Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones

J. Alzahran Abdullah , Nataliav Stakhanoa , Hugo Gonzalezand Ali , A. Ghorbani
Journal of Cyber Security and Mobility 3 ( 2) 89 -132

3
2014
Trust framework for P2P networks using peer-profile based anomaly technique

N. Stakhanova , S. Basu , J. Wong , O. Stakhanov
international conference on distributed computing systems workshops 203 -209

22
2005
DroidKin: Lightweight Detection of Android Apps Similarity

and A. Ghorbani. H. Gonzalez , N. Stakhanova
10th International Conference on Security and Privacy in Communication Networks

Internet Technology

Z Song , D Chaki , A Lakhdari , A Bouguettaya
ACM Transactions on Internet Technology 24 ( 1)

2024
D. Gritzalis and S. De Capitani di Vimercati 165

JL Ferrer-Gomilla , JA Onieva , M Payeras , J Lopez

Code Authorship Attribution: Methods and Challenges Code Authorship Attribution: Methods and Challenges

VAIBHAVI KALGUTKAR , RATINDER KAUR , HUGO GONZALEZ , NATALIA STAKHANOVA

A Reputation-based Trust Management in Peer-to-Peer Network Systems.

Natalia Stakhanova , Johnny S. Wong , Ying Cai , Sergio Ferrero
ISCA PDCS 510 -515

26
2004
Automated caching of behavioral patterns for efficient run-time

Natalia Stakhanova , Robyn R. Lutz , Samik Basu , Johnny S. Wong

2006
2013 Eleventh annual conference on privacy, security and trust

Jordi Castella-Roca , Natalia Stakhanova , Joaquin Garcia-Alfaro , Josep Domingo-Ferrer
IEEE 390

2013
Code Authorship Attribution: Methods and Challenges

Vaibhavi Kalgutkar , Ratinder Kaur , Hugo Gonzalez , Natalia Stakhanova
ACM Computing Surveys 52 ( 1) 3

70
2019
A Behavioral Model of Ideologically-motivated Snowball Attacks

Natalia Stakhanova , Oleg Stakhanov , Ali Ghorbani
availability, reliability and security 88 -95

2
2008
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps

Ratinder Kaur , Yan Li , Junaid Iqbal , Hugo Gonzalez
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 02 492 -497

20
2018
An Entropy Based Encrypted Traffic Classifier

Mohammad Saiful Islam Mamun , Ali A. Ghorbani , Natalia Stakhanova
international conference on information and communication security 282 -294

26
2015
Android authorship attribution through string analysis

Vaibhavi Kalgutkar , Natalia Stakhanova , Paul Cook , Alina Matyukhina
availability, reliability and security 4

10
2018
An online adaptive approach to alert correlation

Hanli Ren , Natalia Stakhanova , Ali A. Ghorbani
international conference on detection of intrusions and malware and vulnerability assessment 153 -172

46
2010
On the symbiosis of specification-based and anomaly-based detection

Natalia Stakhanova , Samik Basu , Johnny Wong
Computers & Security 29 ( 2) 253 -268

19
2010
A taxonomy of intrusion response systems

Natalia Stakhanova , Samik Basu , Johnny Wong
International Journal of Information and Computer Security 1 ( 1) 169 -184

147
2007