dblp.uni-trier.dewww.uni-trier.de

A. Nur Zincir-Heywood

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
53EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka: Testing Detector Parameterization Using Evolutionary Exploit Generation. EvoWorkshops 2009: 105-110
2008
52EEDuffy Angevine, A. Nur Zincir-Heywood: A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set. ARES 2008: 1075-1079
51EEAdetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios: Adaptabilty of a GP Based IDS on Wireless Networks. ARES 2008: 310-318
50EEMelanie Tupper, A. Nur Zincir-Heywood: VEA-bility Security Metric: A Network Security Analysis Tool. ARES 2008: 950-957
49EEAshley George, Adetokunbo Makanju, Evangelos E. Milios, A. Nur Zincir-Heywood, Markus Latzel, Sotirios Stergiopoulos: NetPal: a dynamic network administration knowledge base. CASCON 2008: 20
48EEAshley George, Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios: Information Retrieval in Network Administration. CNSR 2008: 561-568
47EERiyad Alshammari, A. Nur Zincir-Heywood: Investigating Two Different Approaches for Encrypted Traffic Classification. PST 2008: 156-166
46EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? PST 2008: 213-223
45EEAdetokunbo Makanju, Stephen Brooks, A. Nur Zincir-Heywood, Evangelos E. Milios: LogView: Visualizing Event Log Clusters. PST 2008: 99-108
2007
44EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: On the Contribution of Preamble to Information Hiding in Mimicry Attacks. AINA Workshops (1) 2007: 632-638
43EEHilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood: Evolving Buffer Overflow Attacks with Detector Feedback. EvoWorkshops 2007: 11-20
42EEXiao Luo, A. Nur Zincir-Heywood: Incorporating Temporal Information for Document Classification. ICDE Workshops 2007: 780-789
41EEOzge Yeloglu, A. Nur Zincir-Heywood, Malcolm I. Heywood: Growing recurrent self organizing map. SMC 2007: 290-295
40EERiyad Alshammari, A. Nur Zincir-Heywood: A flow based approach for SSH traffic detection. SMC 2007: 296-301
2006
39EEPatrick LaRoche, A. Nur Zincir-Heywood: Genetic Programming Based WiFi Data Link Layer Attack Detection. CNSR 2006: 285-292
38EEYeming Hu, A. Nur Zincir-Heywood: Modeling User Behaviors from FTP Server Logs. CNSR 2006: 320-322
37EEPatrick LaRoche, A. Nur Zincir-Heywood: 802.11 De-authentication Attack Detection Using Genetic Programming. EuroGP 2006: 1-12
36EEHilmi Günes Kayacik, Malcolm I. Heywood, A. Nur Zincir-Heywood: On evolving buffer overflow attacks using genetic programming. GECCO 2006: 1667-1674
35EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Using self-organizing maps to build an attack map for forensic analysis. PST 2006: 33
34EES. Liang, A. Nur Zincir-Heywood, Malcolm I. Heywood: Adding more intelligence to the network routing problem: AntNet and Ga-agents. Appl. Soft Comput. 6(3): 244-257 (2006)
2005
33EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood: Evolving Successful Stack Overflow Attacks for Vulnerability Testing. ACSAC 2005: 225-234
32EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Generating Representative Traffic for Intrusion Detection System Benchmarking. CNSR 2005: 112-117
31EEXiaosong Hu, A. Nur Zincir-Heywood: Understanding the Performance of Cooperative Web Caching Systems. CNSR 2005: 183-188
30EEPeter Lichodzijewski, Malcolm I. Heywood, A. Nur Zincir-Heywood: CasGP: building cascaded hierarchical models using niching. Congress on Evolutionary Computation 2005: 1180-1187
29EEXiao Luo, Malcolm I. Heywood, A. Nur Zincir-Heywood: Evolving recurrent models using linear GP. GECCO 2005: 1787-1788
28EEPatrick LaRoche, A. Nur Zincir-Heywood: 802.11 network intrusion detection using genetic programming. GECCO Workshops 2005: 170-171
27EEHilmi Günes Kayacik, A. Nur Zincir-Heywood: Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. ISI 2005: 362-367
26EEXiao Luo, A. Nur Zincir-Heywood: Evaluation of Two Systems on Multi-class Multi-label Document Classification. ISMIS 2005: 161-169
25EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood: Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. PST 2005
24EEYongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios: Narrative text classification for automatic key phrase extraction in web document corpora. WIDM 2005: 51-58
23EEDong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Trans. Evolutionary Computation 9(3): 225-239 (2005)
22EEZhongmin Shi, Evangelos E. Milios, A. Nur Zincir-Heywood: Post-Supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources. J. Intell. Inf. Syst. 25(1): 69-93 (2005)
21EELeigh Wetmore, Malcolm I. Heywood, A. Nur Zincir-Heywood: Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection. Neural Processing Letters 22(1): 17-32 (2005)
2004
20EEHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood: On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection. CNSR 2004: 181-189
19EEYan Zhou, A. Nur Zincir-Heywood: Intelligent Agents for Routing on Mobile Ad-Hoc Networks. CNSR 2004: 249-254
18EEHaihua Yun, A. Nur Zincir-Heywood: Intelligent Ants for Adaptive Network Routing. CNSR 2004: 255-261
17EEYongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios: Term-Based Clustering and Summarization of Web Page Collections. Canadian Conference on AI 2004: 60-74
16 Xiao Luo, A. Nur Zincir-Heywood: Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs. IC-AI 2004: 977-983
15EEXiao Luo, A. Nur Zincir-Heywood: Analyzing the Temporal Sequences for Text Categorization. KES 2004: 498-505
14 Turhan Tunali, A. Nur Zincir-Heywood: A heuristic approach to network optimised mapping of a distributed resource discovery architecture. IJCAT 19(1): 43-50 (2004)
13EEYongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios: World Wide Web site summarization. Web Intelligence and Agent Systems 2(1): 39-53 (2004)
2003
12EEErnst W. Grundke, A. Nur Zincir-Heywood: A Uniform Continuum Model for Scaling of Ad Hoc Networks. ADHOC-NOW 2003: 96-103
11EEZhongmin Shi, Evangelos E. Milios, A. Nur Zincir-Heywood: Post-supervised Template Induction for Dynamic Web Sources. Canadian Conference on AI 2003: 268-282
10EEYongzheng Zhang, A. Nur Zincir-Heywood, Evangelos E. Milios: Summarizing Web Sites Automatically. Canadian Conference on AI 2003: 283-296
9EEDong Song, Malcolm I. Heywood, A. Nur Zincir-Heywood: A Linear Genetic Programming Approach to Intrusion Detection. GECCO 2003: 2325-2336
8 Hilmi Günes Kayacik, A. Nur Zincir-Heywood: A Case Study of Three Open Source Security Management Tools. Integrated Network Management 2003: 101-104
7 Dyan J. Tufts-Conrad, A. Nur Zincir-Heywood, David Zitner: SOM - Feature Extraction from Patient Discharge Summaries. SAC 2003: 263-267
2002
6 Suihong Liang, A. Nur Zincir-Heywood, Malcolm I. Heywood: Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm. GECCO 2002: 88-96
5EEA. Nur Zincir-Heywood, Malcolm I. Heywood, Chris R. Chatwin: Object-Orientated Design of Digital Library Platforms for Multiagent Environments. IEEE Trans. Knowl. Data Eng. 14(2): 281-295 (2002)
4 Malcolm I. Heywood, A. Nur Zincir-Heywood: Dynamic page based crossover in linear genetic programming. IEEE Transactions on Systems, Man, and Cybernetics, Part B 32(3): 380-388 (2002)
2000
3 Malcolm I. Heywood, A. Nur Zincir-Heywood: Register Based Genetic Programming on FPGA Computing Platforms. EuroGP 2000: 44-59
2 Malcolm I. Heywood, A. Nur Zincir-Heywood, Chris R. Chatwin: Digital library query clearing using clustering and fuzzy decision-making. Inf. Process. Manage. 36(4): 571-583 (2000)
1EEA. Nur Zincir-Heywood, Malcolm I. Heywood, Chris R. Chatwin, Turhan Tunali: Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search. Int. J. Cooperative Inf. Syst. 9(3): 229-254 (2000)

Coauthor Index

1Riyad Alshammari [40] [47]
2Duffy Angevine [52]
3Stephen Brooks [45]
4Stefan Burschka [53]
5Chris R. Chatwin [1] [2] [5]
6Ashley George [48] [49]
7Ernst W. Grundke [12]
8Malcolm I. Heywood [1] [2] [3] [4] [5] [6] [9] [20] [21] [23] [25] [29] [30] [33] [34] [36] [41] [43] [53]
9Xiaosong Hu [31]
10Yeming Hu [38]
11Hilmi Günes Kayacik [8] [20] [25] [27] [32] [33] [35] [36] [43] [44] [46] [53]
12Patrick LaRoche [28] [37] [39]
13Markus Latzel [49]
14S. Liang [34]
15Suihong Liang [6]
16Peter Lichodzijewski [30]
17Xiao Luo [15] [16] [26] [29] [42]
18Adetokunbo Makanju [45] [48] [49] [51]
19Evangelos E. Milios [10] [11] [13] [17] [22] [24] [45] [48] [49] [51]
20Zhongmin Shi [11] [22]
21Dong Song [9] [23]
22Sotirios Stergiopoulos [49]
23Dyan J. Tufts-Conrad [7]
24E. Turhan Tunali (Turhan Tunali) [1] [14]
25Melanie Tupper [50]
26Leigh Wetmore [21]
27Ozge Yeloglu [41]
28Haihua Yun [18]
29Yongzheng Zhang [10] [13] [17] [24]
30Yan Zhou [19]
31David Zitner [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)