Follow
Mahbod Tavallaee
Mahbod Tavallaee
Verified email at ibm.com
Title
Cited by
Cited by
Year
A detailed analysis of the KDD CUP 99 data set
M Tavallaee, E Bagheri, W Lu, AA Ghorbani
2009 IEEE symposium on computational intelligence for security and defense …, 2009
54772009
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
A Shiravi, H Shiravi, M Tavallaee, AA Ghorbani
computers & security 31 (3), 357-374, 2012
14252012
Toward credible evaluation of anomaly-based intrusion-detection methods
M Tavallaee, N Stakhanova, AA Ghorbani
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
3932010
Network intrusion detection and prevention: concepts and techniques
AA Ghorbani, W Lu, M Tavallaee
Springer Science & Business Media, 2009
3622009
Automatic discovery of botnet communities on large-scale communication networks
W Lu, M Tavallaee, AA Ghorbani
Proceedings of the 4th international symposium on information, computer, and …, 2009
1062009
BotCop: An online botnet traffic classifier
W Lu, M Tavallaee, G Rammidi, AA Ghorbani
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
772009
Nsl-kdd dataset
M Tavallaee, E Bagheri, W Lu, AA Ghorbani
Available on http://www. unb. ca/research/iscx/dataset/iscx-NSL-KDD-dataset …, 2012
602012
A novel covariance matrix based approach for detecting network anomalies
M Tavallaee, W Lu, SA Iqbal, AA Ghorbani
6th annual communication networks and services research conference (cnsr …, 2008
452008
Detecting network anomalies using different wavelet basis functions
W Lu, M Tavallaee, AA Ghorbani
6th annual communication networks and services research conference (CNSR …, 2008
392008
Online classification of network flows
M Tavallaee, W Lu, AA Ghorbani
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
332009
Network attacks
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 1-25, 2010
282010
An adaptive hybrid intrusion detection system
M Tavallaee
The University of New Brunswick, 2011
212011
Detection approaches
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 27-53, 2010
162010
Evaluation criteria
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 161-183, 2010
132010
Alert management and correlation
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 129-160, 2010
122010
Intrusion response
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 185-198, 2010
52010
Data collection
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 55-71, 2010
52010
Theoretical foundation of detection
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 73-114, 2010
42010
Hybrid traffic classification approach based on decision tree
W Lu, M Tavallaee, AA Ghorbani
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
42009
Architecture and implementation
AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani, W Lu, M Tavallaee
Network Intrusion Detection and Prevention: Concepts and Techniques, 115-127, 2010
32010
The system can't perform the operation now. Try again later.
Articles 1–20