Natalia Stakhanova

Book chapters



A. Abdul Kadir, N. Stakhanova, and A. Ghorbani. An empirical analysis of Android banking malware. In W. Meng, X. Luo, J. Zhou, and S. Furnell, editors, Protecting Mobile Networks and Devices: Challenges and Solutions. CRC Press - Taylor & Francis, 2016


H. Gonzalez, M.-A. Gosselin-Lavigne, N. Stakhanova, and A. Ghorbani. The impact of application layer Denial of Service attacks. In B. Issac and N. Israr, editors, Case Studies in Secure Computing - Achievements and Trends. ISBN# 978-1-4822-0706-4. CRC Press, Taylor and Francis, 2014 [PDF]


Journal articles



Application-Layer Denial of Service Attacks: taxonomy and survey.
International Journal of Information and Computer Security, 2015 G. Mantas, N. Stakhanova, H. Gonzalez, H.Hadian Jazi, A. A. Ghorbani.

Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones.
Journal of Cyber Security and Mobility, 2014 A. J. Alzahrani, N. Stakhanova, H. Gonzalez, and A. Ghorbani. [PDF]

Detecting Machine-Morphed Malware Variants Via Engine Attribution.
Journal in Computer Virology, Springer-Verlag, :1-21 (2013). R. Chouchane, N. Stakhanova, A. Walenstein, A. Lakhotia[PDF]

Towards Cost-sensitive Assessment of Intrusion Response Selection.
Journal of Computer Security, 20(2-3): 169-198 (2012). N. Stakhanova, C. Strasburg, S. Basu and J. Wong [PDF]

Towards Credible Evaluation of Anomaly-based Intrusion Detection Methods.
IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, Vol. 40, No.5, pp.516 - 524, IEEE, 2010. M. Tavallaee, N. Stakhanova and A. Ghorbani. [PDF]

On the Symbiosis of Specification-based and Anomaly-based Detection.
Computers & Security, Vol. 29, No. 2, pp.253-268, Elsevier, 2010. N. Stakhanova, S. Basu and J. Wong  [PDF]

Taxonomy of Intrusion Response Systems.
International Journal of Information and Computer Security. Vol. 1. No. 1/2, pp.169-184, Inderscience, 2007.  
N. Stakhanova, S. Basu and J. Wong  [PDF]

Software Fault Tree and Colored Petri Net Based Specification, Design, and Implementation of Agent-Based Intrusion Detection Systems.
International Journal of Information and Computer Security. Vol. 1. No. 1/2, pp.109-142, Inderscience, 2007.
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, Y. Wang, X. Wang and N. Stakhanova. [PDF]


Refereed conference and workshop papers


Android malware classification through analysis of string literals.
In The Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS),
R. Killam, P. Cook and N. Stakhanova, 2016

Enriching Reverse Engineering through Visual Exploration of Android Binaries
Program Protection and Reverse Engineering Workshop (PPREW)
A. Jain, H. Gonzalez and N. Stakhanova, 2015, [PDF]

Android Botnets: What URLs are telling us.
International Conference on Network and System Security
A. A.Kadir, N. Stakhanova, and A. A. Ghorbani. 2015

A Performance Evaluation of Hash Functions for IP Reputation Lookup using Bloom Filters.
In Proceedings of Workshop on Software Assurance
M.-A. Gosselin-Lavigne, H. Gonzalez, N. Stakhanova, and A. Ghorbani. 2015

Exploring reverse engineering symptoms in Android apps..
In Proceedings of European Workshop on Systems Security (EuroSec). IEEE, 2015.
H. Gonzalez, A. A.Kadir, A. Alzahrani, N. Stakhanova, and A. A. Ghorbani. [PDF]

Probing the limits of virtualized software protection.
In Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4). ACM, 2014.
J. Cazalas, J. T. McDonald, T. R. Andel, and N. Stakhanova. [PDF]

DroidKin: Lightweight Detection of Android Apps Similarity.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
H. Gonzalez, N. Stakhanova, and A. Ghorbani. [PDF]

Towards effective feature selection in machine learning-based botnet detection approaches.
In IEEE Conference on Communications and Network Security (CNS), 2014
E. BiglarBeigi, H. Hadian Jazi, N. Stakhanova, and A. Ghorbani.

Exploring Network-Based Malware Classification
Proceedings of the 6th International Conference on Malicious and Unwanted Software, Malware 2011.
N. Stakhanova, M. Couture, A. Ghorbani. [PDF]

Selective Regular Expression Matching.
In Proceedings of the Information Security Conference, ISC 2010, Springer.
N. Stakhanova, H.Ren, A. Ghorbani [PDF]

An Online Adaptive Approach to Alert Correlation.
The Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA 2010
H.Ren, N. Stakhanova, A. Ghorbani [PDF]

Managing intrusion detection rule sets.
In Proceedings of the European Workshop on System Security, EuroSec 2010
N. Stakhanova, A. Ghorbani [PDF]

Classification and discovery of rule misconfigurations in intrusion detection and response devices.
In Proceedings of the Privacy, Security and Trust conference, PST 2009
N. Stakhanova, Y. Li, A. A. Ghorbani
[PDF

A Framework for Cost Sensitive Assessment of Intrusion Response Selection. (short paper)
In Proceedings of IEEE Computer Software and Applications Conference, COMPSAC 2009
C. Strasburg, N. Stakhanova, S. Basu, J. S. Wong  [PDF]

Intrusion response cost assessment methodology. (short paper)
In Proceedings of the ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009
C. Strasburg, N. Stakhanova, S. Basu, J. S. Wong
 [PDF](Technical report version [PDF])

On Evaluation of Response Cost for Intrusion Response Systems (Extended Abstract).
In Proceedings of the Recent Advances in Intrusion Detection, RAID 2008
N. Stakhanova, C. Strasburg, S. Basu  and J.Wong  [PDF]

A Behavioral Model of Ideologically-motivated "Snowball" Attacks.
The International Conference on Availability, Reliability and Security, ARES 2008
N. Stakhanova, O. Stakhanov and A.Ghorbani
 

Specification Synthesis for Monitoring and Analysis of MANET Protocols.
The International Symposium on Frontiers in Networking with Applications, FINA 2007
N. Stakhanova, S. Basu, W. Zhang, X.Wang and J.Wong  (Technical report version [PDF])

A Cost-Sensitive Model for Preemptive Intrusion Response Systems. *Nokia Best Student Paper Award
The International Conference on Advanced Information Networking and Applications, AINA 2007
N. Stakhanova, S. Basu and J.Wong  [PDF]

Automated caching of behavioral patterns for efficient run-time monitoring.
IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
N. Stakhanova, S. Basu, R. Lutz and J.Wong [PDF]

Trust Framework for P2P Networks using Peer-Profile based Anomaly Technique.
ICDCSW'05:  The 2d International Workshop on Security in Parallel and Distributed Systems, SDCS 2005.
N. Stakhanova, S. Basu, J. Wong and O.Stakhanov. [PDF]

A reputation-based trust management in peer-to-peer network systems. 
2004 International Workshop on Security in Parallel and Distributed Systems, In Proceedings of 17th International Conference on Parallel and Distributed Computing Systems, PDCS 2004
N. Stakhanova, S. Ferrero, J. Wong and Y. Cai. [PDF]