Ali Ghorbani
Ali Ghorbani
Professor and Canada Research Chair in Cybersecurity, University of New Brunswick, Canada
Verified email at - Homepage
Cited by
Cited by
A detailed analysis of the KDD CUP 99 data set
M Tavallaee, E Bagheri, W Lu, AA Ghorbani
2009 IEEE symposium on computational intelligence for security and defense …, 2009
Toward generating a new intrusion detection dataset and intrusion traffic characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
ICISSp 1, 108-116, 2018
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani
computers & security 31 (3), 357-374, 2012
Weighted pagerank algorithm
W Xing, A Ghorbani
Proceedings. Second Annual Conference on Communication Networks and Services …, 2004
Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani
Proceedings of the 2nd international conference on information systems …, 2016
An overview of online fake news: Characterization, detection, and discussion
X Zhang, AA Ghorbani
Information Processing & Management 57 (2), 102025, 2020
Characterization of tor traffic using time based features
AH Lashkari, GD Gil, MSI Mamun, AA Ghorbani
International Conference on Information Systems Security and Privacy 2, 253-262, 2017
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani
2019 International Carnahan Conference on Security Technology (ICCST), 1-8, 2019
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE access 5, 3302-3312, 2017
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
computers & security 39, 2-16, 2013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust …, 2011
A survey of visualization systems for network security
H Shiravi, A Shiravi, AA Ghorbani
IEEE Transactions on visualization and computer graphics 18 (8), 1313-1329, 2011
Research on intrusion detection and response: A survey.
P Kabiri, AA Ghorbani
Int. J. Netw. Secur. 1 (2), 84-102, 2005
Toward credible evaluation of anomaly-based intrusion-detection methods
M Tavallaee, N Stakhanova, AA Ghorbani
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
Network intrusion detection and prevention: concepts and techniques
AA Ghorbani, W Lu, M Tavallaee
Springer Science & Business Media, 2009
Towards effective feature selection in machine learning-based botnet detection approaches
EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani
2014 IEEE Conference on Communications and Network Security, 247-255, 2014
Y-means: A clustering method for intrusion detection
Y Guan, AA Ghorbani, N Belacel
CCECE 2003-Canadian Conference on Electrical and Computer Engineering …, 2003
Network anomaly detection based on wavelet analysis
W Lu, AA Ghorbani
EURASIP Journal on Advances in Signal Processing 2009, 1-16, 2008
Application of deep learning to cybersecurity: A survey
S Mahdavifar, AA Ghorbani
Neurocomputing 347, 149-176, 2019
Towards a reliable intrusion detection benchmark dataset
I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani
Software Networking 2017 (1), 177-200, 2017
The system can't perform the operation now. Try again later.
Articles 1–20