PUBLICATIONS

Graph structures for event matching. N. Stakhanova, A.Ghorbani and W.Bird. US Patent No. 9413598. Awarded Aug 9, 2016. Assigned to IBM.

 

Generic Parsing of Unstructured Data Sources. N. Stakhanova, A.Ghorbani, E. Biglar Beigi, B. Wuest and W.Bird. US Patent Application No. 91680991.

System and method for simulating network attacks. A.Ghorbani, I-V. Onut, N. Stakhanova and W.Bird. US Patent No. 8160855, Awarded Apr 17, 2012. Assigned to IBM.

 

N. Stakhanova, A. A. Cardenas. Analysis of Metrics for Classification Accuracy in Intrusion Detection. In L. Othmane, M. G. Jaatun,  and E. Weippl, editors.  Empirical Research for Software Security: Foundations and Experience, Taylor & Francis Group, LLC, 2017

A. Abdul Kadir, N. Stakhanova, and A. Ghorbani. An empirical analysis of Android banking malware. In W. Meng, X. Luo, J. Zhou, and S. Furnell, editors, Protecting Mobile Networks and Devices: Challenges and Solutions. CRC Press - Taylor & Francis, 2016

 

H. Gonzalez, M.-A. Gosselin-Lavigne, N. Stakhanova, and A. Ghorbani. The impact of application layer denial of service attacks. In B. Issac and N. Israr, editors, Case Studies in Secure Computing - Achievements and Trends. CRC Press, Taylor and Francis, 2014

 

V. Kalgutkar, R. Kaur, H. Gonzalez, and N. Stakhanova. Code authorship attribution: Methods and challenges. ACM Computing Surveys, 2018

 

A. Abdul Kadir, N. Stakhanova, and A. Ghorbani. Understanding Android Financial Malware Attacks: Taxonomy, Characteristics, and Challenges. Journal of Cyber Security and Mobility, 7(3):1-52, July 2018 

 

H. Jazi, H. Gonzalez, N. Stakhanova, A.A. Ghorbani. Detecting HTTP-based Application Layer DoS attacks on Web Servers in the presence of sampling. Computer Networks, 2017.

 

G. Mantas, N. Stakhanova, H. Gonzalez, and A. Ghorbani. A Taxonomy of Application-Layer Denial of Service (DoS) Attacks. International Journal of Information and Computer Security,  2015

 

A. J. Alzahrani, N. Stakhanova, H. Gonzalez, and A. Ghorbani. Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones. Journal of Cyber Security and Mobility, 2014

 

R. Chouchane, N. Stakhanova, A.Walenstein, and A. Lakhotia. Detecting machine-morphed malware variants via engine attribution. Journal of Computer Virology , 9(3):137-157, Aug.

 

N. Stakhanova, C. Strasburg, S. Basu, and J. S. Wong. Towards cost-sensitive assessment of intrusion response selection. Journal of Computer Security , 20(2-3):169-198, 2012

 

M. Tavallaee, N. Stakhanova, and A. Ghorbani. Toward Credible Evaluation of Anomaly- Based Intrusion-Detection Methods. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on , 40(5):516-524, 2010

 

N. Stakhanova, S. Basu, and J. Wong. On the symbiosis of specication-based and anomaly-based detection. Computers & Security , 29(2):253-268, 2010

 

N. Stakhanova, S. Basu, and J. Wong. A taxonomy of intrusion response systems. In International Journal of Information and Computer Security , volume 1, pages 169-184,

 

G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, Y. Wang, X. Wang, and N. Stakhanova. Software fault tree and coloured petri net based specication, design and implementation of agent-based intrusion detection systems. Int. J. Inf. Comput. Secur. ,1(1/2):109-142, Jan. 2007

 

S. Linoy, S. Ray, N. Stakhanova.  Towards Eidetic Blockchain Systems with Enhanced Provenance. In Proceedings of the 2nd Blockchain and Data Management (BlockDM  2020).

S. Linoy, N. Stakhanova, A. Matyukhina.  Exploring Ethereum’s blockchain anonymity using smart contract code attribution. In Proceedings of the 15th International Conference on Network and Service Management (CNSM 2019).

J. Iqbal, R. Kaur and N. Stakhanova. PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019).

S. Linoy, H. Mahdikhani, S. Ray, R. Lu, Natalia Stakhanova and Ali Ghorbani. Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain. IEEE Symposium on Recent Advances on Blockchain and Its Applications (held in conjunction with IEEE Blockchain),  2019.

A. Matyukhina, N. Stakhanova, M. Dalla Preda and C. Perley. 2019. Adversarial author attribution in open-source projects. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY '19, , New York, NY, USA, 2019. ACM

V. Kalgutkar, N. Stakhanova, P. Cook, and A. Matyukhina. 2018. Android authorship attribution through string analysis. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, New York, NY, USA  Best Presentation Award, a runner-up nomination for Best Paper Award

 

R. Kaur, Y.Ning, H. Gonzalez and N. Stakhanova,“Unmasking Android Obfuscation Tools Using Spatial Analysis”, In The Proceedings of the Privacy, Security and Trust Conference, Hamburg, Germany, 2018

 

R. Kaur, Y. Li, J. Iqbal, H. Gonzalezand N. Stakhanova, "A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps," IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 2018, pp. 492-497.

H. Gonzalez, N. Stakhanova, and A. A. Ghorbani. Authorship attribution of Android apps. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY '18, pages 277-286, New York, NY, USA, 2018. ACM

H. Gonzalez, N. Stakhanova, and A. Ghorbani. Measuring code reuse in Android apps. In The Proceedings of the Privacy, Security and Trust Conference, 2016.

M. Mamun, M. Rathore, A. Lashkari, N. Stakhanova and A. Ghorbani. Detecting Malicious URLs Using Lexical Analysis. In Proceedings of the International Conference on Network and System Security (NSS), 2016.

R. Killam, N. Stakhanova, and P. Cook. Android malware classication through linguistic analysis of string literals. In The Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS) , 2016

 

A. Jain, H. Gonzalez, and N. Stakhanova. Enriching reverse engineering through visual exploration of Android binaries. In Proceedings of the 5th Program Protection and Reverse Engineering Workshop , PPREW-5, pages 9:1-9:9, New York, NY, USA, 2015. ACM

 

M. A. Gosselin-Lavigne, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani. A performance evaluation of hash functions for IP reputation lookup using bloom filters. In 10th International Conference on Availability, Reliability and Security (ARES), Workshop on Software Assurance , pages 516-521. IEEE, 2015

 

A. Abdul Kadir, N. Stakhanova, and A. Ghorbani. Android botnets: What urls are telling us. In M. Qiu, S. Xu, M. Yung, and H. Zhang, editors, International Conference on Network and System Security (NSS) , volume 9408 of Lecture Notes in Computer Science , pages 78-91, Springer International Publishing, 2015  Best Student Paper Honorable Mention

 

M. S. I. Mamun, A. Ghorbani, and N. Stakhanova. An entropy-based encrypted traffic classification using machine learning. In The 17th International Conference on Information and Communication Security (ICICS 2015) , number LNCS 9543 (2015). Springer-Verlag, 2015

 

H. Gonzalez, A. A. Kadir, N. Stakhanova, A. J. Alzahrani, and A. A. Ghorbani. Exploring reverse engineering symptoms in Android apps. In Proceedings of the Eighth European Workshop on System Security , EuroSec '15, pages 7:1-7:7, New York, NY, USA, 2015. ACM

 

J. Cazalas, J. McDonald, T. Andel, and N. Stakhanova. Probing the limits of virtualized software protection. In 4th Program Protection and Reverse Engineering Workshop (PPREW-4) , 2014

 

H. Gonzalez, N. Stakhanova, and A. Ghorbani. Droidkin: Lightweight detection of Android apps similarity. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm 2014) , 2014

 

E. BiglarBeigi, H. Hadian Jazi, N. Stakhanova, and A. Ghorbani. Towards effective feature selection in machine learning-based botnet detection approaches. In IEEE Conference on Communications and Network Security (CNS) , 2014

 

N. Stakhanova, M. Couture, and A. A. Ghorbani. Exploring network-based malware classification. In Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on , pages 14-20. IEEE, 2011

 

N. Stakhanova and A. A. Ghorbani. Managing intrusion detection rule sets. In Proceedings of the Third European Workshop on System Security (EUROSEC) , pages 29-35, New York, NY, USA, 2010. ACM

 

N. Stakhanova, H. Ren, and A. A. Ghorbani. Selective regular expression matching. In M. Burmester, G. Tsudik, S. Magliveras, and I. Ilia, editors, Information Security conference (ISC) , volume 6531 of Lecture Notes in Computer Science , pages 226-240. Springer Berlin Heidelberg, 2011

 

H. Ren, N. Stakhanova, and A. A. Ghorbani. An online adaptive approach to alert correlation. In C. Kreibich and M. Jahnke, editors, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) , volume 6201 of Lecture Notes in Computer Science , pages 153-172. Springer Berlin Heidelberg, 2010

 

C. Strasburg, N. Stakhanova, S. Basu, and J. S. Wong. A framework for cost sensitive assessment of intrusion response selection. In Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01 , COMPSAC'09, pages 355-360, Washington, DC, USA, 2009. IEEE Computer Society

 

C. Strasburg, N. Stakhanova, S. Basu, and J. S. Wong. Intrusion response cost assessment methodology. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security , ASIACCS '09, pages 388-391, New York, NY, USA, 2009. ACM

 

N. Stakhanova, Y. Li, and A. A. Ghorbani. Classification and discovery of rule misconfigurations in intrusion detection and response devices. In Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business , CONGRESS '09, pages 29-37, Washington, DC, USA, 2009. IEEE Computer Society

 

N. Stakhanova, C. Strasburg, S. Basu, and J. Wong. On evaluation of response cost for intrusion response systems. In R. Lippmann, E. Kirda, and A. Trachtenberg, editors, Recent Advances in Intrusion Detection (RAID) , volume 5230 of Lecture Notes in Computer Science , pages 390-391. Springer Berlin Heidelberg, 2008

 

N. Stakhanova, S. Basu, W. Z. amd Xia Wang, and J. Wong. Specification synthesis for monitoring and analysis of Manet protocols. In Proceedings of the IEEE International Symposium on Frontiers in Networking with Applications (FINA) , pages 183-187, 2007

 

N. Stakhanova, S. Basu, and J. Wong. A cost-sensitive model for preemptive intrusion response systems. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 428-435, 2007 Nokia Best Student Paper 

 

N. Stakhanova, S. Basu, R. Lutz, and J. Wong. Automated caching of behavioral patterns for efficient run-time monitoring. In Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), pages 333-340, 2006

 

N. Stakhanova, S. Basu, J. Wong, and O. Stakhanov. Trust framework for p2p networks using peer-prole based anomaly technique. In Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02 , ICDCSW '05, pages 203-209, Washington, DC, USA, 2005. IEEE Computer Society

 

N. Stakhanova, S. Ferrero, J. S. Wong, and Y. Cai. A reputation-based trust management in peer-to-peer network systems. In D. A. Bader and A. A. Khokhar, editors, ISCA PDCS , pages 510-515. ISCA, 2004

University of Saskatchewan,

Canada