


default search action
Nur Zincir-Heywood
Person information
- affiliation: Dalhousie University,Faculty of Computer Science, Halifax, NS, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [d5]Jeffrey A. Adjei, Nur Zincir-Heywood, Malcom Heywood, Nabil Seddigh, Biswajit Nandy:
DALHOUSIE NIMS LAB IoT ATTACK DATASET 2025-1. IEEE DataPort, 2025 - 2024
- [j51]Carol Fung, Augusto Neto, Nur Zincir-Heywood, Changqing Luo:
CSNet 2023 special issue - the resilient networked systems. Ann. des Télécommunications 79(11-12): 707-709 (2024) - [j50]Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Large language models and unsupervised feature learning: implications for log analysis. Ann. des Télécommunications 79(11-12): 711-729 (2024) - [j49]Ziyu Qiu, Zhilei Zhou, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files. Int. J. Netw. Manag. 34(1) (2024) - [j48]Marwa A. Elsayed, Nur Zincir-Heywood:
BoostSec: Adaptive Attack Detection for Vehicular Networks. J. Netw. Syst. Manag. 32(1): 6 (2024) - [j47]Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation. J. Netw. Syst. Manag. 32(3): 59 (2024) - [j46]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova:
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence. IEEE Trans. Netw. Serv. Manag. 21(3): 2608-2612 (2024) - [c192]Jeffrey A. Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
IoT Device and State Identification based on Usage Patterns. CNSM 2024: 1-7 - [c191]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
Evaluating the Robustness of ADVENT on the VeReMi-Extension Dataset. CNSM 2024: 1-7 - [c190]Rafael Copstein, Nur Zincir-Heywood, Malcolm I. Heywood:
Improving Real-Time Anomaly Detection using Multiple Instances of Micro-Cluster Detection. CNSM 2024: 1-6 - [c189]Zhilei Zhou, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks. EvoApplications@EvoStar 2024: 361-376 - [c188]Jeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
Identifying IoT Devices: A Machine Learning Analysis Using Traffic Flow Metadata. NOMS 2024: 1-7 - [c187]Sadia Afrin, Marwa A. Elsayed, Nur Zincir-Heywood:
GENI: GANs Evaluation of iNjection attacks on IoT. WF-IoT 2024: 1-6 - [c186]Haotian Liu, Riyad Alshammari, Nur Zincir-Heywood:
Edge-Cloud VPN Traffic Analysis over Cross Platforms. WF-IoT 2024: 1-6 - [c185]Sadia Afrin, Marwa A. Elsayed, Nur Zincir-Heywood:
Work in Progress: Exploring Generative Modeling for Injection Attack Detection. WF-IoT 2024: 580-581 - [c184]Alexander Loginov, Nur Zincir-Heywood, Kevin de Snayer, Terri Dougall:
Exploring Data Exhaust Under Different IoT Traffic Scenarios. WF-IoT 2024: 798-803 - [d4]Jeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
DALHOUSIE NIMS LAB IOT 2024 DATASET. IEEE DataPort, 2024 - [d3]Jeffrey Attakorah Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
DALHOUSIE NIMS LAB BENIGN DATASET 2024-2. IEEE DataPort, 2024 - [d2]Haotian Liu, Riyad Alshammari, Nur Zincir-Heywood:
Dalhousie NIMS Lab VPN 2024 Dataset. IEEE DataPort, 2024 - [i3]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
ADVENT: Attack/Anomaly Detection in VANETs. CoRR abs/2401.08564 (2024) - 2023
- [j45]Sanaz Adel Alipour
, Rita Orji, Nur Zincir-Heywood:
Behaviour and Bot Analysis on Online Social Networks: Twitter, Parler, and Reddit. Int. J. Technol. Hum. Interact. 19(1): 1-19 (2023) - [j44]Nur Zincir-Heywood
, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II. IEEE Trans. Netw. Serv. Manag. 20(2): 882-889 (2023) - [c183]Marwa A. Elsayed, Patrick Russell, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
Anomaly Detection for IoT Networks: Empirical Study. CCECE 2023: 432-437 - [c182]Rafael Copstein, Brad Niblett, Andrew Johnston, Jeff Schwartzentruber, Malcolm I. Heywood, Nur Zincir-Heywood:
MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection. CNSM 2023: 1-7 - [c181]Alexander Loginov, Jeffrey Adjei, Nur Zincir-Heywood, Srinivas Sampalli, Kevin de Snayer, Terri Dougall:
Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices. CNSM 2023: 1-5 - [c180]Zhilei Zhou, Ziyu Qiu, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood
, Malcolm I. Heywood
:
A Boosting Approach to Constructing an Ensemble Stack. EuroGP 2023: 133-148 - [c179]Zolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed, Nur Zincir-Heywood:
Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study. ICCCN 2023: 1-10 - [c178]Syed Hani Raza Abidi, Nur Zincir-Heywood, Syed Sibte Raza Abidi, Kranthi Jalakam, Samina Abidi, Lakshman Gunaratnam, Rita Suri, Héloïse Cardinale, Amanda Vinson
, Bhanu Prasad, Michael Walsh, Seychelle Yohanna, George Worthen, Karthik K. Tennankore:
Characterizing Cluster-Based Frailty Phenotypes in a Multicenter Prospective Cohort of Kidney Transplant Candidates. MedInfo 2023: 896-900 - [c177]Hamideh Baharlouei
, Adetokunbo Makanju
, Nur Zincir-Heywood
:
Exploring Real-Time Malicious Behaviour Detection in VANETs. DIVANet 2023: 1-8 - [c176]Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones. NOMS 2023: 1-5 - [c175]Zolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood:
Instant Messaging Application Encrypted Traffic Generation System. NOMS 2023: 1-3 - [c174]Patrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
On the Fence: Anomaly Detection in IoT Networks. NOMS 2023: 1-4 - [c173]Julia Silva Weber, Tiago Ferreto, Nur Zincir-Heywood:
Exploring Anomaly Detection Techniques for Enhancing VANET Availability. VTC2023-Spring 2023: 1-7 - [d1]Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Encrypted Mobile Instant Messaging Traffic Dataset. IEEE DataPort, 2023 - [i2]Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation. CoRR abs/2311.14519 (2023) - 2022
- [j43]Rafael Copstein, Egil Karlsen, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Exploring syntactical features for anomaly detection in application logs. it Inf. Technol. 64(1-2): 15-27 (2022) - [j42]Nur Zincir-Heywood
, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib
, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami
, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I. IEEE Trans. Netw. Serv. Manag. 19(4): 3988-3994 (2022) - [c172]Sanaz Adel Alipour
, Rita Orji, Nur Zincir-Heywood:
Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature. ARES 2022: 124:1-124:9 - [c171]Aishik Sanyal, Adetokunbo Makanju, Nur Zincir-Heywood:
Implementation of a Decentralized Traffic Congestion Avoidance Mechanism for VANETs. DIVANet 2022: 3-8 - [c170]Marwa A. Elsayed, Nur Zincir-Heywood:
BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks. NOMS 2022: 1-9 - [c169]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks. VTC Spring 2022: 1-7 - [i1]Zhilei Zhou, Ziyu Qiu, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
A Boosting Approach to Constructing an Ensemble Stack. CoRR abs/2211.15621 (2022) - 2021
- [j41]Xiao Luo, Chengchao Yao, Nur Zincir-Heywood:
Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework. Int. J. Inf. Comput. Secur. 16(1/2): 170-191 (2021) - [j40]Nur Zincir-Heywood
, Rémi Badonnel:
CNSM 2019 special issue: Embracing the new wave of artificial intelligence. Int. J. Netw. Manag. 31(1) (2021) - [j39]Duc C. Le
, Nur Zincir-Heywood
:
Exploring anomalous behaviour detection and classification for insider threat identification. Int. J. Netw. Manag. 31(4) (2021) - [j38]Ali Safari Khatouni
, Nabil Seddigh, Biswajit Nandy, Ayse Nur Zincir-Heywood:
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors. J. Netw. Syst. Manag. 29(1): 8 (2021) - [j37]Nur Zincir-Heywood
, Giuliano Casale
, David Carrera
, Lydia Y. Chen
, Amogh Dhamdhere, Takeru Inoue
, Hanan Lutfiyya, Taghrid Samak:
Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II. IEEE Trans. Netw. Serv. Manag. 18(1): 775-779 (2021) - [j36]Duc C. Le
, Nur Zincir-Heywood
:
Anomaly Detection for Insider Threats Using Unsupervised Ensembles. IEEE Trans. Netw. Serv. Manag. 18(2): 1152-1164 (2021) - [j35]Hanan Lutfiyya
, Robert Birke
, Giuliano Casale
, Amogh Dhamdhere, Jinho Hwang
, Takeru Inoue
, Neeraj Kumar
, Deepak Puthal
, Nur Zincir-Heywood
:
Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management. IEEE Trans. Netw. Serv. Manag. 18(4): 3936-3941 (2021) - [c168]Yulduz Khodjaeva, Nur Zincir-Heywood:
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels. ARES 2021: 72:1-72:7 - [c167]Rafael Copstein, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Log Abstraction for Information Security: Heuristics and Reproducibility. ARES 2021: 93:1-93:10 - [c166]Muhammadjon Toshpulatov, Nur Zincir-Heywood:
Anomaly Detection on Smart Meters Using Hierarchical Self Organizing Maps. CCECE 2021: 1-6 - [c165]Boma Graham-Kalio, Oladapo Oyebode
, Nur Zincir-Heywood, Rita Orji
:
Analyzing COVID-19 Tweets using Health Behaviour Theories and Machine Learning. SEGAH 2021: 1-8 - [c164]Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Training regime influences to semi-supervised learning for insider threat detection. SP (Workshops) 2021: 13-18 - [c163]Noah MacAskill, Zachary Wilkins, Nur Zincir-Heywood:
Scaling Multi-Objective Optimization for Clustering Malware. SSCI 2021: 1-8 - 2020
- [j34]Duc C. Le, Nur Zincir-Heywood
:
A Frontier: Dependable, Reliable and Secure Machine Learning for Network/System Management. J. Netw. Syst. Manag. 28(4): 827-849 (2020) - [j33]Duc C. Le
, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning. IEEE Trans. Netw. Serv. Manag. 17(1): 30-44 (2020) - [j32]Nur Zincir-Heywood
, Giuliano Casale
, David Carrera
, Lydia Y. Chen
, Amogh Dhamdhere, Takeru Inoue
, Hanan Lutfiyya, Taghrid Samak:
Guest Editorial: Special Section on Data Analytics and Machine Learning for Network and Service Management-Part I. IEEE Trans. Netw. Serv. Manag. 17(4): 1971-1974 (2020) - [c162]Amir Khaleghi Moghaddam, Nur Zincir-Heywood:
Exploring data leakage in encrypted payload using supervised machine learning. ARES 2020: 74:1-74:10 - [c161]Duc C. Le, Nur Zincir-Heywood:
Exploring Adversarial Properties of Insider Threat Detection. CNS 2020: 1-9 - [c160]Rafael Copstein, Nur Zincir-Heywood:
Temporal Representations for Detecting BGP Blackjack Attacks. CNSM 2020: 1-7 - [c159]Zachary Wilkins, Nur Zincir-Heywood:
COUGAR: clustering of unknown malware using genetic algorithm routines. GECCO 2020: 1195-1203 - [c158]Zachary Wilkins, Ibrahim Zincir, Nur Zincir-Heywood:
Exploring an artificial arms race for malware detection. GECCO Companion 2020: 1537-1545 - [c157]Adam J. Campbell, Nur Zincir-Heywood:
Exploring Tunneling Behaviours in Malicious Domains With Self-Organizing Maps. SSCI 2020: 1419-1426 - [e6]Nur Zincir-Heywood, Mehmet Ulema, Müge Sayit, Stuart Clayman, Myung-Sup Kim, Cihat Cetinkaya:
16th International Conference on Network and Service Management, CNSM 2020, Izmir, Turkey, November 2-6, 2020. IEEE 2020, ISBN 978-3-903176-31-7 [contents]
2010 – 2019
- 2019
- [j31]Tien D. Phan
, Nur Zincir-Heywood:
User identification via neural network based language models. Int. J. Netw. Manag. 29(3) (2019) - [j30]Duc C. Le
, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Unsupervised Monitoring of Networkand Service Behaviour Using SelfOrganizing Maps. J. Cyber Secur. Mobil. 8(1): 15-52 (2019) - [j29]David Carrera
, Giuliano Casale
, Takeru Inoue
, Hanan Lutfiyya, Jia Wang, Nur Zincir-Heywood:
Guest Editorial: Special Issue on Novel Techniques in Big Data Analytics for Management. IEEE Trans. Netw. Serv. Manag. 16(3): 797-799 (2019) - [c156]Moath Bagarish, Riyad Alshammari, Nur Zincir-Heywood
:
Are There Bots even in FIFA World Cup 2018 Tweets? CNSM 2019: 1-5 - [c155]Pedro Ferreira, Duc C. Le, Nur Zincir-Heywood:
Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection. CNSM 2019: 1-7 - [c154]Mihir Joshi, Parmeet Singh, Nur Zincir-Heywood:
Compromised Tweet Detection Using Siamese Networks and fastText Representations. CNSM 2019: 1-5 - [c153]Ali Safari Khatouni
, Lan Zhang, Khurram Aziz, Ibrahim Zincir, Nur Zincir-Heywood:
Exploring NAT Detection and Host Identification Using Machine Learning. CNSM 2019: 1-8 - [c152]Duc C. Le, Nur Zincir-Heywood:
Learning From Evolving Network Data for Dependable Botnet Detection. CNSM 2019: 1-5 - [c151]Duc C. Le
, Malcolm I. Heywood
, Nur Zincir-Heywood:
Benchmarking genetic programming in dynamic insider threat detection. GECCO (Companion) 2019: 385-386 - [c150]Zachary Wilkins, Nur Zincir-Heywood:
Darwinian malware detectors: a comparison of evolutionary solutions to android malware. GECCO (Companion) 2019: 1651-1658 - [c149]Duc C. Le, Nur Zincir-Heywood:
Machine learning based Insider Threat Modelling and Detection. IM 2019: 1-6 - [c148]Sara Khanchi, Nur Zincir-Heywood, Malcolm I. Heywood:
Network Analytics for Streaming Traffic Analysis. IM 2019: 25-30 - [c147]Ali Safari Khatouni
, Ayse Nur Zincir-Heywood:
Integrating Machine Learning with Off-the-Shelf Traffic Flow Features for HTTP/HTTPS Traffic Classification. ISCC 2019: 1-7 - [c146]Mihir Joshi, Nur Zincir-Heywood:
Classification of Micro-Texts Using Sub-Word Embeddings. RANLP 2019: 526-533 - [c145]Duc C. Le, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Dynamic Insider Threat Detection Based on Adaptable Genetic Programming. SSCI 2019: 2579-2586 - [e5]Hanan Lutfiyya, Yixin Diao, Nur Zincir-Heywood, Rémi Badonnel, Edmundo R. M. Madeira:
15th International Conference on Network and Service Management, CNSM 2019, Halifax, NS, Canada, October 21-25, 2019. IEEE 2019, ISBN 978-3-903176-24-9 [contents] - [e4]Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro
:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6 [contents] - [r2]Duc C. Le
, Nur Zincir-Heywood:
Big Data in Network Anomaly Detection. Encyclopedia of Big Data Technologies 2019 - 2018
- [j28]Sara Khanchi, Ali Vahdat, Malcolm I. Heywood
, Nur Zincir-Heywood
:
On botnet detection with genetic programming under streaming data label budgets and class imbalance. Swarm Evol. Comput. 39: 123-140 (2018) - [j27]Giuliano Casale
, Yixin Diao
, Marco Mellia
, Rajiv Ranjan
, Nur Zincir-Heywood
:
Guest Editorial: Special Section on Advances in Big Data Analytics for Management. IEEE Trans. Netw. Serv. Manag. 15(1): 10-12 (2018) - [c144]Sara Khanchi, Ali Vahdat, Malcolm I. Heywood
, Nur Zincir-Heywood:
On botnet detection with genetic programming under streaming data, label budgets and class imbalance. GECCO (Companion) 2018: 21-22 - [c143]Duc C. Le
, Sara Khanchi, Nur Zincir-Heywood, Malcolm I. Heywood
:
Benchmarking evolutionary computation approaches to insider threat detection. GECCO 2018: 1286-1293 - [c142]Samuel Champagne, Tokunbo Makanju, Chengchao Yao, Nur Zincir-Heywood, Malcolm I. Heywood
:
A genetic algorithm for dynamic controller placement in software defined networking. GECCO (Companion) 2018: 1632-1639 - [c141]Sara Khanchi, Nur Zincir-Heywood, Malcolm I. Heywood
:
Streaming Botnet traffic analysis using bio-inspired active learning. NOMS 2018: 1-6 - [c140]Khalid Shahbar, Nur Zincir-Heywood
:
How far can we push flow analysis to identify encrypted anonymity network traffic? NOMS 2018: 1-6 - [c139]Nur Zincir-Heywood
, Tien D. Phan:
A language model for compromised user analysis. NOMS 2018: 1-4 - [c138]Duc C. Le
, Nur Zincir-Heywood
:
Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning. IEEE Symposium on Security and Privacy Workshops 2018: 270-275 - [c137]Rapahel Bronfman-Nadas, Nur Zincir-Heywood, John T. Jacobs:
An Artificial Arms Race: Could it Improve Mobile Malware Detectors? TMA 2018: 1-8 - 2017
- [j26]Yixin Diao, Nur Zincir-Heywood
:
Big data analytics for network and service management. Int. J. Netw. Manag. 27(4) (2017) - [j25]Fariba Haddadi
, Nur Zincir-Heywood
:
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform? Int. J. Netw. Manag. 27(4) (2017) - [j24]Khalid Shahbar, Nur Zincir-Heywood
:
Packet Momentum for Identificationof Anonymity Networks. J. Cyber Secur. Mobil. 6(1): 27-56 (2017) - [c136]Khalid Shahbar, Nur Zincir-Heywood
:
Weighted Factors for Evaluating Anonymity. FPS 2017: 303-318 - [c135]Adetokunbo Makanju, Nur Zincir-Heywood, Shinsaku Kiyomoto:
On evolutionary computation for moving target defense in software defined networks. GECCO (Companion) 2017: 287-288 - [c134]Sara Khanchi, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Properties of a GP active learning framework for streaming data with class imbalance. GECCO 2017: 945-952 - [c133]Nur Zincir-Heywood
, Günes Kayacik:
Evolutionary computation in network management and security: GECCO 2017 tutorial. GECCO (Companion) 2017: 1094-1112 - [c132]Olivia Lucca Fraser, Nur Zincir-Heywood
, Malcolm I. Heywood
, John T. Jacobs:
Return-oriented programme evolution with ROPER: a proof of concept. GECCO (Companion) 2017: 1447-1454 - [c131]Weikeng Chen, Xiao Luo, Nur Zincir-Heywood
:
Exploring a service-based normal behaviour profiling system for botnet detection. IM 2017: 947-952 - [c130]Khalid Shahbar, Nur Zincir-Heywood
:
Effects of Shared Bandwidth on Anonymity of the I2P Network Users. IEEE Symposium on Security and Privacy Workshops 2017: 235-240 - [c129]Khalid Shahbar, Nur Zincir-Heywood
:
An analysis of tor pluggable transports under adversarial conditions. SSCI 2017: 1-7 - [c128]Chengchao Yao, Xiao Luo, Nur Zincir-Heywood
:
Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks. SSCI 2017: 1-8 - 2016
- [j23]Fariba Haddadi, Nur Zincir-Heywood
:
Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification. IEEE Syst. J. 10(4): 1390-1401 (2016) - [c127]Sara Khanchi, Malcolm I. Heywood
, Nur Zincir-Heywood
:
On the Impact of Class Imbalance in GP Streaming Classification with Label Budgets. EuroGP 2016: 35-50 - [c126]Robert J. Smith
, Ayse Nur Zincir-Heywood
, Malcolm I. Heywood
, John T. Jacobs:
Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector. GECCO (Companion) 2016: 1095-1102 - [c125]Carola Doerr
, Julia Handl, Emma Hart, Gabriela Ochoa
, Amarda Shehu, Tea Tusar, Anya E. Vostinar, Christine Zarges, Nur Zincir-Heywood
:
Women@GECCO 2016 Chairs' Welcome. GECCO (Companion) 2016: 1447-1449 - [c124]Deepthi Rajashekar, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Smart Phone User Behaviour Characterization Based on Autoencoders and Self Organizing Maps. ICDM Workshops 2016: 319-326 - [c123]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
Autonomous system based flow marking scheme for IP-Traceback. NOMS 2016: 121-128 - [c122]Fariba Haddadi, Duong-Tien Phan, Nur Zincir-Heywood
:
How to choose from different botnet detection systems? NOMS 2016: 1079-1084 - [c121]Duc C. Le
, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Data analytics on network traffic flows for botnet behaviour detection. SSCI 2016: 1-7 - [p1]Jillian Morgan, Nur Zincir-Heywood
, John T. Jacobs:
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning. Recent Advances in Computational Intelligence in Defense and Security 2016: 249-273 - [e3]Rami S. Abielmona, Rafael Falcon, Nur Zincir-Heywood
, Hussein A. Abbass
:
Recent Advances in Computational Intelligence in Defense and Security. Studies in Computational Intelligence 621, Springer 2016, ISBN 978-3-319-26448-6 [contents] - 2015
- [j22]Can Bozdogan, Nur Zincir-Heywood
, Ibrahim Zincir:
EMITS: An Experience Management System for IT Management Support. Int. J. Softw. Eng. Knowl. Eng. 25(3): 513-550 (2015) - [j21]Riyad Alshammari, Nur Zincir-Heywood
:
Identification of VoIP encrypted traffic using a machine learning approach. J. King Saud Univ. Comput. Inf. Sci. 27(1): 77-92 (2015) - [j20]Riyad Alshammari, Nur Zincir-Heywood
:
How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP? J. Netw. Syst. Manag. 23(4): 830-869 (2015) - [c120]Eray Balkanli, Nur Zincir-Heywood
:
Highlights on analyzing one-way traffic using different tools. CISDA 2015: 1-8 - [c119]Khalid Shahbar, Nur Zincir-Heywood
:
Traffic flow analysis of tor pluggable transports. CNSM 2015: 178-181 - [c118]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
Deterministic flow marking for IPv6 traceback (DFM6). CNSM 2015: 270-273 - [c117]Xiao Luo, Revanth Nadanasabapathy, Nur Zincir-Heywood
, Keith Gallant, Janith Peduruge:
Predictive Analysis on Tracking Emails for Targeted Marketing. Discovery Science 2015: 116-130 - [c116]Serdar Baran Tatar, Andrew R. McIntyre, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Benchmarking Stream Clustering for Churn Detection in Dynamic Networks. Discovery Science 2015: 284-298 - [c115]Ali Vahdat, Jillian Morgan, Andrew R. McIntyre, Malcolm I. Heywood
, Nur Zincir-Heywood:
Tapped Delay Lines for GP Streaming Data Classification with Label Budgets. EuroGP 2015: 126-138 - [c114]Fariba Haddadi, Nur Zincir-Heywood
:
A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective. FPS 2015: 212-228 - [c113]Fariba Haddadi, Nur Zincir-Heywood
:
Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation. GECCO (Companion) 2015: 893-900 - [c112]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
A Proxy Identifier Based on Patterns in Traffic Flows. HASE 2015: 118-125 - [c111]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
Investigating unique flow marking for tracing back DDoS attacks. IM 2015: 762-765 - [c110]Fariba Haddadi, Duc Le Cong
, Laura Porter, Nur Zincir-Heywood
:
On the Effectiveness of Different Botnet Detection Approaches. ISPEC 2015: 121-135 - [c109]Eray Balkanli, Nur Zincir-Heywood, Malcolm I. Heywood
:
Feature selection for robust backscatter DDoS detection. LCN Workshops 2015: 611-618 - [c108]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
Probabilistic flow marking for IP traceback (PFM). RNDM@WMNC 2015: 229-236 - [e2]Frédéric Cuppens, Joaquín García-Alfaro
, Nur Zincir-Heywood, Philip W. L. Fong:
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8930, Springer 2015, ISBN 978-3-319-17039-8 [contents] - [r1]Ali Vahdat, Jillian Morgan, Andrew R. McIntyre, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Evolving GP Classifiers for Streaming Data Tasks with Concept Change and Label Budgets: A Benchmarking Study. Handbook of Genetic Programming Applications 2015: 451-480 - 2014
- [c107]Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, Nur Zincir-Heywood
:
Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers. AINA Workshops 2014: 7-12 - [c106]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
TDFA: Traceback-Based Defense against DDoS Flooding Attacks. AINA 2014: 597-604 - [c105]Jeevitha Mahendiran, Kirstie Hawkey, Nur Zincir-Heywood:
Exploring the need for visualizations in system administration tools. CHI Extended Abstracts 2014: 1429-1434 - [c104]Eray Balkanli, Jander Alves, Nur Zincir-Heywood
:
Supervised learning to detect DDoS attacks. CICS 2014: 50-57 - [c103]Khalid Shahbar, Nur Zincir-Heywood
:
Benchmarking two techniques for Tor classification: Flow level and circuit level classification. CICS 2014: 58-65 - [c102]Fariba Haddadi, Nur Zincir-Heywood
:
Data Confirmation for Botnet Traffic Analysis. FPS 2014: 329-336 - [c101]Fariba Haddadi, Dylan Runkel, Nur Zincir-Heywood, Malcolm I. Heywood
:
On botnet behaviour analysis using GP and C4.5. GECCO (Companion) 2014: 1253-1260 - [c100]Eray Balkanli, Nur Zincir-Heywood
:
On the analysis of backscatter traffic. LCN Workshops 2014: 671-678 - [c99]Hossein Rahimi, Tuerxun Maimaiti, Nur Zincir-Heywood
:
A case study for a secure and robust geo-fencing and access control framework. NOMS 2014: 1-8 - [c98]Yasemin Gokcen, Vahid Aghaei Foroushani, Nur Zincir-Heywood:
Can We Identify NAT Behavior by Analyzing Traffic Flows? IEEE Symposium on Security and Privacy Workshops 2014: 132-139 - [e1]Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro
, Nur Zincir-Heywood:
Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8352, Springer 2014, ISBN 978-3-319-05301-1 [contents] - 2013
- [j19]Vahid Aghaei Foroushani, Nur Zincir-Heywood:
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation. EURASIP J. Inf. Secur. 2013: 5 (2013) - [c97]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
Deterministic and Authenticated Flow Marking for IP Traceback. AINA 2013: 397-404 - [c96]Fariba Haddadi, Nur Zincir-Heywood:
Analyzing string format-based classifiers for botnet detection: GP and SVM. IEEE Congress on Evolutionary Computation 2013: 2626-2633 - [c95]Patrick LaRoche, Aimee Burrows, Nur Zincir-Heywood
:
How far an evolutionary approach can go for protocol state analysis and discovery. IEEE Congress on Evolutionary Computation 2013: 3228-3235 - [c94]Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher:
Indoor geo-fencing and access control for wireless networks. CICS 2013: 1-8 - [c93]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
Investigating application behavior in network traffic traces. CISDA 2013: 72-79 - [c92]Ozge Yeloglu, Evangelos E. Milios
, Nur Zincir-Heywood
:
Beyond term clusters: assigning Wikipedia concepts to scientific documents. ACM Symposium on Document Engineering 2013: 233-234 - [c91]Fariba Haddadi, Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Malicious Automatically Generated Domain Name Detection Using Stateful-SBB. EvoApplications 2013: 529-539 - [c90]Sara Rahimi, Andrew R. McIntyre, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Label free change detection on streaming data with cooperative multi-objective genetic programming. GECCO (Companion) 2013: 159-160 - [c89]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Investigating event log analysis with minimum apriori information. IM 2013: 962-968 - [c88]Can Bozdogan, Nur Zincir-Heywood, Yasemin Gokcen:
Automatic optimization for a clustering based approach to support IT management. IM 2013: 1233-1236 - [c87]Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
On Evaluating IP Traceback Schemes: A Practical Perspective. IEEE Symposium on Security and Privacy Workshops 2013: 127-134 - 2012
- [j18]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
A Lightweight Algorithm for Message Type Extraction in System Application Logs. IEEE Trans. Knowl. Data Eng. 24(11): 1921-1936 (2012) - [c86]Ali Vahdat, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Symbiotic evolutionary subspace clustering. IEEE Congress on Evolutionary Computation 2012: 1-8 - [c85]Patrick LaRoche, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Network Protocol Discovery and Analysis via Live Interaction. EvoApplications 2012: 11-20 - [c84]Aaron Atwater, Malcolm I. Heywood
, Nur Zincir-Heywood
:
GP under streaming data constraints: a case for pareto archiving? GECCO 2012: 703-710 - [c83]Riyad Alshammari, Nur Zincir-Heywood
:
The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic. ICCCN 2012: 1-8 - [c82]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Interactive learning of alert signatures in High Performance Cluster system logs. NOMS 2012: 52-60 - [c81]Can Bozdogan, Nur Zincir-Heywood
:
Data mining for supporting IT management. NOMS 2012: 1378-1385 - [c80]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
, Markus Latzel:
Spatio-temporal decomposition, clustering and identification for alert detection in system logs. SAC 2012: 621-628 - 2011
- [j17]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Appl. Soft Comput. 11(7): 4366-4383 (2011) - [j16]Riyad Alshammari, Nur Zincir-Heywood
:
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Comput. Networks 55(6): 1326-1350 (2011) - [j15]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evol. Intell. 4(4): 243-266 (2011) - [j14]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Robust learning intrusion detection for attacks on wireless networks. Intell. Data Anal. 15(5): 801-823 (2011) - [c79]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
System State Discovery Via Information Content Clustering of System Logs. ARES 2011: 301-306 - [c78]Riyad Alshammari, Nur Zincir-Heywood
:
Is machine learning losing the battle to produce transportable signatures against VoIP traffic? IEEE Congress on Evolutionary Computation 2011: 1543-1550 - [c77]Patrick LaRoche, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Exploring the state space of an application protocol: A case study of SMTP. CICS 2011: 152-159 - [c76]Carlos Bacquet, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. CICS 2011: 194-201 - [c75]Daniel J. Arndt, Nur Zincir-Heywood
:
A Comparison of three machine learning techniques for encrypted network traffic analysis. CISDA 2011: 107-114 - [c74]Curtis McCarthy, Nur Zincir-Heywood
:
An investigation on identifying SSL traffic. CISDA 2011: 115-122 - [c73]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
A next generation entropy based framework for alert detection in system logs. Integrated Network Management 2011: 626-629 - [c72]Ozge Yeloglu, Evangelos E. Milios
, Nur Zincir-Heywood
:
Multi-document summarization of scientific corpora. SAC 2011: 252-258 - [c71]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Storage and retrieval of system log events using a structured schema based on message type transformation. SAC 2011: 528-533 - 2010
- [j13]Yongzheng Zhang, Evangelos E. Milios
, Nur Zincir-Heywood
:
Topic-based web site summarization. Int. J. Web Inf. Syst. 6(4): 266-303 (2010) - [c70]Natasha Bodorik, Nur Zincir-Heywood
:
One Size Fits None: The Importance of Detector Parameterization. ARES 2010: 487-494 - [c69]Riyad Alshammari, Nur Zincir-Heywood
:
Unveiling Skype encrypted tunnels using GP. IEEE Congress on Evolutionary Computation 2010: 1-8 - [c68]Carlos Bacquet, Nur Zincir-Heywood
, Malcolm I. Heywood
:
An analysis of clustering objectives for feature selection applied to encrypted traffic identification. IEEE Congress on Evolutionary Computation 2010: 1-8 - [c67]Ali Vahdat, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Bottom-up evolutionary subspace clustering. IEEE Congress on Evolutionary Computation 2010: 1-8 - [c66]Riyad Alshammari, Nur Zincir-Heywood
:
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. CNSM 2010: 310-313 - [c65]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Fast entropy based alert detection in super computer logs. DSN Workshops 2010: 52-58 - [c64]Patrick LaRoche, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Using Code Bloat to Obfuscate Evolved Network Traffic. EvoApplications (2) 2010: 101-110 - [c63]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs. QEST 2010: 69-78
2000 – 2009
- 2009
- [c62]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
, Stefan Burschka:
Generating mimicry attacks using genetic programming: A benchmarking study. CICS 2009: 136-143 - [c61]Riyad Alshammari, Nur Zincir-Heywood
:
Generalization of signatures for SSH encrypted traffic identification. CICS 2009: 167-174 - [c60]Riyad Alshammari, Nur Zincir-Heywood
:
Machine learning based encrypted traffic classification: Identifying SSH and Skype. CISDA 2009: 1-8 - [c59]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
, Stefan Burschka:
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing. CISDA 2009: 1-8 - [c58]Patrick LaRoche, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Evolving TCP/IP packets: A case study of port scans. CISDA 2009: 1-8 - [c57]Carlos Bacquet, Nur Zincir-Heywood
, Malcolm I. Heywood
:
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification. CISIS 2009: 93-100 - [c56]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
, Stefan Burschka:
Testing Detector Parameterization Using Evolutionary Exploit Generation. EvoWorkshops 2009: 105-110 - [c55]Riyad Alshammari, Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood:
Classifying SSH encrypted traffic with minimum packet header features using genetic programming. GECCO (Companion) 2009: 2539-2546 - [c54]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Clustering event logs using iterative partitioning. KDD 2009: 1255-1264 - 2008
- [c53]Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Adaptabilty of a GP Based IDS on Wireless Networks. ARES 2008: 310-318 - [c52]Melanie Tupper, Nur Zincir-Heywood
:
VEA-bility Security Metric: A Network Security Analysis Tool. ARES 2008: 950-957 - [c51]Duffy Angevine, Nur Zincir-Heywood
:
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. ARES 2008: 1075-1079 - [c50]Ashley George, Adetokunbo Makanju, Evangelos E. Milios
, Nur Zincir-Heywood
, Markus Latzel, Sotirios Stergiopoulos:
NetPal: a dynamic network administration knowledge base. CASCON 2008: 20 - [c49]Riyad Alshammari, Nur Zincir-Heywood
:
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification. CISIS 2008: 203-210 - [c48]Ashley George, Adetokunbo Makanju, Nur Zincir-Heywood
, Evangelos E. Milios
:
Information Retrieval in Network Administration. CNSR 2008: 561-568 - [c47]Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood
, Evangelos E. Milios
:
LogView: Visualizing Event Log Clusters. PST 2008: 99-108 - [c46]Riyad Alshammari, Nur Zincir-Heywood
:
Investigating Two Different Approaches for Encrypted Traffic Classification. PST 2008: 156-166 - [c45]Hilmi Günes Kayacik, Nur Zincir-Heywood:
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? PST 2008: 213-223 - 2007
- [j12]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood
:
A hierarchical SOM-based intrusion detection system. Eng. Appl. Artif. Intell. 20(4): 439-451 (2007) - [j11]Yongzheng Zhang, Evangelos E. Milios, Nur Zincir-Heywood:
A Comparative Study on Key Phrase Extraction Methods in Automatic Web Site Summarization. J. Digit. Inf. Manag. 5(5): 323-332 (2007) - [c44]Hilmi Günes Kayacik, Nur Zincir-Heywood
:
On the Contribution of Preamble to Information Hiding in Mimicry Attacks. AINA Workshops (1) 2007: 632-638 - [c43]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Automatically Evading IDS Using GP Authored Attacks. CISDA 2007: 153-160 - [c42]Adetokunbo Makanju, Patrick LaRoche, Nur Zincir-Heywood
:
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks. CISDA 2007: 213-219 - [c41]Hilmi Günes Kayacik, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Evolving Buffer Overflow Attacks with Detector Feedback. EvoWorkshops 2007: 11-20 - [c40]Xiao Luo, Nur Zincir-Heywood
:
Incorporating Temporal Information for Document Classification. ICDE Workshops 2007: 780-789 - [c39]Ozge Yeloglu, Nur Zincir-Heywood, Malcolm I. Heywood
:
Growing recurrent self organizing map. SMC 2007: 290-295 - [c38]Riyad Alshammari, Nur Zincir-Heywood:
A flow based approach for SSH traffic detection. SMC 2007: 296-301 - 2006
- [j10]Suihong Liang, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Adding more intelligence to the network routing problem: AntNet and Ga-agents. Appl. Soft Comput. 6(3): 244-257 (2006) - [c37]Xiao Luo, Nur Zincir-Heywood:
Evolving Recurrent Linear-GP for Document Classification and Word Tracking. IEEE Congress on Evolutionary Computation 2006: 2436-2443 - [c36]Patrick LaRoche, Nur Zincir-Heywood
:
Genetic Programming Based WiFi Data Link Layer Attack Detection. CNSR 2006: 285-292 - [c35]Yeming Hu, Nur Zincir-Heywood
:
Modeling User Behaviors from FTP Server Logs. CNSR 2006: 320-322 - [c34]Patrick LaRoche, Nur Zincir-Heywood
:
802.11 De-authentication Attack Detection Using Genetic Programming. EuroGP 2006: 1-12 - [c33]Hilmi Günes Kayacik, Malcolm I. Heywood
, Nur Zincir-Heywood
:
On evolving buffer overflow attacks using genetic programming. GECCO 2006: 1667-1674 - [c32]Hilmi Günes Kayacik, Nur Zincir-Heywood:
Using self-organizing maps to build an attack map for forensic analysis. PST 2006: 33 - 2005
- [j9]Zhongmin Shi, Evangelos E. Milios
, Nur Zincir-Heywood
:
Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources. J. Intell. Inf. Syst. 25(1): 69-93 (2005) - [j8]Leigh Wetmore, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection. Neural Process. Lett. 22(1): 17-32 (2005) - [j7]Dong Song, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Trans. Evol. Comput. 9(3): 225-239 (2005) - [c31]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood
:
Evolving Successful Stack Overflow Attacks for Vulnerability Testing. ACSAC 2005: 225-234 - [c30]Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood:
CasGP: building cascaded hierarchical models using niching. Congress on Evolutionary Computation 2005: 1180-1187 - [c29]Hilmi Günes Kayacik, Nur Zincir-Heywood
:
Generating Representative Traffic for Intrusion Detection System Benchmarking. CNSR 2005: 112-117 - [c28]Xiaosong Hu, Nur Zincir-Heywood
:
Understanding the Performance of Cooperative Web Caching Systems. CNSR 2005: 183-188 - [c27]Patrick LaRoche, Nur Zincir-Heywood:
802.11 network intrusion detection using genetic programming. GECCO Workshops 2005: 170-171 - [c26]Xiao Luo, Malcolm I. Heywood
, Nur Zincir-Heywood
:
Evolving recurrent models using linear GP. GECCO 2005: 1787-1788 - [c25]Leigh Wetmore, Ayse Nur Zincir-Heywood
, Malcolm I. Heywood
:
Training the SOFM efficiently: an example from intrusion detection. IJCNN 2005: 1575-1580 - [c24]Xiao Luo, Nur Zincir-Heywood
:
Comparison of a SOM based sequence analysis system and naive Bayesian classifier for spam filtering. IJCNN 2005: 2571-2576 - [c23]Hilmi Günes Kayacik, Nur Zincir-Heywood
:
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. ISI 2005: 362-367 - [c22]Xiao Luo, Nur Zincir-Heywood
:
Evaluation of Two Systems on Multi-class Multi-label Document Classification. ISMIS 2005: 161-169 - [c21]Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. PST 2005 - [c20]Yongzheng Zhang, Nur Zincir-Heywood
, Evangelos E. Milios
:
Narrative text classification for automatic key phrase extraction in web document corpora. WIDM 2005: 51-58 - 2004
- [j6]Turhan Tunali, Nur Zincir-Heywood
:
A heuristic approach to network optimised mapping of a distributed resource discovery architecture. Int. J. Comput. Appl. Technol. 19(1): 43-50 (2004) - [j5]Yongzheng Zhang, Nur Zincir-Heywood, Evangelos E. Milios:
World Wide Web site summarization. Web Intell. Agent Syst. 2(1): 39-53 (2004) - [c19]Yongzheng Zhang, Nur Zincir-Heywood
, Evangelos E. Milios:
Term-Based Clustering and Summarization of Web Page Collections. Canadian AI 2004: 60-74 - [c18]Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood:
Cascaded GP models for data mining. IEEE Congress on Evolutionary Computation 2004: 2258-2264 - [c17]Hilmi Günes Kayacik, Nur Zincir-Heywood
, Malcolm I. Heywood
:
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection. CNSR 2004: 181-189 - [c16]Yan Zhou, Nur Zincir-Heywood
:
Intelligent Agents for Routing on Mobile Ad-Hoc Networks. CNSR 2004: 249-254 - [c15]Haihua Yun, Nur Zincir-Heywood
:
Intelligent Ants for Adaptive Network Routing. CNSR 2004: 255-261 - [c14]Xiao Luo, Nur Zincir-Heywood:
Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs. IC-AI 2004: 977-983 - [c13]Xiao Luo, Nur Zincir-Heywood
:
Analyzing the Temporal Sequences for Text Categorization. KES 2004: 498-505 - 2003
- [c12]Ernst W. Grundke, Nur Zincir-Heywood
:
A Uniform Continuum Model for Scaling of Ad Hoc Networks. ADHOC-NOW 2003: 96-103 - [c11]Zhongmin Shi, Evangelos E. Milios
, Nur Zincir-Heywood
:
Post-supervised Template Induction for Dynamic Web Sources. AI 2003: 268-282 - [c10]Yongzheng Zhang, Nur Zincir-Heywood
, Evangelos E. Milios
:
Summarizing Web Sites Automatically. AI 2003: 283-296 - [c9]Dong Song, Malcolm I. Heywood
, Nur Zincir-Heywood
:
A Linear Genetic Programming Approach to Intrusion Detection. GECCO 2003: 2325-2336 - [c8]Xiao Luo, Ayse Nur Zincir-Heywood:
A comparison of SOM based document categorization systems. IJCNN 2003: 1786-1791 - [c7]Hilmi Günes Kayacik, Ayse Nur Zincir-Heywood, Malcolm I. Heywood:
On the capability of an SOM based intrusion detection system. IJCNN 2003: 1808-1813 - [c6]Hilmi Günes Kayacik, Nur Zincir-Heywood:
A Case Study of Three Open Source Security Management Tools. Integrated Network Management 2003: 101-104 - [c5]Dyan J. Tufts-Conrad, Nur Zincir-Heywood, David Zitner:
SOM - Feature Extraction from Patient Discharge Summaries. SAC 2003: 263-267 - 2002
- [j4]Nur Zincir-Heywood
, Malcolm I. Heywood
, Chris R. Chatwin:
Object-Orientated Design of Digital Library Platforms for Multiagent Environments. IEEE Trans. Knowl. Data Eng. 14(2): 281-295 (2002) - [j3]Malcolm I. Heywood
, Nur Zincir-Heywood
:
Dynamic page based crossover in linear genetic programming. IEEE Trans. Syst. Man Cybern. Part B 32(3): 380-388 (2002) - [c4]Suiliong Liang, Nur Zincir-Heywood, Malcolm I. Heywood
:
The effect of routing under local information using a social insect metaphor. IEEE Congress on Evolutionary Computation 2002: 1438-1443 - [c3]Suihong Liang, Nur Zincir-Heywood, Malcolm I. Heywood:
Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm. GECCO 2002: 88-96 - 2000
- [j2]Nur Zincir-Heywood
, Malcolm I. Heywood
, Chris R. Chatwin, Turhan Tunali:
Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search. Int. J. Cooperative Inf. Syst. 9(3): 229-254 (2000) - [j1]Malcolm I. Heywood
, Nur Zincir-Heywood
, Chris R. Chatwin:
Digital library query clearing using clustering and fuzzy decision-making. Inf. Process. Manag. 36(4): 571-583 (2000) - [c2]Malcolm I. Heywood
, Nur Zincir-Heywood
:
Register Based Genetic Programming on FPGA Computing Platforms. EuroGP 2000: 44-59 - [c1]Malcolm I. Heywood, Ayse Nur Zincir-Heywood:
Page-based linear genetic programming. SMC 2000: 3823-3828
1990 – 1999
- 1998
- [b1]Ayse Nur Zincir-Heywood:
İnternet üzerinde yeni bir bilgi tarama sisteminin tasarımı, gerçekleştirilmesi ve başarım değerlendirmesi (The Design, development and performance analysis of a new information retriveal system over internet). Ege University, Turkey, 1998
Coauthor Index
aka: Marwa A. Elsayed
aka: Günes Kayacik
aka: Duc Le Cong

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-08 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint