Filter
Conference contribution

Search results

  • 2023

    Are You Human? Investigating the Perceptions and Evaluations of Virtual Versus Human Instagram Influencers

    Nissen, A., Conrad, C. & Newman, A., Apr 19 2023, CHI 2023 - Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 659. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2022

    Implementation of a Decentralized Traffic Congestion Avoidance Mechanism for VANETs

    Sanyal, A., Makanju, A. & Zincir-Heywood, N., Oct 24 2022, DIVANet 2022 - Proceedings of the 12th ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications. Association for Computing Machinery, Inc, p. 3-8 6 p. (DIVANet 2022 - Proceedings of the 12th ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards Mind Wandering Adaptive Online Learning and Virtual Work Experiences

    Conrad, C. & Newman, A. J., 2022, Information Systems and Neuroscience - NeuroIS Retreat 2022. Davis, F. D., Riedl, R., Riedl, R., vom Brocke, J., Léger, P.-M., Randolph, A. B. & Müller-Putz, G. R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 261-267 7 p. (Lecture Notes in Information Systems and Organisation; vol. 58).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Water Quality Measurement using Plasmonic Fiber-Optic Sensors with Alternative Materials

    Monfared, Y. E., Kurylyk, B. L. & Dasog, M., 2022, 2022 Photonics North, PN 2022. Institute of Electrical and Electronics Engineers Inc., (2022 Photonics North, PN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    A Tri-Hybrid Brain-Computer Interface for Neuro-Information Systems

    Godfrey, D., Findlay, C., Mulchandani, D., Subramanilyer, R., Conrad, C. & Newman, A., 2020, Information Systems and Neuroscience - NeuroIS Retreat 2020. Davis, F. D., Riedl, R., vom Brocke, J., Léger, P.-M., Randolph, A. B. & Fischer, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 291-297 7 p. (Lecture Notes in Information Systems and Organisation; vol. 43).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On using python to run, analyze, and decode EEG experiments

    Conrad, C., Agarwal, O., Woc, C. C., Chiles, T., Godfrey, D., Krueger, K., Marini, V., Sproul, A. & Newman, A., 2020, Information Systems and Neuroscience - NeuroIS Retreat 2019. Davis, F. D., Riedl, R., Riedl, R., vom Brocke, J., Léger, P.-M., Randolph, A. & Fischer, T. (eds.). Springer, p. 287-293 7 p. (Lecture Notes in Information Systems and Organisation; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • What Do Users Feel? Towards Affective EEG Correlates of Cybersecurity Notifications

    Conrad, C., Aziz, J., Smith, N. & Newman, A., 2020, Information Systems and Neuroscience - NeuroIS Retreat 2020. Davis, F. D., Riedl, R., vom Brocke, J., Léger, P.-M., Randolph, A. B. & Fischer, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 153-162 10 p. (Lecture Notes in Information Systems and Organisation; vol. 43).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2019

    Are There Bots even in FIFA World Cup 2018 Tweets?

    Bagarish, M., Alshammari, R. & Zincir-Heywood, A. N., Oct 2019, 15th International Conference on Network and Service Management, CNSM 2019. Lutfiyya, H., Diao, Y., Zincir-Heywood, N., Badonnel, R. & Madeira, E. (eds.). Institute of Electrical and Electronics Engineers Inc., 9012743. (15th International Conference on Network and Service Management, CNSM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Dynamic Insider Threat Detection Based on Adaptable Genetic Programming

    Le, D. C., Zincir-Heywood, A. N. & Heywood, M. I., Dec 2019, 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 2579-2586 8 p. 9003134. (2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2018

    A language model for compromised user analysis

    Zincir-Heywood, A. N. & Phan, T. D., Jul 6 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An analysis of tor pluggable transports under adversarial conditions

    Shahbar, K. & Zincir-Heywood, A. N., Feb 2 2018, 2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p. (2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks

    Yao, C., Luo, X. & Zincir-Heywood, A. N., Feb 2 2018, 2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. (2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Evaluating insider threat detection workflow using supervised and unsupervised learning

    Le, D. C. & Zincir-Heywood, A. N., Aug 2 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., p. 270-275 6 p. 8424659. (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    49 Citations (Scopus)
  • How far can we push flow analysis to identify encrypted anonymity network traffic?

    Shahbar, K. & Zincir-Heywood, A. N., Jul 6 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Weighted factors for evaluating anonymity

    Shahbar, K. & Zincir-Heywood, A. N., 2018, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Imine, A., Fernandez, J. M., Logrippo, L., Marion, J.-Y. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 303-318 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    Data analytics on network traffic flows for botnet behaviour detection

    Le, D. C., Zincir-Heywood, A. N. & Heywood, M. I., Feb 9 2017, 2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016. Institute of Electrical and Electronics Engineers Inc., 7850078. (2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Citations (Scopus)
  • Effects of shared bandwidth on anonymity of the I2P network users

    Shahbar, K. & Zincir-Heywood, A. N., Dec 19 2017, Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017. Institute of Electrical and Electronics Engineers Inc., p. 235-240 6 p. (Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Exploring a service-based normal behaviour profiling system for botnet detection

    Chen, W. R., Luo, X. & Zincir-Heywood, A. N., Jul 20 2017, Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management. Chemouil, P., Simoes, P., Madeira, E., Secci, S., Monteiro, E., Gaspary, L. P., dos Santos, C. R. P. & Charalambides, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 947-952 6 p. 7987417. (Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • GECCO 2017 tutorial: Evolutionary computation in network management and security

    Zincir-Heywood, N. & Kayacik, G., Jul 15 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery, Inc, p. 1094-1112 19 p. (GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Properties of a GP active learning framework for streaming data with class imbalance

    Khanchi, S., Heywood, M. I. & Zincir-Heywood, A. N., Jul 1 2017, GECCO 2017 - Proceedings of the 2017 Genetic and Evolutionary Computation Conference. Association for Computing Machinery, Inc, p. 945-952 8 p. (GECCO 2017 - Proceedings of the 2017 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Pushing buttons: A sociomaterial exploration of the distributed lecture

    MacLeod, A., Cameron, P., Kits, O. & Fournier, C., 2017, 14th International Conference on Cognition and Exploratory Learning in the Digital Age, CELDA 2017. Spector, J. M., Ifenthaler, D., Ifenthaler, D., Sampson, D. G., Isaias, P. & Rodrigues, L. (eds.). IADIS Press, p. 125-132 8 p. (14th International Conference on Cognition and Exploratory Learning in the Digital Age, CELDA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Return-oriented programme evolution with roper: A proof of concept

    Fraser, O. L., Zincir-Heywood, N., Heywood, M. & Jacobs, J. T., Jul 15 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery, Inc, p. 1447-1454 8 p. (GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2016

    A closer look at the HTTP and P2P based botnets from a detector’s perspective

    Haddadi, F. & Zincir-Heywood, A. N., 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Garcia-Alfaro, J., Bonfante, G. & Kranakis, E. (eds.). Springer Verlag, p. 212-228 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9482).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Autonomous system based flow marking scheme for IP-Traceback

    Aghaei-Foroushani, V. & Zincir-Heywood, A. N., Jun 30 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Badonnel, S. O., Ulema, M., Cavdar, C., Granville, L. Z. & dos Santos, C. R. P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 121-128 8 p. 7502804. (Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • How to choose from different botnet detection systems?

    Haddadi, F., Phan, D. T. & Zincir-Heywood, A. N., Jun 30 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Badonnel, S. O., Ulema, M., Cavdar, C., Granville, L. Z. & dos Santos, C. R. P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1079-1084 6 p. 7502964. (Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Initiating a moving target network defense with a real-time neuro-evolutionary detector

    Smith, R. J., Zincir-Heywood, A. N., Heywood, M. I. & Jacobs, J. T., Jul 20 2016, GECCO 2016 Companion - Proceedings of the 2016 Genetic and Evolutionary Computation Conference. Friedrich, T. (ed.). Association for Computing Machinery, Inc, p. 1095-1102 8 p. (GECCO 2016 Companion - Proceedings of the 2016 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • On the impact of class imbalance in GP streaming classification with label budgets

    Khanchi, S., Heywood, M. I. & Zincir-Heywood, N., 2016, Genetic Programming - 19th European Conference, EuroGP 2016, Proceedings. Castelli, M., McDermott, J., Heywood, M. I., Costa, E. & Sim, K. (eds.). Springer Verlag, p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9594).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Smart Phone User Behaviour Characterization Based on Autoencoders and Self Organizing Maps

    Rajashekar, D., Zincir-Heywood, A. N. & Heywood, M. I., Jul 2 2016, Proceedings - 16th IEEE International Conference on Data Mining Workshops, ICDMW 2016. Domeniconi, C., Gullo, F., Bonchi, F., Bonchi, F., Domingo-Ferrer, J., Baeza-Yates, R., Baeza-Yates, R., Baeza-Yates, R., Zhou, Z.-H. & Wu, X. (eds.). IEEE Computer Society, p. 319-326 8 p. 7836683. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • 2015

    A hazard based modelling approach for residential mobility decisions

    Fatmi, M. R. & Habib, M. A., 2015, Annual Conference of the Canadian Society for Civil Engineering 2014: Sustainable Municipalities. Canadian Society for Civil Engineering, p. 2012-2025 14 p. (Proceedings, Annual Conference - Canadian Society for Civil Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An ordered response model for examining pedestrian injury severity in Halifax Regional Municipality (HRM)

    Forbes, J. J. & Habib, M. A., 2015, Annual Conference of the Canadian Society for Civil Engineering 2014: Sustainable Municipalities. Canadian Society for Civil Engineering, p. 1917-1928 12 p. (Proceedings, Annual Conference - Canadian Society for Civil Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Benchmarking stream clustering for churn detection in dynamic networks

    Tatar, S. B., McIntyre, A., Zincir-Heywood, N. & Heywood, M., 2015, Discovery Science - 18th International Conference, DS 2015. Matwin, S. & Japkowicz, N. (eds.). Springer Verlag, p. 284-298 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9356).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Botnet detection system analysis on the effect of botnet evolution and feature representation

    Haddadi, F. & Zincir-Heywood, A. N., Jul 11 2015, GECCO 2015 - Companion Publication of the 2015 Genetic and Evolutionary Computation Conference. Silva, S. (ed.). Association for Computing Machinery, Inc, p. 893-900 8 p. (GECCO 2015 - Companion Publication of the 2015 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Built environment, life style choices and active transportation: Evidence from Halifax Regional Municipality, NS, Canada

    Daisy, N. S. & Habib, M. A., 2015, Annual Conference of the Canadian Society for Civil Engineering 2014: Sustainable Municipalities. Canadian Society for Civil Engineering, p. 1971-1981 11 p. (Proceedings, Annual Conference - Canadian Society for Civil Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Data confirmation for botnet traffic analysis

    Haddadi, F. & Zincir-Heywood, A. N., 2015, Foundations and Practice of Security - 7th International Symposium, FPS 2014, Revised Selected Papers. Garcia-Alfaro, J., Cuppens, F., Heywood, N. Z. & Fong, P. W. L. (eds.). Springer Verlag, p. 329-336 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8930).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Deterministic flow marking for IPv6 traceback (DFM6)

    Aghaei-Foroushani, V. & Zincir-Heywood, A. N., Dec 28 2015, Proceedings of the 11th International Conference on Network and Service Management, CNSM 2015. Madeira, E. R. M., Serrat, J., Schonwalder, J., Schmitt, C. & Tortonesi, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 270-273 4 p. 7367370. (Proceedings of the 11th International Conference on Network and Service Management, CNSM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Estimation of accessibility measures for service destinations in the Halifax Regional Municipality, Canada

    Irin, S. & Habib, M. A., 2015, Annual Conference of the Canadian Society for Civil Engineering 2014: Sustainable Municipalities. Canadian Society for Civil Engineering, p. 2001-2011 11 p. (Proceedings, Annual Conference - Canadian Society for Civil Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Highlights on analyzing one-way traffic using different tools

    Balkanli, E. & Zincir-Heywood, A. N., Aug 17 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 104-111 8 p. 7208635. (2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Investigating unique flow marking for tracing back DDoS attacks

    Aghaei-Foroushani, V. & Zincir-Heywood, A. N., Jun 29 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 762-765 4 p. 7140370. (Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • On the effectiveness of different botnet detection approaches

    Haddadi, F., Le Cong, D., Porter, L. & Zincir-Heywood, A. N., 2015, Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Proceedings. Lopez, J. & Wu, Y. (eds.). Springer Verlag, p. 121-135 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9065).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Predictive analysis on tracking emails for targeted marketing

    Luo, X., Nadanasabapathy, R., Zincir-Heywood, A. N., Gallant, K. & Peduruge, J., 2015, Discovery Science - 18th International Conference, DS 2015. Matwin, S. & Japkowicz, N. (eds.). Springer Verlag, p. 116-130 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9356).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Probabilistic flow marking for IP traceback (PFM)

    Aghaei-Foroushani, V. & Zincir-Heywood, A. N., Nov 10 2015, Proceedings of 2015 7th International Workshop on Reliable Networks Design and Modeling, RNDM 2015. Papadimitriou, D., Mas Machuca, C., Vinel, A., Rak, J., Oki, E. & Walkowiak, K. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 229-236 8 p. 7325234. (Proceedings of 2015 7th International Workshop on Reliable Networks Design and Modeling, RNDM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Temporary closure of the MacDonald Bridge in Halifax: Modeling mode shift behaviour of cyclists and pedestrians

    Khan, N. H. A. & Habib, M. A., 2015, Annual Conference of the Canadian Society for Civil Engineering 2014: Sustainable Municipalities. Canadian Society for Civil Engineering, p. 1949-1958 10 p. (Proceedings, Annual Conference - Canadian Society for Civil Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Traffic flow analysis of tor pluggable transports

    Shahbar, K. & Zincir-Heywood, A. N., Dec 28 2015, Proceedings of the 11th International Conference on Network and Service Management, CNSM 2015. Madeira, E. R. M., Serrat, J., Schonwalder, J., Schmitt, C. & Tortonesi, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 178-181 4 p. 7367356. (Proceedings of the 11th International Conference on Network and Service Management, CNSM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • 2014

    A case study for a secure and robust geo-fencing and access control framework

    Rahimi, H., Maimaiti, T. & Zincir-Heywood, A. N., 2014, IEEE/IFIP NOMS 2014 - IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World. IEEE Computer Society, 6838325. (IEEE/IFIP NOMS 2014 - IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Benchmarking two techniques for Tor classification: Flow level and circuit level classification

    Shahbar, K. & Zincir-Heywood, A. N., Jan 16 2014, IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings. Institute of Electrical and Electronics Engineers Inc., 7013368. (IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Botnet behaviour analysis using IP flows: With http filters using classifiers

    Haddadi, F., Morgan, J., Filho, E. G. & Zincir-Heywood, A. N., 2014, Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014. IEEE Computer Society, p. 7-12 6 p. 6844605. (Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • On the analysis of backscatter traffic

    Balkanli, E. & Zincir-Heywood, A. N., Oct 16 2014, Proceedings of the 39th Annual IEEE Conference on Local Computer Networks, LCN 2014. Aschenbruck, N., Kanhere, S. & Akkaya, K. (eds.). November ed. IEEE Computer Society, p. 671-678 8 p. 6927719. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2014-November, no. November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Citations (Scopus)
  • Supervised learning to detect DDoS attacks

    Balkanli, E., Alves, J. & Zincir-Heywood, A. N., Jan 16 2014, IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings. Institute of Electrical and Electronics Engineers Inc., 7013367. (IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • TDFA: Traceback-based defense against DDoS flooding attacks

    Foroushani, V. A. & Zincir-Heywood, A. N., 2014, Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, IEEE AINA 2014. Institute of Electrical and Electronics Engineers Inc., p. 597-604 8 p. 6838719. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • Term-based clustering and summarization of web page collections

    Zhang, Y., Zincir-Heywood, N. & Milios, E., 2014, Advances in Artificial Intelligence. Tawfik, A. Y. & Goodwin, S. D. (eds.). Springer Verlag, p. 60-74 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3060).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2013

    Automatic optimization for a clustering based approach to support IT management

    Bozdogan, C., Zincir-Heywood, A. N. & Gokcen, Y., 2013, Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. p. 1233-1236 4 p. 6573170. (Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Beyond term clusters: Assigning Wikipedia concepts to scientific documents

    Yeloglu, O., Milios, E. & Zincir-Heywood, A. N., 2013, DocEng 2013 - Proceedings of the 2013 ACM Symposium on Document Engineering. Association for Computing Machinery, p. 233-234 2 p. (DocEng 2013 - Proceedings of the 2013 ACM Symposium on Document Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Deterministic and authenticated flow marking for IP traceback

    Foroushani, V. A. & Zincir-Heywood, A. N., 2013, Proceedings - IEEE International Conference on Advanced Information Networking and Applications, AINA 2013. p. 397-404 8 p. 6531783. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Citations (Scopus)
  • How far an evolutionary approach can go for protocol state analysis and discovery

    Laroche, P., Burrows, A. & Zincir-Heywood, A. N., 2013, 2013 IEEE Congress on Evolutionary Computation, CEC 2013. p. 3228-3235 8 p. 6557965. (2013 IEEE Congress on Evolutionary Computation, CEC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Investigating application behavior in network traffic traces

    Foroushani, V. A. & Zincir-Heywood, A. N., 2013, Proceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013. p. 72-79 8 p. 6595430. (Proceedings of the 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Investigating event log analysis with minimum apriori information

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2013, Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. p. 962-968 7 p. 6573118. (Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Label free change detection on streaming data with cooperative multi-objective genetic programming

    Rahimi, S., McIntyre, A. R., Heywood, M. I. & Zincir-Heywood, N., 2013, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion. p. 159-160 2 p. (GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Malicious automatically generated domain name detection using stateful-SBB

    Haddadi, F., Kayacik, H. G., Zincir-Heywood, A. N. & Heywood, M. I., 2013, Applications of Evolutionary Computation - 16th European Conference, EvoApplications 2013, Proceedings. Springer Verlag, p. 529-539 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7835 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • On evaluating IP traceback schemes: A practical perspective

    Aghaei-Foroushani, V. & Zincir-Heywood, A. N., 2013, Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013. p. 127-134 8 p. 6565241. (Proceedings - IEEE CS Security and Privacy Workshops, SPW 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Citations (Scopus)
  • 2012

    Data mining for supporting IT management

    Bozdogan, C. & Zincir-Heywood, N., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. p. 1378-1385 8 p. 6212079. (Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • GP under streaming data constraints: A case for pareto archiving?

    Atwater, A., Heywood, M. I. & Zincir-Heywood, N., 2012, GECCO'12 - Proceedings of the 14th International Conference on Genetic and Evolutionary Computation. p. 703-710 8 p. (GECCO'12 - Proceedings of the 14th International Conference on Genetic and Evolutionary Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Interactive learning of alert signatures in High Performance Cluster system logs

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. p. 52-60 9 p. 6211882. (Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Is there a relationship between ethylene evolution, ethylene sensitivity, and needle abscission in root-detached balsam fir?

    MacDonald, M. T., Lada, R. R., Martynenko, A. I., Pepin, S., Desjardins, Y. & Dorais, M., May 1 2012, XXVIII International Horticultural Congress on Science and Horticulture for People (IHC2010): International Symposium on Plant Physiology from Cell to Fruit Production System. International Society for Horticultural Science, p. 405-412 8 p. (Acta Horticulturae; vol. 932).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Network protocol discovery and analysis via live interaction

    Laroche, P., Zincir-Heywood, A. N. & Heywood, M. I., 2012, Applications of Evolutionary Computation - EvoApplications 2012: EvoCOMNET, EvoCOMPLEX, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoNUM, EvoPAR, EvoRISK, EvoSTIM, and EvoSTOC, Proceedings. p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7248 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Spatio-temporal decomposition, clustering and identification for alert detection in system logs

    Makanju, A., Zincir-Heywood, A. N., Milios, E. E. & Latzel, M., 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 621-628 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Symbiotic evolutionary subspace clustering

    Vahdat, A., Heywood, M. I. & Zincir-Heywood, A. N., 2012, 2012 IEEE Congress on Evolutionary Computation, CEC 2012. 6252895. (2012 IEEE Congress on Evolutionary Computation, CEC 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • The impact of evasion on the generalization of machine learning algorithms to classify VoIP traffic

    Alshammari, R. & Zincir-Heywood, A. N., 2012, 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings. 6289243. (2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2011

    A Comparison of three machine learning techniques for encrypted network traffic analysis

    Arndt, D. J. & Zincir-Heywood, A. N., 2011, IEEE SSCI 2011 - Symposium Series on Computational Intelligence - CISDA 2011: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications. p. 107-114 8 p. 5945941. (IEEE SSCI 2011 - Symposium Series on Computational Intelligence - CISDA 2011: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Citations (Scopus)
  • A next generation entropy based framework for alert detection in system logs

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2011, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. p. 626-629 4 p. 5990587. (Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An investigation on identifying SSL traffic

    McCarthy, C. & Zincir-Heywood, A. N., 2011, IEEE SSCI 2011 - Symposium Series on Computational Intelligence - CISDA 2011: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications. p. 115-122 8 p. 5945943. (IEEE SSCI 2011 - Symposium Series on Computational Intelligence - CISDA 2011: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Exploring the state space of an application protocol: A case study of SMTP

    Laroche, P., Zincir-Heywood, A. N. & Heywood, M. I., 2011, IEEE SSCI 2011: Symposium Series on Computational Intelligence - CICS 2011: 2011 IEEE Symposium on Computational Intelligence in Cyber Security. p. 152-159 8 p. 5949387. (IEEE SSCI 2011: Symposium Series on Computational Intelligence - CICS 2011: 2011 IEEE Symposium on Computational Intelligence in Cyber Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Genetic optimization and hierarchical clustering applied to encrypted traffic identification

    Bacquet, C., Zincir-Heywood, A. N. & Heywood, M. I., 2011, IEEE SSCI 2011: Symposium Series on Computational Intelligence - CICS 2011: 2011 IEEE Symposium on Computational Intelligence in Cyber Security. p. 194-201 8 p. 5949391. (IEEE SSCI 2011: Symposium Series on Computational Intelligence - CICS 2011: 2011 IEEE Symposium on Computational Intelligence in Cyber Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Is machine learning losing the battle to produce transportable signatures against VoIP traffic?

    Alshammari, R. & Zincir-Heywood, A. N., 2011, 2011 IEEE Congress of Evolutionary Computation, CEC 2011. p. 1543-1550 8 p. 5949799. (2011 IEEE Congress of Evolutionary Computation, CEC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Multi-document summarization of scientific corpora

    Yeloglu, O., Milios, E. & Zincir-Heywood, N., 2011, 26th Annual ACM Symposium on Applied Computing, SAC 2011. p. 252-258 7 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Storage and retrieval of system log events using a structured schema based on message type transformation

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2011, 26th Annual ACM Symposium on Applied Computing, SAC 2011. p. 528-533 6 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • System state discovery via information content clustering of system logs

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2011, Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011. p. 301-306 6 p. 6045954. (Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2010

    An analysis of clustering objectives for feature selection applied to encrypted traffic identification

    Bacquet, C., Zincir-Heywood, N. A. & Heywood, M. I., 2010, 2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010. 5586163. (2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An evaluation of entropy based approaches to alert detection in high performance cluster logs

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2010, Proceedings - 7th International Conference on the Quantitative Evaluation of Systems, QEST 2010. p. 69-78 10 p. 5600405. (Proceedings - 7th International Conference on the Quantitative Evaluation of Systems, QEST 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An investigation on the identification of voip traffic: Case study on Gtalk and Skype

    Alshammari, R. & Zincir-Heywood, A. N., 2010, Proceedings of the 2010 International Conference on Network and Service Management, CNSM 2010. p. 310-313 4 p. 5691210. (Proceedings of the 2010 International Conference on Network and Service Management, CNSM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)
  • Bottom-up evolutionary subspace clustering

    Vahdat, A., Heywood, M. & Zincir-Heywood, N., 2010, 2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010. 5585962. (2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Fast entropy based alert detection in super computer logs

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2010, 2010 International Conference on Dependable Systems and Networks Workshops, DSN-W 2010. p. 52-58 7 p. 5542621. (Proceedings of the International Conference on Dependable Systems and Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • One size fits none: The importance of detector parameterization

    Bodorik, N. & Zincir-Heywood, A. N., 2010, ARES 2010 - 5th International Conference on Availability, Reliability, and Security. p. 487-494 8 p. 5438049. (ARES 2010 - 5th International Conference on Availability, Reliability, and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Unveiling Skype encrypted tunnels using GP

    Alshammari, R. & Zincir-Heywood, A. N., 2010, 2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010. 5586288. (2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Using code bloat to obfuscate evolved network traffic

    Laroche, P., Zincir-Heywood, N. & Heywood, M. I., 2010, Applications of Evolutionary Computation - EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Proceedings. PART 2 ed. Springer Verlag, p. 101-110 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6025 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2009

    An investigation of multi-objective genetic algorithms for encrypted traffic identification

    Bacquet, C., Zincir-Heywood, A. N. & Heywood, M. I., 2009, Computational Intelligence in Security for Information Systems, CISIS 2009 - 2nd International Workshop, Proceedings. p. 93-100 8 p. (Advances in Intelligent and Soft Computing; vol. 63 AISC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A preliminary performance comparison of two feature sets for encrypted traffic classification

    Alshammari, R. & Zincir-Heywood, A. N., 2009, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Corchado, E., Herrero, A., Zunino, R. & Gastaldo, P. (eds.). p. 203-210 8 p. (Advances in Soft Computing; vol. 53).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Classifying SSH encrypted traffic with minimum packet header features using genetic programming

    Alshammari, R., Lichodzijewski, P. I., Heywood, M. & Zincir-Heywood, A. N., 2009, Proceedings of the 11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009. Association for Computing Machinery, p. 2539-2546 8 p. (Proceedings of the 11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009; vol. 2009-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Clustering event logs using iterative partitioning

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2009, KDD '09: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 1255-1263 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    245 Citations (Scopus)
  • Evolving TCP/IP packets: A case study of port scans

    Laroche, P., Zincir-Heywood, N. & Heywood, M. I., Dec 16 2009, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009. 5356541. (IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Generalization of Signatures for SSH Encrypted Traffic Identification

    Alshammari, R. & Zincir-Heywood, A. N., 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings. 4925105. (2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Generating mimicry attacks using genetic programming: A benchmarking study

    Kayacik, H. G., Zincir-Heywood, A. N., Heywood, M. I. & Burschka, S., 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings. 4925101. (2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing

    Kayacik, H. G., Zincir-Heywood, N., Heywood, M. & Burschka, S., Dec 16 2009, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009. 5356546. (IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Performance comparison of four rule sets: An example for encrypted traffic classification

    Alshammari, R., Zincir-Heywood, A. N. & Farrag, A. A., 2009, CONGRESS 2009 - 2009 World Congress on Privacy, Security, Trust and the Management of e-Business. p. 21-28 8 p. 5341716. (CONGRESS 2009 - 2009 World Congress on Privacy, Security, Trust and the Management of e-Business).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Testing detector parameterization using evolutionary exploit generation

    Kayacik, H. G., Zincir-Heywood, A. N., Heywood, M. I. & Burschka, S., 2009, Applications of Evolutionary Computing - EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Proceedings. p. 105-110 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    Adaptability of a GP based IDS on wireless networks

    Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 310-318 9 p. 4529352. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A preliminary investigation of Skype traffic classification using a minimalist feature set

    Angevine, D. & Zincir-Heywood, A. N., 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 1075-1079 5 p. 4529463. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Information retrieval in network administration

    George, A., Makanju, A., Zincir-Heywood, A. N. & Milios, E. E., 2008, Proceedings of the 6th Annual Communication Networks and Services Research Coference, CNSR 2008. p. 561-568 8 p. 4519908. (Proceedings of the 6th Annual Communication Networks and Services Research Conference, CNSR 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Investigating two different approaches for encrypted traffic classification

    Alshammari, R. & Zincir-Heywood, A. N., 2008, Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008. p. 156-166 11 p. 4641283. (Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    54 Citations (Scopus)
  • LogView: Visualizing event log clusters

    Makanju, A., Brooks, S., Zincir-Heywood, A. N. & Milios, E. E., 2008, Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008. p. 99-108 10 p. 4641277. (Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • VEA-bility security metric: A network security analysis tool

    Tupper, M. & Zincir-Heywood, A. N., 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 950-957 8 p. 4529446. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Citations (Scopus)
  • 2007

    A comparison between signature and GP-based IDSs for link layer attacks on WiFi networks

    Makanju, A., LaRoche, P. & Zincir-Heywood, A. N., 2007, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007. p. 213-219 7 p. 4219103. (Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Automatically evading IDS using GP authored attacks

    Kayacik, H. G., Zincir-Heywood, A. N. & Heywood, M. I., 2007, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007. p. 153-160 8 p. 4219095. (Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Evolving buffer overflow attacks with detector feedback

    Kayacik, H. G., Heywood, M. I. & Zincir-Heywood, A. N., 2007, Applications of Evolutionary Computing - EvoWorkshops 2007: EvoCOMNET, EvoFIN, EvoIASP, EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTRANSLOG, Proceedings. Springer Verlag, p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4448 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Incorporating temporal information for document classification

    Luo, X. & Zincir-Heywood, N., 2007, Workshops in Conjunction with the International Conference on Data Engineering - ICDE' 07. p. 780-789 10 p. 4401067. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • On the contribution of preamble to information hiding in mimicry attacks

    Kayacik, H. G. & Zincir-Heywood, A. N., 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 632-638 7 p. 4221128. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2006

    802.11 de-authentication attack detection using genetic programming

    LaRoche, P. & Zincir-Heywood, A. N., 2006, Genetic Programming - 9th European Conference, EuroGP 2006, Proceedings. Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3905 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Benchmarking a recurrent linear GP model on prediction and control problems

    Luo, X., Heywood, M. & Zincir-Heywood, A. N., 2006, Intelligent Control and Automation: International Conference on Intelligent Computing, ICIC 2006. Springer Verlag, p. 845-850 6 p. (Lecture Notes in Control and Information Sciences; vol. 344).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Evolving recurrent linear-gp for document classification and word tracking

    Luo, X. & Zincir-Heywood, A. N., 2006, 2006 IEEE Congress on Evolutionary Computation, CEC 2006. p. 2436-2443 8 p. 1688611. (2006 IEEE Congress on Evolutionary Computation, CEC 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Genetic programming based WiFi data link layer attack detection

    LaRoche, P. & Zincir-Heywood, A. N., 2006, Proceedings - 4th Annual Communication Networks and Services Research Conference, CNSR 2006. p. 285-292 8 p. 1628127. (Proceedings - 4th Annual Communication Networks and Services Research Conference, CNSR 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Modeling user behaviors from FTP server logs

    Yeming, H. & Zincir-Heywood, A. N., 2006, Proceedings - 4th Annual Communication Networks and Services Research Conference, CNSR 2006. p. 320-322 3 p. 1628133. (Proceedings - 4th Annual Communication Networks and Services Research Conference, CNSR 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On evolving buffer overflow attacks using genetic programming

    Kayacik, H. G., Heywood, M. & Zincir-Heywood, N., 2006, GECCO 2006 - Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 1667-1673 7 p. (GECCO 2006 - Genetic and Evolutionary Computation Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • 2005

    802.11 network intrusion detection using genetic programming

    Laroche, P. & Zincir-Heywood, A. N., 2005, GECCO 2005 - Genetic and Evolutionary Computation Conference. Association for Computing Machinery, p. 170-171 2 p. (GECCO 2005 - Genetic and Evolutionary Computation Conference; vol. 2005-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • CasGP: Building Cascaded hierarchical models using Niching

    Lichodzijewski, P., Heywood, M. I. & Zincir-Heywood, A. N., 2005, 2005 IEEE Congress on Evolutionary Computation, IEEE CEC 2005. Proceedings. p. 1180-1187 8 p. (2005 IEEE Congress on Evolutionary Computation, IEEE CEC 2005. Proceedings; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Comparison of a SOM based sequence analysis system and Naive Bayesian classifier for spam filtering

    Luo, X. & Zincir-Heywood, N., 2005, Proceedings of the International Joint Conference on Neural Networks, IJCNN 2005. p. 2571-2576 6 p. 1556308. (Proceedings of the International Joint Conference on Neural Networks; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Evaluation of two systems on multi-class multi-label document classification

    Luo, X. & Zincir-Heywood, A. N., 2005, Foundations of Intelligent Systems - 15th International Symposium, ISMIS 2005, Proceedings. Springer Verlag, p. 161-169 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3488 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)
  • Evolving recurrent using linear GP

    Luo, X., Heywood, M. I. & Zincir-Heywood, A. N., 2005, GECCO 2005 - Genetic and Evolutionary Computation Conference. Beyer, H. G., O'Reilly, U. M., Arnold, D., Banzhaf, W., Blum, C., Bonabeau, E. W., Cantu-Paz, E., Dasgupta, D., Deb, K. & et al, A. (eds.). p. 1787-1788 2 p. (GECCO 2005 - Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Generating representative traffic for intrusion detection system benchmarking

    Kayacik, H. G. & Zincir-Heywood, N., 2005, Proceedings of the 3rd Annual Communication Networks and Services Research Conference. p. 112-117 6 p. 1429954. (Proceedings of the 3rd Annual Communication Networks and Services Research Conference; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Narrative text classification for automatic key phrase extraction in Web document corpora

    Zhang, Y., Zincir-Heywood, N. & Milios, E., 2005, WIDM 2005 - Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005. p. 51-58 8 p. (Proceedings of the Interntational Workshop on Web Information and Data Management WIDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Citations (Scopus)
  • Understanding the performance of cooperative web caching systems

    Hu, X. & Zincir-Heywood, A. N., 2005, Proceedings of the 3rd Annual Communication Networks and Services Research Conference. p. 183-188 6 p. 1429965. (Proceedings of the 3rd Annual Communication Networks and Services Research Conference; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2004

    Analyzing the temporal sequences for text categorization

    Luo, X. & Zincir-Heywood, A. N., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Negoita, M. G., Howlett, R. J. & Jain, L. C. (eds.). Springer Verlag, p. 498-505 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Capturing temporal sequences for text representation using hierarchical SOMs

    Luo, X. & Zincir-Heywood, A. N., 2004, Proceedings of the International Conference on Artificial Intelligence, IC-AI'04 and Proceedings of the International Conference on Machine Learning; Models, Technologies and Applications, MLMTA'04). Arabnia, H. R. & Youngsong, M. (eds.). p. 977-983 7 p. (Proceedings of the International Conference on Artificial Intelligence, IC-AI'04; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cascaded GP models for data mining

    Lichodzijewski, P., Heywood, M. I. & Zincir-Heywood, A. N., 2004, Proceedings of the 2004 Congress on Evolutionary Computation, CEC2004. p. 2258-2264 7 p. (Proceedings of the 2004 Congress on Evolutionary Computation, CEC2004; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Combining word based and word co-occurrence based sequence analysis for text categorization

    Luo, X. & Zincir-Heywood, A. N., 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics. p. 1580-1585 6 p. (Proceedings of 2004 International Conference on Machine Learning and Cybernetics; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Improving intrusion detection systems through heuristic evaluation

    Zhou, A. T., Blustein, J. & Zincir-Heywood, N., 2004, Canadian Conference on Electrical and Computer Engineering; Technology Driving Innovation, 2004. p. 1641-1644 4 p. (Canadian Conference on Electrical and Computer Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Intelligent agents for routing on mobile ad-hoc networks

    Zhou, Y. & Zincir-Heywood, A. N., 2004, Proceedings - Second Annual Conference on Communication Networks and Services Research. Ghorbani, A. A. (ed.). p. 249-254 6 p. (Proceedings - Second Annual Conference on Communication Networks and Services Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Intelligent ants for adaptive network routing

    Yun, H. & Zincir-Heywood, A. N., 2004, Proceedings - Second Annual Conference on Communication Networks and Services Research. Ghorbani, A. A. (ed.). p. 255-261 7 p. (Proceedings - Second Annual Conference on Communication Networks and Services Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • On dataset biases in a learning system with minimum a priori information for intrusion detection

    Kayacik, H. G., Zincir-Heywood, A. N. & Heywood, M. I., 2004, Proceedings - Second Annual Conference on Communication Networks and Services Research. Ghorbani, A. A. (ed.). p. 181-189 9 p. (Proceedings - Second Annual Conference on Communication Networks and Services Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • 2003

    A case study of three open source security management tools

    Kayacik, H. G. & Zincir-Heywood, A. N., 2003, Integrated Network Management VIII: Managing It All - IFIP/IEEE 8th International Symposium on Integrated Network Management, IM 2003. Springer New York LLC, p. 101-104 4 p. (IFIP Advances in Information and Communication Technology; vol. 118).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Post-supervised template induction for dynamic web sources

    Shi, Z., Milios, E. & Zincir-Heywood, N., 2003, Advances in Artificial Intelligence - 16th Conference of the Canadian Society for Computational Studies of Intelligence, AI 2003, Proceedings. Xiang, Y. & Chaib-Draa, B. (eds.). Springer Verlag, p. 268-282 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2671).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Summarizing web sites automatically

    Zhang, Y. Z., Zincir-Heywood, N. & Milios, E., 2003, Advances in Artificial Intelligence - 16th Conference of the Canadian Society for Computational Studies of Intelligence, AI 2003, Proceedings. Xiang, Y. & Chaib-Draa, B. (eds.). Springer Verlag, p. 283-296 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2671).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2002

    Agent-based routing algorithms on a LAN

    Yang, Y., Zincir-Heywood, A. N., Heywood, M. I. & Srinivas, S., 2002, Canadian Conference on Electrical and Computer Engineering. Kinsner, W., Sebak, A. & Ferens, K. (eds.). p. 1442-1447 6 p. (Canadian Conference on Electrical and Computer Engineering; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)