default search action
Ali A. Ghorbani 0001
Person information
- affiliation: University of New Brunswick, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j113]Samuel Ansong, Windhya Rankothge, Somayeh Sadeghi, Hesamodin Mohammadian, Farrukh Bin Rashid, Ali A. Ghorbani:
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications. Comput. Secur. 149: 104156 (2025) - 2024
- [j112]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani:
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective. Comput. Commun. 213: 61-77 (2024) - [j111]Yoonjib Kim, Saqib Hakak, Ali A. Ghorbani:
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure. Comput. Secur. 144: 103989 (2024) - [j110]Alireza Zohourian, Sajjad Dadkhah, Heather Molyneaux, Euclides Carlos Pinto Neto, Ali A. Ghorbani:
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks. Comput. Secur. 146: 104034 (2024) - [j109]Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. Int. J. Inf. Sec. 23(2): 887-913 (2024) - [j108]Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis. Inf. 15(2): 102 (2024) - [j107]Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, Shahrear Iqbal, Pulei Xiong, Taufiq Rahman, Ali A. Ghorbani:
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet Things 26: 101209 (2024) - [j106]Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, Reginald C. Molokwu, Somayeh Sadeghi, Ali A. Ghorbani:
CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT. Internet Things 28: 101351 (2024) - [j105]Priscilla Kyei Danso, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Alireza Zohourian, Heather Molyneaux, Rongxing Lu, Ali A. Ghorbani:
Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification. IEEE Internet Things J. 11(2): 2322-2335 (2024) - [j104]Xichen Zhang, Roozbeh Razavi-Far, Haruna Isah, Amir David, Griffin Higgins, Rongxing Lu, Ali A. Ghorbani:
Area in circle: A novel evaluation metric for object detection. Knowl. Based Syst. 293: 111684 (2024) - [j103]Amin Mirlohi, Jalehsadat Mahdavimoghaddam, Jelena Jovanovic, Feras N. Al-Obeidat, Mehdi Khani, Ali A. Ghorbani, Ebrahim Bagheri:
Social Alignment Contagion in Online Social Networks. IEEE Trans. Comput. Soc. Syst. 11(1): 399-417 (2024) - [j102]Xichen Zhang, Sajjad Dadkhah, Alexander Gerald Weismann, Mohammad Amin Kanaani, Ali A. Ghorbani:
Multimodal Fake News Analysis Based on Image-Text Similarity. IEEE Trans. Comput. Soc. Syst. 11(1): 959-972 (2024) - [j101]Sajjad Dadkhah, Xichen Zhang, Alexander Gerald Weismann, Amir Firouzi, Ali A. Ghorbani:
The Largest Social Media Ground-Truth Dataset for Real/Fake Content: TruthSeeker. IEEE Trans. Comput. Soc. Syst. 11(3): 3376-3390 (2024) - [j100]Asma Sormeily, Sajjad Dadkhah, Xichen Zhang, Ali A. Ghorbani:
MEFaND: A Multimodel Framework for Early Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 5337-5353 (2024) - [j99]Soheil Shirvani, Yaser Baseri, Ali A. Ghorbani:
Evaluation Framework for Electric Vehicle Security Risk Assessment. IEEE Trans. Intell. Transp. Syst. 25(1): 33-56 (2024) - [j98]Samaneh Mahdavifar, Ali A. Ghorbani:
CapsRule: Explainable Deep Learning for Classifying Network Attacks. IEEE Trans. Neural Networks Learn. Syst. 35(9): 12434-12448 (2024) - [j97]Mahdi Rabbani, Leila Rashidi, Ali A. Ghorbani:
A Graph Learning-Based Approach for Lateral Movement Detection. IEEE Trans. Netw. Serv. Manag. 21(5): 5361-5373 (2024) - [c170]Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, Raphael Ferreira:
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024. DBSec 2024: 171-190 - [c169]Chansu Han, Akira Tanaka, Takeshi Takahashi, Sajjad Dadkhah, Ali A. Ghorbani, Tsung-Nan Lin:
Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet. DSC 2024: 17-22 - [i8]Yaser Baseri, Vikas Chouhan, Ali A. Ghorbani, Aaron Chow:
Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration. CoRR abs/2404.08231 (2024) - [i7]Yaser Baseri, Vikas Chouhan, Ali A. Ghorbani:
Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure. CoRR abs/2404.10659 (2024) - [i6]Erfan Ghiasvand, Suprio Ray, Shahrear Iqbal, Sajjad Dadkhah, Ali A. Ghorbani:
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment. CoRR abs/2407.11278 (2024) - [i5]Farrukh Bin Rashid, Windhya Hansinie Rankothge, Somayeh Sadeghi, Hesamodin Mohammadian, Ali A. Ghorbani:
Privacy-Preserving for Images in Satellite Communications: A Comprehensive Review of Chaos-Based Encryption. CoRR abs/2410.21177 (2024) - 2023
- [j96]Hesamodin Mohammadian, Ali A. Ghorbani, Arash Habibi Lashkari:
A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems. Appl. Soft Comput. 137: 110173 (2023) - [j95]Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Philippe Lamontagne, Suprio Ray, Ali A. Ghorbani:
Internet of Things (IoT) security dataset evolution: Challenges and future directions. Internet Things 22: 100780 (2023) - [j94]Alireza Zohourian, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Hassan Mahdikhani, Priscilla Kyei Danso, Heather Molyneaux, Ali A. Ghorbani:
IoT Zigbee device security: A comprehensive review. Internet Things 22: 100791 (2023) - [j93]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Suprio Ray, Ali A. Ghorbani:
Security issues in Internet of Vehicles (IoV): A comprehensive survey. Internet Things 22: 100809 (2023) - [j92]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Raphael Ferreira, Alireza Zohourian, Rongxing Lu, Ali A. Ghorbani:
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 23(13): 5941 (2023) - [c168]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol. BigDataSecurity/HPSC/IDS 2023: 122-129 - [c167]Priscilla Kyei Danso, Heather Molyneaux, Alireza Zohourian, Euclides Carlos Pinto Neto, Derrick Whalen, Sajjad Dadkhah, Ali A. Ghorbani:
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment. HCI (35) 2023: 622-642 - [c166]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach. PST 2023: 1-12 - [c165]Rashid Hussain Khokhar, Sajjad Dadkhah, Tianhao Zhao, Xichen Zhang, Ali A. Ghorbani:
UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor. PST 2023: 1-11 - [c164]Yoonjib Kim, Saqib Hakak, Ali A. Ghorbani:
DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure. PST 2023: 1-9 - [c163]Leila Rashidi, Windhya Hansinie Rankothge, Hesamodin Mohammadian, Rashid Hussain Khokhar, Brian Frei, Shawn Ellis, Lago Freitas, Ali Akbar Ghorbani:
Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment. PST 2023: 1-10 - [c162]Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Evaluating Label Flipping Attack in Deep Learning-Based NIDS. SECRYPT 2023: 597-603 - 2022
- [j91]Wajiha Shahid, Yiran Li, Dakota Staples, Gulshan Amin Gilkar, Saqib Hakak, Ali A. Ghorbani:
Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders. IEEE Access 10: 27069-27083 (2022) - [j90]Mohammed Aldarwbi, Ali A. Ghorbani, Arash Habibi Lashkari:
QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution. IEEE Access 10: 107685-107702 (2022) - [j89]Mohammed Aldarwbi, Arash Habibi Lashkari, Ali A. Ghorbani:
The sound of intrusion: A novel network intrusion detection system. Comput. Electr. Eng. 104(Part): 108455 (2022) - [j88]Mahdi Daghmehchi Firoozjaei, Nastaran Mahmoudyar, Yaser Baseri, Ali A. Ghorbani:
An evaluation framework for industrial control system cyber incidents. Int. J. Crit. Infrastructure Prot. 36: 100487 (2022) - [j87]Xichen Zhang, Mohammad Mehdi Yadollahi, Sajjad Dadkhah, Haruna Isah, Duc-Phong Le, Ali A. Ghorbani:
Data breach: analysis, countermeasures and challenges. Int. J. Inf. Comput. Secur. 19(3/4): 402-442 (2022) - [j86]Xichen Zhang, Sajjad Dadkhah, Samaneh Mahdavifar, Rongxing Lu, Ali A. Ghorbani:
An entity matching-based image topic verification framework for online fact-checking. Int. J. Multim. Intell. Secur. 4(1): 65-85 (2022) - [j85]Xichen Zhang, Rongxing Lu, Jun Shao, Fengwei Wang, Hui Zhu, Ali A. Ghorbani:
FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing. IEEE Internet Things J. 9(7): 5344-5356 (2022) - [j84]Hamid Azimy, Ali A. Ghorbani, Ebrahim Bagheri:
Preventing proof-of-work mining attacks. Inf. Sci. 608: 1503-1523 (2022) - [j83]Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani:
Improved fault analysis on SIMECK ciphers. J. Cryptogr. Eng. 12(2): 169-180 (2022) - [j82]Samaneh Mahdavifar, Dima Alhadidi, Ali A. Ghorbani:
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder. J. Netw. Syst. Manag. 30(1): 22 (2022) - [j81]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
A Trust-Influenced Smart Grid: A Survey and a Proposal. J. Sens. Actuator Networks 11(3): 34 (2022) - [j80]Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. IEEE Trans. Dependable Secur. Comput. 19(1): 591-606 (2022) - [j79]Miraqa Safi, Sajjad Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, Ali A. Ghorbani:
A Survey on IoT Profiling, Fingerprinting, and Identification. ACM Trans. Internet Things 3(4): 26:1-26:39 (2022) - [c161]Mahdi Abrishami, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study. FRUCT 2022: 3-14 - [c160]Xichen Zhang, Rongxing Lu, Songnian Zhang, Suprio Ray, Ali A. Ghorbani:
Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints. ICC 2022: 4384-4389 - [c159]Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Evaluating Deep Learning-based NIDS in Adversarial Settings. ICISSP 2022: 435-444 - [c158]Toluwalope David Akande, Barjinder Kaur, Sajjad Dadkhah, Ali A. Ghorbani:
Threshold based Technique to Detect Anomalies using Log Files. ICMLT 2022: 191-198 - [c157]Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani:
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset. PST 2022: 1-11 - [c156]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Ali A. Ghorbani:
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning. PST 2022: 1-10 - [c155]Xichen Zhang, Songnian Zhang, Suprio Ray, Ali A. Ghorbani:
Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories. PST 2022: 1-8 - 2021
- [j78]Sajjad Dadkhah, Farzaneh Shoeleh, Mohammad Mehdi Yadollahi, Xichen Zhang, Ali A. Ghorbani:
A real-time hostile activities analyses and detection system. Appl. Soft Comput. 104: 107175 (2021) - [j77]Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani:
Classifying and clustering malicious advertisement uniform resource locators using deep learning. Comput. Intell. 37(1): 511-537 (2021) - [j76]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
A memory-based game-theoretic defensive approach for digital forensic investigators. Digit. Investig. 38: 301214 (2021) - [j75]Hassan Mahdikhani, Rongxing Lu, Jun Shao, Ali A. Ghorbani:
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT. IEEE Internet Things J. 8(6): 4762-4774 (2021) - [j74]Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani:
Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing. IEEE Internet Things J. 8(14): 11758-11772 (2021) - [j73]Seyed Amin Mirlohi Falavarjani, Jelena Jovanovic, Hossein Fani, Ali A. Ghorbani, Zeinab Noorian, Ebrahim Bagheri:
On the causal relation between real world activities and emotional expressions of social media users. J. Assoc. Inf. Sci. Technol. 72(6): 723-743 (2021) - [j72]Mohammed Aldarwbi, Ali A. Ghorbani, Arash Habibi Lashkari:
KeyShield: A Scalable and Quantum-Safe Key Management Scheme. IEEE Open J. Commun. Soc. 2: 87-101 (2021) - [j71]Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani:
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud. IEEE Trans. Serv. Comput. 14(5): 1292-1305 (2021) - [c154]Barjinder Kaur, Sajjad Dadkhah, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
Verification Based Scheme to Restrict IoT Attacks. BDCAT 2021: 63-68 - [c153]Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani:
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency. DASC/PiCom/CBDCom/CyberSciTech 2021: 574-581 - [c152]Masoud Erfani, Farzaneh Shoeleh, Sajjad Dadkhah, Barjinder Kaur, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
A feature exploration approach for IoT attack type classification. DASC/PiCom/CBDCom/CyberSciTech 2021: 582-588 - [c151]Xichen Zhang, Rongxing Lu, Suprio Ray, Jun Shao, Ali A. Ghorbani:
Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing. GLOBECOM 2021: 1-6 - [c150]Miraqa Safi, Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Arash Habibi Lashkari, Heather Molyneaux, Ali A. Ghorbani:
Behavioural Monitoring and Security Profiling in the Internet of Things (IoT). HPCC/DSS/SmartCity/DependSys 2021: 1203-1210 - [c149]Hamid Azimy, Ali A. Ghorbani:
Alternative Difficulty Adjustment Algorithms for Preventing Selfish Mining Attack. ICBC 2021: 59-73 - [c148]Abu Hena Al Muktadir, Ida S. R. Siahaan, Kwasi Boakye-Boateng, Dongyang Xu, Ali A. Ghorbani:
Recommending Location for Placing Data Collector in the OPC Classic. ICPS 2021: 158-165 - [c147]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
RiskISM: A Risk Assessment Tool for Substations. iSCI 2021: 23-30 - [c146]Kwasi Boakye-Boateng, Ida S. R. Siahaan, Abu Hena Al Muktadir, Dongyang Xu, Ali A. Ghorbani:
Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection. ISGT-Europe 2021: 1-6 - [c145]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
A Novel Trust Model In Detecting Final-Phase Attacks in Substations. PST 2021: 1-11 - [c144]Farzaneh Shoeleh, Masoud Erfani, Saeed Shafiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani:
User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security. PST 2021: 1-10 - [c143]Mohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani:
Towards Query-efficient Black-box Adversarial Attack on Text Classification Models. PST 2021: 1-7 - [i4]Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani:
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency. CoRR abs/2103.05590 (2021) - 2020
- [j70]Duc-Phong Le, Ali A. Ghorbani:
Memory-Efficient Random Order Exponentiation Algorithm. IEEE Access 8: 146923-146931 (2020) - [j69]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
A game-theoretic defensive approach for forensic investigators against rootkits. Digit. Investig. 33: 200909 (2020) - [j68]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour. Digit. Investig. 35: 301024 (2020) - [j67]Hassan Mahdikhani, Rongxing Lu, Yandong Zheng, Jun Shao, Ali A. Ghorbani:
Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT. IEEE Internet Things J. 7(6): 5220-5232 (2020) - [j66]Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani:
Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS. IEEE Internet Things J. 7(12): 11524-11535 (2020) - [j65]Xichen Zhang, Ali A. Ghorbani:
An overview of online fake news: Characterization, detection, and discussion. Inf. Process. Manag. 57(2): 102025 (2020) - [j64]Samaneh Mahdavifar, Ali A. Ghorbani:
DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput. Appl. 32(18): 14753-14780 (2020) - [j63]Mahdi Daghmehchi Firoozjaei, Rongxing Lu, Ali A. Ghorbani:
An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms. Secur. Priv. 3(6) (2020) - [j62]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, JaeSeung Song:
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms. Sensors 20(3): 928 (2020) - [c142]Masoud Erfani, Farzaneh Shoeleh, Ali A. Ghorbani:
Financial Fraud Detection using Deep Support Vector Data Description. IEEE BigData 2020: 2274-2282 - [c141]Shubhangi Upadhyay, Ali A. Ghorbani:
Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs). DASC/PiCom/CBDCom/CyberSciTech 2020: 399-405 - [c140]Samaneh Mahdavifar, Andi Fitriah Abdul Kadir, Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani:
Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning. DASC/PiCom/CBDCom/CyberSciTech 2020: 515-522 - [c139]Farzaneh Shoeleh, Masoud Erfani, Duc-Phong Le, Ali A. Ghorbani:
Ensemble of Hierarchical Temporal Memory for Anomaly Detection. DSAA 2020: 50-59 - [c138]Mehrgan Khoshpasand, Ali A. Ghorbani:
On The Generation of Unrestricted Adversarial Examples. DSN Workshops 2020: 9-15 - [c137]Hassan Mahdikhani, Rongxing Lu, Yandong Zheng, Ali A. Ghorbani:
Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter. ICC 2020: 1-6 - [i3]Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani:
Improved Fault Analysis on SIMECK Ciphers. CoRR abs/2010.05296 (2020) - [i2]Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani:
Improved Fault Analysis on SIMECK Ciphers. IACR Cryptol. ePrint Arch. 2020: 1263 (2020)
2010 – 2019
- 2019
- [j61]Hassan Mahdikhani, Samaneh Mahdavifar, Rongxing Lu, Hui Zhu, Ali A. Ghorbani:
Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT. IEEE Access 7: 184438-184447 (2019) - [j60]Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
An evaluation framework for network security visualizations. Comput. Secur. 84: 70-92 (2019) - [j59]Beibei Li, Rongxing Lu, Gaoxi Xiao, Haiyong Bao, Ali A. Ghorbani:
Towards insider threats detection in smart grid communication systems. IET Commun. 13(12): 1728-1736 (2019) - [j58]Samaneh Mahdavifar, Ali A. Ghorbani:
Application of deep learning to cybersecurity: A survey. Neurocomputing 347: 149-176 (2019) - [j57]Fatemeh Lashkari, Ebrahim Bagheri, Ali A. Ghorbani:
Neural embedding-based indices for semantic search. Inf. Process. Manag. 56(3): 733-755 (2019) - [j56]Seyed Amin Mirlohi Falavarjani, Fattane Zarrinkalam, Jelena Jovanovic, Ebrahim Bagheri, Ali A. Ghorbani:
The reflection of offline activities on users' online social behavior: An observational study. Inf. Process. Manag. 56(6) (2019) - [j55]Arash Habibi Lashkari, Min Chen, Ali A. Ghorbani:
A Survey on User Profiling Model forAnomaly Detection in Cyberspace. J. Cyber Secur. Mobil. 8(1): 75-112 (2019) - [c136]Seyed Amin Mirlohi Falavarjani, Ebrahim Bagheri, Ssu Yu Zoe Chou, Jelena Jovanovic, Ali A. Ghorbani:
On the causal relation between users' real-world activities and their affective processes. ASONAM 2019: 311-314 - [c135]Shlomi Linoy, Hassan Mahdikhani, Suprio Ray, Rongxing Lu, Natalia Stakhanova, Ali A. Ghorbani:
Scalable Privacy-Preserving Query Processing over Ethereum Blockchain. Blockchain 2019: 398-404 - [c134]Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani:
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. ICCST 2019: 1-8 - [c133]Nasim Maleki, Ali A. Ghorbani:
Generating Phishing Emails Using Graph Database. ISPEC 2019: 434-449 - [c132]Hamid Azimy, Ali A. Ghorbani:
Competitive Selfish Mining. PST 2019: 1-8 - [c131]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, Jaeseung Song:
EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging. PST 2019: 1-5 - [c130]Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
A New Multisignature Scheme with Public Key Aggregation for Blockchain. PST 2019: 1-7 - [c129]Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani:
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing. WCSP 2019: 1-6 - [i1]Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
DDH-based Multisignatures with Public Key Aggregation. IACR Cryptol. ePrint Arch. 2019: 771 (2019) - 2018
- [j54]Wei Guo, Jun Shao, Rongxing Lu, Yi-Ning Liu, Ali A. Ghorbani:
A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment. IEEE Access 6: 48946-48957 (2018) - [j53]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Atsuko Miyaji, Uyen Trang Nguyen:
SupAUTH: A new approach to supply chain authentication for the IoT. Comput. Intell. 34(2): 582-602 (2018) - [j52]Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali A. Ghorbani:
OTP-IoT: An ownership transfer protocol for the Internet of Things. J. Inf. Secur. Appl. 43: 73-82 (2018) - [j51]Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali A. Ghorbani:
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges. J. Cyber Secur. Mobil. 7(3): 1-52 (2018) - [c128]Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
Authorship Attribution of Android Apps. CODASPY 2018: 277-286 - [c127]Beibei Li, Rongxing Lu, Gaoxi Xiao, Zhou Su, Ali A. Ghorbani:
PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids. GLOBECOM 2018: 1-6 - [c126]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals. ICCST 2018: 1-6 - [c125]Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Laya Taheri, Ali A. Ghorbani:
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. ICCST 2018: 1-7 - [c124]Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. ICISSP 2018: 108-116 - [c123]Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
A Detailed Analysis of the CICIDS2017 Data Set. ICISSP (Revised Selected Papers) 2018: 172-188 - [c122]Iman Sharafaldin, Ali A. Ghorbani:
EagleEye: A Novel Visual Anomaly Detection Method. PST 2018: 1-6 - [e8]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - [e7]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018, ISBN 978-3-319-78812-8 [contents] - [e6]Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239, Springer 2018, ISBN 978-3-319-78815-9 [contents] - 2017
- [j50]Rongxing Lu, Kevin Heung, Arash Habibi Lashkari, Ali A. Ghorbani:
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 5: 3302-3312 (2017) - [j49]Hossein Hadian Jazi, Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput. Networks 121: 25-36 (2017) - [j48]Fatemeh Lashkari, Faezeh Ensan, Ebrahim Bagheri, Ali A. Ghorbani:
Efficient indexing for semantic search. Expert Syst. Appl. 73: 92-114 (2017) - [c121]Ramanpreet Singh, Ali A. Ghorbani:
EfficientPMM: Finite Automata Based Efficient Pattern Matching Machine. ICCS 2017: 1060-1070 - [c120]Arash Habibi Lashkari, Gerard Draper-Gil, Jonathan Edward Keenan, Kenneth Fon Mbah, Ali A. Ghorbani:
A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection. ICCNS 2017: 59-66 - [c119]Arash Habibi Lashkari, Amy Seo, Gerard Drapper Gil, Ali A. Ghorbani:
CIC-AB: Online ad blocker for browsers. ICCST 2017: 1-7 - [c118]Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari, Ali A. Ghorbani:
BotViz: A memory forensic-based botnet detection and visualization approach. ICCST 2017: 1-8 - [c117]Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Tor Traffic using Time based Features. ICISSP 2017: 253-262 - [c116]Amirhossein Gharib, Ali A. Ghorbani:
DNA-Droid: A Real-Time Android Ransomware Detection Framework. NSS 2017: 184-198 - [c115]Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani:
Towards a Network-Based Framework for Android Malware Detection and Characterization. PST 2017: 233-234 - [c114]Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani:
A Lightweight Online Advertising Classification System using Lexical-based Features. SECRYPT 2017: 486-494 - 2016
- [j47]Kamran Morovati, Sanjay Kadam, Ali A. Ghorbani:
A network based document management model to prevent data extrusion. Comput. Secur. 59: 71-91 (2016) - [j46]Mehrnaz Ghashghaei, Ebrahim Bagheri, John Cuzzola, Ali A. Ghorbani, Zeinab Noorian:
Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content. Int. J. Semantic Comput. 10(1): 121- (2016) - [j45]Abdullah J. Alzahrani, Ali A. Ghorbani:
SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents. J. Cyber Secur. Mobil. 5(2): 47-74 (2016) - [c113]Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Encrypted and VPN Traffic using Time-related Features. ICISSP 2016: 407-414 - [c112]Abdullah J. Alzahrani, Ali A. Ghorbani:
SMS-Based Mobile Botnet Detection Module. ICITCS 2016: 1-7 - [c111]Abdullah J. Alzahrani, Ali A. Ghorbani:
Towards Android malware detection using intelligent agents. ISAMSR 2016: 1-8 - [c110]Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani:
Detecting Malicious URLs Using Lexical Analysis. NSS 2016: 467-482 - [c109]Hossein Hadian Jazi, Ali A. Ghorbani:
Dynamic graph-based malware classifier. PST 2016: 112-120 - [c108]Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
Measuring code reuse in Android apps. PST 2016: 187-195 - [c107]Fatemeh Razzaghi, Hamed Minaee, Ali A. Ghorbani:
Context Free Frequently Asked Questions Detection Using Machine Learning Techniques. WI 2016: 558-561 - 2015
- [j44]Georgios Mantas, Natalia Stakhanova, Hugo Gonzalez, Hossein Hadian Jazi, Ali A. Ghorbani:
Application-layer denial of service attacks: taxonomy and survey. Int. J. Inf. Comput. Secur. 7(2/3/4): 216-239 (2015) - [c106]Marc Antoine Gosselin-Lavigne, Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters. ARES 2015: 516-521 - [c105]Hugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Abdullah J. Alzahrani, Ali A. Ghorbani:
Exploring reverse engineering symptoms in Android apps. EUROSEC 2015: 7:1-7:7 - [c104]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova:
An Entropy Based Encrypted Traffic Classifier. ICICS 2015: 282-294 - [c103]Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani:
Android Botnets: What URLs are Telling Us. NSS 2015: 78-91 - [c102]Abdullah J. Alzahrani, Ali A. Ghorbani:
Real-time signature-based detection approach for SMS botnet. PST 2015: 157-164 - [c101]Mehrnaz Ghashghaei, John Cuzzola, Ebrahim Bagheri, Ali A. Ghorbani:
Semantic Annotation of Quantitative Textual Content. LD4IE@ISWC 2015: 20-33 - [e5]Ali A. Ghorbani, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir:
13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7828-4 [contents] - 2014
- [j43]Abdullah J. Alzahrani, Nataliav Stakhanoa, Hugo Gonzalez, Ali A. Ghorbani:
Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones. J. Cyber Secur. Mobil. 3(2): 89-132 (2014) - [j42]Julian L. Rrushi, Ali A. Ghorbani:
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management. J. Comput. Virol. Hacking Tech. 10(1): 29-51 (2014) - [c100]Elaheh Biglar Beigi Samani, Hossein Hadian Jazi, Natalia Stakhanova, Ali A. Ghorbani:
Towards effective feature selection in machine learning-based botnet detection approaches. CNS 2014: 247-255 - [c99]Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
DroidKin: Lightweight Detection of Android Apps Similarity. SecureComm (1) 2014: 436-453 - 2013
- [j41]David Zhao, Issa Traoré, Bassam Sayed, Wei Lu, Sherif Saad, Ali A. Ghorbani, Daniel Garant:
Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39: 2-16 (2013) - [j40]Mehdi Bateni, Ahmad Baraani, Ali A. Ghorbani:
Using Artificial Immune System and Fuzzy Logic for Alert Correlation. Int. J. Netw. Secur. 15(3): 190-204 (2013) - [c98]Abtin Zohrabi Aliabadi, Fatemeh Razzaghi, Seyed Pooria Madani Kochak, Ali A. Ghorbani:
Classifying Organizational Roles Using Email Social Networks. Canadian AI 2013: 301-307 - [c97]Mostafa Karamibekr, Ali A. Ghorbani:
Lexical-Syntactical Patterns for Subjectivity Analysis of Social Issues. AMT 2013: 241-250 - [c96]Saeed Nari, Ali A. Ghorbani:
Automated malware classification based on network behavior. ICNC 2013: 642-647 - [c95]Mostafa Karamibekr, Ali A. Ghorbani:
A Structure for Opinion in Social Domains. SocialCom 2013: 264-271 - [c94]Mostafa Karamibekr, Ali A. Ghorbani:
Sentence Subjectivity Analysis in Social Domains. Web Intelligence 2013: 268-275 - [e4]Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang:
Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5839-2 [contents] - 2012
- [j39]Mahboobeh Soleimani, Ali A. Ghorbani:
Multi-layer episode filtering for the multi-step attack detection. Comput. Commun. 35(11): 1368-1379 (2012) - [j38]Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani:
Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3): 357-374 (2012) - [j37]Mehdi Bateni, Ahmad Baraani, Ali A. Ghorbani:
Alert correlation using artificial immune recognition system. Int. J. Bio Inspired Comput. 4(3): 181-195 (2012) - [j36]John Zhong Lei, Ali A. Ghorbani:
Improved competitive learning neural networks for network intrusion and fraud detection. Neurocomputing 75(1): 135-145 (2012) - [j35]Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani:
A Survey of Visualization Systems for Network Security. IEEE Trans. Vis. Comput. Graph. 18(8): 1313-1329 (2012) - [c93]John Felix Charles Joseph, Ali A. Ghorbani:
Group Behavior Metrics for P2P Botnet Detection. ICICS 2012: 93-104 - [c92]Mohammed S. Gadelrab, Ali A. Ghorbani:
A New Framework for Publishing and Sharing Network and Security Datasets. SC Companion 2012: 539-546 - [c91]David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu:
Peer to Peer Botnet Detection Based on Flow Intervals. SEC 2012: 87-102 - [c90]Mostafa Karamibekr, Ali A. Ghorbani:
Sentiment Analysis of Social Issues. SocialInformatics 2012: 215-221 - [c89]Mostafa Karamibekr, Ali A. Ghorbani:
Verb Oriented Sentiment Classification. Web Intelligence 2012: 327-331 - [e3]Runhe Huang, Ali A. Ghorbani, Gabriella Pasi, Takahira Yamaguchi, Neil Y. Yen, Beijing Jin:
Active Media Technology - 8th International Conference, AMT 2012, Macau, China, December 4-7, 2012. Proceedings. Lecture Notes in Computer Science 7669, Springer 2012, ISBN 978-3-642-35235-5 [contents] - 2011
- [j34]Wei Lu, Goaletsa Rammidi, Ali A. Ghorbani:
Clustering botnet communication traffic based on n-gram feature selection. Comput. Commun. 34(3): 502-514 (2011) - [j33]Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani:
Estimating botnet virulence within mathematical models of botnet propagation dynamics. Comput. Secur. 30(8): 791-802 (2011) - [c88]Ali A. Ghorbani:
People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues. AMT 2011: 1 - [c87]Ali A. Ghorbani:
People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues. Brain Informatics 2011: 21 - [c86]Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani:
A statistical approach to botnet virulence estimation. AsiaCCS 2011: 508-512 - [c85]John Felix Charles Joseph, Ali A. Ghorbani:
VisVerND: Visual Verification of Network Traffic Dataset. CNSR 2011: 56-62 - [c84]Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani:
Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation. ICICS 2011: 399-413 - [c83]Natalia Stakhanova, Mathieu Couture, Ali A. Ghorbani:
Exploring network-based malware classification. MALWARE 2011: 14-20 - [c82]Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian:
Detecting P2P botnets through network behavior analysis and machine learning. PST 2011: 174-180 - [e2]Ning Zhong, Vic Callaghan, Ali A. Ghorbani, Bin Hu:
Active Media Technology - 7th International Conference, AMT 2011, Lanzhou, China, September 7-9, 2011. Proceedings. Lecture Notes in Computer Science 6890, Springer 2011, ISBN 978-3-642-23619-8 [contents] - 2010
- [b1]Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee:
Network Intrusion Detection and Prevention - Concepts and Techniques. Advances in Information Security 47, Springer 2010, ISBN 978-0-387-88770-8, pp. 1-198 - [j32]Ebrahim Bagheri, Ali A. Ghorbani:
An exploratory classification of applications in the realm of collaborative modeling and design. Inf. Syst. E Bus. Manag. 8(3): 257-286 (2010) - [j31]Ebrahim Bagheri, Ali A. Ghorbani:
UML-CI: A reference model for profiling critical infrastructure systems. Inf. Syst. Frontiers 12(2): 115-139 (2010) - [j30]Ebrahim Bagheri, Ali A. Ghorbani:
The analysis and management of non-canonical requirement specifications through a belief integration game. Knowl. Inf. Syst. 22(1): 27-64 (2010) - [j29]Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorbani:
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods. IEEE Trans. Syst. Man Cybern. Part C 40(5): 516-524 (2010) - [j28]Ebrahim Bagheri, Ali A. Ghorbani:
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games. IEEE Trans. Syst. Man Cybern. Part A 40(6): 1257-1270 (2010) - [c81]Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. Ghorbani:
Automatic Discovery of Network Applications: A Hybrid Approach. Canadian AI 2010: 208-219 - [c80]Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani:
An Online Adaptive Approach to Alert Correlation. DIMVA 2010: 153-172 - [c79]Natalia Stakhanova, Ali A. Ghorbani:
Managing intrusion detection rule sets. EUROSEC 2010: 29-35 - [c78]Ali A. Ghorbani, Iosif-Viorel Onut:
Y-Means: An Autonomous Clustering Algorithm. HAIS (1) 2010: 1-13 - [c77]Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani:
IDS Alert Visualization and Monitoring through Heuristic Host Selection. ICICS 2010: 445-458 - [c76]Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani:
Selective Regular Expression Matching. ISC 2010: 226-240 - [e1]Jimmy Xiangji Huang, Ali A. Ghorbani, Mohand-Said Hacid, Takahira Yamaguchi:
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2010, Toronto, Canada, August 31 - September 3, 2010. IEEE Computer Society Press 2010 [contents]
2000 – 2009
- 2009
- [j27]Reza Sadoddin, Ali A. Ghorbani:
An incremental frequent structure mining framework for real-time alert correlation. Comput. Secur. 28(3-4): 153-173 (2009) - [j26]Wei Lu, Ali A. Ghorbani:
Network Anomaly Detection Based on Wavelet Analysis. EURASIP J. Adv. Signal Process. 2009 (2009) - [j25]Mark Kilfoil, Ali A. Ghorbani:
SWAMI: A Multiagent, Active Representation of a User's Browsing Interests. Int. J. Inf. Technol. Web Eng. 4(3): 1-24 (2009) - [j24]Ebrahim Bagheri, Ali A. Ghorbani:
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models. J. Syst. Softw. 82(4): 707-729 (2009) - [j23]Ebrahim Bagheri, Ali A. Ghorbani:
Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology. IEEE Trans. Syst. Man Cybern. Part A 39(1): 66-85 (2009) - [c75]Mohammad-Amin Jashki, Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani:
An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering. Canadian AI 2009: 74-85 - [c74]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani:
Automatic discovery of botnet communities on large-scale communication networks. AsiaCCS 2009: 1-10 - [c73]Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani:
A detailed analysis of the KDD CUP 99 data set. CISDA 2009: 1-6 - [c72]Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi, Ali A. Ghorbani:
BotCop: An Online Botnet Traffic Classifier. CNSR 2009: 70-77 - [c71]Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani:
Online Classification of Network Flows. CNSR 2009: 78-85 - [c70]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani:
Hybrid Traffic Classification Approach Based on Decision Tree. GLOBECOM 2009: 1-6 - 2008
- [j22]M. Barouni-Ebrahimi, Ali A. Ghorbani:
An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics. Comput. Intell. 24(2): 158-190 (2008) - [j21]Ali A. Ghorbani, Ebrahim Bagheri:
The state of the art in critical infrastructure protection: a framework for convergence. Int. J. Crit. Infrastructures 4(3): 215-244 (2008) - [j20]George O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung:
Guest Editors' Introduction. J. Comput. Secur. 16(2): 103-106 (2008) - [j19]Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection. J. Comput. Secur. 16(2): 165-197 (2008) - [j18]S. Hossein Sadat-Mohtasham, Ali A. Ghorbani:
A language for high-level description of adaptive web systems. J. Syst. Softw. 81(7): 1196-1217 (2008) - [c69]Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani:
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. ARES 2008: 88-95 - [c68]Reza Sadoddin, Ali A. Ghorbani:
Real-time Alert Correlation Using Stream Data Mining Techniques. AAAI 2008: 1731-1737 - [c67]Ebrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafarani, Ali A. Ghorbani:
A Belief-Theoretic Reputation Estimation Model for Multi-context Communities. Canadian AI 2008: 48-59 - [c66]M. Barouni-Ebrahimi, Ebrahim Bagheri, Ali A. Ghorbani:
A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals. Canadian AI 2008: 60-65 - [c65]Reza Zafarani, Mohammad-Amin Jashki, Hamidreza Baghi, Ali A. Ghorbani:
A Novel Approach for Social Behavior Analysis of the Blogosphere. Canadian AI 2008: 356-367 - [c64]Ebrahim Bagheri, Ali A. Ghorbani:
Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models. Australian Software Engineering Conference 2008: 357-366 - [c63]Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. Ghorbani:
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. CNSR 2008: 75-81 - [c62]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani:
Detecting Network Anomalies Using Different Wavelet Basis Functions. CNSR 2008: 149-156 - [c61]Mahboobeh Soleimani, Ali A. Ghorbani:
Critical Episode Mining in Intrusion Detection Alerts. CNSR 2008: 157-164 - [c60]Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani:
Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process. ECSA 2008: 264-272 - [c59]Wei Lu, Ali A. Ghorbani:
Botnets Detection Based on IRC-Community. GLOBECOM 2008: 2067-2071 - [c58]Iosif-Viorel Onut, Ali A. Ghorbani:
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks. HICSS 2008: 203 - [c57]Ebrahim Bagheri, Ali A. Ghorbani:
Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development. HICSS 2008: 489 - [c56]Reza Zafarani, Majid Makki, Ali A. Ghorbani:
An Empirical Analysis on the Stability of Clustering Algorithms. ICTAI (2) 2008: 19-26 - [c55]Reza Zafarani, Ali A. Ghorbani:
Oracle Clustering: Dynamic Partitioning Based on Random Observations. ICTAI (2) 2008: 27-34 - [c54]Ebrahim Bagheri, Ali A. Ghorbani:
On the Definition of Essential and Contingent Properties of Subjective Belief Bases. MICAI 2008: 686-698 - [c53]Wei Lu, Ali A. Ghorbani:
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). RAID 2008: 415-416 - 2007
- [j17]Iosif-Viorel Onut, Ali A. Ghorbani:
SVision: A novel visual network-anomaly identification technique. Comput. Secur. 26(3): 201-212 (2007) - [j16]Ebrahim Bagheri, Hamidreza Baghi, Ali A. Ghorbani, Alireza Yari:
An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis. Int. J. Bus. Process. Integr. Manag. 2(4): 312-326 (2007) - [j15]Jie Zhang, Ali A. Ghorbani, Robin Cohen:
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. Int. J. Inf. Sec. 6(5): 333-344 (2007) - [j14]Iosif-Viorel Onut, Ali A. Ghorbani:
A Feature Classification Scheme For Network Intrusion Detection. Int. J. Netw. Secur. 5(1): 1-15 (2007) - [j13]Peyman Kabiri, Ali A. Ghorbani:
A Rule-based Temporal Alert Correlation System. Int. J. Netw. Secur. 5(1): 66-72 (2007) - [c52]Jie Zhang, Ali A. Ghorbani:
GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems. CNSR 2007: 117-124 - [c51]M. Barouni-Ebrahimi, Ali A. Ghorbani:
A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. CNSR 2007: 125-132 - [c50]Hamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani:
ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. CNSR 2007: 133-140 - [c49]Ebrahim Bagheri, Ali A. Ghorbani:
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. CNSR 2007: 335-344 - [c48]Farnaz Gharibian, Ali A. Ghorbani:
Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. CNSR 2007: 350-358 - [c47]Ebrahim Bagheri, Ali A. Ghorbani:
Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications. IFIPTM 2007: 239-254 - [c46]Iosif-Viorel Onut, Ali A. Ghorbani:
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. ISC 2007: 19-36 - [c45]Reza Sadoddin, Ali A. Ghorbani:
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection. MLDM 2007: 404-418 - [c44]Ebrahim Bagheri, Ali A. Ghorbani:
A framework for distributed collaborative conceptual model development. OOPSLA Companion 2007: 785-786 - [c43]Ebrahim Bagheri, Ali A. Ghorbani:
On the Collaborative Development of Para-Consistent Conceptual Models. QSIC 2007: 336-341 - [c42]Ali A. Ghorbani, Xiaowen Xu:
A Fuzzy Markov Model Approach for Predicting User Navigation. Web Intelligence 2007: 307-311 - [c41]M. Barouni-Ebrahimi, Ali A. Ghorbani:
On Query Completion in Web Search Engines Based on Query Stream Mining. Web Intelligence 2007: 317-320 - 2006
- [j12]Bin Zhu, Ali A. Ghorbani:
Alert Correlation for Extracting Attack Strategies. Int. J. Netw. Secur. 3(3): 244-258 (2006) - [j11]Yuhong Yan, Yong Liang, Xinge Du, Hamadou Saliah-Hassane, Ali A. Ghorbani:
Putting labs online with Web services. IT Prof. 8(2): 27-34 (2006) - [c40]Iosif-Viorel Onut, Ali A. Ghorbani:
Toward A Feature Classification Scheme For Network Intrusion Detection. CNSR 2006: 277-284 - [c39]Eugenia Kondratova, Ali A. Ghorbani, Stephen Marsh:
CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems. CNSR 2006: 300-310 - [c38]Jie Zhang, Ali A. Ghorbani, Robin Cohen:
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. PST 2006: 19 - [c37]Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection. PST 2006: 23 - [c36]Reza Sadoddin, Ali A. Ghorbani:
Alert correlation survey: framework and techniques. PST 2006: 37 - [c35]Ebrahim Bagheri, Ali A. Ghorbani:
Behavior analysis through reputation propagation in a multi-context environment. PST 2006: 40 - [c34]Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani:
Trust-based contextual information filtering. PST 2006: 51 - [c33]Ebrahim Bagheri, Ali A. Ghorbani:
Towards an MDA-oriented UML profile for critical infrastructure modeling. PST 2006: 66 - [c32]Mehran Nadjarbashi-Noghani, Ali A. Ghorbani:
Design and implementation of a behavioral difference analyzer for network intrusion detection. PST 2006: 69 - [c31]M. Barouni-Ebrahimi, Ali A. Ghorbani:
A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines. WAW 2006: 129-136 - 2005
- [j10]Peyman Kabiri, Ali A. Ghorbani:
Research on Intrusion Detection and Response: A Survey. Int. J. Netw. Secur. 1(2): 84-102 (2005) - [j9]Ming Chen, Ali A. Ghorbani, Virendrakumar C. Bhavsar:
Incremental communication for adaptive resonance theory networks. IEEE Trans. Neural Networks 16(1): 132-144 (2005) - [c30]Mark Kilfoil, Ali A. Ghorbani:
SWAMI: Searching the Web Using Agents with Mobility and Intelligence. Canadian AI 2005: 91-102 - [c29]Mehran Nadjarbashi-Noghani, Jie Zhang, Hossein Sadat, Ali A. Ghorbani:
PENS: A Personalized Electronic News System. CNSR 2005: 31-38 - [c28]Hossein Sadat, Ali A. Ghorbani:
A Presentation Description Language for Adaptive Web Systems. CNSR 2005: 169-175 - [c27]Mark Kilfoil, Wenpu Xing, Ali A. Ghorbani:
ARAS: Adaptive Recommender for Academic Scheduling. CNSR 2005: 307-312 - [c26]Yuhong Yan, Yong Liang, Xinge Du, Hamadou Saliah, Ali A. Ghorbani:
Using Web Services to Control Remote Instruments for Online Experiment Systems. CSCWD (Selected papers) 2005: 205-214 - [c25]Sepideh Miralaei, Ali A. Ghorbani:
Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems. IAT 2005: 242-245 - [c24]Jie Zhang, Ali A. Ghorbani:
Value-Centric Trust Model with Improved Familiarity Measurement. IJCAI 2005: 1670-1671 - [c23]Mehdi Shajari, Ali A. Ghorbani:
Agent-oriented Design for Network Survivability. ISDA 2005: 166-171 - [c22]Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:
SVision: A Network Host-Centered Anomaly Visualization Technique. ISC 2005: 16-28 - [c21]Wenpu Xing, Ali A. Ghorbani:
Information Domain Modeling for Adaptive Web Systems. Web Intelligence 2005: 684-687 - 2004
- [j8]Ali A. Ghorbani:
Introduction to Special Issue on Agent Technologies for Electronic Business. Comput. Intell. 20(4): 527-531 (2004) - [j7]Elijah Bitting, Ali A. Ghorbani:
Protecting e-commerce agents from defamation. Electron. Commer. Res. Appl. 3(1): 21-38 (2004) - [j6]Jonathan Carter, Ali A. Ghorbani:
Towards a formalization of value-centric trust in agent societies. Web Intell. Agent Syst. 2(3): 167-183 (2004) - [c20]John Zhong Lei, Ali A. Ghorbani:
The Reconstruction of the Interleaved Sessions from a Server Log. Canadian AI 2004: 133-145 - [c19]John Zhong Lei, Ali A. Ghorbani:
Network Intrusion Detection Using an Improved Competitive Learning Neural Network. CNSR 2004: 190-197 - [c18]Mehran Nadjarbashi-Noghani, Ali A. Ghorbani:
Improving the Referrer-Based Web Log Session Reconstruction. CNSR 2004: 286-292 - [c17]Wenpu Xing, Ali A. Ghorbani:
Weighted PageRank Algorithm. CNSR 2004: 305-314 - [c16]Jie Zhang, Ali A. Ghorbani:
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics. CNSR 2004: 315-322 - [c15]Elijah Bitting, Ali A. Ghorbani:
Cooperative Multiagent Systems for the Optimization of Urban Traffic. IAT 2004: 176-182 - [c14]Jie Zhang, Ali A. Ghorbani:
Familiarity and Trust: Measuring Familiarity with a Web Site. PST 2004: 23-28 - [c13]Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:
A novel visualization technique for network anomaly detection. PST 2004: 167-174 - [c12]Mehdi Shajari, Ali A. Ghorbani:
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. PST 2004: 181-191 - [c11]Hossein Sadat, Ali A. Ghorbani:
On the Evaluation of Adaptive Web Systems. Workshop on Web-based Support Systems 2004: 127-136 - 2003
- [j5]Stephen Marsh, Ali A. Ghorbani, Virendra C. Bhavsar:
The ACORN multi-agent system. Web Intell. Agent Syst. 1(1): 65-86 (2003) - [c10]Yu Guan, Ali A. Ghorbani, Nabil Belacel:
An Unsupervised Clustering Algorithm for Intrusion Detection. AI 2003: 616-617 - [c9]Hong Tang, Ali A. Ghorbani:
Accent Classification Using Support Vector Machine and Hidden Markov Model. AI 2003: 629-631 - [c8]John France, Ali A. Ghorbani:
A Multiagent System for Optimizing Urban Traffic. IAT 2003: 411-414 - [c7]Mehdi Shajari, Ali A. Ghorbani:
Using Fuzzy System to Manage False Alarms in Intrusion Detection. SEC 2003: 241-252 - [c6]Jonathan Carter, Ali A. Ghorbani:
Value Centric Trust in Multiagent Systems. Web Intelligence 2003: 3-9 - 2002
- [j4]Jonathan Carter, Elijah Bitting, Ali A. Ghorbani:
Reputation Formalization for an Information-Sharing Multi-Agent System. Comput. Intell. 18(4): 515-534 (2002) - [j3]Jonathan Carter, Ali A. Ghorbani, Stephen Marsh:
Architectural Components of Information-Sharing Societies. Comput. Intell. 18(4): 638-655 (2002) - [c5]Jonathan Carter, Ali A. Ghorbani, Stephen Marsh:
Just-in-time information sharing architectures in multiagent systems. AAMAS 2002: 647-654 - 2001
- [c4]Ali Farzan, Ali A. Ghorbani:
The Bottom-Up Freezing: An Approach to Neural Engineering. AI 2001: 317-324 - 2000
- [c3]Ali A. Ghorbani, Lila Bayat:
Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm. AI 2000: 293-304 - [c2]Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Stephen Marsh:
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture. MATA 2000: 243-256
1990 – 1999
- 1998
- [j2]Ali A. Ghorbani, Virendra C. Bhavsar:
Incremental communication for multilayer neural networks: error analysis. IEEE Trans. Neural Networks 9(1): 68-82 (1998) - 1996
- [c1]Ali A. Ghorbani, Virendrakumar C. Bhavsar:
Limited precision incremental communication: error analysis. ICNN 1996: 1127-1132 - 1995
- [j1]Ali A. Ghorbani, Virendrakumar C. Bhavsar:
Incremental communication for multilayer neural networks. IEEE Trans. Neural Networks 6(6): 1375-1385 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint