 |
|
2012 |
Shiravi H, Shiravi A, Ghorbani AA. A survey of visualization systems for network security. Ieee Transactions On Visualization and Computer Graphics. 18: 1313-29. PMID 21876227 DOI: 10.1109/Tvcg.2011.144 |
0.348 |
|
2012 |
Bateni M, Baraani A, Ghorbani A. Alert correlation using artificial immune recognition system International Journal of Bio-Inspired Computation. 4: 181-195. DOI: 10.1504/Ijbic.2012.047240 |
0.336 |
|
2012 |
Lei JZ, Ghorbani AA. Improved competitive learning neural networks for network intrusion and fraud detection Neurocomputing. 75: 135-145. DOI: 10.1016/J.Neucom.2011.02.021 |
0.444 |
|
2012 |
Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers and Security. 31: 357-374. DOI: 10.1016/J.Cose.2011.12.012 |
0.702 |
|
2012 |
Soleimani M, Ghorbani AA. Multi-layer episode filtering for the multi-step attack detection Computer Communications. 35: 1368-1379. DOI: 10.1016/J.Comcom.2012.04.001 |
0.407 |
|
2011 |
Yin C, Ghorbani AA, Sun R. Research on new botnet detection strategy based on information materials Advanced Materials Research. 282: 236-239. DOI: 10.4028/Www.Scientific.Net/Amr.282-283.236 |
0.365 |
|
2011 |
Rrushi J, Mokhtari E, Ghorbani AA. A statistical approach to botnet virulence estimation Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 508-512. DOI: 10.1145/1966913.1966988 |
0.328 |
|
2011 |
Lu W, Ghorbani AA. A multiple-stage classifier for identifying unknown Internet traffic Ieee Pacific Rim Conference On Communications, Computers, and Signal Processing - Proceedings. 725-729. DOI: 10.1109/PACRIM.2011.6032983 |
0.406 |
|
2011 |
Stakhanova N, Couture M, Ghorbani AA. Exploring network-based malware classification Proceedings of the 2011 6th International Conference On Malicious and Unwanted Software, Malware 2011. 14-19. DOI: 10.1109/MALWARE.2011.6112321 |
0.35 |
|
2011 |
Yin C, Ghorbani AA. P2P botnet detection based on association between common network behaviors and host behaviors 2011 International Conference On Multimedia Technology, Icmt 2011. 5010-5012. DOI: 10.1109/ICMT.2011.6001651 |
0.363 |
|
2011 |
Joseph JFC, Ghorbani AA. VisVerND: Visual verification of network traffic dataset Proceedings - 2011 9th Annual Communication Networks and Services Research Conference, Cnsr 2011. 56-62. DOI: 10.1109/CNSR.2011.17 |
0.35 |
|
2011 |
Rrushi J, Mokhtari E, Ghorbani AA. Estimating botnet virulence within mathematical models of botnet propagation dynamics Computers and Security. 30: 791-802. DOI: 10.1016/J.Cose.2011.07.004 |
0.435 |
|
2011 |
Lu W, Rammidi G, Ghorbani AA. Clustering botnet communication traffic based on n-gram feature selection Computer Communications. 34: 502-514. DOI: 10.1016/J.Comcom.2010.04.007 |
0.484 |
|
2011 |
Shiravi H, Shiravi A, Ghorbani AA. Situational assessment of intrusion alerts: A multi attack scenario evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7043: 399-413. DOI: 10.1007/978-3-642-25243-3_32 |
0.38 |
|
2011 |
Ghorbani A. People's opinion, people's nexus, people's security and computational intelligence: the evolution continues Brain Informatics. 21-21. DOI: 10.1007/978-3-642-23605-1_3 |
0.395 |
|
2010 |
Bagheri E, Ghorbani AA. UML-CI: A reference model for profiling critical infrastructure systems Information Systems Frontiers. 12: 115-139. DOI: 10.1007/S10796-008-9127-Y |
0.318 |
|
2010 |
Bagheri E, Ghorbani AA. An exploratory classification of applications in the realm of collaborative modeling and design Information Systems and E-Business Management. 8: 257-286. DOI: 10.1007/S10257-008-0101-5 |
0.338 |
|
2010 |
Bagheri E, Ghorbani AA. The analysis and management of non-canonical requirement specifications through a belief integration game Knowledge and Information Systems. 22: 27-64. DOI: 10.1007/S10115-008-0187-6 |
0.308 |
|
2010 |
Tavallaee M, Lu W, Bagheri E, Ghorbani AA. Automatic discovery of network applications: A hybrid approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6085: 208-219. DOI: 10.1007/978-3-642-13059-5_21 |
0.393 |
|
2010 |
Ghorbani AA, Lu W, Tavallaee M. Data collection Advances in Information Security. 47: 55-71. DOI: 10.1007/978-0-387-88771-5_3 |
0.398 |
|
2010 |
Ghorbani AA, Lu W, Tavallaee M. Network attacks Advances in Information Security. 47: 1-25. DOI: 10.1007/978-0-387-88771-5_1 |
0.389 |
|
2010 |
Ghorbani AA, Lu W, Tavallaee M. Network Intrusion Detection and Prevention Ai & Society. 47. DOI: 10.1007/978-0-387-88771-5 |
0.682 |
|
2010 |
Ghorbani AA, Lu W, Tavallaee M. Network intrusion detection and prevention: Concepts and Techniques Advances in Information Security. 47. |
0.357 |
|
2009 |
Kilfoil M, Ghorbani AA. SWAMI: A Multiagent, Active Representation of a User's Browsing Interests International Journal of Information Technology and Web Engineering. 4: 1-24. DOI: 10.4018/Jitwe.2009100601 |
0.315 |
|
2009 |
Lu W, Ghorbani AA. Network anomaly detection based on wavelet analysis Eurasip Journal On Advances in Signal Processing. 2009. DOI: 10.1155/2009/837601 |
0.503 |
|
2009 |
Lu W, Tavallaee M, Ghorbani AA. Automatic discovery of botnet communities on large-scale communication networks Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 1-10. DOI: 10.1145/1533057.1533062 |
0.379 |
|
2009 |
Tavallaee M, Lu W, Ghorbani AA. Online classification of network flows Proceedings of the 7th Annual Communication Networks and Services Research Conference, Cnsr 2009. 78-85. DOI: 10.1109/CNSR.2009.22 |
0.386 |
|
2009 |
Lu W, Tavallaee M, Rammidi G, Ghorbani AA. Botcop: An online botnet traffic classifier Proceedings of the 7th Annual Communication Networks and Services Research Conference, Cnsr 2009. 70-77. DOI: 10.1109/CNSR.2009.21 |
0.37 |
|
2009 |
Bagheri E, Ghorbani AA. A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models Journal of Systems and Software. 82: 707-729. DOI: 10.1016/J.Jss.2008.10.012 |
0.351 |
|
2009 |
Sadoddin R, Ghorbani AA. An incremental frequent structure mining framework for real-time alert correlation Computers and Security. 28: 153-173. DOI: 10.1016/J.Cose.2008.11.010 |
0.429 |
|
2008 |
Nayyar H, Ghorbani AA. Approximate autoregressive modeling for network attack detection Journal of Computer Security. 16: 165-197. DOI: 10.3233/Jcs-2008-16204 |
0.496 |
|
2008 |
Bagheri E, Ghorbani AA. The state of the art in critical infrastructure protection: A framework for convergence International Journal of Critical Infrastructures. 4: 215-244. DOI: 10.1504/Ijcis.2008.017438 |
0.341 |
|
2008 |
Onut IV, Ghorbani AA. A comprehensive fuzzy logic model for feature performance assessment against network attacks Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2008.8 |
0.301 |
|
2008 |
Lu W, Ghorbani AA. Botnets detection based on IRC-community Globecom - Ieee Global Telecommunications Conference. 2067-2071. DOI: 10.1109/GLOCOM.2008.ECP.398 |
0.39 |
|
2008 |
Tavallaee M, Lu W, Iqbal SA, Ghorbani AA. A novel covariance matrix based approach for detecting network anomalies Proceedings of the 6th Annual Communication Networks and Services Research Conference, Cnsr 2008. 75-81. DOI: 10.1109/CNSR.2008.80 |
0.375 |
|
2008 |
Lu W, Tavallaee M, Ghorbani AA. Detecting network anomalies using different wavelet basis functions Proceedings of the 6th Annual Communication Networks and Services Research Conference, Cnsr 2008. 149-156. DOI: 10.1109/CNSR.2008.75 |
0.339 |
|
2008 |
Sadat-Mohtasham SH, Ghorbani AA. A language for high-level description of adaptive web systems Journal of Systems and Software. 81: 1196-1217. DOI: 10.1016/J.Jss.2007.08.033 |
0.321 |
|
2008 |
Lu W, Ghorbani AA. Bots behaviors vs. human behaviors on large-scale communication networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 415-416. DOI: 10.1007/978-3-540-87403-4_33 |
0.357 |
|
2008 |
Sadoddin R, Ghorbani AA. Real-time alert correlation using stream data mining techniques Proceedings of the National Conference On Artificial Intelligence. 3: 1731-1737. |
0.312 |
|
2007 |
Onut IV, Ghorbani AA. SVision: A novel visual network-anomaly identification technique Computers and Security. 26: 201-212. DOI: 10.1016/J.Cose.2006.10.001 |
0.493 |
|
2007 |
Onut IV, Ghorbani AA. Features vs. attacks: A comprehensive feature selection model for network based intrusion detection systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 19-36. |
0.358 |
|
2006 |
Yan Y, Liang Y, Du X, Hassane HS, Ghorbani A. Putting labs online with Web services It Professional. 8: 27-34. DOI: 10.1109/Mitp.2006.45 |
0.334 |
|
2006 |
Onut IV, Ghorbani AA. Toward a feature classification scheme for network intrusion detection Proceedings - 4th Annual Communication Networks and Services Research Conference, Cnsr 2006. 277-284. DOI: 10.1109/CNSR.2006.53 |
0.334 |
|
2006 |
Zhu B, Ghorbani AA. Alert correlation for extracting attack strategies International Journal of Network Security. 3: 244-258. |
0.367 |
|
2005 |
Kilfoil M, Ghorbani A. SWAMI: searching the web using agents with mobility and intelligence Lecture Notes in Computer Science. 91-102. DOI: 10.1007/11424918_11 |
0.323 |
|
2005 |
Kabiri P, Ghorbani AA. Research on intrusion detection and response: A survey International Journal of Network Security. 1: 84-102. |
0.39 |
|
2005 |
Shajari M, Ghorbani AA. Fuzzy analysis of network incidents Proceedings of the 9th Iasted International Conference On Artificial Intelligence and Soft Computing, Asc 2005. 93-98. |
0.338 |
|
2005 |
Onut IV, Zhu B, Ghorbani AA. Svision: Visual identification of scanning and denial of service attacks Proceedings - Wec 05: Fourth World Enformatika Conference. 6: 37-40. |
0.345 |
|
2005 |
Onut IV, Zhu B, Ghorbani AA. SVision: A network host-centered anomaly visualization technique Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 16-28. |
0.384 |
|
2004 |
Bitting E, Ghorbani AA. Protecting e-commerce agents from defamation Electronic Commerce Research and Applications. 3: 21-38. DOI: 10.1016/J.Elerap.2003.09.001 |
0.323 |
|
2004 |
Lei JZ, Ghorbani AA. The Reconstruction of the Interleaved Sessions from a Server Log Lecture Notes in Computer Science. 133-145. DOI: 10.1007/978-3-540-24840-8_10 |
0.301 |
|
2003 |
Tang H, Ghorbani AA. Accent classification using support vector machine and hidden markov model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2671: 629-631. DOI: 10.1007/3-540-44886-1_65 |
0.365 |
|
2003 |
Guan Y, Ghorbani AA, Belacel N. An unsupervised clustering algorithm for intrusion detection Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 2671: 616-617. DOI: 10.1007/3-540-44886-1_60 |
0.358 |
|
2002 |
Carter J, Ghorbani AA, Marsh S. Just-in-time information sharing architectures in multiagent systems Proceedings of the International Conference On Autonomous Agents. 647-654. |
0.322 |
|
2001 |
Farzan A, Ghorbani AA. The bottom-up freezing: An approach to neural engineering Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2056: 317-324. DOI: 10.1007/3-540-45153-6_31 |
0.403 |
|
2000 |
Yu H, Ghorbani AA, Bhavsar VC, Marsh S. Keyphrase-based information sharing in the ACORN multi-agent architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1931: 243-256. DOI: 10.1007/3-540-45391-1_20 |
0.34 |
|
Show low-probability matches. |