dblp.uni-trier.dewww.uni-trier.de

Ali A. Ghorbani

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
80EEWei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Automatic discovery of botnet communities on large-scale communication networks. ASIACCS 2009: 1-10
79EEEbrahim Bagheri, Ali A. Ghorbani: Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology. IEEE Transactions on Systems, Man, and Cybernetics, Part A 39(1): 66-85 (2009)
2008
78 Reza Sadoddin, Ali A. Ghorbani: Real-time Alert Correlation Using Stream Data Mining Techniques. AAAI 2008: 1731-1737
77EENatalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani: A Behavioral Model of Ideologically-motivated “Snowball” Attacks. ARES 2008: 88-95
76EEEbrahim Bagheri, Ali A. Ghorbani: Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models. Australian Software Engineering Conference 2008: 357-366
75EEWei Lu, Mahbod Tavallaee, Ali A. Ghorbani: Detecting Network Anomalies Using Different Wavelet Basis Functions. CNSR 2008: 149-156
74EEMahboobeh Soleimani, Ali A. Ghorbani: Critical Episode Mining in Intrusion Detection Alerts. CNSR 2008: 157-164
73EEMahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. Ghorbani: A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. CNSR 2008: 75-81
72EEReza Zafarani, Mohammad-Amin Jashki, Hamidreza Baghi, Ali A. Ghorbani: A Novel Approach for Social Behavior Analysis of the Blogosphere. Canadian Conference on AI 2008: 356-367
71EEEbrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafarani, Ali A. Ghorbani: A Belief-Theoretic Reputation Estimation Model for Multi-context Communities. Canadian Conference on AI 2008: 48-59
70EEM. Barouni-Ebrahimi, Ebrahim Bagheri, Ali A. Ghorbani: A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals. Canadian Conference on AI 2008: 60-65
69EEMajid Makki, Ebrahim Bagheri, Ali A. Ghorbani: Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process. ECSA 2008: 264-272
68EEWei Lu, Ali A. Ghorbani: Botnets Detection Based on IRC-Community. GLOBECOM 2008: 2067-2071
67EEIosif-Viorel Onut, Ali A. Ghorbani: A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks. HICSS 2008: 203
66EEEbrahim Bagheri, Ali A. Ghorbani: Towards a Belief-Theoretic Model for Collaborative Conceptual Model Development. HICSS 2008: 489
65EEReza Zafarani, Majid Makki, Ali A. Ghorbani: An Empirical Analysis on the Stability of Clustering Algorithms. ICTAI (2) 2008: 19-26
64EEReza Zafarani, Ali A. Ghorbani: Oracle Clustering: Dynamic Partitioning Based on Random Observations. ICTAI (2) 2008: 27-34
63EEEbrahim Bagheri, Ali A. Ghorbani: On the Definition of Essential and Contingent Properties of Subjective Belief Bases. MICAI 2008: 686-698
62EEWei Lu, Ali A. Ghorbani: Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). RAID 2008: 415-416
61EEGeorge O. M. Yee, Ali A. Ghorbani, Patrick C. K. Hung: Guest Editors' Introduction. Journal of Computer Security 16(2): 103-106 (2008)
60EEHarshit Nayyar, Ali A. Ghorbani: Approximate autoregressive modeling for network attack detection. Journal of Computer Security 16(2): 165-197 (2008)
59EES. Hossein Sadat-Mohtasham, Ali A. Ghorbani: A language for high-level description of adaptive web systems. Journal of Systems and Software 81(7): 1196-1217 (2008)
2007
58EEJie Zhang, Ali A. Ghorbani: GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems. CNSR 2007: 117-124
57EEM. Barouni-Ebrahimi, Ali A. Ghorbani: A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. CNSR 2007: 125-132
56EEHamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani: ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. CNSR 2007: 133-140
55EEEbrahim Bagheri, Ali A. Ghorbani: Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. CNSR 2007: 335-344
54EEFarnaz Gharibian, Ali A. Ghorbani: Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. CNSR 2007: 350-358
53EEIosif-Viorel Onut, Ali A. Ghorbani: Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. ISC 2007: 19-36
52EEReza Sadoddin, Ali A. Ghorbani: A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection. MLDM 2007: 404-418
51EEEbrahim Bagheri, Ali A. Ghorbani: A framework for distributed collaborative conceptual model development. OOPSLA Companion 2007: 785-786
50EEEbrahim Bagheri, Ali A. Ghorbani: On the Collaborative Development of Para-Consistent Conceptual Models. QSIC 2007: 336-341
49EEAli A. Ghorbani, Xiaowen Xu: A Fuzzy Markov Model Approach for Predicting User Navigation. Web Intelligence 2007: 307-311
48EEM. Barouni-Ebrahimi, Ali A. Ghorbani: On Query Completion in Web Search Engines Based on Query Stream Mining. Web Intelligence 2007: 317-320
47EEIosif-Viorel Onut, Ali A. Ghorbani: SVision: A novel visual network-anomaly identification technique. Computers & Security 26(3): 201-212 (2007)
46EEJie Zhang, Ali A. Ghorbani, Robin Cohen: A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. Int. J. Inf. Sec. 6(5): 333-344 (2007)
2006
45EEIosif-Viorel Onut, Ali A. Ghorbani: Toward A Feature Classification Scheme For Network Intrusion Detection. CNSR 2006: 277-284
44EEEugenia Kondratova, Ali A. Ghorbani, Stephen Marsh: CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems. CNSR 2006: 300-310
43EEJie Zhang, Ali A. Ghorbani, Robin Cohen: An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. PST 2006: 19
42EEHarshit Nayyar, Ali A. Ghorbani: Approximate autoregressive modeling for network attack detection. PST 2006: 23
41EEReza Sadoddin, Ali A. Ghorbani: Alert correlation survey: framework and techniques. PST 2006: 37
40EEEbrahim Bagheri, Ali A. Ghorbani: Behavior analysis through reputation propagation in a multi-context environment. PST 2006: 40
39EEEugenia Kondratova, Stephen Marsh, Ali A. Ghorbani: Trust-based contextual information filtering. PST 2006: 51
38EEEbrahim Bagheri, Ali A. Ghorbani: Towards an MDA-oriented UML profile for critical infrastructure modeling. PST 2006: 66
37EEMehran Nadjarbashi-Noghani, Ali A. Ghorbani: Design and implementation of a behavioral difference analyzer for network intrusion detection. PST 2006: 69
36EEM. Barouni-Ebrahimi, Ali A. Ghorbani: A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines. WAW 2006: 129-136
2005
35EEHossein Sadat, Ali A. Ghorbani: A Presentation Description Language for Adaptive Web Systems. CNSR 2005: 169-175
34EEMark Kilfoil, Wenpu Xing, Ali A. Ghorbani: ARAS: Adaptive Recommender for Academic Scheduling. CNSR 2005: 307-312
33EEMehran Nadjarbashi-Noghani, Jie Zhang, Hossein Sadat, Ali A. Ghorbani: PENS: A Personalized Electronic News System. CNSR 2005: 31-38
32EEYuhong Yan, Yong Liang, Xinge Du, Hamadou Saliah, Ali A. Ghorbani: Using Web Services to Control Remote Instruments for Online Experiment Systems. CSCWD (Selected papers) 2005: 205-214
31EEMark Kilfoil, Ali A. Ghorbani: SWAMI: Searching the Web Using Agents with Mobility and Intelligence. Canadian Conference on AI 2005: 91-102
30EESepideh Miralaei, Ali A. Ghorbani: Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems. IAT 2005: 242-245
29EEJie Zhang, Ali A. Ghorbani: Value-Centric Trust Model with Improved Familiarity Measurement. IJCAI 2005: 1670-1671
28EEIosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani: SVision: A Network Host-Centered Anomaly Visualization Technique. ISC 2005: 16-28
27EEMehdi Shajari, Ali A. Ghorbani: Agent-oriented Design for Network Survivability. ISDA 2005: 166-171
26EEWenpu Xing, Ali A. Ghorbani: Information Domain Modeling for Adaptive Web Systems. Web Intelligence 2005: 684-687
2004
25EEJohn Zhong Lei, Ali A. Ghorbani: Network Intrusion Detection Using an Improved Competitive Learning Neural Network. CNSR 2004: 190-197
24EEMehran Nadjarbashi-Noghani, Ali A. Ghorbani: Improving the Referrer-Based Web Log Session Reconstruction. CNSR 2004: 286-292
23EEWenpu Xing, Ali A. Ghorbani: Weighted PageRank Algorithm. CNSR 2004: 305-314
22EEJie Zhang, Ali A. Ghorbani: The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics. CNSR 2004: 315-322
21EEJohn Zhong Lei, Ali A. Ghorbani: The Reconstruction of the Interleaved Sessions from a Server Log. Canadian Conference on AI 2004: 133-145
20EEElijah Bitting, Ali A. Ghorbani: Cooperative Multiagent Systems for the Optimization of Urban Traffic. IAT 2004: 176-182
19EEIosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani: A novel visualization technique for network anomaly detection. PST 2004: 167-174
18EEMehdi Shajari, Ali A. Ghorbani: Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. PST 2004: 181-191
17EEJie Zhang, Ali A. Ghorbani: Familiarity and Trust: Measuring Familiarity with a Web Site. PST 2004: 23-28
16 Hossein Sadat, Ali A. Ghorbani: On the Evaluation of Adaptive Web Systems. Workshop on Web-based Support Systems 2004: 127-136
15EEElijah Bitting, Ali A. Ghorbani: Protecting e-commerce agents from defamation. Electronic Commerce Research and Applications 3(1): 21-38 (2004)
14EEJonathan Carter, Ali A. Ghorbani: Towards a formalization of value-centric trust in agent societies. Web Intelligence and Agent Systems 2(3): 167-183 (2004)
2003
13EEYu Guan, Ali A. Ghorbani, Nabil Belacel: An Unsupervised Clustering Algorithm for Intrusion Detection. Canadian Conference on AI 2003: 616-617
12EEHong Tang, Ali A. Ghorbani: Accent Classification Using Support Vector Machine and Hidden Markov Model. Canadian Conference on AI 2003: 629-631
11EEJohn France, Ali A. Ghorbani: A Multiagent System for Optimizing Urban Traffic. IAT 2003: 411-414
10 Mehdi Shajari, Ali A. Ghorbani: Using Fuzzy System to Manage False Alarms in Intrusion Detection. SEC 2003: 241-252
9EEJonathan Carter, Ali A. Ghorbani: Value Centric Trust in Multiagent Systems. Web Intelligence 2003: 3-9
8EEStephen Marsh, Ali A. Ghorbani, Virendra C. Bhavsar: The ACORN multi-agent system. Web Intelligence and Agent Systems 1(1): 65-86 (2003)
2002
7EEJonathan Carter, Ali A. Ghorbani, Stephen Marsh: Just-in-time information sharing architectures in multiagent systems. AAMAS 2002: 647-654
6 Jonathan Carter, Elijah Bitting, Ali A. Ghorbani: Reputation Formalization for an Information-Sharing Multi-Agent System. Computational Intelligence 18(4): 515-534 (2002)
5 Jonathan Carter, Ali A. Ghorbani, Stephen Marsh: Architectural Components of Information-Sharing Societies. Computational Intelligence 18(4): 638-655 (2002)
2001
4EEAli Farzan, Ali A. Ghorbani: The Bottom-Up Freezing: An Approach to Neural Engineering. Canadian Conference on AI 2001: 317-324
2000
3EEAli A. Ghorbani, Lila Bayat: Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm. Canadian Conference on AI 2000: 293-304
2EEHui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Stephen Marsh: Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture. MATA 2000: 243-256
1998
1EEAli A. Ghorbani, Virendra C. Bhavsar: Incremental communication for multilayer neural networks: error analysis. IEEE Transactions on Neural Networks 9(1): 68-82 (1998)

Coauthor Index

1Ebrahim Bagheri [38] [40] [50] [51] [55] [63] [66] [69] [70] [71] [76] [79]
2Hamidreza Baghi [56] [72]
3M. Barouni-Ebrahimi (Mohammadreza Barouni-Ebrahimi) [36] [48] [56] [57] [70] [71]
4Lila Bayat [3]
5Nabil Belacel [13]
6Virendra C. Bhavsar [1] [2] [8]
7Elijah Bitting [6] [15] [20]
8Jonathan Carter [5] [6] [7] [9] [14]
9Robin Cohen [43] [46]
10Xinge Du [32]
11Ali Farzan [4]
12John France [11]
13Farnaz Gharibian [54]
14Yu Guan [13]
15Patrick C. K. Hung [61]
16Shah Arif Iqbal [73]
17Mohammad-Amin Jashki [72]
18Mark Kilfoil [31] [34]
19Eugenia Kondratova [39] [44]
20John Zhong Lei [21] [25]
21Yong Liang [32]
22Wei Lu [62] [68] [73] [75] [80]
23Majid Makki [65] [69]
24Stephen Marsh [2] [5] [7] [8] [39] [44]
25Sepideh Miralaei [30]
26Mehran Nadjarbashi-Noghani [24] [33] [37]
27Harshit Nayyar [42] [60]
28Iosif-Viorel Onut [19] [28] [45] [47] [53] [67]
29Hossein Sadat [16] [33] [35]
30S. Hossein Sadat-Mohtasham [59]
31Reza Sadoddin [41] [52] [78]
32Hamadou Saliah [32]
33Mehdi Shajari [10] [18] [27]
34Mahboobeh Soleimani [74]
35Oleg Stakhanov [77]
36Natalia Stakhanova [77]
37Hong Tang [12]
38Mahbod Tavallaee [73] [75] [80]
39Wenpu Xing [23] [26] [34]
40Xiaowen Xu [49]
41Yuhong Yan [32]
42George O. M. Yee [61]
43Hui Yu [2]
44Reza Zafarani [56] [64] [65] [71] [72]
45Jie Zhang [17] [22] [29] [33] [43] [46] [58]
46Bin Zhu [19] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)