Network Intrusion Detection and Prevention: Concepts and Techniques

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee ,
Network Intrusion Detection and Prevention: Concepts and Techniques 1st 47 216 -216

307
2009
Clustering botnet communication traffic based on n-gram feature selection

Wei Lu , Goaletsa Rammidi , Ali A. Ghorbani
Computer Communications 34 ( 3) 502 -514

131
2011
Phylogenetic analysis using Bayesian model

Wei Lu , Mike Hanrahan
Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education 1 -4

2014
Botnet detection based on traffic behavior analysis and flow intervals

David Zhao , Issa Traore , Bassam Sayed , Wei Lu
Computers & Security 39 2 -16

403
2013
Classification of Web Applications Using AiFlow Features

Nathanael Mercaldo , Wei Lu
advanced information networking and applications 389 -399

2020
Characterizing Command and Control Channel of Mongoose Bots Over TOR

Wei Lu , Nathanael Mercaldo , Chance Tellier
International Conference on Wireless Intelligent and Distributed Environment for Communication 23 -30

2020
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm

Wei Lu , Issa Traore
International Journal of Information and Computer Security 2 ( 2) 107 -139

13
2008
Detecting Network Anomalies Using Different Wavelet Basis Functions

Wei Lu , Mahbod Tavallaee , Ali A. Ghorbani
conference on communication networks and services research 149 -156

36
2008
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies

Mahbod Tavallaee , Wei Lu , Shah Arif Iqbal , Ali A. Ghorbani
conference on communication networks and services research 75 -81

28
2008
BotCop: An Online Botnet Traffic Classifier

Wei Lu , Mahbod Tavallaee , Goaletsa Rammidi , Ali A. Ghorbani
conference on communication networks and services research 70 -77

44
2009
Online Classification of Network Flows

Mahbod Tavallaee , Wei Lu , Ali A. Ghorbani
conference on communication networks and services research 78 -85

14
2009
Detecting Command and Control Channel of Botnets in Cloud

Wei Lu , Mark Miller , Ling Xue
International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments 55 -62

2
2017
Multiple Attribute Handover in 5G HetNets Based on an Intuitionistic Trapezoidal Fuzzy Algorithm

Mengyuan Liu , Yibo Huan , Qixun Zhang , Wei Lu
international conference on communications 261 -266

2018
Detecting Network Anomalies Using CUSUM and EM Clustering

Wei Lu , Hengjian Tong
international symposium on advances in computation and intelligence 297 -308

15
2009
A detailed analysis of the KDD CUP 99 data set

Mahbod Tavallaee , Ebrahim Bagheri , Wei Lu , Ali A. Ghorbani
computational intelligence and security ( 2) 53 -58

4,270
2009
Automatic Discovery of Network Applications: A Hybrid Approach

Mahbod Tavallaee , Wei Lu , Ebrahim Bagheri , Ali A. Ghorbani
Advances in Artificial Intelligence 208 -219

1
2010
A multiple-stage classifier for identifying unknown Internet traffic

Wei Lu , Ali A. Ghorbani
Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing 725 -729

1
2011
Detecting Network Intrusions Using a Confidence-Based Reward System

Kole Nunley , Wei Lu
advanced information networking and applications 175 -180

2018