Nur Zincir-Heywood
TitleCited byYear
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
3452005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the International Joint Conference on Neural Networks, 2003 …, 2003
2042003
Host-based intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
1692002
Machine learning based encrypted traffic classification: Identifying ssh and skype
R Alshammari, AN Zincir-Heywood
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
1682009
Training genetic programming on half a million patterns: an example from anomaly detection
D Song, MI Heywood, AN Zincir-Heywood
IEEE transactions on evolutionary computation 9 (3), 225-239, 2005
1642005
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
1552007
Clustering event logs using iterative partitioning
AAO Makanju, AN Zincir-Heywood, EE Milios
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
1242009
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
R Alshammari, AN Zincir-Heywood
Computer networks 55 (6), 1326-1350, 2011
1042011
Dynamic intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
The 14th Annual Canadian Information Technology Security Symposium (CITSS), 2002
952002
Evaluation of two systems on multi-class multi-label document classification
X Luo, AN Zincir-Heywood
International Symposium on Methodologies for Intelligent Systems, 161-169, 2005
722005
A linear genetic programming approach to intrusion detection
D Song, MI Heywood, AN Zincir-Heywood
Genetic and Evolutionary Computation Conference, 2325-2336, 2003
702003
Logview: Visualizing event log clusters
A Makanju, S Brooks, AN Zincir-Heywood, EE Milios
2008 Sixth Annual Conference on Privacy, Security and Trust, 99-108, 2008
692008
Eutrophication of shallow lakes with special reference to Lake Taihu, China
B Qin, Z Liu, K Havens
Springer Science & Business Media, 2007
69*2007
World wide web site summarization
Y Zhang, N Zincir-Heywood, E Milios
Web Intelligence and Agent Systems: An International Journal 2 (1), 39-53, 2004
682004
A flow based approach for ssh traffic detection
R Alshammari, AN Zincir-Heywood
2007 IEEE International Conference on Systems, Man and Cybernetics, 296-301, 2007
672007
Narrative text classification for automatic key phrase extraction in web document corpora
Y Zhang, N Zincir-Heywood, E Milios
Proceedings of the 7th annual ACM international workshop on Web information …, 2005
672005
Investigating two different approaches for encrypted traffic classification
R Alshammari, AN Zincir-Heywood
2008 Sixth Annual Conference on Privacy, Security and Trust, 156-166, 2008
512008
Dynamic page based crossover in linear genetic programming
MI Heywood, AN Zincir-Heywood
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002
512002
NetPal: a dynamic network administration knowledge base
A George, A Makanju, E Milios, N Zincir-Heywood, M Latzel, ...
Proceedings of the 2008 conference of the center for advanced studies on …, 2008
502008
A lightweight algorithm for message type extraction in system application logs
A Makanju, AN Zincir-Heywood, EE Milios
IEEE Transactions on Knowledge and Data Engineering 24 (11), 1921-1936, 2011
482011
The system can't perform the operation now. Try again later.
Articles 1–20