Building an intrusion detection system using a filter-based feature selection algorithm, IEEE Transactions on Computers, vol.65, issue.10, pp.2986-2998, 2016. ,
, Correntropybased evolving fuzzy neural system, to appear in IEEE Transactions on Fuzzy Systems
, A new ransomware attack is infecting airlines, banks and utilities across Europe, The Verge, 2017.
FACT: A framework for authentication in cloud-based IP traceback, IEEE Transactions on Information Forensics and Security, vol.12, issue.3, pp.604-616, 2017. ,
Using chi-square statistics to measure similarities for text categorization, Expert Systems with Applications, vol.38, issue.4, pp.3085-3090, 2011. ,
A novel privacy preserving user identification approach for network traffic, Computers and Security, vol.70, pp.335-350, 2017. ,
Network security evaluation method via attack graphs and fuzzy cognitive maps, Proceedings of the Fourth International Conference on Intelligent Decision Technologies, vol.2, pp.433-440, 2012. ,
Survey of real-time security mechanisms in network forensics, International Journal of Computer Applications, vol.151, issue.2, 2016. ,
Network forensic method based on evidence graph and vulnerability reasoning, Future Internet, vol.8, issue.4, 2016. ,
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks, Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensics, pp.201-206, 2012. ,
Network forensics: Review, taxonomy and open challenges, Journal of Network and Computer Applications, vol.66, pp.214-235, 2016. ,
A comprehensive review of the adaptability of network forensic frameworks for mobile cloud computing, The Scientific World Journal, vol.2014, 2014. ,
Deterministic packet marking based on the coordination of border gateways, Proceedings of the Second International Conference on Education Technology and Computers, vol.2, pp.154-161, 2010. ,
A probabilistic network forensic model for evidence analysis, Advances in Digital Forensics XII, pp.189-210, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01758685
Computational Methods of Feature Selection, 2008. ,
Design and implementation of a network forensic system based on intrusion detection analysis, Proceedings of the International Conference on Control Engineering and Communications Technology, pp.689-692, 2012. ,
Correntropy: Properties and applications in non-Gaussian signal processing, IEEE Transactions on Signal Processing, vol.55, issue.11, pp.5286-5298, 2007. ,
UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 Network Data Set, Proceedings of the Military Communications and Information Systems Conference, 2015. ,
Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation in large-scale networks ,
An efficient proactive artificial immune system based anomaly detection and prevention system, Expert Systems with Applications, vol.60, pp.311-320, 2016. ,
Big data analytics by automated generation of fuzzy rules for network forensic readiness, Applied Soft Computing, vol.52, pp.359-375, 2017. ,
Identifying significant features for network forensic analysis using artificial intelligence techniques, International Journal of Digital Evidence, vol.1, issue.4, 2003. ,
A proposed architecture for network forensic systems in large-scale networks, International Journal of Computer Networks and Communications, vol.7, issue.4, pp.43-56, 2015. ,
A system for denial-of-service attack detection based on multivariate correlation analysis, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.447-456, 2014. ,
Sampling, New Jersey, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00894156
Attack detection and distributed forensics in machine-to-machine networks, IEEE Network, vol.30, issue.6, pp.49-55, 2016. ,
Topology-assisted deterministic packet marking for IP traceback, Journal of China Universities of Posts and Telecommunications, vol.17, issue.2, pp.116-121, 2010. ,