The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ali A. Ghorbani: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yu Guan, Ali A. Ghorbani, Nabil Belacel
    An Unsupervised Clustering Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2003, pp:616-617 [Conf]
  2. Ali Farzan, Ali A. Ghorbani
    The Bottom-Up Freezing: An Approach to Neural Engineering. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2001, pp:317-324 [Conf]
  3. Ali A. Ghorbani, Lila Bayat
    Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2000, pp:293-304 [Conf]
  4. Mark Kilfoil, Ali A. Ghorbani
    SWAMI: Searching the Web Using Agents with Mobility and Intelligence. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2005, pp:91-102 [Conf]
  5. John Zhong Lei, Ali A. Ghorbani
    The Reconstruction of the Interleaved Sessions from a Server Log. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2004, pp:133-145 [Conf]
  6. Hong Tang, Ali A. Ghorbani
    Accent Classification Using Support Vector Machine and Hidden Markov Model. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2003, pp:629-631 [Conf]
  7. Jonathan Carter, Ali A. Ghorbani, Stephen Marsh
    Just-in-time information sharing architectures in multiagent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2002, pp:647-654 [Conf]
  8. Wenpu Xing, Ali A. Ghorbani
    Weighted PageRank Algorithm. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:305-314 [Conf]
  9. Jie Zhang, Ali A. Ghorbani
    The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:315-322 [Conf]
  10. Mark Kilfoil, Wenpu Xing, Ali A. Ghorbani
    ARAS: Adaptive Recommender for Academic Scheduling. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:307-312 [Conf]
  11. Hossein Sadat, Ali A. Ghorbani
    A Presentation Description Language for Adaptive Web Systems. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:169-175 [Conf]
  12. John Zhong Lei, Ali A. Ghorbani
    Network Intrusion Detection Using an Improved Competitive Learning Neural Network. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:190-197 [Conf]
  13. Iosif-Viorel Onut, Ali A. Ghorbani
    Toward A Feature Classification Scheme For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:277-284 [Conf]
  14. Mehran Nadjarbashi-Noghani, Ali A. Ghorbani
    Improving the Referrer-Based Web Log Session Reconstruction. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:286-292 [Conf]
  15. Mehran Nadjarbashi-Noghani, Jie Zhang, Hossein Sadat, Ali A. Ghorbani
    PENS: A Personalized Electronic News System. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:31-38 [Conf]
  16. Eugenia Kondratova, Ali A. Ghorbani, Stephen Marsh
    CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:300-310 [Conf]
  17. Hamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani
    ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:133-140 [Conf]
  18. Jie Zhang, Ali A. Ghorbani
    GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:117-124 [Conf]
  19. Ebrahim Bagheri, Ali A. Ghorbani
    Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:335-344 [Conf]
  20. M. Barouni-Ebrahimi, Ali A. Ghorbani
    A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:125-132 [Conf]
  21. Farnaz Gharibian, Ali A. Ghorbani
    Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:350-358 [Conf]
  22. Yuhong Yan, Yong Liang 0002, Xinge Du, Hamadou Saliah, Ali A. Ghorbani
    Using Web Services to Control Remote Instruments for Online Experiment Systems. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2005, pp:205-214 [Conf]
  23. John France, Ali A. Ghorbani
    A Multiagent System for Optimizing Urban Traffic. [Citation Graph (0, 0)][DBLP]
    IAT, 2003, pp:411-414 [Conf]
  24. Elijah Bitting, Ali A. Ghorbani
    Cooperative Multiagent Systems for the Optimization of Urban Traffic. [Citation Graph (0, 0)][DBLP]
    IAT, 2004, pp:176-182 [Conf]
  25. Sepideh Miralaei, Ali A. Ghorbani
    Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:242-245 [Conf]
  26. Jie Zhang, Ali A. Ghorbani
    Value-Centric Trust Model with Improved Familiarity Measurement. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2005, pp:1670-1671 [Conf]
  27. Mehdi Shajari, Ali A. Ghorbani
    Agent-oriented Design for Network Survivability. [Citation Graph (0, 0)][DBLP]
    ISDA, 2005, pp:166-171 [Conf]
  28. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
    SVision: A Network Host-Centered Anomaly Visualization Technique. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:16-28 [Conf]
  29. Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Stephen Marsh
    Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture. [Citation Graph (0, 0)][DBLP]
    MATA, 2000, pp:243-256 [Conf]
  30. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
    A novel visualization technique for network anomaly detection. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:167-174 [Conf]
  31. Mehdi Shajari, Ali A. Ghorbani
    Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:181-191 [Conf]
  32. Jie Zhang, Ali A. Ghorbani
    Familiarity and Trust: Measuring Familiarity with a Web Site. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:23-28 [Conf]
  33. Mehdi Shajari, Ali A. Ghorbani
    Using Fuzzy System to Manage False Alarms in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:241-252 [Conf]
  34. Jonathan Carter, Ali A. Ghorbani
    Value Centric Trust in Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2003, pp:3-9 [Conf]
  35. Hossein Sadat, Ali A. Ghorbani
    On the Evaluation of Adaptive Web Systems. [Citation Graph (0, 0)][DBLP]
    Workshop on Web-based Support Systems, 2004, pp:127-136 [Conf]
  36. Wenpu Xing, Ali A. Ghorbani
    Information Domain Modeling for Adaptive Web Systems. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2005, pp:684-687 [Conf]
  37. Jonathan Carter, Elijah Bitting, Ali A. Ghorbani
    Reputation Formalization for an Information-Sharing Multi-Agent System. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 2002, v:18, n:4, pp:515-534 [Journal]
  38. Jonathan Carter, Ali A. Ghorbani, Stephen Marsh
    Architectural Components of Information-Sharing Societies. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 2002, v:18, n:4, pp:638-655 [Journal]
  39. Elijah Bitting, Ali A. Ghorbani
    Protecting e-commerce agents from defamation. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2004, v:3, n:1, pp:21-38 [Journal]
  40. Stephen Marsh, Ali A. Ghorbani, Virendra C. Bhavsar
    The ACORN multi-agent system. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2003, v:1, n:1, pp:65-86 [Journal]
  41. Jonathan Carter, Ali A. Ghorbani
    Towards a formalization of value-centric trust in agent societies. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2004, v:2, n:3, pp:167-183 [Journal]
  42. Iosif-Viorel Onut, Ali A. Ghorbani
    Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:19-36 [Conf]
  43. Reza Sadoddin, Ali A. Ghorbani
    A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    MLDM, 2007, pp:404-418 [Conf]
  44. Ebrahim Bagheri, Ali A. Ghorbani
    A framework for distributed collaborative conceptual model development. [Citation Graph (0, 0)][DBLP]
    OOPSLA Companion, 2007, pp:785-786 [Conf]
  45. Jie Zhang, Ali A. Ghorbani, Robin Cohen
    A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:5, pp:333-344 [Journal]

  46. A Behavioral Model of Ideologically-motivated “Snowball” Attacks. [Citation Graph (, )][DBLP]


  47. Real-time Alert Correlation Using Stream Data Mining Techniques. [Citation Graph (, )][DBLP]


  48. Automatic Discovery of Network Applications: A Hybrid Approach. [Citation Graph (, )][DBLP]


  49. A Belief-Theoretic Reputation Estimation Model for Multi-context Communities. [Citation Graph (, )][DBLP]


  50. A Novel Approach for Social Behavior Analysis of the Blogosphere. [Citation Graph (, )][DBLP]


  51. A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals. [Citation Graph (, )][DBLP]


  52. An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering. [Citation Graph (, )][DBLP]


  53. Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models. [Citation Graph (, )][DBLP]


  54. Automatic discovery of botnet communities on large-scale communication networks. [Citation Graph (, )][DBLP]


  55. Detecting Network Anomalies Using Different Wavelet Basis Functions. [Citation Graph (, )][DBLP]


  56. Critical Episode Mining in Intrusion Detection Alerts. [Citation Graph (, )][DBLP]


  57. A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. [Citation Graph (, )][DBLP]


  58. BotCop: An Online Botnet Traffic Classifier. [Citation Graph (, )][DBLP]


  59. Online Classification of Network Flows. [Citation Graph (, )][DBLP]


  60. An Online Adaptive Approach to Alert Correlation. [Citation Graph (, )][DBLP]


  61. Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development. [Citation Graph (, )][DBLP]


  62. A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks. [Citation Graph (, )][DBLP]


  63. Oracle Clustering: Dynamic Partitioning Based on Random Observations. [Citation Graph (, )][DBLP]


  64. An Empirical Analysis on the Stability of Clustering Algorithms. [Citation Graph (, )][DBLP]


  65. On the Definition of Essential and Contingent Properties of Subjective Belief Bases. [Citation Graph (, )][DBLP]


  66. Design and implementation of a behavioral difference analyzer for network intrusion detection. [Citation Graph (, )][DBLP]


  67. An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. [Citation Graph (, )][DBLP]


  68. Approximate autoregressive modeling for network attack detection. [Citation Graph (, )][DBLP]


  69. Trust-based contextual information filtering. [Citation Graph (, )][DBLP]


  70. Behavior analysis through reputation propagation in a multi-context environment. [Citation Graph (, )][DBLP]


  71. Towards an MDA-oriented UML profile for critical infrastructure modeling. [Citation Graph (, )][DBLP]


  72. Alert correlation survey: framework and techniques. [Citation Graph (, )][DBLP]


  73. On the Collaborative Development of Para-Consistent Conceptual Models. [Citation Graph (, )][DBLP]


  74. Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). [Citation Graph (, )][DBLP]


  75. A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines. [Citation Graph (, )][DBLP]


  76. On Query Completion in Web Search Engines Based on Query Stream Mining. [Citation Graph (, )][DBLP]


  77. A Fuzzy Markov Model Approach for Predicting User Navigation. [Citation Graph (, )][DBLP]


  78. Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process. [Citation Graph (, )][DBLP]


  79. Botnets Detection Based on IRC-Community. [Citation Graph (, )][DBLP]


  80. Hybrid Traffic Classification Approach Based on Decision Tree. [Citation Graph (, )][DBLP]


  81. Y-Means: An Autonomous Clustering Algorithm. [Citation Graph (, )][DBLP]


  82. Managing intrusion detection rule sets. [Citation Graph (, )][DBLP]


  83. An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics. [Citation Graph (, )][DBLP]


  84. Introduction to Special Issue on Agent Technologies for Electronic Business. [Citation Graph (, )][DBLP]


  85. SVision: A novel visual network-anomaly identification technique. [Citation Graph (, )][DBLP]


  86. An incremental frequent structure mining framework for real-time alert correlation. [Citation Graph (, )][DBLP]


Search in 0.061secs, Finished in 0.065secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002