The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

A. Nur Zincir-Heywood: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
    Evolving Successful Stack Overflow Attacks for Vulnerability Testing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:225-234 [Conf]
  2. Ernst W. Grundke, A. Nur Zincir-Heywood
    A Uniform Continuum Model for Scaling of Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2003, pp:96-103 [Conf]
  3. Zhongmin Shi, Evangelos E. Milios, A. Nur Zincir-Heywood
    Post-supervised Template Induction for Dynamic Web Sources. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2003, pp:268-282 [Conf]
  4. Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
    Summarizing Web Sites Automatically. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2003, pp:283-296 [Conf]
  5. Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
    Term-Based Clustering and Summarization of Web Page Collections. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2004, pp:60-74 [Conf]
  6. Hilmi Günes Kayacik, A. Nur Zincir-Heywood
    On the Contribution of Preamble to Information Hiding in Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:632-638 [Conf]
  7. Yeming Hu, A. Nur Zincir-Heywood
    Modeling User Behaviors from FTP Server Logs. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:320-322 [Conf]
  8. Haihua Yun, A. Nur Zincir-Heywood
    Intelligent Ants for Adaptive Network Routing. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:255-261 [Conf]
  9. Xiaosong Hu, A. Nur Zincir-Heywood
    Understanding the Performance of Cooperative Web Caching Systems. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:183-188 [Conf]
  10. Yan Zhou, A. Nur Zincir-Heywood
    Intelligent Agents for Routing on Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:249-254 [Conf]
  11. Hilmi Günes Kayacik, A. Nur Zincir-Heywood
    Generating Representative Traffic for Intrusion Detection System Benchmarking. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:112-117 [Conf]
  12. Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
    On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:181-189 [Conf]
  13. Patrick LaRoche, A. Nur Zincir-Heywood
    Genetic Programming Based WiFi Data Link Layer Attack Detection. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:285-292 [Conf]
  14. Malcolm I. Heywood, A. Nur Zincir-Heywood
    Register Based Genetic Programming on FPGA Computing Platforms. [Citation Graph (0, 0)][DBLP]
    EuroGP, 2000, pp:44-59 [Conf]
  15. Patrick LaRoche, A. Nur Zincir-Heywood
    802.11 De-authentication Attack Detection Using Genetic Programming. [Citation Graph (0, 0)][DBLP]
    EuroGP, 2006, pp:1-12 [Conf]
  16. Hilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood
    On evolving buffer overflow attacks using genetic programming. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1667-1674 [Conf]
  17. Suihong Liang, A. Nur Zincir-Heywood, Malcolm I. Heywood
    Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    GECCO, 2002, pp:88-96 [Conf]
  18. Patrick LaRoche, A. Nur Zincir-Heywood
    802.11 network intrusion detection using genetic programming. [Citation Graph (0, 0)][DBLP]
    GECCO Workshops, 2005, pp:170-171 [Conf]
  19. Xiao Luo, Malcolm I. Heywood, A. Nur Zincir-Heywood
    Evolving recurrent models using linear GP. [Citation Graph (0, 0)][DBLP]
    GECCO, 2005, pp:1787-1788 [Conf]
  20. Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood
    A Linear Genetic Programming Approach to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    GECCO, 2003, pp:2325-2336 [Conf]
  21. Xiao Luo, A. Nur Zincir-Heywood
    Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2004, pp:977-983 [Conf]
  22. Hilmi Günes Kayacik, A. Nur Zincir-Heywood
    A Case Study of Three Open Source Security Management Tools. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:101-104 [Conf]
  23. Hilmi Günes Kayacik, A. Nur Zincir-Heywood
    Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:362-367 [Conf]
  24. Xiao Luo, A. Nur Zincir-Heywood
    Evaluation of Two Systems on Multi-class Multi-label Document Classification. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:161-169 [Conf]
  25. Xiao Luo, A. Nur Zincir-Heywood
    Analyzing the Temporal Sequences for Text Categorization. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:498-505 [Conf]
  26. Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
    Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  27. Dyan J. Tufts-Conrad, A. Nur Zincir-Heywood, David Zitner
    SOM - Feature Extraction from Patient Discharge Summaries. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:263-267 [Conf]
  28. Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
    Narrative text classification for automatic key phrase extraction in web document corpora. [Citation Graph (0, 0)][DBLP]
    WIDM, 2005, pp:51-58 [Conf]
  29. S. Liang, A. Nur Zincir-Heywood, Malcolm I. Heywood
    Adding more intelligence to the network routing problem: AntNet and Ga-agents. [Citation Graph (0, 0)][DBLP]
    Appl. Soft Comput., 2006, v:6, n:3, pp:244-257 [Journal]
  30. Turhan Tunali, A. Nur Zincir-Heywood
    A heuristic approach to network optimised mapping of a distributed resource discovery architecture. [Citation Graph (0, 0)][DBLP]
    IJCAT, 2004, v:19, n:1, pp:43-50 [Journal]
  31. A. Nur Zincir-Heywood, Malcolm I. Heywood, Chris R. Chatwin, Turhan Tunali
    Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search. [Citation Graph (0, 0)][DBLP]
    Int. J. Cooperative Inf. Syst., 2000, v:9, n:3, pp:229-254 [Journal]
  32. Malcolm I. Heywood, A. Nur Zincir-Heywood, Chris R. Chatwin
    Digital library query clearing using clustering and fuzzy decision-making. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 2000, v:36, n:4, pp:571-583 [Journal]
  33. Zhongmin Shi, Evangelos E. Milios, A. Nur Zincir-Heywood
    Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2005, v:25, n:1, pp:69-93 [Journal]
  34. Leigh Wetmore, Malcolm I. Heywood, A. Nur Zincir-Heywood
    Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection. [Citation Graph (0, 0)][DBLP]
    Neural Processing Letters, 2005, v:22, n:1, pp:17-32 [Journal]
  35. Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood
    Training genetic programming on half a million patterns: an example from anomaly detection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Evolutionary Computation, 2005, v:9, n:3, pp:225-239 [Journal]
  36. A. Nur Zincir-Heywood, Malcolm I. Heywood, Chris R. Chatwin
    Object-Orientated Design of Digital Library Platforms for Multiagent Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:281-295 [Journal]
  37. Malcolm I. Heywood, A. Nur Zincir-Heywood
    Dynamic page based crossover in linear genetic programming. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2002, v:32, n:3, pp:380-388 [Journal]
  38. Yongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios
    World Wide Web site summarization. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2004, v:2, n:1, pp:39-53 [Journal]
  39. Hilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood
    Evolving Buffer Overflow Attacks with Detector Feedback. [Citation Graph (0, 0)][DBLP]
    EvoWorkshops, 2007, pp:11-20 [Conf]
  40. Peter Lichodzijewski, Malcolm I. Heywood, A. Nur Zincir-Heywood
    CasGP: building cascaded hierarchical models using niching. [Citation Graph (0, 0)][DBLP]
    Congress on Evolutionary Computation, 2005, pp:1180-1187 [Conf]

  41. Adaptabilty of a GP Based IDS on Wireless Networks. [Citation Graph (, )][DBLP]


  42. VEA-bility Security Metric: A Network Security Analysis Tool. [Citation Graph (, )][DBLP]


  43. A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. [Citation Graph (, )][DBLP]


  44. One Size Fits None: The Importance of Detector Parameterization. [Citation Graph (, )][DBLP]


  45. NetPal: a dynamic network administration knowledge base. [Citation Graph (, )][DBLP]


  46. Information Retrieval in Network Administration. [Citation Graph (, )][DBLP]


  47. Testing Detector Parameterization Using Evolutionary Exploit Generation. [Citation Graph (, )][DBLP]


  48. Using Code Bloat to Obfuscate Evolved Network Traffic. [Citation Graph (, )][DBLP]


  49. Classifying SSH encrypted traffic with minimum packet header features using genetic programming. [Citation Graph (, )][DBLP]


  50. Incorporating Temporal Information for Document Classification. [Citation Graph (, )][DBLP]


  51. Clustering event logs using iterative partitioning. [Citation Graph (, )][DBLP]


  52. Investigating Two Different Approaches for Encrypted Traffic Classification. [Citation Graph (, )][DBLP]


  53. Using self-organizing maps to build an attack map for forensic analysis. [Citation Graph (, )][DBLP]


  54. LogView: Visualizing Event Log Clusters. [Citation Graph (, )][DBLP]


  55. Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? [Citation Graph (, )][DBLP]


  56. A flow based approach for SSH traffic detection. [Citation Graph (, )][DBLP]


  57. Growing recurrent self organizing map. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002