Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets HG Kayacik, AN Zincir-Heywood, MI Heywood Proceedings of the third annual conference on privacy, security and trust 94 …, 2005 | 561 | 2005 |
Clustering event logs using iterative partitioning AAO Makanju, AN Zincir-Heywood, EE Milios Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 383 | 2009 |
Machine learning based encrypted traffic classification: Identifying ssh and skype R Alshammari, AN Zincir-Heywood 2009 IEEE symposium on computational intelligence for security and defense …, 2009 | 291 | 2009 |
Host-based intrusion detection using self-organizing maps P Lichodzijewski, AN Zincir-Heywood, MI Heywood Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002 | 256 | 2002 |
On the capability of an SOM based intrusion detection system HG Kayacık, AN Zincir-Heywood, MI Heywood IEEE-INNS International Joint Conference on Neural Networks. Pp 1808-1813, 2003., 2003 | 229 | 2003 |
A hierarchical SOM-based intrusion detection system HG Kayacik, AN Zincir-Heywood, MI Heywood Engineering applications of artificial intelligence 20 (4), 439-451, 2007 | 224 | 2007 |
Training genetic programming on half a million patterns: an example from anomaly detection D Song, MI Heywood, AN Zincir-Heywood IEEE transactions on evolutionary computation 9 (3), 225-239, 2005 | 201 | 2005 |
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? R Alshammari, AN Zincir-Heywood Computer networks 55 (6), 1326-1350, 2011 | 189 | 2011 |
A lightweight algorithm for message type extraction in system application logs A Makanju, AN Zincir-Heywood, EE Milios IEEE Transactions on Knowledge and Data Engineering 24 (11), 1921-1936, 2011 | 170 | 2011 |
World wide web site summarization Y Zhang, N Zincir-Heywood, E Milios Web intelligence and agent systems: an international journal 2 (1), 39-53, 2004 | 131 | 2004 |
Analyzing data granularity levels for insider threat detection using machine learning DC Le, N Zincir-Heywood, MI Heywood IEEE Transactions on Network and Service Management 17 (1), 30-44, 2020 | 129 | 2020 |
NetPal: A Dynamic Network Administration Knowledge Base A George, A Makanju, E Milios, N Zincir-Heywood, M Latzel, ... Proceedings of the 2008 conference of the center for advanced studies on …, 2008 | 115 | 2008 |
A flow based approach for SSH traffic detection R Alshammari, AN Zincir-Heywood 2007 IEEE international conference on systems, man and cybernetics, 296-301, 2007 | 96 | 2007 |
Evaluation of two systems on multi-class multi-label document classification X Luo, AN Zincir-Heywood International Symposium on Methodologies for Intelligent Systems, 161-169, 2005 | 94 | 2005 |
Logview: Visualizing event log clusters A Makanju, S Brooks, AN Zincir-Heywood, EE Milios 2008 Sixth Annual Conference on Privacy, Security and Trust, 99-108, 2008 | 91 | 2008 |
Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification F Haddadi, AN Zincir-Heywood IEEE Systems journal 10 (4), 1390-1401, 2014 | 85 | 2014 |
Narrative text classification for automatic key phrase extraction in web document corpora Y Zhang, N Zincir-Heywood, E Milios Proceedings of the 7th annual ACM international workshop on Web information …, 2005 | 85 | 2005 |
A linear genetic programming approach to intrusion detection D Song, MI Heywood, AN Zincir-Heywood Genetic and Evolutionary Computation—GECCO 2003: Genetic and Evolutionary …, 2003 | 83 | 2003 |
Exploring feature normalization and temporal information for machine learning based insider threat detection P Ferreira, DC Le, N Zincir-Heywood 2019 15th International Conference on Network and Service Management (CNSM), 1-7, 2019 | 81 | 2019 |
Anomaly detection for insider threats using unsupervised ensembles DC Le, N Zincir-Heywood IEEE Transactions on Network and Service Management 18 (2), 1152-1164, 2021 | 78 | 2021 |