Follow
Nur Zincir-Heywood
Nur Zincir-Heywood
Professor of Computer Science, Dalhousie University
Verified email at cs.dal.ca - Homepage
Title
Cited by
Cited by
Year
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
5582005
Clustering event logs using iterative partitioning
AAO Makanju, AN Zincir-Heywood, EE Milios
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4062009
Machine learning based encrypted traffic classification: Identifying ssh and skype
R Alshammari, AN Zincir-Heywood
2009 IEEE symposium on computational intelligence for security and defense …, 2009
2932009
Host-based intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
2572002
On the capability of an SOM based intrusion detection system
HG Kayacık, AN Zincir-Heywood, MI Heywood
IEEE-INNS International Joint Conference on Neural Networks. Pp 1808-1813, 2003., 2003
2292003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
2272007
Training genetic programming on half a million patterns: an example from anomaly detection
D Song, MI Heywood, AN Zincir-Heywood
IEEE transactions on evolutionary computation 9 (3), 225-239, 2005
2022005
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
R Alshammari, AN Zincir-Heywood
Computer networks 55 (6), 1326-1350, 2011
1902011
A lightweight algorithm for message type extraction in system application logs
A Makanju, AN Zincir-Heywood, EE Milios
IEEE Transactions on Knowledge and Data Engineering 24 (11), 1921-1936, 2011
1752011
Analyzing data granularity levels for insider threat detection using machine learning
DC Le, N Zincir-Heywood, MI Heywood
IEEE Transactions on Network and Service Management 17 (1), 30-44, 2020
1432020
World wide web site summarization
Y Zhang, N Zincir-Heywood, E Milios
Web intelligence and agent systems: an international journal 2 (1), 39-53, 2004
1312004
NetPal: A Dynamic Network Administration Knowledge Base
A George, A Makanju, E Milios, N Zincir-Heywood, M Latzel, ...
Proceedings of the 2008 conference of the center for advanced studies on …, 2008
1142008
A flow based approach for SSH traffic detection
R Alshammari, AN Zincir-Heywood
2007 IEEE international conference on systems, man and cybernetics, 296-301, 2007
952007
Evaluation of two systems on multi-class multi-label document classification
X Luo, AN Zincir-Heywood
International Symposium on Methodologies for Intelligent Systems, 161-169, 2005
952005
Exploring feature normalization and temporal information for machine learning based insider threat detection
P Ferreira, DC Le, N Zincir-Heywood
2019 15th International Conference on Network and Service Management (CNSM), 1-7, 2019
912019
Logview: Visualizing event log clusters
A Makanju, S Brooks, AN Zincir-Heywood, EE Milios
2008 Sixth Annual Conference on Privacy, Security and Trust, 99-108, 2008
912008
Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification
F Haddadi, AN Zincir-Heywood
IEEE Systems journal 10 (4), 1390-1401, 2014
872014
Anomaly detection for insider threats using unsupervised ensembles
DC Le, N Zincir-Heywood
IEEE Transactions on Network and Service Management 18 (2), 1152-1164, 2021
852021
Narrative text classification for automatic key phrase extraction in web document corpora
Y Zhang, N Zincir-Heywood, E Milios
Proceedings of the 7th annual ACM international workshop on Web information …, 2005
852005
A linear genetic programming approach to intrusion detection
D Song, MI Heywood, AN Zincir-Heywood
Genetic and Evolutionary Computation—GECCO 2003: Genetic and Evolutionary …, 2003
832003
The system can't perform the operation now. Try again later.
Articles 1–20