PUBLICATIONS
Conference & Workshop Publications
M. Mamun, M. Rathore, A. Lashkari, N. Stakhanova and A. Ghorbani. Detecting Malicious URLs Using Lexical Analysis. In Proceedings of the International Conference on Network and System Security (NSS), 2016.
R. Killam, N. Stakhanova, and P. Cook. Android malware classication through linguistic analysis of string literals. In The Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS) , 2016
A. Jain, H. Gonzalez, and N. Stakhanova. Enriching reverse engineering through visual exploration of Android binaries. In Proceedings of the 5th Program Protection and Reverse Engineering Workshop , PPREW-5, pages 9:1-9:9, New York, NY, USA, 2015. ACM
M. A. Gosselin-Lavigne, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani. A performance evaluation of hash functions for IP reputation lookup using bloom filters. In 10th International Conference on Availability, Reliability and Security (ARES), Workshop on Software Assurance , pages 516-521. IEEE, 2015
A. Abdul Kadir, N. Stakhanova, and A. Ghorbani. Android botnets: What urls are telling us. In M. Qiu, S. Xu, M. Yung, and H. Zhang, editors, International Conference on Network and System Security (NSS) , volume 9408 of Lecture Notes in Computer Science , pages 78-91, Springer International Publishing, 2015
M. S. I. Mamun, A. Ghorbani, and N. Stakhanova. An entropy-based encrypted traffic classication using machine learning. In The 17th International Conference on Information and Communication Security (ICICS 2015) , number LNCS 9543 (2015). Springer-Verlag, 2015
H. Gonzalez, A. A. Kadir, N. Stakhanova, A. J. Alzahrani, and A. A. Ghorbani. Exploring reverse engineering symptoms in Android apps. In Proceedings of the Eighth European Workshop on System Security , EuroSec '15, pages 7:1-7:7, New York, NY, USA, 2015. ACM
J. Cazalas, J. McDonald, T. Andel, and N. Stakhanova. Probing the limits of virtualized software protection. In 4th Program Protection and Reverse Engineering Workshop (PPREW-4) , 2014
H. Gonzalez, N. Stakhanova, and A. Ghorbani. Droidkin: Lightweight detection of Android apps similarity. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm 2014) , 2014
E. BiglarBeigi, H. Hadian Jazi, N. Stakhanova, and A. Ghorbani. Towards effective feature selection in machine learning-based botnet detection approaches. In IEEE Conference on Communications and Network Security (CNS) , 2014
N. Stakhanova, M. Couture, and A. A. Ghorbani. Exploring network-based malware classification. In Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on , pages 14-20. IEEE, 2011
N. Stakhanova and A. A. Ghorbani. Managing intrusion detection rule sets. In Proceedings of the Third European Workshop on System Security (EUROSEC) , pages 29-35, New York, NY, USA, 2010. ACM
N. Stakhanova, H. Ren, and A. A. Ghorbani. Selective regular expression matching. In M. Burmester, G. Tsudik, S. Magliveras, and I. Ilia, editors, Information Security conference (ISC) , volume 6531 of Lecture Notes in Computer Science , pages 226-240. Springer Berlin Heidelberg, 2011
H. Ren, N. Stakhanova, and A. A. Ghorbani. An online adaptive approach to alert correlation. In C. Kreibich and M. Jahnke, editors, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) , volume 6201 of Lecture Notes in Computer Science , pages 153-172. Springer Berlin Heidelberg, 2010
C. Strasburg, N. Stakhanova, S. Basu, and J. S. Wong. A framework for cost sensitive assessment of intrusion response selection. In Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01 , COMPSAC'09, pages 355-360, Washington, DC, USA, 2009. IEEE Computer Society
C. Strasburg, N. Stakhanova, S. Basu, and J. S. Wong. Intrusion response cost assessment methodology. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security , ASIACCS '09, pages 388-391, New York, NY, USA, 2009. ACM
N. Stakhanova, Y. Li, and A. A. Ghorbani. Classification and discovery of rule misconfigurations in intrusion detection and response devices. In Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business , CONGRESS '09, pages 29-37, Washington, DC, USA, 2009. IEEE Computer Society
N. Stakhanova, C. Strasburg, S. Basu, and J. Wong. On evaluation of response cost for intrusion response systems. In R. Lippmann, E. Kirda, and A. Trachtenberg, editors, Recent Advances in Intrusion Detection (RAID) , volume 5230 of Lecture Notes in Computer Science , pages 390-391. Springer Berlin Heidelberg, 2008
N. Stakhanova, S. Basu, W. Z. amd Xia Wang, and J. Wong. Specification synthesis for monitoring and analysis of Manet protocols. In Proceedings of the IEEE International Symposium on Frontiers in Networking with Applications (FINA) , pages 183-187, 2007
N. Stakhanova, S. Basu, and J. Wong. A cost-sensitive model for preemptive intrusion response systems. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 428-435, 2007
N. Stakhanova, S. Basu, R. Lutz, and J. Wong. Automated caching of behavioral patterns for efficient run-time monitoring. In Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), pages 333-340, 2006
N. Stakhanova, S. Basu, J. Wong, and O. Stakhanov. Trust framework for p2p networks using peer-prole based anomaly technique. In Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02 , ICDCSW '05, pages 203-209, Washington, DC, USA, 2005. IEEE Computer Society
N. Stakhanova, S. Ferrero, J. S. Wong, and Y. Cai. A reputation-based trust management in peer-to-peer network systems. In D. A. Bader and A. A. Khokhar, editors, ISCA PDCS , pages 510-515. ISCA, 2004