Ali A. Ghorbani - Publications

Affiliations: 
University of New Brunswick (Canada) 
Area:
Computer Science

80 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2023 Mahdavifar S, Ghorbani AA. CapsRule: Explainable Deep Learning for Classifying Network Attacks. Ieee Transactions On Neural Networks and Learning Systems. PMID 37053064 DOI: 10.1109/TNNLS.2023.3262981  0.349
2020 Daghmehchi Firoozjaei M, Ghorbani A, Kim H, Song J. Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms. Sensors (Basel, Switzerland). 20. PMID 32050570 DOI: 10.3390/S20030928  0.353
2020 Mahdikhani H, Lu R, Zheng Y, Shao J, Ghorbani AA. Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT Ieee Internet of Things Journal. 7: 5220-5232. DOI: 10.1109/Jiot.2020.2977253  0.334
2020 Zhang X, Ghorbani AA. An overview of online fake news: Characterization, detection, and discussion Information Processing and Management. 57: 102025. DOI: 10.1016/J.Ipm.2019.03.004  0.343
2020 Mahdavifar S, Ghorbani AA. DeNNeS: deep embedded neural network expert system for detecting cyber attacks Neural Computing and Applications. DOI: 10.1007/S00521-020-04830-W  0.468
2019 Mahdikhani H, Mahdavifar S, Lu R, Zhu H, Ghorbani AA. Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT Ieee Access. 7: 184438-184447. DOI: 10.1109/Access.2019.2961270  0.382
2019 Li B, Lu R, Xiao G, Bao H, Ghorbani AA. Towards insider threats detection in smart grid communication systems Iet Communications. 13: 1728-1736. DOI: 10.1049/Iet-Com.2018.5736  0.334
2019 Mahdavifar S, Ghorbani AA. Application of deep learning to cybersecurity: A survey Neurocomputing. 347: 149-176. DOI: 10.1016/J.Neucom.2019.02.056  0.381
2019 Falavarjani SAM, Zarrinkalam F, Jovanovic J, Bagheri E, Ghorbani AA. The reflection of offline activities on users’ online social behavior: An observational study Information Processing and Management. 56: 102070. DOI: 10.1016/J.Ipm.2019.102070  0.311
2019 Lashkari F, Bagheri E, Ghorbani AA. Neural embedding-based indices for semantic search Information Processing and Management. 56: 733-755. DOI: 10.1016/J.Ipm.2018.10.015  0.354
2019 Sharafaldin I, Lashkari AH, Ghorbani AA. An evaluation framework for network security visualizations Computers & Security. 84: 70-92. DOI: 10.1016/J.Cose.2019.03.005  0.448
2018 Yang X, Lu R, Shao J, Tang X, Ghorbani A. Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2018.2881147  0.316
2018 Guo W, Shao J, Lu R, Liu Y, Ghorbani AA. A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment Ieee Access. 6: 48946-48957. DOI: 10.1109/Access.2018.2866971  0.304
2017 Lu R, Heung K, Lashkari AH, Ghorbani AA. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT Ieee Access. 5: 3302-3312. DOI: 10.1109/Access.2017.2677520  0.377
2017 Jazi HH, Gonzalez H, Stakhanova N, Ghorbani AA. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling Computer Networks. 121: 25-36. DOI: 10.1016/J.Comnet.2017.03.018  0.463
2016 Ghashghaei M, Bagheri E, Cuzzola J, Ghorbani AA, Noorian Z. Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content International Journal of Semantic Computing. 10: 121-142. DOI: 10.1142/S1793351X16500021  0.35
2016 Morovati K, Kadam S, Ghorbani A. A network based document management model to prevent data extrusion Computers and Security. 59: 71-91. DOI: 10.1016/J.Cose.2016.02.003  0.452
2015 Mantas G, Stakhanova N, Gonzalez H, Jazi HH, Ghorbani AA. Application-layer denial of service attacks: taxonomy and survey International Journal of Information and Computer Security. 7: 216-239. DOI: 10.1504/Ijics.2015.073028  0.378
2015 Alzahrani AJ, Ghorbani AA. Real-time signature-based detection approach for SMS botnet 2015 13th Annual Conference On Privacy, Security and Trust, Pst 2015. 157-164. DOI: 10.1109/PST.2015.7232968  0.306
2014 Alzahrani AJ, Ghorbani AA. SMS mobile botnet detection using a multi-agent system: Research in progress Acm International Conference Proceeding Series. DOI: 10.1145/2602945.2602950  0.309
2014 Rrushi JL, Ghorbani AA. A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management Journal in Computer Virology. 10: 29-51. DOI: 10.1007/S11416-013-0190-7  0.456
2013 Bateni M, Baraani A, Ghorbani AA. Using artificial immune system and fuzzy logic for alert correlation International Journal of Network Security. 15: 160-174. DOI: 10.6633/Ijns.201305.15(3).05  0.346
2013 Nari S, Ghorbani AA. Automated malware classification based on network behavior 2013 International Conference On Computing, Networking and Communications, Icnc 2013. 642-647. DOI: 10.1109/ICCNC.2013.6504162  0.338
2013 Zhao D, Traore I, Sayed B, Lu W, Saad S, Ghorbani A, Garant D. Botnet detection based on traffic behavior analysis and flow intervals Computers and Security. 39: 2-16. DOI: 10.1016/J.Cose.2013.04.007  0.493
2012 Shiravi H, Shiravi A, Ghorbani AA. A survey of visualization systems for network security. Ieee Transactions On Visualization and Computer Graphics. 18: 1313-29. PMID 21876227 DOI: 10.1109/Tvcg.2011.144  0.348
2012 Bateni M, Baraani A, Ghorbani A. Alert correlation using artificial immune recognition system International Journal of Bio-Inspired Computation. 4: 181-195. DOI: 10.1504/Ijbic.2012.047240  0.336
2012 Lei JZ, Ghorbani AA. Improved competitive learning neural networks for network intrusion and fraud detection Neurocomputing. 75: 135-145. DOI: 10.1016/J.Neucom.2011.02.021  0.444
2012 Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers and Security. 31: 357-374. DOI: 10.1016/J.Cose.2011.12.012  0.702
2012 Soleimani M, Ghorbani AA. Multi-layer episode filtering for the multi-step attack detection Computer Communications. 35: 1368-1379. DOI: 10.1016/J.Comcom.2012.04.001  0.407
2011 Yin C, Ghorbani AA, Sun R. Research on new botnet detection strategy based on information materials Advanced Materials Research. 282: 236-239. DOI: 10.4028/Www.Scientific.Net/Amr.282-283.236  0.365
2011 Rrushi J, Mokhtari E, Ghorbani AA. A statistical approach to botnet virulence estimation Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 508-512. DOI: 10.1145/1966913.1966988  0.328
2011 Lu W, Ghorbani AA. A multiple-stage classifier for identifying unknown Internet traffic Ieee Pacific Rim Conference On Communications, Computers, and Signal Processing - Proceedings. 725-729. DOI: 10.1109/PACRIM.2011.6032983  0.406
2011 Stakhanova N, Couture M, Ghorbani AA. Exploring network-based malware classification Proceedings of the 2011 6th International Conference On Malicious and Unwanted Software, Malware 2011. 14-19. DOI: 10.1109/MALWARE.2011.6112321  0.35
2011 Yin C, Ghorbani AA. P2P botnet detection based on association between common network behaviors and host behaviors 2011 International Conference On Multimedia Technology, Icmt 2011. 5010-5012. DOI: 10.1109/ICMT.2011.6001651  0.363
2011 Joseph JFC, Ghorbani AA. VisVerND: Visual verification of network traffic dataset Proceedings - 2011 9th Annual Communication Networks and Services Research Conference, Cnsr 2011. 56-62. DOI: 10.1109/CNSR.2011.17  0.35
2011 Rrushi J, Mokhtari E, Ghorbani AA. Estimating botnet virulence within mathematical models of botnet propagation dynamics Computers and Security. 30: 791-802. DOI: 10.1016/J.Cose.2011.07.004  0.435
2011 Lu W, Rammidi G, Ghorbani AA. Clustering botnet communication traffic based on n-gram feature selection Computer Communications. 34: 502-514. DOI: 10.1016/J.Comcom.2010.04.007  0.484
2011 Shiravi H, Shiravi A, Ghorbani AA. Situational assessment of intrusion alerts: A multi attack scenario evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7043: 399-413. DOI: 10.1007/978-3-642-25243-3_32  0.38
2011 Ghorbani A. People's opinion, people's nexus, people's security and computational intelligence: the evolution continues Brain Informatics. 21-21. DOI: 10.1007/978-3-642-23605-1_3  0.395
2010 Bagheri E, Ghorbani AA. UML-CI: A reference model for profiling critical infrastructure systems Information Systems Frontiers. 12: 115-139. DOI: 10.1007/S10796-008-9127-Y  0.318
2010 Bagheri E, Ghorbani AA. An exploratory classification of applications in the realm of collaborative modeling and design Information Systems and E-Business Management. 8: 257-286. DOI: 10.1007/S10257-008-0101-5  0.338
2010 Bagheri E, Ghorbani AA. The analysis and management of non-canonical requirement specifications through a belief integration game Knowledge and Information Systems. 22: 27-64. DOI: 10.1007/S10115-008-0187-6  0.308
2010 Tavallaee M, Lu W, Bagheri E, Ghorbani AA. Automatic discovery of network applications: A hybrid approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6085: 208-219. DOI: 10.1007/978-3-642-13059-5_21  0.393
2010 Ghorbani AA, Lu W, Tavallaee M. Data collection Advances in Information Security. 47: 55-71. DOI: 10.1007/978-0-387-88771-5_3  0.398
2010 Ghorbani AA, Lu W, Tavallaee M. Network attacks Advances in Information Security. 47: 1-25. DOI: 10.1007/978-0-387-88771-5_1  0.389
2010 Ghorbani AA, Lu W, Tavallaee M. Network Intrusion Detection and Prevention Ai & Society. 47. DOI: 10.1007/978-0-387-88771-5  0.682
2010 Ghorbani AA, Lu W, Tavallaee M. Network intrusion detection and prevention: Concepts and Techniques Advances in Information Security. 47.  0.357
2009 Kilfoil M, Ghorbani AA. SWAMI: A Multiagent, Active Representation of a User's Browsing Interests International Journal of Information Technology and Web Engineering. 4: 1-24. DOI: 10.4018/Jitwe.2009100601  0.315
2009 Lu W, Ghorbani AA. Network anomaly detection based on wavelet analysis Eurasip Journal On Advances in Signal Processing. 2009. DOI: 10.1155/2009/837601  0.503
2009 Lu W, Tavallaee M, Ghorbani AA. Automatic discovery of botnet communities on large-scale communication networks Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 1-10. DOI: 10.1145/1533057.1533062  0.379
2009 Tavallaee M, Lu W, Ghorbani AA. Online classification of network flows Proceedings of the 7th Annual Communication Networks and Services Research Conference, Cnsr 2009. 78-85. DOI: 10.1109/CNSR.2009.22  0.386
2009 Lu W, Tavallaee M, Rammidi G, Ghorbani AA. Botcop: An online botnet traffic classifier Proceedings of the 7th Annual Communication Networks and Services Research Conference, Cnsr 2009. 70-77. DOI: 10.1109/CNSR.2009.21  0.37
2009 Bagheri E, Ghorbani AA. A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models Journal of Systems and Software. 82: 707-729. DOI: 10.1016/J.Jss.2008.10.012  0.351
2009 Sadoddin R, Ghorbani AA. An incremental frequent structure mining framework for real-time alert correlation Computers and Security. 28: 153-173. DOI: 10.1016/J.Cose.2008.11.010  0.429
2008 Nayyar H, Ghorbani AA. Approximate autoregressive modeling for network attack detection Journal of Computer Security. 16: 165-197. DOI: 10.3233/Jcs-2008-16204  0.496
2008 Bagheri E, Ghorbani AA. The state of the art in critical infrastructure protection: A framework for convergence International Journal of Critical Infrastructures. 4: 215-244. DOI: 10.1504/Ijcis.2008.017438  0.341
2008 Onut IV, Ghorbani AA. A comprehensive fuzzy logic model for feature performance assessment against network attacks Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2008.8  0.301
2008 Lu W, Ghorbani AA. Botnets detection based on IRC-community Globecom - Ieee Global Telecommunications Conference. 2067-2071. DOI: 10.1109/GLOCOM.2008.ECP.398  0.39
2008 Tavallaee M, Lu W, Iqbal SA, Ghorbani AA. A novel covariance matrix based approach for detecting network anomalies Proceedings of the 6th Annual Communication Networks and Services Research Conference, Cnsr 2008. 75-81. DOI: 10.1109/CNSR.2008.80  0.375
2008 Lu W, Tavallaee M, Ghorbani AA. Detecting network anomalies using different wavelet basis functions Proceedings of the 6th Annual Communication Networks and Services Research Conference, Cnsr 2008. 149-156. DOI: 10.1109/CNSR.2008.75  0.339
2008 Sadat-Mohtasham SH, Ghorbani AA. A language for high-level description of adaptive web systems Journal of Systems and Software. 81: 1196-1217. DOI: 10.1016/J.Jss.2007.08.033  0.321
2008 Lu W, Ghorbani AA. Bots behaviors vs. human behaviors on large-scale communication networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 415-416. DOI: 10.1007/978-3-540-87403-4_33  0.357
2008 Sadoddin R, Ghorbani AA. Real-time alert correlation using stream data mining techniques Proceedings of the National Conference On Artificial Intelligence. 3: 1731-1737.  0.312
2007 Onut IV, Ghorbani AA. SVision: A novel visual network-anomaly identification technique Computers and Security. 26: 201-212. DOI: 10.1016/J.Cose.2006.10.001  0.493
2007 Onut IV, Ghorbani AA. Features vs. attacks: A comprehensive feature selection model for network based intrusion detection systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4779: 19-36.  0.358
2006 Yan Y, Liang Y, Du X, Hassane HS, Ghorbani A. Putting labs online with Web services It Professional. 8: 27-34. DOI: 10.1109/Mitp.2006.45  0.334
2006 Onut IV, Ghorbani AA. Toward a feature classification scheme for network intrusion detection Proceedings - 4th Annual Communication Networks and Services Research Conference, Cnsr 2006. 277-284. DOI: 10.1109/CNSR.2006.53  0.334
2006 Zhu B, Ghorbani AA. Alert correlation for extracting attack strategies International Journal of Network Security. 3: 244-258.  0.367
2005 Kilfoil M, Ghorbani A. SWAMI: searching the web using agents with mobility and intelligence Lecture Notes in Computer Science. 91-102. DOI: 10.1007/11424918_11  0.323
2005 Kabiri P, Ghorbani AA. Research on intrusion detection and response: A survey International Journal of Network Security. 1: 84-102.  0.39
2005 Shajari M, Ghorbani AA. Fuzzy analysis of network incidents Proceedings of the 9th Iasted International Conference On Artificial Intelligence and Soft Computing, Asc 2005. 93-98.  0.338
2005 Onut IV, Zhu B, Ghorbani AA. Svision: Visual identification of scanning and denial of service attacks Proceedings - Wec 05: Fourth World Enformatika Conference. 6: 37-40.  0.345
2005 Onut IV, Zhu B, Ghorbani AA. SVision: A network host-centered anomaly visualization technique Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3650: 16-28.  0.384
2004 Bitting E, Ghorbani AA. Protecting e-commerce agents from defamation Electronic Commerce Research and Applications. 3: 21-38. DOI: 10.1016/J.Elerap.2003.09.001  0.323
2004 Lei JZ, Ghorbani AA. The Reconstruction of the Interleaved Sessions from a Server Log Lecture Notes in Computer Science. 133-145. DOI: 10.1007/978-3-540-24840-8_10  0.301
2003 Tang H, Ghorbani AA. Accent classification using support vector machine and hidden markov model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2671: 629-631. DOI: 10.1007/3-540-44886-1_65  0.365
2003 Guan Y, Ghorbani AA, Belacel N. An unsupervised clustering algorithm for intrusion detection Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 2671: 616-617. DOI: 10.1007/3-540-44886-1_60  0.358
2002 Carter J, Ghorbani AA, Marsh S. Just-in-time information sharing architectures in multiagent systems Proceedings of the International Conference On Autonomous Agents. 647-654.  0.322
2001 Farzan A, Ghorbani AA. The bottom-up freezing: An approach to neural engineering Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2056: 317-324. DOI: 10.1007/3-540-45153-6_31  0.403
2000 Yu H, Ghorbani AA, Bhavsar VC, Marsh S. Keyphrase-based information sharing in the ACORN multi-agent architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1931: 243-256. DOI: 10.1007/3-540-45391-1_20  0.34
Show low-probability matches.