Tuning the lambda parameter for language modeling based Persian retrieval

Farhad Oroumchian , Hadi Amiri , Masoud Rahgozar , Ashkan Zarnani

2008
Investigation of the Lambda Parameter for Language Modeling Based Persian Retrieval

Farhad Oroumchian , Hadi Amiri , Masoud Rahgozar , Ashkan Zarnani

2
2008
Network Intrusion Detection and Prevention: Concepts and Techniques

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee ,
Network Intrusion Detection and Prevention: Concepts and Techniques 1st 47 216 -216

307
2009
Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi , Hadi Shiravi , Mahbod Tavallaee , Ali A. Ghorbani
Computers & Security 31 ( 3) 357 -374

1,153
2012
Detecting Network Anomalies Using Different Wavelet Basis Functions

Wei Lu , Mahbod Tavallaee , Ali A. Ghorbani
conference on communication networks and services research 149 -156

36
2008
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies

Mahbod Tavallaee , Wei Lu , Shah Arif Iqbal , Ali A. Ghorbani
conference on communication networks and services research 75 -81

28
2008
BotCop: An Online Botnet Traffic Classifier

Wei Lu , Mahbod Tavallaee , Goaletsa Rammidi , Ali A. Ghorbani
conference on communication networks and services research 70 -77

44
2009
Online Classification of Network Flows

Mahbod Tavallaee , Wei Lu , Ali A. Ghorbani
conference on communication networks and services research 78 -85

14
2009
A detailed analysis of the KDD CUP 99 data set

Mahbod Tavallaee , Ebrahim Bagheri , Wei Lu , Ali A. Ghorbani
computational intelligence and security ( 2) 53 -58

4,270
2009
Automatic Discovery of Network Applications: A Hybrid Approach

Mahbod Tavallaee , Wei Lu , Ebrahim Bagheri , Ali A. Ghorbani
Advances in Artificial Intelligence 208 -219

1
2010
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods

Mahbod Tavallaee , Natalia Stakhanova , Ali Akbar Ghorbani
systems man and cybernetics 40 ( 5) 516 -524

341
2010
Hybrid Traffic Classification Approach Based on Decision Tree

Wei Lu , Mahbod Tavallaee , Ali A. Ghorbani
global communications conference 5679 -5684

3
2009
Automatic discovery of botnet communities on large-scale communication networks

Wei Lu , Mahbod Tavallaee , Ali A. Ghorbani
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09 1 -10

63
2009
Nsl-kdd dataset

Mahbod Tavallaee , Ebrahim Bagheri , Wei Lu , Ali A Ghorbani
Available on http://www. unb. ca/research/iscx/dataset/iscx-NSL-KDD-dataset. html),[Accessed on 28 Feb. 2016] 114

60
2012
Network attacks

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee , Ali A Ghorbani
Network Intrusion Detection and Prevention: Concepts and Techniques 1 -25

27
2010
An adaptive hybrid intrusion detection system

Mahbod Tavallaee
The University of New Brunswick

20
2011
Detection approaches

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee , Ali A Ghorbani
Network Intrusion Detection and Prevention: Concepts and Techniques 27 -53

15
2010
Evaluation criteria

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee , Ali A Ghorbani
Network Intrusion Detection and Prevention: Concepts and Techniques 161 -183

12
2010
Alert management and correlation

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee , Ali A Ghorbani
Network Intrusion Detection and Prevention: Concepts and Techniques 129 -160

12
2010
Intrusion response

Ali A Ghorbani , Wei Lu , Mahbod Tavallaee , Ali A Ghorbani
Network Intrusion Detection and Prevention: Concepts and Techniques 185 -198

5
2010