A detailed analysis of the KDD CUP 99 data set M Tavallaee, E Bagheri, W Lu, AA Ghorbani 2009 IEEE symposium on computational intelligence for security and defense …, 2009 | 5834 | 2009 |
Toward developing a systematic approach to generate benchmark datasets for intrusion detection A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani computers & security 31 (3), 357-374, 2012 | 1497 | 2012 |
Toward credible evaluation of anomaly-based intrusion-detection methods M Tavallaee, N Stakhanova, AA Ghorbani IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 409 | 2010 |
Network intrusion detection and prevention: concepts and techniques AA Ghorbani, W Lu, M Tavallaee Springer Science & Business Media, 2009 | 377 | 2009 |
Automatic discovery of botnet communities on large-scale communication networks W Lu, M Tavallaee, AA Ghorbani Proceedings of the 4th international symposium on information, computer, and …, 2009 | 107 | 2009 |
BotCop: An online botnet traffic classifier W Lu, M Tavallaee, G Rammidi, AA Ghorbani 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 78 | 2009 |
Nsl-kdd dataset M Tavallaee, E Bagheri, W Lu, AA Ghorbani Available on http://www. unb. ca/research/iscx/dataset/iscx-NSL-KDD-dataset …, 2012 | 64 | 2012 |
A novel covariance matrix based approach for detecting network anomalies M Tavallaee, W Lu, SA Iqbal, AA Ghorbani 6th annual communication networks and services research conference (cnsr …, 2008 | 46 | 2008 |
Detecting network anomalies using different wavelet basis functions W Lu, M Tavallaee, AA Ghorbani 6th annual communication networks and services research conference (CNSR …, 2008 | 40 | 2008 |
Online classification of network flows M Tavallaee, W Lu, AA Ghorbani 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 33 | 2009 |
Network attacks AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 1-25, 2010 | 29 | 2010 |
An adaptive hybrid intrusion detection system M Tavallaee The University of New Brunswick, 2011 | 21 | 2011 |
Detection approaches AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 27-53, 2010 | 18 | 2010 |
Evaluation criteria AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 161-183, 2010 | 14 | 2010 |
Alert management and correlation AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 129-160, 2010 | 13 | 2010 |
Intrusion response AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 185-198, 2010 | 5 | 2010 |
Data collection AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 55-71, 2010 | 5 | 2010 |
Theoretical foundation of detection AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 73-114, 2010 | 4 | 2010 |
Hybrid traffic classification approach based on decision tree W Lu, M Tavallaee, AA Ghorbani GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 4 | 2009 |
Architecture and implementation AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee Network Intrusion Detection and Prevention: Concepts and Techniques, 115-127, 2010 | 3 | 2010 |