Follow
Ali A. Ghorbani
Ali A. Ghorbani
Professor and Canada Research Chair in Cybersecurity
Verified email at unb.ca - Homepage
Title
Cited by
Cited by
Year
A detailed analysis of the KDD CUP 99 data set
M Tavallaee, E Bagheri, W Lu, AA Ghorbani
2009 IEEE symposium on computational intelligence for security and defense …, 2009
58532009
Toward generating a new intrusion detection dataset and intrusion traffic characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
ICISSp 1, 108-116, 2018
40982018
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani
computers & security 31 (3), 357-374, 2012
14982012
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani
2019 international carnahan conference on security technology (ICCST), 1-8, 2019
10642019
An overview of online fake news: Characterization, detection, and discussion
X Zhang, AA Ghorbani
Information Processing & Management 57 (2), 102025, 2020
10512020
Weighted pagerank algorithm
W Xing, A Ghorbani
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
9402004
Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani
Proceedings of the 2nd international conference on information systems …, 2016
8972016
Characterization of tor traffic using time based features
AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani
International Conference on Information Systems Security and Privacy 2, 253-262, 2017
8802017
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE access 5, 3302-3312, 2017
5262017
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
computers & security 39, 2-16, 2013
4812013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust …, 2011
4102011
Toward credible evaluation of anomaly-based intrusion-detection methods
M Tavallaee, N Stakhanova, AA Ghorbani
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
4102010
A survey of visualization systems for network security
H Shiravi, A Shiravi, AA Ghorbani
IEEE Transactions on visualization and computer graphics 18 (8), 1313-1329, 2011
3912011
Network intrusion detection and prevention: concepts and techniques
AA Ghorbani, W Lu, M Tavallaee
Springer Science & Business Media, 2009
3772009
Research on intrusion detection and response: A survey.
P Kabiri, AA Ghorbani
Int. J. Netw. Secur. 1 (2), 84-102, 2005
3772005
Towards effective feature selection in machine learning-based botnet detection approaches
EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani
2014 IEEE Conference on Communications and Network Security, 247-255, 2014
3642014
Toward developing a systematic approach to generate benchmark android malware datasets and classification
AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani
2018 International Carnahan conference on security technology (ICCST), 1-7, 2018
3572018
Application of deep learning to cybersecurity: A survey
S Mahdavifar, AA Ghorbani
Neurocomputing 347, 149-176, 2019
3342019
Towards a reliable intrusion detection benchmark dataset
I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani
Software Networking 2018 (1), 177-200, 2018
3302018
Y-means: A clustering method for intrusion detection
Y Guan, AA Ghorbani, N Belacel
CCECE 2003-Canadian Conference on Electrical and Computer Engineering …, 2003
3132003
The system can't perform the operation now. Try again later.
Articles 1–20