Intrusion Detection and Attack Classification Using Feed-Forward Neural Network F Haddadi, S Khanchi, M Shetabi, V Derhami Computer and Network Technology (ICCNT), 2010 Second International …, 2010 | 95 | 2010 |
Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification F Haddadi, AN Zincir-Heywood IEEE Systems Journal, 2014 | 86 | 2014 |
Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers F Haddadi, J Morgan, EG Filho, AN Zincir-Heywood Advanced Information Networking and Applications Workshops (WAINA), 2014 …, 2014 | 51 | 2014 |
On the effectiveness of different botnet detection approaches F Haddadi, D Le Cong, L Porter, AN Zincir-Heywood Information Security Practice and Experience, 121-135, 2015 | 44 | 2015 |
On botnet behaviour analysis using GP and C4. 5 F Haddadi, D Runkel, AN Zincir-Heywood, MI Heywood Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014 | 41 | 2014 |
Botnet detection system analysis on the effect of botnet evolution and feature representation F Haddadi, AN Zincir-Heywood Proceedings of the Companion Publication of the 2015 Annual Conference on …, 2015 | 27 | 2015 |
Wireless intrusion detection system using a lightweight agent F Haddadi, MA Sarram Second International Conference on Computer and Network Technology, 84-87, 2010 | 27 | 2010 |
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform? F Haddadi, AN Zincir-Heywood International Journal of Network Management, 2017 | 20 | 2017 |
Malicious automatically generated domain name detection using stateful-SBB F Haddadi, HG Kayacik, AN Zincir-Heywood, MI Heywood European Conference on the Applications of Evolutionary Computation, 529-539, 2013 | 20 | 2013 |
How to Choose from Different Botnet Detection Systems? F Haddadi, DT Phan, N Zincir-Heywood AnNet Workshop, IEEE/IFIP Network Operations and Management Symposium, 2016 | 19 | 2016 |
Analyzing string format-based classifiers for botnet detection: GP and SVM F Haddadi, AN Zincir-Heywood Evolutionary Computation (CEC), 2013 IEEE Congress on, 2626-2633, 2013 | 18 | 2013 |
Data confirmation for botnet traffic analysis F Haddadi, AN Zincir-Heywood Proc. 7th Int. Symp. on Foundations and Practice of Security 8930, 329-336, 2015 | 13 | 2015 |
A Closer Look at the HTTP and P2P Based Botnets from a Detector’s Perspective F Haddadi, AN Zincir-Heywood International Symposium on Foundations and Practice of Security, 212-228, 2015 | 7 | 2015 |