Seguir
Jill Slay
Jill Slay
University of South Australia SmartSat Chair in Cybersecurity
Dirección de correo verificada de unisa.edu.au - Página principal
Título
Citado por
Citado por
Año
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)
N Moustafa, J Slay
2015 military communications and information systems conference (MilCIS), 1-6, 2015
37462015
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
N Moustafa, J Slay
Information Security Journal: A Global Perspective 25 (1-3), 18-31, 2016
11582016
Lessons learned from the maroochy water breach
J Slay, M Miller
International conference on critical infrastructure protection, 73-82, 2007
9522007
A holistic review of network anomaly detection systems: A comprehensive survey
N Moustafa, J Hu, J Slay
Journal of Network and Computer Applications 128, 33-55, 2019
3522019
Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks
N Moustafa, J Slay, G Creech
IEEE Transactions on Big Data 5 (4), 481-494, 2017
3052017
The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems
N Moustafa, J Slay
2015 4th international workshop on building analysis datasets and gathering …, 2015
2992015
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
W Haider, J Hu, J Slay, BP Turnbull, Y Xie
Journal of Network and Computer Applications 87, 185-192, 2017
2342017
Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models
N Moustafa, G Creech, J Slay
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies …, 2017
2312017
Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques
N Koroniotis, N Moustafa, E Sitnikova, J Slay
Mobile Networks and Management: 9th International Conference, MONAMI 2017 …, 2018
2262018
A hybrid feature selection for network intrusion detection systems: Central points
N Moustafa, J Slay
arXiv preprint arXiv:1707.05505, 2017
1372017
Validation and verification of computer forensic software tools—Searching Function
Y Guo, J Slay, J Beckett
digital investigation 6, S12-S22, 2009
1232009
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD
M Xie, J Hu, J Slay
2014 11th International Conference on Fuzzy Systems and Knowledge Discovery …, 2014
1072014
Digital forensics: Validation and verification in a dynamic work environment
J Beckett, J Slay
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
782007
Anomaly detection system using beta mixture models and outlier detection
N Moustafa, G Creech, J Slay
Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017 …, 2018
762018
Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks
N Moustafa, G Misra, J Slay
IEEE Transactions on Sustainable Computing 6 (2), 245-256, 2018
752018
Money laundering and terrorism financing in virtual environments: a feasibility study
A SM Irwin, J Slay, KK Raymond Choo, L Lui
Journal of Money Laundering Control 17 (1), 50-75, 2014
752014
Recovery of skype application activity data from physical memory
M Simon, J Slay
2010 International Conference on Availability, Reliability and Security, 283-288, 2010
732010
Information technology security and risk management
J Slay, A Koronios
Wiley, 2006
642006
Cyber terrorism: A homogenized taxonomy and definition
JJ Plotnek, J Slay
Computers & Security 102, 102145, 2021
522021
Creating novel features to anomaly network detection using DARPA-2009 data set
N Moustaf, J Slay
Proceedings of the 14th European Conference on Cyber Warfare and Security …, 2015
482015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20