|
Search the dblp DataBase
A. Nur Zincir-Heywood:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
Evolving Successful Stack Overflow Attacks for Vulnerability Testing. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:225-234 [Conf]
- Ernst W. Grundke, A. Nur Zincir-Heywood
A Uniform Continuum Model for Scaling of Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ADHOC-NOW, 2003, pp:96-103 [Conf]
- Zhongmin Shi, Evangelos E. Milios, A. Nur Zincir-Heywood
Post-supervised Template Induction for Dynamic Web Sources. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2003, pp:268-282 [Conf]
- Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
Summarizing Web Sites Automatically. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2003, pp:283-296 [Conf]
- Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
Term-Based Clustering and Summarization of Web Page Collections. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2004, pp:60-74 [Conf]
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood
On the Contribution of Preamble to Information Hiding in Mimicry Attacks. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:632-638 [Conf]
- Yeming Hu, A. Nur Zincir-Heywood
Modeling User Behaviors from FTP Server Logs. [Citation Graph (0, 0)][DBLP] CNSR, 2006, pp:320-322 [Conf]
- Haihua Yun, A. Nur Zincir-Heywood
Intelligent Ants for Adaptive Network Routing. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:255-261 [Conf]
- Xiaosong Hu, A. Nur Zincir-Heywood
Understanding the Performance of Cooperative Web Caching Systems. [Citation Graph (0, 0)][DBLP] CNSR, 2005, pp:183-188 [Conf]
- Yan Zhou, A. Nur Zincir-Heywood
Intelligent Agents for Routing on Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:249-254 [Conf]
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood
Generating Representative Traffic for Intrusion Detection System Benchmarking. [Citation Graph (0, 0)][DBLP] CNSR, 2005, pp:112-117 [Conf]
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:181-189 [Conf]
- Patrick LaRoche, A. Nur Zincir-Heywood
Genetic Programming Based WiFi Data Link Layer Attack Detection. [Citation Graph (0, 0)][DBLP] CNSR, 2006, pp:285-292 [Conf]
- Malcolm I. Heywood, A. Nur Zincir-Heywood
Register Based Genetic Programming on FPGA Computing Platforms. [Citation Graph (0, 0)][DBLP] EuroGP, 2000, pp:44-59 [Conf]
- Patrick LaRoche, A. Nur Zincir-Heywood
802.11 De-authentication Attack Detection Using Genetic Programming. [Citation Graph (0, 0)][DBLP] EuroGP, 2006, pp:1-12 [Conf]
- Hilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood
On evolving buffer overflow attacks using genetic programming. [Citation Graph (0, 0)][DBLP] GECCO, 2006, pp:1667-1674 [Conf]
- Suihong Liang, A. Nur Zincir-Heywood, Malcolm I. Heywood
Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm. [Citation Graph (0, 0)][DBLP] GECCO, 2002, pp:88-96 [Conf]
- Patrick LaRoche, A. Nur Zincir-Heywood
802.11 network intrusion detection using genetic programming. [Citation Graph (0, 0)][DBLP] GECCO Workshops, 2005, pp:170-171 [Conf]
- Xiao Luo, Malcolm I. Heywood, A. Nur Zincir-Heywood
Evolving recurrent models using linear GP. [Citation Graph (0, 0)][DBLP] GECCO, 2005, pp:1787-1788 [Conf]
- Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood
A Linear Genetic Programming Approach to Intrusion Detection. [Citation Graph (0, 0)][DBLP] GECCO, 2003, pp:2325-2336 [Conf]
- Xiao Luo, A. Nur Zincir-Heywood
Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs. [Citation Graph (0, 0)][DBLP] IC-AI, 2004, pp:977-983 [Conf]
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood
A Case Study of Three Open Source Security Management Tools. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2003, pp:101-104 [Conf]
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:362-367 [Conf]
- Xiao Luo, A. Nur Zincir-Heywood
Evaluation of Two Systems on Multi-class Multi-label Document Classification. [Citation Graph (0, 0)][DBLP] ISMIS, 2005, pp:161-169 [Conf]
- Xiao Luo, A. Nur Zincir-Heywood
Analyzing the Temporal Sequences for Text Categorization. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:498-505 [Conf]
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. [Citation Graph (0, 0)][DBLP] PST, 2005, pp:- [Conf]
- Dyan J. Tufts-Conrad, A. Nur Zincir-Heywood, David Zitner
SOM - Feature Extraction from Patient Discharge Summaries. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:263-267 [Conf]
- Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
Narrative text classification for automatic key phrase extraction in web document corpora. [Citation Graph (0, 0)][DBLP] WIDM, 2005, pp:51-58 [Conf]
- S. Liang, A. Nur Zincir-Heywood, Malcolm I. Heywood
Adding more intelligence to the network routing problem: AntNet and Ga-agents. [Citation Graph (0, 0)][DBLP] Appl. Soft Comput., 2006, v:6, n:3, pp:244-257 [Journal]
- Turhan Tunali, A. Nur Zincir-Heywood
A heuristic approach to network optimised mapping of a distributed resource discovery architecture. [Citation Graph (0, 0)][DBLP] IJCAT, 2004, v:19, n:1, pp:43-50 [Journal]
- A. Nur Zincir-Heywood, Malcolm I. Heywood, Chris R. Chatwin, Turhan Tunali
Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search. [Citation Graph (0, 0)][DBLP] Int. J. Cooperative Inf. Syst., 2000, v:9, n:3, pp:229-254 [Journal]
- Malcolm I. Heywood, A. Nur Zincir-Heywood, Chris R. Chatwin
Digital library query clearing using clustering and fuzzy decision-making. [Citation Graph (0, 0)][DBLP] Inf. Process. Manage., 2000, v:36, n:4, pp:571-583 [Journal]
- Zhongmin Shi, Evangelos E. Milios, A. Nur Zincir-Heywood
Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources. [Citation Graph (0, 0)][DBLP] J. Intell. Inf. Syst., 2005, v:25, n:1, pp:69-93 [Journal]
- Leigh Wetmore, Malcolm I. Heywood, A. Nur Zincir-Heywood
Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection. [Citation Graph (0, 0)][DBLP] Neural Processing Letters, 2005, v:22, n:1, pp:17-32 [Journal]
- Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood
Training genetic programming on half a million patterns: an example from anomaly detection. [Citation Graph (0, 0)][DBLP] IEEE Trans. Evolutionary Computation, 2005, v:9, n:3, pp:225-239 [Journal]
- A. Nur Zincir-Heywood, Malcolm I. Heywood, Chris R. Chatwin
Object-Orientated Design of Digital Library Platforms for Multiagent Environments. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:281-295 [Journal]
- Malcolm I. Heywood, A. Nur Zincir-Heywood
Dynamic page based crossover in linear genetic programming. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2002, v:32, n:3, pp:380-388 [Journal]
- Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
World Wide Web site summarization. [Citation Graph (0, 0)][DBLP] Web Intelligence and Agent Systems, 2004, v:2, n:1, pp:39-53 [Journal]
- Hilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood
Evolving Buffer Overflow Attacks with Detector Feedback. [Citation Graph (0, 0)][DBLP] EvoWorkshops, 2007, pp:11-20 [Conf]
- Peter Lichodzijewski, Malcolm I. Heywood, A. Nur Zincir-Heywood
CasGP: building cascaded hierarchical models using niching. [Citation Graph (0, 0)][DBLP] Congress on Evolutionary Computation, 2005, pp:1180-1187 [Conf]
Adaptabilty of a GP Based IDS on Wireless Networks. [Citation Graph (, )][DBLP]
VEA-bility Security Metric: A Network Security Analysis Tool. [Citation Graph (, )][DBLP]
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. [Citation Graph (, )][DBLP]
One Size Fits None: The Importance of Detector Parameterization. [Citation Graph (, )][DBLP]
NetPal: a dynamic network administration knowledge base. [Citation Graph (, )][DBLP]
Information Retrieval in Network Administration. [Citation Graph (, )][DBLP]
Testing Detector Parameterization Using Evolutionary Exploit Generation. [Citation Graph (, )][DBLP]
Using Code Bloat to Obfuscate Evolved Network Traffic. [Citation Graph (, )][DBLP]
Classifying SSH encrypted traffic with minimum packet header features using genetic programming. [Citation Graph (, )][DBLP]
Incorporating Temporal Information for Document Classification. [Citation Graph (, )][DBLP]
Clustering event logs using iterative partitioning. [Citation Graph (, )][DBLP]
Investigating Two Different Approaches for Encrypted Traffic Classification. [Citation Graph (, )][DBLP]
Using self-organizing maps to build an attack map for forensic analysis. [Citation Graph (, )][DBLP]
LogView: Visualizing Event Log Clusters. [Citation Graph (, )][DBLP]
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? [Citation Graph (, )][DBLP]
A flow based approach for SSH traffic detection. [Citation Graph (, )][DBLP]
Growing recurrent self organizing map. [Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.034secs
|