• Publications
  • Influence
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
Software security failures are common and the problem is growing. A vulnerability is a weakness in the software that, when exploited, causes a security failure. It is difficult to detectExpand
  • 187
  • 18
  • PDF
A software implementation of a genetic algorithm based approach to network intrusion detection
With the rapid expansion of Internet in recent years, computer systems are facing increased number of security threats. Despite numerous technological innovations for information assurance, it isExpand
  • 184
  • 18
  • PDF
A Neural Network Based System for Intrusion Detection and Classification of Attacks
With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recentExpand
  • 160
  • 13
  • PDF
Random-Forests-Based Network Intrusion Detection Systems
Prevention of security breaches completely using the existing security technologies is unrealistic. As a result, intrusion detection is an important component in network security. However, manyExpand
  • 301
  • 12
  • PDF
DIDMA: a distributed intrusion detection system using mobile agents
The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes thatExpand
  • 90
  • 9
  • PDF
Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
Anomaly detection is a critical issue in Network Intrusion Detection Systems (NIDSs). Most anomaly based NIDSs employ supervised algorithms, whose performances highly depend on attack-free trainingExpand
  • 194
  • 8
  • PDF
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However,Expand
  • 67
  • 8
  • PDF
CAT: a context-aware trust model for open and dynamic systems
The requirements for spontaneous interactions in open and dynamic systems create security issues and necessitate the incorporation of trust management into each software entity to make decisions.Expand
  • 63
  • 7
Network Intrusion Detection using Random Forests
Network Intrusion Detection Systems (NIDSs) have become an important component in network security infrastructure. Currently, many NIDSs are rule-based systems whose performances highly depend onExpand
  • 83
  • 7
  • PDF
MUSIC: Mutation-based SQL Injection Vulnerability Checking
SQL injection is one of the most prominent vulnerabilities for web-based applications. Exploitation of SQL injection vulnerabilities (SQLIV) through successful attacks might result in severeExpand
  • 83
  • 6
  • PDF