Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Mahbod Tavallaee
2010 – today
- 2012
[j2]Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31(3): 357-374 (2012)- 2010
[b1]Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee: Network Intrusion Detection and Prevention - Concepts and Techniques. Advances in Information Security 47, Springer 2010, ISBN 978-0-387-88770-8, pp. 1-198
[j1]Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorbani: Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40(5): 516-524 (2010)
[c7]Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. Ghorbani: Automatic Discovery of Network Applications: A Hybrid Approach. Canadian Conference on AI 2010: 208-219
2000 – 2009
- 2009
[c6]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Automatic discovery of botnet communities on large-scale communication networks. ASIACCS 2009: 1-10
[c5]Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi, Ali A. Ghorbani: BotCop: An Online Botnet Traffic Classifier. CNSR 2009: 70-77
[c4]
[c3]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Hybrid Traffic Classification Approach Based on Decision Tree. GLOBECOM 2009: 1-6- 2008
[c2]Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. Ghorbani: A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. CNSR 2008: 75-81
[c1]Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Detecting Network Anomalies Using Different Wavelet Basis Functions. CNSR 2008: 149-156
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:19 CEST by the dblp team



