Nur Zincir-Heywood
Title
Cited by
Cited by
Year
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
4072005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the International Joint Conference on Neural Networks, 2003 …, 2003
2082003
Machine learning based encrypted traffic classification: Identifying ssh and skype
R Alshammari, AN Zincir-Heywood
2009 IEEE symposium on computational intelligence for security and defense …, 2009
1802009
Training genetic programming on half a million patterns: an example from anomaly detection
D Song, MI Heywood, AN Zincir-Heywood
IEEE transactions on evolutionary computation 9 (3), 225-239, 2005
1742005
Host-based intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
1732002
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
1632007
Clustering event logs using iterative partitioning
AAO Makanju, AN Zincir-Heywood, EE Milios
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
1572009
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
R Alshammari, AN Zincir-Heywood
Computer networks 55 (6), 1326-1350, 2011
1172011
Dynamic intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
The 14th Annual Canadian Information Technology Security Symposium (CITSS), 2002
972002
Eutrophication of shallow lakes with special reference to Lake Taihu, China
B Qin, Z Liu, K Havens
Springer Science & Business Media, 2007
80*2007
World wide web site summarization
Y Zhang, N Zincir-Heywood, E Milios
Web intelligence and agent systems: an international journal 2 (1), 39-53, 2004
782004
Evaluation of two systems on multi-class multi-label document classification
X Luo, AN Zincir-Heywood
International Symposium on Methodologies for Intelligent Systems, 161-169, 2005
752005
Logview: Visualizing event log clusters
A Makanju, S Brooks, AN Zincir-Heywood, EE Milios
2008 Sixth Annual Conference on Privacy, Security and Trust, 99-108, 2008
742008
A linear genetic programming approach to intrusion detection
D Song, MI Heywood, AN Zincir-Heywood
Genetic and Evolutionary Computation Conference, 2325-2336, 2003
742003
A flow based approach for ssh traffic detection
R Alshammari, AN Zincir-Heywood
2007 IEEE international conference on systems, man and cybernetics, 296-301, 2007
722007
Narrative text classification for automatic key phrase extraction in web document corpora
Y Zhang, N Zincir-Heywood, E Milios
Proceedings of the 7th annual ACM international workshop on Web information …, 2005
692005
A lightweight algorithm for message type extraction in system application logs
A Makanju, AN Zincir-Heywood, EE Milios
IEEE Transactions on Knowledge and Data Engineering 24 (11), 1921-1936, 2011
662011
Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification
F Haddadi, AN Zincir-Heywood
IEEE Systems journal 10 (4), 1390-1401, 2014
572014
Investigating two different approaches for encrypted traffic classification
R Alshammari, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 156-166, 2008
542008
Dynamic page based crossover in linear genetic programming
MI Heywood, AN Zincir-Heywood
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002
522002
The system can't perform the operation now. Try again later.
Articles 1–20