Ali. A. Ghorbani
#131,283
Most Influential Person Now
Ali. A. Ghorbani's AcademicInfluence.com Rankings
Ali. A. Ghorbanicomputer-science Degrees
Computer Science
#5787
World Rank
#6108
Historical Rank
Data Mining
#118
World Rank
#118
Historical Rank
Machine Learning
#1661
World Rank
#1683
Historical Rank
Artificial Intelligence
#1897
World Rank
#1929
Historical Rank

Download Badge
Computer Science
Ali. A. Ghorbani's Degrees
- Masters Computer Engineering Sharif University of Technology
- Bachelors Computer Engineering Sharif University of Technology
Why Is Ali. A. Ghorbani Influential?
(Suggest an Edit or Addition)Ali. A. Ghorbani's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A detailed analysis of the KDD CUP 99 data set (2009) (3213)
- Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization (2018) (1651)
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection (2012) (989)
- Weighted PageRank algorithm (2004) (566)
- Characterization of Encrypted and VPN Traffic using Time-related Features (2016) (495)
- Characterization of Tor Traffic using Time based Features (2017) (373)
- An overview of online fake news: Characterization, detection, and discussion (2020) (369)
- A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT (2017) (339)
- Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy (2019) (310)
- Botnet detection based on traffic behavior analysis and flow intervals (2013) (308)
- A Survey of Visualization Systems for Network Security (2012) (266)
- Detecting P2P botnets through network behavior analysis and machine learning (2011) (262)
- Research on Intrusion Detection and Response: A Survey (2005) (260)
- Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods (2010) (259)
- Network Anomaly Detection Based on Wavelet Analysis (2009) (215)
- Towards effective feature selection in machine learning-based botnet detection approaches (2014) (214)
- Y-means: a clustering method for intrusion detection (2003) (213)
- Application of deep learning to cybersecurity: A survey (2019) (168)
- An Evaluation Framework for Intrusion Detection Dataset (2016) (149)
- Network Intrusion Detection and Prevention - Concepts and Techniques (2009) (149)
- Towards a Reliable Intrusion Detection Benchmark Dataset (2017) (144)
- Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification (2018) (144)
- Alert Correlation for Extracting Attack Strategies (2006) (144)
- Alert correlation survey: framework and techniques (2006) (139)
- Network intrusion detection using an improved competitive learning neural network (2004) (124)
- Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling (2017) (122)
- Reputation Formalization for an Information–Sharing Multi–Agent System (2002) (115)
- Automated malware classification based on network behavior (2013) (109)
- Clustering botnet communication traffic based on n-gram feature selection (2011) (103)
- Detecting Malicious URLs Using Lexical Analysis (2016) (98)
- Automatic discovery of botnet communities on large-scale communication networks (2009) (86)
- Towards a Network-Based Framework for Android Malware Detection and Characterization (2017) (83)
- Android Botnets: What URLs are Telling Us (2015) (82)
- Improved competitive learning neural networks for network intrusion and fraud detection (2012) (82)
- Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection (2007) (79)
- A multiagent system for optimizing urban traffic (2003) (77)
- Peer to Peer Botnet Detection Based on Flow Intervals (2012) (70)
- An incremental frequent structure mining framework for real-time alert correlation (2009) (70)
- The state of the art in critical infrastructure protection: a framework for convergence (2008) (69)
- DroidKin: Lightweight Detection of Android Apps Similarity (2014) (66)
- Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning (2020) (65)
- An Online Adaptive Approach to Alert Correlation (2010) (58)
- DNA-Droid: A Real-Time Android Ransomware Detection Framework (2017) (56)
- Sentiment Analysis of Social Issues (2012) (55)
- BotCop: An Online Botnet Traffic Classifier (2009) (54)
- A Detailed Analysis of the CICIDS2017 Data Set (2018) (53)
- The reconstruction of user sessions from a server log using improved time-oriented heuristics (2004) (52)
- Toward An Adaptive Web: The State of the Art and Science (2003) (52)
- Putting labs online with Web services (2006) (47)
- UML-CI: A reference model for profiling critical infrastructure systems (2010) (42)
- Verb Oriented Sentiment Classification (2012) (42)
- A Feature Classification Scheme For Network Intrusion Detection (2007) (39)
- A Novel Covariance Matrix Based Approach for Detecting Network Anomalies (2008) (38)
- Classification of Web Log Data to Identify Interested Users Using Naïve Bayesian Classification (2012) (37)
- A Rule-based Temporal Alert Correlation System (2007) (36)
- A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems (2007) (36)
- Exploring reverse engineering symptoms in Android apps (2015) (35)
- Towards a formalization of value-centric trust in agent societies (2004) (35)
- Stacked generalization in neural networks: generalization on statistically neutral problems (2001) (34)
- Accent Classification Using Support Vector Machine and Hidden Markov Model (2003) (32)
- DeNNeS: deep embedded neural network expert system for detecting cyber attacks (2020) (31)
- Detecting Network Anomalies Using Different Wavelet Basis Functions (2008) (30)
- Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT (2020) (29)
- Application-layer denial of service attacks: taxonomy and survey (2015) (29)
- SMS mobile botnet detection using a multi-agent system: research in progress (2014) (29)
- On the Evaluation of Adaptive Web Systems (2004) (29)
- Automatic multi-step attack pattern discovering (2008) (26)
- Multi-layer episode filtering for the multi-step attack detection (2012) (26)
- A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (2007) (25)
- Familiarity and Trust: Measuring Familiarity with a Web Site (2004) (25)
- Detecting P 2 P Botnets through Network Behavior Analysis and Machine Learning (2011) (25)
- Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms (2020) (24)
- The ACORN multi-agent system (2003) (24)
- An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering (2009) (24)
- An Entropy Based Encrypted Traffic Classifier (2015) (23)
- Reputation Formalization Within Information Sharing Multiagent Architectures (2002) (23)
- A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment (2018) (22)
- An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis (2007) (21)
- Application of Belief-Desire-Intention Agents in Intrusion Detection & Response (2004) (21)
- GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems (2007) (21)
- Sentence Subjectivity Analysis in Social Domains (2013) (21)
- Real-time signature-based detection approach for SMS botnet (2015) (21)
- IDS Alert Visualization and Monitoring through Heuristic Host Selection (2010) (20)
- SVision: A novel visual network-anomaly identification technique (2007) (19)
- Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud (2018) (19)
- Botnets Detection Based on IRC-Community (2008) (19)
- Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder (2021) (19)
- Using Artificial Immune System and Fuzzy Logic for Alert Correlation (2013) (18)
- A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams (2007) (17)
- Towards a Formalization of Trust (2003) (17)
- An Unsupervised Clustering Algorithm for Intrusion Detection (2003) (17)
- CIC-AB: Online ad blocker for browsers (2017) (17)
- SWAMI: A Multiagent, Active Representation of a User's Browsing Interests (2009) (17)
- Online Classification of Network Flows (2009) (16)
- Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology (2009) (16)
- Group Behavior Metrics for P2P Botnet Detection (2012) (16)
- Efficient indexing for semantic search (2017) (16)
- Behavior analysis through reputation propagation in a multi-context environment (2006) (16)
- Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices (2009) (16)
- On Query Completion in Web Search Engines Based on Query Stream Mining (2007) (15)
- A novel visualization technique for network anomaly detection (2004) (15)
- Toward a feature classification scheme for network intrusion detection (2006) (15)
- The reflection of offline activities on users' online social behavior: An observational study (2019) (14)
- Value centric trust in multiagent systems (2003) (14)
- P2P botnet detection based on association between common network behaviors and host behaviors (2011) (14)
- A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models (2009) (14)
- Category-based similarity algorithm for semantic similarity in multi-agent information sharing systems (2005) (14)
- Neural embedding-based indices for semantic search (2019) (14)
- Classifying cognitive states from fMRI data using neural networks (2004) (14)
- Exploring network-based malware classification (2011) (14)
- Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud (2020) (13)
- An evaluation framework for network security visualizations (2019) (13)
- Managing intrusion detection rule sets (2010) (13)
- Incremental communication for multilayer neural networks (1995) (12)
- Alert correlation using artificial immune recognition system (2012) (12)
- Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process (2008) (12)
- Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges (2018) (12)
- Authorship Attribution of Android Apps (2018) (12)
- Motif and Anomaly Discovery of Time Series Based on Subseries Join (2010) (12)
- Scalable Privacy-Preserving Query Processing over Ethereum Blockchain (2019) (11)
- Multiagent Systems Development Kits : An Evaluation (2003) (11)
- Protecting e-commerce agents from defamation (2004) (11)
- Towards the Development of a Realistic Multidimensional IoT Profiling Dataset (2022) (11)
- A Survey on User Profiling Model for Anomaly Detection in Cyberspace (2018) (11)
- PENS: a personalized electronic news system (2005) (11)
- A Belief-Theoretic Reputation Estimation Model for Multi-context Communities (2008) (11)
- Just-in-time information sharing architectures in multiagent systems (2002) (11)
- A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection (2017) (10)
- Towards an MDA-oriented UML profile for critical infrastructure modeling (2006) (10)
- A Survey on User Profiling Model forAnomaly Detection in Cyberspace (2019) (10)
- Time Series Motif Discovery and Anomaly Detection Based on Subseries Join (2010) (10)
- A Structure for Opinion in Social Domains (2013) (10)
- A Fuzzy Markov Model Approach for Predicting User Navigation (2007) (10)
- A real-time hostile activities analyses and detection system (2021) (10)
- Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS (2020) (10)
- Critical Episode Mining in Intrusion Detection Alerts (2008) (10)
- An evaluation framework for industrial control system cyber incidents (2021) (10)
- Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones (2014) (10)
- On the Collaborative Development of Para-Consistent Conceptual Models (2007) (9)
- A Novel Approach for Social Behavior Analysis of the Blogosphere (2008) (9)
- Real-time Alert Correlation Using Stream Data Mining Techniques (2008) (9)
- EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging (2019) (9)
- Cooperative multiagent systems for the optimization of urban traffic (2004) (9)
- Conceptualizing Critical Infrastructures as Service Oriented Complex Interdependent Systems (9)
- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems (2007) (9)
- An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms (2020) (9)
- The analysis and management of non-canonical requirement specifications through a belief integration game (2010) (9)
- Incremental communication for adaptive resonance theory networks (2005) (8)
- Human Factors in Cybersecurity (2021) (8)
- PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids (2018) (8)
- Lexical-Syntactical Patterns for Subjectivity Analysis of Social Issues (2013) (8)
- A New Multisignature Scheme with Public Key Aggregation for Blockchain (2019) (8)
- AN ONLINE FREQUENCY RATE BASED ALGORITHM FOR MINING FREQUENT SEQUENCES IN EVOLVING DATA STREAMS (2008) (8)
- Improving the referrer-based Web log session reconstruction (2004) (8)
- AN AIS-INSPIRED ARCHITECTURE FOR ALERT CORRELATION (2013) (8)
- A network based document management model to prevent data extrusion (2016) (8)
- Architectural Components of Information–Sharing Societies (2002) (8)
- SupAUTH: A new approach to supply chain authentication for the IoT (2018) (7)
- A language for high-level description of adaptive web systems (2008) (7)
- A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters (2015) (7)
- On the causal relation between real world activities and emotional expressions of social media users (2020) (7)
- A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends ............................................................................................. YUXIN MENG, WENJUAN LI, AND LAM-FOR KWOK (2014) (7)
- A statistical approach to botnet virulence estimation (2011) (7)
- Measuring code reuse in Android apps (2016) (7)
- Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing (2021) (7)
- Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology (2007) (7)
- Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT (2019) (7)
- An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems (2006) (6)
- A game-theoretic defensive approach for forensic investigators against rootkits (2020) (6)
- Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development (2008) (6)
- Alert Management and Correlation (2010) (6)
- A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals (2008) (6)
- A feature exploration approach for IoT attack type classification (2021) (6)
- A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour (2020) (6)
- Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm (2000) (6)
- A Phishing Email Detection Approach Using Machine Learning Techniques (2017) (6)
- Design Instrumental Web Services for Online Experiment Systems (2005) (6)
- A locality-based replication manager for data cloud (2016) (6)
- Approximate autoregressive modeling for network attack detection (2006) (6)
- Information domain modeling for adaptive Web systems (2005) (6)
- SWAMI: Searching the Web Using Agents with Mobility and Intelligence (2005) (6)
- Y-Means: An Autonomous Clustering Algorithm (2010) (6)
- A Multi-agent System for Smartphone Intrusion Detection Framework (2015) (6)
- BotViz: A memory forensic-based botnet detection and visualization approach (2017) (6)
- Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency (2021) (5)
- Incremental communication for multilayer neural networks: error analysis (1998) (5)
- Competitive Selfish Mining (2019) (5)
- Context Free Frequently Asked Questions Detection Using Machine Learning Techniques (2016) (5)
- Towards insider threats detection in smart grid communication systems (2019) (5)
- Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models (2008) (5)
- SMS-Based Mobile Botnet Detection Module (2016) (5)
- Hybrid Traffic Classification Approach Based on Decision Tree (2009) (5)
- FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing (2022) (5)
- AN INTERACTIVE SEARCH ASSISTANT ARCHITECTURE BASED ON INTRINSIC QUERY STREAM CHARACTERISTICS (2008) (5)
- Classifying Organizational Roles Using Email Social Networks (2013) (5)
- Agent Design Considerations within Distributed Information Retrieval Systems (2001) (5)
- A framework for distributed collaborative conceptual model development (2007) (5)
- A Performance Evaluation of the Acorn Architecture (2002) (4)
- Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter (2020) (4)
- An exploratory classification of applications in the realm of collaborative modeling and design (2010) (4)
- Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT (2021) (4)
- DDH-based Multisignatures with Public Key Aggregation (2019) (4)
- Incremental communication for artificial neural networks (1993) (4)
- Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications (2007) (4)
- On the Definition of Essential and Contingent Properties of Subjective Belief Bases (2008) (4)
- Architecture and Implementation (2010) (4)
- Agent-oriented design for network survivability (2005) (4)
- Estimating botnet virulence within mathematical models of botnet propagation dynamics (2011) (4)
- A Survey on IoT Profiling, Fingerprinting, and Identification (2022) (4)
- The Reconstruction of the Interleaved Sessions from a Server Log (2004) (4)
- Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones (2014) (4)
- EagleEye: A Novel Visual Anomaly Detection Method (2018) (3)
- Using Fuzzy System to Manage False Alarms in Intrusion Detection (2003) (3)
- Generating Phishing Emails Using Graph Database (2019) (3)
- A Lightweight Online Advertising Classification System using Lexical-based Features (2017) (3)
- SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents (2016) (3)
- CIFS: a trust-based multilayer information filtering system for multi-agent mobile information systems (2006) (3)
- Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture (2000) (3)
- Value-Centric Trust Model with Improved Familiarity Measurement (2005) (3)
- A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games (2010) (3)
- Early Stage Botnet Detection and Containment via Mathematical Modeling and Prediction of Botnet Propagation Dynamics (2010) (3)
- VisVerND: Visual Verification of Network Traffic Dataset (2011) (3)
- Monday, 27 August 2012 (2012) (3)
- Selective Regular Expression Matching (2010) (3)
- Training artificial neural networks using variable precision incremental communication (1994) (3)
- Preventing proof-of-work mining attacks (2022) (3)
- ConnectA! : An Intelligent Search Engine based on Authors' Connectivity (2007) (3)
- Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing (2019) (3)
- ARAS: adaptive recommender for academic scheduling (2005) (3)
- Cyber Criminal Profiling (2020) (3)
- Threat Hunting in Windows Using Big Security Log Data (2020) (3)
- A multiple-stage classifier for identifying unknown Internet traffic (2011) (2)
- Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation (2011) (2)
- Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs) (2020) (2)
- A presentation specification language for adaptive Web systems (2005) (2)
- A Framework for the Manifestation of Tacit Critical Infrastructure Knowledge (2010) (2)
- Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network (2019) (2)
- Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract) (2008) (2)
- The Bottom-Up Freezing: An Approach to Neural Engineering (2001) (2)
- Detecting and Preventing Defamation in Multiagent Systems (2003) (2)
- Dynamic graph-based malware classifier (2016) (2)
- OTP-IoT: An ownership transfer protocol for the Internet of Things (2018) (2)
- THE SECOND INTERNATIONAL WORKSHOP ON Collaboration Agents: Autonomous Agents for Collaborative Environments (2004) (2)
- SVision: A Network Host-Centered Anomaly Visualization Technique (2005) (2)
- A New Framework for Publishing and Sharing Network and Security Datasets (2012) (2)
- KeyShield: A Scalable and Quantum-Safe Key Management Scheme (2021) (2)
- Increasing Stability of Value-Centric Trust Model through Improved Familiarity Measurement (2005) (2)
- Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection (2021) (2)
- Research on New Botnet Detection Strategy Based on Information Materials (2011) (2)
- Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing (2021) (2)
- A Behavioral Model of Ideologically-motivated “Snowball” Attacks (2008) (2)
- Financial Fraud Detection using Deep Support Vector Data Description (2020) (2)
- The sound of intrusion: A novel network intrusion detection system (2022) (2)
- A memory-based game-theoretic defensive approach for digital forensic investigators (2021) (1)
- Ensemble of Hierarchical Temporal Memory for Anomaly Detection (2020) (1)
- RiskISM: A Risk Assessment Tool for Substations (2021) (1)
- The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals (2018) (1)
- Semantic Search Guidance : Learn From History (2007) (1)
- Accelerated Backpropagation Learning : Parallel Tangent Optimization Algorithm (1983) (1)
- Recommending Location for Placing Data Collector in the OPC Classic (2021) (1)
- An Empirical Analysis on the Stability of Clustering Algorithms (2008) (1)
- Evaluating Deep Learning-based NIDS in Adversarial Settings (2022) (1)
- Classifying and clustering malicious advertisement uniform resource locators using deep learning (2020) (1)
- Security and Privacy in Communication Networks (2017) (1)
- Verification Based Scheme to Restrict IoT Attacks (2021) (1)
- EfficientPMM: Finite Automata Based Efficient Pattern Matching Machine (2017) (1)
- A Comprehensive SMS-Based Intrusion Detection Framework (2017) (1)
- Automated Web Page Synthesis in Adaptive Web Systems (2004) (1)
- Proceedings of the 7th international conference on Active media technology (2011) (1)
- Inductive Learning Inability of Artificial Neural Networks (1)
- Improved fault analysis on SIMECK ciphers (2020) (1)
- 2013 Eleventh annual conference on privacy, security and trust (2013) (1)
- Memory forensics tools: a comparative analysis (2022) (1)
- Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning (2022) (1)
- Towards Android malware detection using intelligent agents (2016) (1)
- A Novel Trust Model In Detecting Final-Phase Attacks in Substations (2021) (1)
- A Trust-Influenced Smart Grid: A Survey and a Proposal (2022) (1)
- Using Web Services to Control Remote Instruments for Online Experiment Systems (2005) (1)
- On The Generation of Unrestricted Adversarial Examples (2020) (1)
- Introduction to Special Issue on Agent Technologies for Electronic Business (2004) (1)
- Dimension Reduction and its Effects on Clustering for Intrusion Detection (2012) (1)
- SWAMI : Searching the Web using Agents having Mobility and Intelligence (2003) (1)
- Semantic Annotation of Quantitative Textual Content (2015) (0)
- Sustainable and Secure Optimization of Load Distribution in Edge Computing (2022) (0)
- Controlling Defamation in Multiagent Systems (2003) (0)
- THE ACORN ARCHITECTURE (0)
- Trust-based contextual information filtering (2006) (0)
- Threshold based Technique to Detect Anomalies using Log Files (2022) (0)
- An intelligent malware classification framework (2015) (0)
- Behavioural Monitoring and Security Profiling in the Internet of Things (IoT) (2021) (0)
- IoT Zigbee device security: A comprehensive review (2023) (0)
- Multimodal Fake News Analysis Based on Image–Text Similarity (2023) (0)
- Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content (2016) (0)
- Inductive Learning Inabilityr of Artificial Neural Networks (2004) (0)
- Honourary Conference Chair (2007) (0)
- Critical Infrastructure Modeling and Simulation : The State of the Art (2006) (0)
- Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study (2022) (0)
- Adaptive resonance theory networks using incremental communication (2001) (0)
- Design and implementation of a behavioral difference analyzer for network intrusion detection (2006) (0)
- On the Causal Relation between Users' Real-World Activities and their Affective Processes (2019) (0)
- ABelief-theoreticFrameworkfortheCollaborativeDevelopmentand IntegrationofPara-consistentConceptualModels (2008) (0)
- Steering committee chair welcome (2016) (0)
- Label Noise Detection in IoT Security based on Decision Tree and Active Learning (2022) (0)
- A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines (2007) (0)
- A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks (2008) (0)
- Automatic Discovery of Network Applications: A Hybrid Approach (2010) (0)
- CapsRule: Explainable Deep Learning for Classifying Network Attacks. (2023) (0)
- Cse 255 -assignment I (0)
- Integrating Subjective Knowledge Bases through an Extended Belief Game Model (2008) (0)
- 2015 Thirteenth Annual Conference on Privacy, Security and Trust (2015) (0)
- An entity matching-based image topic verification framework for online fact-checking (2022) (0)
- People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues (2011) (0)
- Preface (2019) (0)
- Synthesis in Adaptive Web Systems (2004) (0)
- Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints (2022) (0)
- Theoretical Foundation of Detection (2010) (0)
- Running head: 1 On The Causal Relation Between Real World Activities and Emotional Expressions of Social Media Users (2020) (0)
- Oracle Clustering: Dynamic Partitioning Based on Random Observations (2008) (0)
- A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management (2013) (0)
- A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems (2023) (0)
- User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security (2021) (0)
- Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories (2022) (0)
- Memory-Efficient Random Order Exponentiation Algorithm (2020) (0)
- Table of Contents (1999) (0)
- Inductive learning inability of artificial neural network (2000) (0)
- Towards Query-efficient Black-box Adversarial Attack on Text Classification Models (2021) (0)
- Limited precision incremental communication: error analysis (1996) (0)
- 2 EURASIP Journal on Advances in Signal Processing Packets flows Network flow based features Residuals Intrusion or normalFeature analysis (2008) (0)
- Ensemble-based Intrusion Detection for Internet of Things Devices (2022) (0)
- Agent Design Considerations within DistributedInformation Retrieval (2001) (0)
- Svision: Visual Identification of Scanning and Denial of Service Attacks (2007) (0)
- Social Alignment Contagion in Online Social Networks (2022) (0)
- Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder (2021) (0)
- QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution (2022) (0)
- A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management (2014) (0)
- Data breach: analysis, countermeasures and challenges (2022) (0)
This paper list is powered by the following services: