Natalia Stakhanova
Natalia Stakhanova
Canada Research Chair in Security & Privacy, University of Saskatchewan, Canada
Verified email at
Cited by
Cited by
Toward credible evaluation of anomaly-based intrusion-detection methods
M Tavallaee, N Stakhanova, AA Ghorbani
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
Towards effective feature selection in machine learning-based botnet detection approaches
EB Beigi, HH Jazi, N Stakhanova, AA Ghorbani
2014 IEEE Conference on Communications and Network Security, 247-255, 2014
A taxonomy of intrusion response systems
N Stakhanova, S Basu, J Wong
International journal of information and computer security 1 (1-2), 169-184, 2007
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling
HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani
Computer Networks 121, 25-36, 2017
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
A cost-sensitive model for preemptive intrusion response systems
N Stakhanova, S Basu, J Wong
21st International Conference on Advanced Information Networking and …, 2007
Android botnets: What urls are telling us
AF Abdul Kadir, N Stakhanova, AA Ghorbani
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems
G Helmer, J Wong, M Slagell, V Honavar, L Miller, Y Wang, X Wang, ...
International Journal of Information and Computer Security 1 (1-2), 109-142, 2007
Code authorship attribution: Methods and challenges
V Kalgutkar, R Kaur, H Gonzalez, N Stakhanova, A Matyukhina
ACM Computing Surveys (CSUR) 52 (1), 1-36, 2019
An online adaptive approach to alert correlation
H Ren, N Stakhanova, AA Ghorbani
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
Droidkin: Lightweight detection of android apps similarity
H Gonzalez, N Stakhanova, AA Ghorbani
International Conference on Security and Privacy in Communication Networks …, 2015
A framework for cost sensitive assessment of intrusion response selection
C Strasburg, N Stakhanova, S Basu, JS Wong
2009 33rd Annual IEEE international computer software and applications …, 2009
Application-layer denial of service attacks: taxonomy and survey
G Mantas, N Stakhanova, H Gonzalez, HH Jazi, AA Ghorbani
International Journal of Information and Computer Security 7 (2-4), 216-239, 2015
Intrusion response cost assessment methodology
C Strasburg, N Stakhanova, S Basu, JS Wong
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
Exploring reverse engineering symptoms in Android apps
H Gonzalez, AA Kadir, N Stakhanova, AJ Alzahrani, AA Ghorbani
Proceedings of the Eighth European Workshop on System Security, 1-7, 2015
On the symbiosis of specification-based and anomaly-based detection
N Stakhanova, S Basu, J Wong
computers & security 29 (2), 253-268, 2010
Trust framework for p2p networks using peer-profile based anomaly technique
N Stakhanova, S Basu, J Wong, O Stakhanov
25th IEEE International Conference on Distributed Computing Systems …, 2005
A Reputation-based Trust Management in Peer-to-Peer Network Systems.
N Stakhanova, S Ferrero, JS Wong, Y Cai
PDCS, 510-515, 2004
Scalable privacy-preserving query processing over ethereum blockchain
S Linoy, H Mahdikhani, S Ray, R Lu, N Stakhanova, A Ghorbani
2019 IEEE International Conference on Blockchain (Blockchain), 398-404, 2019
Enriching reverse engineering through visual exploration of Android binaries
A Jain, H Gonzalez, N Stakhanova
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015
The system can't perform the operation now. Try again later.
Articles 1–20