|
Search the dblp DataBase
Ali A. Ghorbani:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yu Guan, Ali A. Ghorbani, Nabil Belacel
An Unsupervised Clustering Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2003, pp:616-617 [Conf]
- Ali Farzan, Ali A. Ghorbani
The Bottom-Up Freezing: An Approach to Neural Engineering. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2001, pp:317-324 [Conf]
- Ali A. Ghorbani, Lila Bayat
Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2000, pp:293-304 [Conf]
- Mark Kilfoil, Ali A. Ghorbani
SWAMI: Searching the Web Using Agents with Mobility and Intelligence. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2005, pp:91-102 [Conf]
- John Zhong Lei, Ali A. Ghorbani
The Reconstruction of the Interleaved Sessions from a Server Log. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2004, pp:133-145 [Conf]
- Hong Tang, Ali A. Ghorbani
Accent Classification Using Support Vector Machine and Hidden Markov Model. [Citation Graph (0, 0)][DBLP] Canadian Conference on AI, 2003, pp:629-631 [Conf]
- Jonathan Carter, Ali A. Ghorbani, Stephen Marsh
Just-in-time information sharing architectures in multiagent systems. [Citation Graph (0, 0)][DBLP] AAMAS, 2002, pp:647-654 [Conf]
- Wenpu Xing, Ali A. Ghorbani
Weighted PageRank Algorithm. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:305-314 [Conf]
- Jie Zhang, Ali A. Ghorbani
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:315-322 [Conf]
- Mark Kilfoil, Wenpu Xing, Ali A. Ghorbani
ARAS: Adaptive Recommender for Academic Scheduling. [Citation Graph (0, 0)][DBLP] CNSR, 2005, pp:307-312 [Conf]
- Hossein Sadat, Ali A. Ghorbani
A Presentation Description Language for Adaptive Web Systems. [Citation Graph (0, 0)][DBLP] CNSR, 2005, pp:169-175 [Conf]
- John Zhong Lei, Ali A. Ghorbani
Network Intrusion Detection Using an Improved Competitive Learning Neural Network. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:190-197 [Conf]
- Iosif-Viorel Onut, Ali A. Ghorbani
Toward A Feature Classification Scheme For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] CNSR, 2006, pp:277-284 [Conf]
- Mehran Nadjarbashi-Noghani, Ali A. Ghorbani
Improving the Referrer-Based Web Log Session Reconstruction. [Citation Graph (0, 0)][DBLP] CNSR, 2004, pp:286-292 [Conf]
- Mehran Nadjarbashi-Noghani, Jie Zhang, Hossein Sadat, Ali A. Ghorbani
PENS: A Personalized Electronic News System. [Citation Graph (0, 0)][DBLP] CNSR, 2005, pp:31-38 [Conf]
- Eugenia Kondratova, Ali A. Ghorbani, Stephen Marsh
CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems. [Citation Graph (0, 0)][DBLP] CNSR, 2006, pp:300-310 [Conf]
- Hamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani
ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:133-140 [Conf]
- Jie Zhang, Ali A. Ghorbani
GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:117-124 [Conf]
- Ebrahim Bagheri, Ali A. Ghorbani
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:335-344 [Conf]
- M. Barouni-Ebrahimi, Ali A. Ghorbani
A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:125-132 [Conf]
- Farnaz Gharibian, Ali A. Ghorbani
Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:350-358 [Conf]
- Yuhong Yan, Yong Liang 0002, Xinge Du, Hamadou Saliah, Ali A. Ghorbani
Using Web Services to Control Remote Instruments for Online Experiment Systems. [Citation Graph (0, 0)][DBLP] CSCWD (Selected papers), 2005, pp:205-214 [Conf]
- John France, Ali A. Ghorbani
A Multiagent System for Optimizing Urban Traffic. [Citation Graph (0, 0)][DBLP] IAT, 2003, pp:411-414 [Conf]
- Elijah Bitting, Ali A. Ghorbani
Cooperative Multiagent Systems for the Optimization of Urban Traffic. [Citation Graph (0, 0)][DBLP] IAT, 2004, pp:176-182 [Conf]
- Sepideh Miralaei, Ali A. Ghorbani
Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems. [Citation Graph (0, 0)][DBLP] IAT, 2005, pp:242-245 [Conf]
- Jie Zhang, Ali A. Ghorbani
Value-Centric Trust Model with Improved Familiarity Measurement. [Citation Graph (0, 0)][DBLP] IJCAI, 2005, pp:1670-1671 [Conf]
- Mehdi Shajari, Ali A. Ghorbani
Agent-oriented Design for Network Survivability. [Citation Graph (0, 0)][DBLP] ISDA, 2005, pp:166-171 [Conf]
- Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
SVision: A Network Host-Centered Anomaly Visualization Technique. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:16-28 [Conf]
- Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Stephen Marsh
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture. [Citation Graph (0, 0)][DBLP] MATA, 2000, pp:243-256 [Conf]
- Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
A novel visualization technique for network anomaly detection. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:167-174 [Conf]
- Mehdi Shajari, Ali A. Ghorbani
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:181-191 [Conf]
- Jie Zhang, Ali A. Ghorbani
Familiarity and Trust: Measuring Familiarity with a Web Site. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:23-28 [Conf]
- Mehdi Shajari, Ali A. Ghorbani
Using Fuzzy System to Manage False Alarms in Intrusion Detection. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:241-252 [Conf]
- Jonathan Carter, Ali A. Ghorbani
Value Centric Trust in Multiagent Systems. [Citation Graph (0, 0)][DBLP] Web Intelligence, 2003, pp:3-9 [Conf]
- Hossein Sadat, Ali A. Ghorbani
On the Evaluation of Adaptive Web Systems. [Citation Graph (0, 0)][DBLP] Workshop on Web-based Support Systems, 2004, pp:127-136 [Conf]
- Wenpu Xing, Ali A. Ghorbani
Information Domain Modeling for Adaptive Web Systems. [Citation Graph (0, 0)][DBLP] Web Intelligence, 2005, pp:684-687 [Conf]
- Jonathan Carter, Elijah Bitting, Ali A. Ghorbani
Reputation Formalization for an Information-Sharing Multi-Agent System. [Citation Graph (0, 0)][DBLP] Computational Intelligence, 2002, v:18, n:4, pp:515-534 [Journal]
- Jonathan Carter, Ali A. Ghorbani, Stephen Marsh
Architectural Components of Information-Sharing Societies. [Citation Graph (0, 0)][DBLP] Computational Intelligence, 2002, v:18, n:4, pp:638-655 [Journal]
- Elijah Bitting, Ali A. Ghorbani
Protecting e-commerce agents from defamation. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2004, v:3, n:1, pp:21-38 [Journal]
- Stephen Marsh, Ali A. Ghorbani, Virendra C. Bhavsar
The ACORN multi-agent system. [Citation Graph (0, 0)][DBLP] Web Intelligence and Agent Systems, 2003, v:1, n:1, pp:65-86 [Journal]
- Jonathan Carter, Ali A. Ghorbani
Towards a formalization of value-centric trust in agent societies. [Citation Graph (0, 0)][DBLP] Web Intelligence and Agent Systems, 2004, v:2, n:3, pp:167-183 [Journal]
- Iosif-Viorel Onut, Ali A. Ghorbani
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:19-36 [Conf]
- Reza Sadoddin, Ali A. Ghorbani
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP] MLDM, 2007, pp:404-418 [Conf]
- Ebrahim Bagheri, Ali A. Ghorbani
A framework for distributed collaborative conceptual model development. [Citation Graph (0, 0)][DBLP] OOPSLA Companion, 2007, pp:785-786 [Conf]
- Jie Zhang, Ali A. Ghorbani, Robin Cohen
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:5, pp:333-344 [Journal]
A Behavioral Model of Ideologically-motivated Snowball Attacks. [Citation Graph (, )][DBLP]
Real-time Alert Correlation Using Stream Data Mining Techniques. [Citation Graph (, )][DBLP]
Automatic Discovery of Network Applications: A Hybrid Approach. [Citation Graph (, )][DBLP]
A Belief-Theoretic Reputation Estimation Model for Multi-context Communities. [Citation Graph (, )][DBLP]
A Novel Approach for Social Behavior Analysis of the Blogosphere. [Citation Graph (, )][DBLP]
A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals. [Citation Graph (, )][DBLP]
An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering. [Citation Graph (, )][DBLP]
Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models. [Citation Graph (, )][DBLP]
Automatic discovery of botnet communities on large-scale communication networks. [Citation Graph (, )][DBLP]
Detecting Network Anomalies Using Different Wavelet Basis Functions. [Citation Graph (, )][DBLP]
Critical Episode Mining in Intrusion Detection Alerts. [Citation Graph (, )][DBLP]
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. [Citation Graph (, )][DBLP]
BotCop: An Online Botnet Traffic Classifier. [Citation Graph (, )][DBLP]
Online Classification of Network Flows. [Citation Graph (, )][DBLP]
An Online Adaptive Approach to Alert Correlation. [Citation Graph (, )][DBLP]
Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development. [Citation Graph (, )][DBLP]
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks. [Citation Graph (, )][DBLP]
Oracle Clustering: Dynamic Partitioning Based on Random Observations. [Citation Graph (, )][DBLP]
An Empirical Analysis on the Stability of Clustering Algorithms. [Citation Graph (, )][DBLP]
On the Definition of Essential and Contingent Properties of Subjective Belief Bases. [Citation Graph (, )][DBLP]
Design and implementation of a behavioral difference analyzer for network intrusion detection. [Citation Graph (, )][DBLP]
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. [Citation Graph (, )][DBLP]
Approximate autoregressive modeling for network attack detection. [Citation Graph (, )][DBLP]
Trust-based contextual information filtering. [Citation Graph (, )][DBLP]
Behavior analysis through reputation propagation in a multi-context environment. [Citation Graph (, )][DBLP]
Towards an MDA-oriented UML profile for critical infrastructure modeling. [Citation Graph (, )][DBLP]
Alert correlation survey: framework and techniques. [Citation Graph (, )][DBLP]
On the Collaborative Development of Para-Consistent Conceptual Models. [Citation Graph (, )][DBLP]
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). [Citation Graph (, )][DBLP]
A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines. [Citation Graph (, )][DBLP]
On Query Completion in Web Search Engines Based on Query Stream Mining. [Citation Graph (, )][DBLP]
A Fuzzy Markov Model Approach for Predicting User Navigation. [Citation Graph (, )][DBLP]
Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process. [Citation Graph (, )][DBLP]
Botnets Detection Based on IRC-Community. [Citation Graph (, )][DBLP]
Hybrid Traffic Classification Approach Based on Decision Tree. [Citation Graph (, )][DBLP]
Y-Means: An Autonomous Clustering Algorithm. [Citation Graph (, )][DBLP]
Managing intrusion detection rule sets. [Citation Graph (, )][DBLP]
An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics. [Citation Graph (, )][DBLP]
Introduction to Special Issue on Agent Technologies for Electronic Business. [Citation Graph (, )][DBLP]
SVision: A novel visual network-anomaly identification technique. [Citation Graph (, )][DBLP]
An incremental frequent structure mining framework for real-time alert correlation. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.027secs
|