Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems

Guy Helmer , Johnny Wong , Mark Slagell , Vasant Honavar
International Journal of Information and Computer Security 1 ( 1) 109 -142

54
2007
Application-layer denial of service attacks: taxonomy and survey

Georgios Mantas , Natalia Stakhanova , Hugo Gonzalez , Hossein Hadian Jazi
International Journal of Information and Computer Security 7 ( 2) 216 -239

17
2015
A Framework for Cost Sensitive Assessment of Intrusion Response Selection

Chris Strasburg , Natalia Stakhanova , Samik Basu , Johnny S. Wong
computer software and applications conference 1 355 -360

37
2009
Analysis of Metrics for Classification Accuracy in Intrusion Detection

Natalia Stakhanova , Alvaro A. Cardenas
CRC Press 173 -199

1
2017
Towards cost-sensitive assessment of intrusion response selection

Natalia Stakhanova , Chris Strasburg , Samik Basu , Johnny S. Wong
Journal of Computer Security 20 ( 2) 169 -198

16
2012
Understanding Android Financial MalwareAttacks:Taxonomy, Characterization,and Challenges

Andi Fitriah Abdul Kadir , Natalia Stakhanova , Ali A. Ghorbani ,
Journal of Cyber Security and Mobility 7 ( 3) 1 -52

13
2018
Detecting machine-morphed malware variants via engine attribution

Radhouane Chouchane , Natalia Stakhanova , Andrew Walenstein , Arun Lakhotia
Journal of Computer Virology and Hacking Techniques 9 ( 3) 137 -157

10
2013
Android Botnets: What URLs are Telling Us

Andi Fitriah Abdul Kadir , Natalia Stakhanova , Ali Akbar Ghorbani
Network and System Security 78 -91

43
2015
Towards Eidetic Blockchain Systems with Enhanced Provenance

Shlomi Linoy , Suprio Ray , Natalia Stakhanova
2020 IEEE 36th International Conference on Data Engineering Workshops (ICDEW) 7 -10

2020
DroidKin: Lightweight Detection of Android Apps Similarity

Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
security and privacy in communication networks 436 -453

76
2014
Selective regular expression matching

Natalia Stakhanova , Hanli Ren , Ali A. Ghorbani
international conference on information security 226 -240

3
2010
Measuring code reuse in Android apps

Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
conference on privacy security and trust 187 -195

3
2016
Unmasking Android Obfuscation Tools Using Spatial Analysis

Ratinder Kaur , Ye Ning , Hugo Gonzalez , Natalia Stakhanova
conference on privacy security and trust 1 -10

8
2018
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering

Junaid Iqbal , Ratinder Kaur , Natalia Stakhanova
availability, reliability and security

2019
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods

Mahbod Tavallaee , Natalia Stakhanova , Ali Akbar Ghorbani
systems man and cybernetics 40 ( 5) 516 -524

341
2010
Managing intrusion detection rule sets

Natalia Stakhanova , Ali A. Ghorbani
european workshop on system security 29 -35

16
2010
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters

Marc Antoine Gosselin-Lavigne , Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
availability, reliability and security 516 -521

3
2015
Exploring network-based malware classification

Natalia Stakhanova , Mathieu Couture , Ali A. Ghorbani
international conference on malicious and unwanted software 14 -20

11
2011
Enriching reverse engineering through visual exploration of Android binaries

Ashutosh Jain , Hugo Gonzalez , Natalia Stakhanova
Proceedings of the 5th Program Protection and Reverse Engineering Workshop 9

11
2015
Towards effective feature selection in machine learning-based botnet detection approaches

Elaheh Biglar Beigi , Hossein Hadian Jazi , Natalia Stakhanova , Ali A. Ghorbani
communications and networking symposium 247 -255

292
2014