Search

Your search keyword '"Ghorbani, Ali"' showing total 224 results

Search Constraints

Start Over You searched for: Author "Ghorbani, Ali" Remove constraint Author: "Ghorbani, Ali" Publication Type eBooks Remove constraint Publication Type: eBooks
224 results on '"Ghorbani, Ali"'

Search Results

1. Graph-Based Classification of IoT Malware Families Enhanced by Fuzzy Hashing

3. Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment

6. A Detailed Analysis of the CICIDS2017 Data Set

7. Generating Phishing Emails Using Graph Database

8. DNA-Droid: A Real-Time Android Ransomware Detection Framework

9. An Entropy Based Encrypted Traffic Classifier

10. Detecting Malicious URLs Using Lexical Analysis

17. Data Collection

18. Network Attacks

19. DroidKin: Lightweight Detection of Android Apps Similarity

21. Android Botnets: What URLs are Telling Us

22. Classifying Organizational Roles Using Email Social Networks

23. Lexical-Syntactical Patterns for Subjectivity Analysis of Social Issues

25. Group Behavior Metrics for P2P Botnet Detection

26. Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation

27. Selective Regular Expression Matching

28. IDS Alert Visualization and Monitoring through Heuristic Host Selection

29. An Online Adaptive Approach to Alert Correlation

30. Y-Means: An Autonomous Clustering Algorithm

31. Automatic Discovery of Network Applications: A Hybrid Approach

33. An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering

38. Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process

39. A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines

42. Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems

43. Using Web Services to Control Remote Instruments for Online Experiment Systems

44. SWAMI: Searching the Web Using Agents with Mobility and Intelligence

45. SVision: A Network Host-Centered Anomaly Visualization Technique

46. The Reconstruction of the Interleaved Sessions from a Server Log

Catalog

Books, media, physical & digital resources