Sidahmed Benabderrahmane

Follow

Generating author description...

All published works
Action Title Year Authors
+ Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data 2024 Sidahmed Benabderrahmane
Ngoc T. Hoang
Petko Valtchev
James Cheney
Talal Rahwan
+ PDF Chat Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data 2024 Sidahmed Benabderrahmane
Ngoc T. Hoang
Petko Valtchev
James Cheney
Talal Rahwan
+ PDF Chat Hack Me If You Can: Aggregating Autoencoders for Countering Persistent Access Threats within Highly Imbalanced Data 2024 Sidahmed Benabderrahmane
Ngoc T. Hoang
Petko Valtchev
James Cheney
Talal Rahwan
+ Perception, performance, and detectability of conversational artificial intelligence across 32 university courses 2023 Hazem Ibrahim
Fengyuan Liu
Rohail Asim
Balaraju Battu
Sidahmed Benabderrahmane
Bashar Alhafni
Wifag Adnan
Tuka Alhanai
Bedoor AlShebli
Riyadh Baghdadi
+ A Rule Mining-based Advanced Persistent Threats Detection System 2021 Sidahmed Benabderrahmane
Ghita Berrada
James Cheney
Petko Valtchev
+ A Rule Mining-Based Advanced Persistent Threats Detection System 2021 Sidahmed Benabderrahmane
Ghita Berrada
James Cheney
Petko Valtchev
+ A Rule Mining-Based Advanced Persistent Threats Detection System 2021 Sidahmed Benabderrahmane
Ghita Berrada
James Cheney
Petko Valtchev
+ PDF Chat A baseline for unsupervised advanced persistent threat detection in system-level provenance 2020 Ghita Berrada
James Cheney
Sidahmed Benabderrahmane
William Maxwell
Himan Mookherjee
Alec Theriault
Ryan Wright
+ Categorical anomaly detection in heterogeneous data using minimum description length clustering 2020 James Cheney
Xavier Gombau
Ghita Berrada
Sidahmed Benabderrahmane
+ Satellite Images Analysis with Symbolic Time Series: A Case Study of the Algerian Zone 2016 Dalila Attaf
Djamila Hamdadou
Sidahmed Benabderrahmane
Aicha Lafrid
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs 2016 Emaad Manzoor
Sadegh M. Milajerdi
Leman Akoglu
4
+ PDF Chat A baseline for unsupervised advanced persistent threat detection in system-level provenance 2020 Ghita Berrada
James Cheney
Sidahmed Benabderrahmane
William Maxwell
Himan Mookherjee
Alec Theriault
Ryan Wright
4
+ The Minimum Description Length Principle 2007 Peter D. Grünwald
3
+ Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats 2020 Xueyuan Han
Thomas Pasquier
Adam Bates
James Mickens
Margo Seltzer
3
+ Attention Is All You Need 2017 Ashish Vaswani
Noam Shazeer
Niki Parmar
Jakob Uszkoreit
Llion Jones
Aidan N. Gomez
Łukasz Kaiser
Illia Polosukhin
2
+ Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling 2014 Jun‐Young Chung
Çaǧlar Gülçehre
Kyunghyun Cho
Yoshua Bengio
2
+ A Scalable and Efficient Outlier Detection Strategy for Categorical Data 2007 Anna Koufakou
Enrique Ortiz
Michael Georgiopoulos
Georgios Anagnostopoulos
K. Michael Reynolds
2
+ Provenance-based Intrusion Detection: Opportunities and Challenges 2018 Xueyuan Han
Thomas Pasquier
Margo Seltzer
2
+ Neural Machine Translation by Jointly Learning to Align and Translate 2015 Dzmitry Bahdanau
Kyunghyun Cho
Yoshua Bengio
2
+ How to Construct Deep Recurrent Neural Networks 2014 Razvan Pascanu
Çaǧlar Gülçehre
Kyunghyun Cho
Yoshua Bengio
2
+ PDF Chat Few-shot website fingerprinting attack 2021 Mantun Chen
Yongjun Wang
Hongzuo Xu
Xiatian Zhu
2
+ Hierarchical Text-Conditional Image Generation with CLIP Latents 2022 Aditya Ramesh
Prafulla Dhariwal
Alex Nichol
Casey Chu
Mark Chen
1
+ An Introduction to Outlier Analysis 2016 Charų C. Aggarwal
1
+ A Rule Mining-Based Advanced Persistent Threats Detection System 2021 Sidahmed Benabderrahmane
Ghita Berrada
James Cheney
Petko Valtchev
1
+ PDF Chat Graph based anomaly detection and description: a survey 2014 Leman Akoglu
Hanghang Tong
Danai Koutra
1
+ Early Detection of the Advanced Persistent Threat Attack Using Performance Analysis of Deep Learning 2020 Javad Hassannataj Joloudari
Mojtaba Haderbadi
Amir Mashmool
Mohammad GhasemiGol
Shahab S. Band
Amir Mosavi
1
+ PDF Chat POIROT 2019 Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
1
+ PDF Chat CICLAD: A Fast and Memory-efficient Closed Itemset Miner for Streams 2020 Tomas Martin
Guy Francoeur
Petko Valtchev
1
+ A ranking-based algorithm for detection of outliers in categorical data 2013 Niranjan Suri
M. Narasimha Murty
G. Athithan
1
+ One Pass Outlier Detection for Streaming Categorical Data 2013 Swee Chuan Tan
Si Hao Yip
Ashfaqur Rahman
1
+ Outlier detection in complex categorical data by modelling the feature value couplings 2016 Guansong Pang
Longbing Cao
Ling Chen
1
+ SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data 2018 Nahid Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. N. Venkatakrishnan
1
+ Graph-based Anomaly Detection and Description: A Survey 2014 Leman Akoglu
Hanghang Tong
Danai Koutra
1
+ PDF Chat HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows 2019 Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. N. Venkatakrishnan
1