Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Ali A. Ghorbani
2010 – today
- 2013
[c88]Abtin Zohrabi Aliabadi, Fatemeh Razzaghi, Seyed Pooria Madani Kochak, Ali A. Ghorbani: Classifying Organizational Roles Using Email Social Networks. Canadian Conference on AI 2013: 301-307
[e4]Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian D. Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang (Eds.): Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013. IEEE 2013, ISBN 978-1-4673-5839-2- 2012
[j37]Mahboobeh Soleimani, Ali A. Ghorbani: Multi-layer episode filtering for the multi-step attack detection. Computer Communications 35(11): 1368-1379 (2012)
[j36]Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31(3): 357-374 (2012)
[j35]John Zhong Lei, Ali A. Ghorbani: Improved competitive learning neural networks for network intrusion and fraud detection. Neurocomputing 75(1): 135-145 (2012)
[j34]Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani: A Survey of Visualization Systems for Network Security. IEEE Trans. Vis. Comput. Graph. 18(8): 1313-1329 (2012)
[c87]John Felix Charles Joseph, Ali A. Ghorbani: Group Behavior Metrics for P2P Botnet Detection. ICICS 2012: 93-104
[c86]David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu: Peer to Peer Botnet Detection Based on Flow Intervals. SEC 2012: 87-102
[c85]Mostafa Karamibekr, Ali A. Ghorbani: Sentiment Analysis of Social Issues. SocialInformatics 2012: 215-221
[c84]Mostafa Karamibekr, Ali A. Ghorbani: Verb Oriented Sentiment Classification. Web Intelligence 2012: 327-331
[e3]Runhe Huang, Ali A. Ghorbani, Gabriella Pasi, Takahira Yamaguchi, Neil Y. Yen, Beijing Jin (Eds.): Active Media Technology - 8th International Conference, AMT 2012, Macau, China, December 4-7, 2012. Proceedings. Lecture Notes in Computer Science 7669, Springer 2012, ISBN 978-3-642-35235-5- 2011
[j33]Wei Lu, Goaletsa Rammidi, Ali A. Ghorbani: Clustering botnet communication traffic based on n-gram feature selection. Computer Communications 34(3): 502-514 (2011)
[j32]Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani: Estimating botnet virulence within mathematical models of botnet propagation dynamics. Computers & Security 30(8): 791-802 (2011)
[c83]Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani: A statistical approach to botnet virulence estimation. ASIACCS 2011: 508-512
[c82]John Felix Charles Joseph, Ali A. Ghorbani: VisVerND: Visual Verification of Network Traffic Dataset. CNSR 2011: 56-62
[c81]Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani: Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation. ICICS 2011: 399-413
[c80]Natalia Stakhanova, Mathieu Couture, Ali A. Ghorbani: Exploring network-based malware classification. MALWARE 2011: 14-20
[c79]Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian: Detecting P2P botnets through network behavior analysis and machine learning. PST 2011: 174-180
[e2]Ning Zhong, Vic Callaghan, Ali A. Ghorbani, Bin Hu (Eds.): Active Media Technology - 7th International Conference, AMT 2011, Lanzhou, China, September 7-9, 2011. Proceedings. Lecture Notes in Computer Science 6890, Springer 2011, ISBN 978-3-642-23619-8- 2010
[b1]Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee: Network Intrusion Detection and Prevention - Concepts and Techniques. Advances in Information Security 47, Springer 2010, ISBN 978-0-387-88770-8, pp. 1-198
[j31]Ebrahim Bagheri, Ali A. Ghorbani: An exploratory classification of applications in the realm of collaborative modeling and design. Inf. Syst. E-Business Management 8(3): 257-286 (2010)
[j30]Ebrahim Bagheri, Ali A. Ghorbani: UML-CI: A reference model for profiling critical infrastructure systems. Information Systems Frontiers 12(2): 115-139 (2010)
[j29]Ebrahim Bagheri, Ali A. Ghorbani: The analysis and management of non-canonical requirement specifications through a belief integration game. Knowl. Inf. Syst. 22(1): 27-64 (2010)
[j28]Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorbani: Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40(5): 516-524 (2010)
[j27]Ebrahim Bagheri, Ali A. Ghorbani: A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games. IEEE Transactions on Systems, Man, and Cybernetics, Part A 40(6): 1257-1270 (2010)
[c78]Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. Ghorbani: Automatic Discovery of Network Applications: A Hybrid Approach. Canadian Conference on AI 2010: 208-219
[c77]Hanli Ren, Natalia Stakhanova, Ali A. Ghorbani: An Online Adaptive Approach to Alert Correlation. DIMVA 2010: 153-172
[c76]
[c75]Ali A. Ghorbani, Iosif-Viorel Onut: Y-Means: An Autonomous Clustering Algorithm. HAIS (1) 2010: 1-13
[c74]Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani: IDS Alert Visualization and Monitoring through Heuristic Host Selection. ICICS 2010: 445-458
[c73]Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani: Selective Regular Expression Matching. ISC 2010: 226-240
[e1]Jimmy Xiangji Huang, Ali A. Ghorbani, Mohand-Said Hacid, Takahira Yamaguchi (Eds.): Proceedings of the 2010 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2010, Toronto, Canada, August 31 - September 3, 2010. IEEE Computer Society Press 2010, ISBN 978-0-7695-4191-4
2000 – 2009
- 2009
[j26]Reza Sadoddin, Ali A. Ghorbani: An incremental frequent structure mining framework for real-time alert correlation. Computers & Security 28(3-4): 153-173 (2009)
[j25]Wei Lu, Ali A. Ghorbani: Network Anomaly Detection Based on Wavelet Analysis. EURASIP J. Adv. Sig. Proc. 2009 (2009)
[j24]Mark Kilfoil, Ali A. Ghorbani: SWAMI: A Multiagent, Active Representation of a User's Browsing Interests. IJITWE 4(3): 1-24 (2009)
[j23]Ebrahim Bagheri, Ali A. Ghorbani: A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models. Journal of Systems and Software 82(4): 707-729 (2009)
[j22]Ebrahim Bagheri, Ali A. Ghorbani: Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology. IEEE Transactions on Systems, Man, and Cybernetics, Part A 39(1): 66-85 (2009)
[c72]Mohammad-Amin Jashki, Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani: An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering. Canadian Conference on AI 2009: 74-85
[c71]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Automatic discovery of botnet communities on large-scale communication networks. ASIACCS 2009: 1-10
[c70]Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi, Ali A. Ghorbani: BotCop: An Online Botnet Traffic Classifier. CNSR 2009: 70-77
[c69]
[c68]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Hybrid Traffic Classification Approach Based on Decision Tree. GLOBECOM 2009: 1-6- 2008
[j21]M. Barouni-Ebrahimi, Ali A. Ghorbani: An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics. Computational Intelligence 24(2): 158-190 (2008)
[j20]Ali A. Ghorbani, Ebrahim Bagheri: The state of the art in critical infrastructure protection: a framework for convergence. IJCIS 4(3): 215-244 (2008)
[j19]George O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung: Guest Editors' Introduction. Journal of Computer Security 16(2): 103-106 (2008)
[j18]Harshit Nayyar, Ali A. Ghorbani: Approximate autoregressive modeling for network attack detection. Journal of Computer Security 16(2): 165-197 (2008)
[j17]S. Hossein Sadat-Mohtasham, Ali A. Ghorbani: A language for high-level description of adaptive web systems. Journal of Systems and Software 81(7): 1196-1217 (2008)
[c67]Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani: A Behavioral Model of Ideologically-motivated "Snowball" Attacks. ARES 2008: 88-95
[c66]Reza Sadoddin, Ali A. Ghorbani: Real-time Alert Correlation Using Stream Data Mining Techniques. AAAI 2008: 1731-1737
[c65]Ebrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafarani, Ali A. Ghorbani: A Belief-Theoretic Reputation Estimation Model for Multi-context Communities. Canadian Conference on AI 2008: 48-59
[c64]M. Barouni-Ebrahimi, Ebrahim Bagheri, Ali A. Ghorbani: A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals. Canadian Conference on AI 2008: 60-65
[c63]Reza Zafarani, Mohammad-Amin Jashki, Hamidreza Baghi, Ali A. Ghorbani: A Novel Approach for Social Behavior Analysis of the Blogosphere. Canadian Conference on AI 2008: 356-367
[c62]Ebrahim Bagheri, Ali A. Ghorbani: Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models. Australian Software Engineering Conference 2008: 357-366
[c61]Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. Ghorbani: A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. CNSR 2008: 75-81
[c60]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Detecting Network Anomalies Using Different Wavelet Basis Functions. CNSR 2008: 149-156
[c59]Mahboobeh Soleimani, Ali A. Ghorbani: Critical Episode Mining in Intrusion Detection Alerts. CNSR 2008: 157-164
[c58]Majid Makki, Ebrahim Bagheri, Ali A. Ghorbani: Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process. ECSA 2008: 264-272
[c57]
[c56]Iosif-Viorel Onut, Ali A. Ghorbani: A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks. HICSS 2008: 203
[c55]Ebrahim Bagheri, Ali A. Ghorbani: Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development. HICSS 2008: 489
[c54]Reza Zafarani, Majid Makki, Ali A. Ghorbani: An Empirical Analysis on the Stability of Clustering Algorithms. ICTAI (2) 2008: 19-26
[c53]Reza Zafarani, Ali A. Ghorbani: Oracle Clustering: Dynamic Partitioning Based on Random Observations. ICTAI (2) 2008: 27-34
[c52]Ebrahim Bagheri, Ali A. Ghorbani: On the Definition of Essential and Contingent Properties of Subjective Belief Bases. MICAI 2008: 686-698
[c51]- 2007
[j16]Iosif-Viorel Onut, Ali A. Ghorbani: SVision: A novel visual network-anomaly identification technique. Computers & Security 26(3): 201-212 (2007)
[j15]Jie Zhang, Ali A. Ghorbani, Robin Cohen: A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. Int. J. Inf. Sec. 6(5): 333-344 (2007)
[j14]Iosif-Viorel Onut, Ali A. Ghorbani: A Feature Classification Scheme For Network Intrusion Detection. I. J. Network Security 5(1): 1-15 (2007)
[j13]Peyman Kabiri, Ali A. Ghorbani: A Rule-based Temporal Alert Correlation System. I. J. Network Security 5(1): 66-72 (2007)
[c50]
[c49]M. Barouni-Ebrahimi, Ali A. Ghorbani: A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. CNSR 2007: 125-132
[c48]Hamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani: ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. CNSR 2007: 133-140
[c47]Ebrahim Bagheri, Ali A. Ghorbani: Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. CNSR 2007: 335-344
[c46]Farnaz Gharibian, Ali A. Ghorbani: Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. CNSR 2007: 350-358
[c45]Iosif-Viorel Onut, Ali A. Ghorbani: Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. ISC 2007: 19-36
[c44]Reza Sadoddin, Ali A. Ghorbani: A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection. MLDM 2007: 404-418
[c43]Ebrahim Bagheri, Ali A. Ghorbani: A framework for distributed collaborative conceptual model development. OOPSLA Companion 2007: 785-786
[c42]Ebrahim Bagheri, Ali A. Ghorbani: On the Collaborative Development of Para-Consistent Conceptual Models. QSIC 2007: 336-341
[c41]Ali A. Ghorbani, Xiaowen Xu: A Fuzzy Markov Model Approach for Predicting User Navigation. Web Intelligence 2007: 307-311
[c40]M. Barouni-Ebrahimi, Ali A. Ghorbani: On Query Completion in Web Search Engines Based on Query Stream Mining. Web Intelligence 2007: 317-320- 2006
[j12]Bin Zhu, Ali A. Ghorbani: Alert Correlation for Extracting Attack Strategies. I. J. Network Security 3(3): 244-258 (2006)
[j11]Yuhong Yan, Yong Liang, Xinge Du, Hamadou Saliah-Hassane, Ali A. Ghorbani: Putting labs online with Web services. IT Professional 8(2): 27-34 (2006)
[c39]Iosif-Viorel Onut, Ali A. Ghorbani: Toward A Feature Classification Scheme For Network Intrusion Detection. CNSR 2006: 277-284
[c38]Eugenia Kondratova, Ali A. Ghorbani, Stephen Marsh: CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems. CNSR 2006: 300-310
[c37]Jie Zhang, Ali A. Ghorbani, Robin Cohen: An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. PST 2006: 19
[c36]Harshit Nayyar, Ali A. Ghorbani: Approximate autoregressive modeling for network attack detection. PST 2006: 23
[c35]
[c34]Ebrahim Bagheri, Ali A. Ghorbani: Behavior analysis through reputation propagation in a multi-context environment. PST 2006: 40
[c33]Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani: Trust-based contextual information filtering. PST 2006: 51
[c32]Ebrahim Bagheri, Ali A. Ghorbani: Towards an MDA-oriented UML profile for critical infrastructure modeling. PST 2006: 66
[c31]Mehran Nadjarbashi-Noghani, Ali A. Ghorbani: Design and implementation of a behavioral difference analyzer for network intrusion detection. PST 2006: 69
[c30]M. Barouni-Ebrahimi, Ali A. Ghorbani: A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines. WAW 2006: 129-136- 2005
[j10]Peyman Kabiri, Ali A. Ghorbani: Research on Intrusion Detection and Response: A Survey. I. J. Network Security 1(2): 84-102 (2005)
[j9]Ming Chen, Ali A. Ghorbani, Virendrakumar C. Bhavsar: Incremental communication for adaptive resonance theory networks. IEEE Transactions on Neural Networks 16(1): 132-144 (2005)
[c29]Mark Kilfoil, Ali A. Ghorbani: SWAMI: Searching the Web Using Agents with Mobility and Intelligence. Canadian Conference on AI 2005: 91-102
[c28]Mehran Nadjarbashi-Noghani, Jie Zhang, Hossein Sadat, Ali A. Ghorbani: PENS: A Personalized Electronic News System. CNSR 2005: 31-38
[c27]Hossein Sadat, Ali A. Ghorbani: A Presentation Description Language for Adaptive Web Systems. CNSR 2005: 169-175
[c26]Mark Kilfoil, Wenpu Xing, Ali A. Ghorbani: ARAS: Adaptive Recommender for Academic Scheduling. CNSR 2005: 307-312
[c25]Yuhong Yan, Yong Liang, Xinge Du, Hamadou Saliah, Ali A. Ghorbani: Using Web Services to Control Remote Instruments for Online Experiment Systems. CSCWD (Selected papers) 2005: 205-214
[c24]Sepideh Miralaei, Ali A. Ghorbani: Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems. IAT 2005: 242-245
[c23]Jie Zhang, Ali A. Ghorbani: Value-Centric Trust Model with Improved Familiarity Measurement. IJCAI 2005: 1670-1671
[c22]
[c21]Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani: SVision: A Network Host-Centered Anomaly Visualization Technique. ISC 2005: 16-28
[c20]Wenpu Xing, Ali A. Ghorbani: Information Domain Modeling for Adaptive Web Systems. Web Intelligence 2005: 684-687- 2004
[j8]Ali A. Ghorbani: Introduction to Special Issue on Agent Technologies for Electronic Business. Computational Intelligence 20(4): 527-531 (2004)
[j7]Elijah Bitting, Ali A. Ghorbani: Protecting e-commerce agents from defamation. Electronic Commerce Research and Applications 3(1): 21-38 (2004)
[j6]Jonathan Carter, Ali A. Ghorbani: Towards a formalization of value-centric trust in agent societies. Web Intelligence and Agent Systems 2(3): 167-183 (2004)
[c19]John Zhong Lei, Ali A. Ghorbani: The Reconstruction of the Interleaved Sessions from a Server Log. Canadian Conference on AI 2004: 133-145
[c18]John Zhong Lei, Ali A. Ghorbani: Network Intrusion Detection Using an Improved Competitive Learning Neural Network. CNSR 2004: 190-197
[c17]Mehran Nadjarbashi-Noghani, Ali A. Ghorbani: Improving the Referrer-Based Web Log Session Reconstruction. CNSR 2004: 286-292
[c16]
[c15]
[c14]Elijah Bitting, Ali A. Ghorbani: Cooperative Multiagent Systems for the Optimization of Urban Traffic. IAT 2004: 176-182
[c13]
[c12]Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani: A novel visualization technique for network anomaly detection. PST 2004: 167-174
[c11]Mehdi Shajari, Ali A. Ghorbani: Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. PST 2004: 181-191
[c10]Hossein Sadat, Ali A. Ghorbani: On the Evaluation of Adaptive Web Systems. Workshop on Web-based Support Systems 2004: 127-136- 2003
[j5]Stephen Marsh, Ali A. Ghorbani, Virendra C. Bhavsar: The ACORN multi-agent system. Web Intelligence and Agent Systems 1(1): 65-86 (2003)
[c9]Yu Guan, Ali A. Ghorbani, Nabil Belacel: An Unsupervised Clustering Algorithm for Intrusion Detection. Canadian Conference on AI 2003: 616-617
[c8]Hong Tang, Ali A. Ghorbani: Accent Classification Using Support Vector Machine and Hidden Markov Model. Canadian Conference on AI 2003: 629-631
[c7]
[c6]Mehdi Shajari, Ali A. Ghorbani: Using Fuzzy System to Manage False Alarms in Intrusion Detection. SEC 2003: 241-252
[c5]Jonathan Carter, Ali A. Ghorbani: Value Centric Trust in Multiagent Systems. Web Intelligence 2003: 3-9- 2002
[j4]Jonathan Carter, Elijah Bitting, Ali A. Ghorbani: Reputation Formalization for an Information-Sharing Multi-Agent System. Computational Intelligence 18(4): 515-534 (2002)
[j3]Jonathan Carter, Ali A. Ghorbani, Stephen Marsh: Architectural Components of Information-Sharing Societies. Computational Intelligence 18(4): 638-655 (2002)
[c4]Jonathan Carter, Ali A. Ghorbani, Stephen Marsh: Just-in-time information sharing architectures in multiagent systems. AAMAS 2002: 647-654- 2001
[c3]Ali Farzan, Ali A. Ghorbani: The Bottom-Up Freezing: An Approach to Neural Engineering. Canadian Conference on AI 2001: 317-324- 2000
[c2]Ali A. Ghorbani, Lila Bayat: Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm. Canadian Conference on AI 2000: 293-304
[c1]Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Stephen Marsh: Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture. MATA 2000: 243-256
1990 – 1999
- 1998
[j2]Ali A. Ghorbani, Virendra C. Bhavsar: Incremental communication for multilayer neural networks: error analysis. IEEE Transactions on Neural Networks 9(1): 68-82 (1998)- 1995
[j1]Ali A. Ghorbani, Virendrakumar C. Bhavsar: Incremental communication for multilayer neural networks. IEEE Trans. Neural Netw. Learning Syst. 6(6): 1375-1385 (1995)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:01 CEST by the dblp team



