Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Clustering event logs using iterative partitioning
- A. Makanju, A. N. Zincir-Heywood, E. Milios
- Computer ScienceKDD
- 28 June 2009
TLDR
A Lightweight Algorithm for Message Type Extraction in System Application Logs
- A. Makanju, A. N. Zincir-Heywood, E. Milios
- Computer ScienceIEEE Transactions on Knowledge and Data…
- 1 November 2012
TLDR
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer SciencePST
- 2005
TLDR
Intrusion Detection Systems
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer Science
- 2008
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC ©…
A hierarchical SOM-based intrusion detection system
- H. G. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer ScienceEng. Appl. Artif. Intell.
- 1 June 2007
Machine learning based encrypted traffic classification: Identifying SSH and Skype
- Riyad Alshammari, A. N. Zincir-Heywood
- Computer ScienceIEEE Symposium on Computational Intelligence for…
- 8 July 2009
TLDR
On the capability of an SOM based intrusion detection system
- H. Kayacik, A. N. Zincir-Heywood, M. Heywood
- Computer ScienceProceedings of the International Joint Conference…
- 20 July 2003
TLDR
A flow based approach for SSH traffic detection
- Riyad Alshammari, A. N. Zincir-Heywood
- Computer ScienceIEEE International Conference on Systems, Man and…
- 1 October 2007
TLDR
Training genetic programming on half a million patterns: an example from anomaly detection
- Dong Song, M. Heywood, A. N. Zincir-Heywood
- Computer ScienceIEEE Transactions on Evolutionary Computation
- 1 June 2005
The hierarchical RSS-DSS algorithm is introduced for dynamically filtering large datasets based on the concepts of training pattern age and difficulty, while utilizing a data structure to facilitate…
Packet Momentum for Identification of Anonymity Networks
- Khalid Shahbar, A. N. Zincir-Heywood
- Computer Science
- 2017
TLDR
...
...