His primary areas of study are Intrusion detection system, Data mining, Computer security, The Internet and Machine learning. His work carried out in the field of Intrusion detection system brings together such families of science as Testbed, Software deployment, Constant false alarm rate and Strengths and weaknesses. His Data mining study focuses on Anomaly detection in particular.
His Network security study in the realm of Computer security interacts with subjects such as Process. In his study, Denial-of-service attack and Click fraud is strongly linked to Artificial intelligence, which falls under the umbrella field of Machine learning. His Data set research integrates issues from Feature extraction, Computational intelligence and Data security.
His primary areas of investigation include Data mining, Computer security, Artificial intelligence, Intrusion detection system and Machine learning. His studies deal with areas such as Information retrieval, Feature selection, Cluster analysis and Flow network as well as Data mining. Information retrieval and Web page are commonly linked in his work.
His research integrates issues of Android, Computer network and The Internet, Botnet in his study of Computer security. The Artificial intelligence study combines topics in areas such as Natural language processing and Pattern recognition. His Intrusion detection system study combines topics from a wide range of disciplines, such as Anomaly detection, Denial-of-service attack and Network security.
Computer security, Artificial intelligence, Deep learning, Blockchain and Encryption are his primary areas of study. His Computer security research incorporates elements of Block, Correctness, Feature and Big data. Ali A. Ghorbani combines subjects such as Intrusion detection system and Enhanced Data Rates for GSM Evolution with his study of Feature.
His biological study spans a wide range of topics, including Univariate and Machine learning. His work deals with themes such as Random forest, Data mining and Support vector machine, which intersect with Receiver operating characteristic. His Data mining study incorporates themes from Watermark, Embedding and Brute-force attack.
Ali A. Ghorbani mainly focuses on Computer security, Distributed computing, Network security, Taxonomy and Cloud computing. Blockchain and Intrusion detection system are the subjects of his Computer security studies. Reliability is closely connected to Probabilistic logic in his research, which is encompassed under the umbrella topic of Distributed computing.
Ali A. Ghorbani has included themes like Data mining, Feature, Flow network, Denial-of-service attack and Data science in his Network security study. His Taxonomy research includes elements of Visualization, Volume and Categorization. His Cloud computing study deals with Encryption intersecting with Access control.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A detailed analysis of the KDD CUP 99 data set
Mahbod Tavallaee;Ebrahim Bagheri;Wei Lu;Ali A. Ghorbani.
computational intelligence and security (2009)
A detailed analysis of the KDD CUP 99 data set
Mahbod Tavallaee;Ebrahim Bagheri;Wei Lu;Ali A. Ghorbani.
computational intelligence and security (2009)
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
Iman Sharafaldin;Arash Habibi Lashkari;Ali A. Ghorbani.
international conference on information systems security (2018)
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
Iman Sharafaldin;Arash Habibi Lashkari;Ali A. Ghorbani.
international conference on information systems security (2018)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi;Hadi Shiravi;Mahbod Tavallaee;Ali A. Ghorbani.
Computers & Security (2012)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi;Hadi Shiravi;Mahbod Tavallaee;Ali A. Ghorbani.
Computers & Security (2012)
Weighted PageRank algorithm
W. Xing;A. Ghorbani.
conference on communication networks and services research (2004)
Weighted PageRank algorithm
W. Xing;A. Ghorbani.
conference on communication networks and services research (2004)
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
Rongxing Lu;Kevin Heung;Arash Habibi Lashkari;Ali A. Ghorbani.
IEEE Access (2017)
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
Rongxing Lu;Kevin Heung;Arash Habibi Lashkari;Ali A. Ghorbani.
IEEE Access (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Michigan–Ann Arbor
University of New Brunswick
Nanyang Technological University
University of Belgrade
Singapore Management University
University of Waterloo
Southwest Jiaotong University
University of Milano-Bicocca
Umeå University
Rovira i Virgili University
Carnegie Mellon University
Cornell University
Royal Holloway University of London
Harbin Institute of Technology
Åbo Akademi University
Polytechnic University of Milan
Medical University of South Carolina
Harvard University
Centre national de la recherche scientifique, CNRS
University of Göttingen
Finnish Environment Institute
Iowa State University
Brown University
Brown University
University of Pisa
Princess Margaret Cancer Centre