Makanju A., Zincir-Heywood A. N., Milios E., “Learning of Alert Signatures in High Performance Cluster System Logs”, Accepted for publication in the proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), 2012.


Makanju A., Zincir-Heywood A. N., Milios E., Latzel M., “Spatio-Temporal Decomposition, Clustering and Identification for Alert Detection in System Logs”, Accepted for publication in the proceedings of the ACM Symposium on Applied Computing (SAC), 2012.


Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing”, Accepted to the journal of Evolutionary Intelligence, Springer Verlag, 2011.


Makanju A., Zincir-Heywood A. N., Milios E., “A Lightweight Algorithm for Message Type Extraction in System application Logs”, Accepted to the journal of the IEEE Transactions on Knowledge and Data Engineering, 2011.


Alshammari R., Zincir-Heywood A.N., “Can Encrypted Traffic be identified without Port Numbers, IP Addresses and Payload Inspection?”, Journal of Computer Networks, Elsevier, 2011.


Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “Can a Good Offense be a Good Defense? Vulnerability Testing of Anomaly Detectors Through an Artificial Arms Race”, Journal of Applied Soft Computing: Special Issue on Soft Computing for Information System Security, Elsevier, 2011.


Makanju A., Zincir-Heywood A. N., Milios E., “System State Discovery via Information Content Clustering of System Logs”, IEEE Conference on Availability, Reliability and Security, pp. 301-306, 2011.


Alshammari R., Zincir-Heywood A.N., “Is Machine Learning losing the battle to produce transportable signatures against VoIP traffic?”, IEEE Congress on Evolutionary Computation, pp. 1543-1550, June 2011.


Makanju A., Zincir-Heywood A. N., Milios E., “A Next Generation Entropy based framework for Alert Detection in System Logs”, IEEE International Symposium on Integrated Network Management, pp. 626-629, 2011.


Bacquet C., Zincir-Heywood A.N., Heywood M. I., “Genetic Optimization and Hierarchical Clustering applied to Encrypted Traffic Identification”, IEEE Symposium on Computational Intelligence on Cyber Security, pp. 194-201, 2011. Received Best Paper Award


LaRoche P., Zincir-Heywood A.N., Heywood M. I., “Exploring the State Space of an Application Protocol: A Case study of SMTP”, IEEE Symposium on Computational Intelligence on Cyber Security, pp. 152-159, 2011.


Arndt D., Zincir-Heywood A.N., “A Comparison of Three Machine Learning Techniques for Encrypted Network Traffic Analysis”, IEEE International Symposium on Computational Intelligence for Security and Defense Applications, pp. 107-114, 2011.


McCarthy C., Zincir-Heywood A.N., “An Investigation on Identifying SSL Traffic”, IEEE International Symposium on Computational Intelligence for Security and Defense Applications, pp. 115-122, 2011.


Makanju A., Zincir-Heywood A. N., Milios E., “Storage and Retrieval of System Log Events using a Structured Schema based on Message Type Transformation”, ACM Symposium on Applied Computing, pp. 525-531, 2011.


Yeloglu O., Milios E., Zincir-Heywood A. N., “Multi-Document Summarization of Scientific Corpora”, ACM Symposium on Applied Computing, pp. 251-258, 2011.


Zhang Y., Milios E., Zincir-Heywood A. N., “Topic-Based Web Site Summarization”, International Journal of Web Information Systems, Emerald Group Publishing, 2010.


Makanju A., Zincir-Heywood A. N., Milios E., “Robust Learning Intrusion Detection for DoS Attacks on Wireless Networks”, International Journal of Intelligent Data Analysis, IOS Press, 2010.


Bacquet C., Gumus K., Tizer D., Zincir-Heywood A.N., Heywood M. I. “A Comparison of Unsupervised Learning Techniques for Encrypted Traffic Identification”, Journal of Information Assurance and Security, 2010.


Alshammari R., Zincir-Heywood A.N., “An Investigation on the identification of VoIP Traffic: Case Study on Gtalk and Skype”, IEEE CNSM, 2010.


Makanju A., Zincir-Heywood A. N., Milios E., “An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs”, IEEE QEST, 2010

  

Alshammari R., Zincir-Heywood A.N., “Unveiling Skype Encrypted Tunnels using GP”, IEEE World Congress on Computational Intelligence WCCI – CEC, 2010.

  

Bacquet C., Zincir-Heywood A.N., Heywood M. I., “An Analysis of Clustering Objectives for Feature Selection Applied to Encrypted Traffic Identification”, IEEE World Congress on Computational Intelligence WCCI – CEC, 2010.

  

Vahdat A., Heywood M. I., Zincir-Heywood A.N., “Bottom-up Evolutionary Subspace Clustering”, IEEE World Congress on Computational Intelligence WCCI – CEC, 2010.

  

Makanju A., Zincir-Heywood A. N., Milios E., “Fast Entropy Based Alert Detection in Super Computer Logs”, IEEE DSN PFARM, 2010.

  

LaRoche P., Zincir-Heywood A. N., Heywood M. I., “Using Code Bloat to Obfuscate Evolved Network Traffic”, European Workshop on the Application of Nature-inspired Techniques for Telecommunication Networks and other Parallel and Distributed Systems, Springer – Lecture Notes in Computer Science series, 2010.

  

Bodorik N., Zincir-Heywood A. N., “One size fits none: The importance of detector parameterization”, IEEE Workshop OSA, with the IEEE Conference ARES, 2010.

  

Makanju A., Zincir-Heywood A. N., Milios E., “Extracting Message Types from BlueGene/L’s Logs”, ACM / Usenix Workshop on the Analysis of System Logs, with the 22nd ACM SIGOPS Symposium on Operating Systems Principles, 2009.

  

Bacquet C., Zincir-Heywood A.N., Heywood M. I., “An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification”, International Workshop on Computational Intelligence in Security for Information Systems, Springer – Advances on Soft Computing series, 2009.

  

Alshammari R., Zincir-Heywood A.N., Farrag A., “Performance Comparison of Four Rule Sets: An Example for Encrypted Traffic Classification”, IEEE Conference on Privacy, Security and Trust, 2009.

  

Alshammari R., Zincir-Heywood A.N., “Machine Learning Based Encrypted Traffic Classification: Identifying SSH and Skype”, IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.

  

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., Burschka S., “Optimizing Anomaly Detector Deployment under Evolutionary Black-box Vulnerability Testing”, IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.

  

LaRoche P., Zincir-Heywood A. N., Heywood M. I., “Evolving TCP/IP Packets: A Case Study of Port Scans”, IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.

  

Makanju A., Zincir-Heywood A. N., Milios E., “Clustering of Event Logs Using Iterative Partitioning”, ACM SIGKDD international conference on Knowledge discovery and data mining, 2009.

  

Alshammari R., Lichodzijewski P., Zincir-Heywood A.N., Heywood M. I., “Classifying SSH Encrypted Traffic with Minimum Packet Header Features using Genetic Programming”, ACM SIGEVO Workshop on Defense Applications of Computational Intelligence, 2009.

  

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., Burschka S., “Testing Detector Parameterization using Evolutionary Exploit Generation”, European Workshop on the Application of Nature-inspired Techniques for Telecommunication Networks and other Parallel and Distributed Systems, Springer – Lecture Notes in Computer Science series, 2009.

  

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., Burschka S., “Generating Mimicry Attacks using Genetic Programming: A Benchmarking Study”, IEEE Symposium on Computational Intelligence on Cyber Security, 2009.

  

Alshammari R., Zincir-Heywood A. N., “Generalization of Signatures for SSH Encrypted Traffic Identification”, IEEE Symposium on Computational Intelligence on Cyber Security, 2009.

  

Alshammari R., Zincir-Heywood A. N., “A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification”, Proceedings of the IEEE on Computational Intelligence in Security for Information Systems, 2008.

  

George A., Makanju A., Milios E., Zincir-Heywood A. N.,Latzel M., Stergiopoulos S., “NetPal: A Dynamic Network Administration Knowledge Base” Proceedings of the ACM Conference of the Center for Advanced Studies on Collaborative Resarch, October 2008.

  

Kayacik H. G., Zincir-Heywood A. N., “Mimicry Attacks Demystified: What can Attackers do to Evade Detection?”, Proceedings of the IEEE Conference on Privacy, Security and Truct, October 2008. Received Best Paper Award

   

Alshammari R., Zincir-Heywood A. N., “Investigating two Different Approaches for Encrypted Traffic Classification”, Proceedings of the IEEE Conference on Privacy, Security and Truct, October 2008.

  

Makanju A., Brooks S., Zincir-Heywood A. N., Milios E., “LogView: Visualizing Event Log Clusters”, Proceedings of the IEEE Conference on Privacy, Security and Truct, October 2008.

   

George A., Makanju A., Zincir-Heywood A. N., Milios E., “Information Retrieval in Network Administration”, Proceedings of the IEEE Conference on Computer Networks and Services Research, pp. 561-568, 2008.

   

Makanju A., Zincir-Heywood A. N., Milios E., “Adaptibility of a GP based IDS on Wireless Networks”, Proceedings of the IEEE International Conference on Availability, Reliability and Security, pp. 310-318, 2008.

   

Tupper M., Zincir-Heywood A. N., “VEA-bility Security Metric: A Network Security Analysis Tool”, Proceedings of the IEEE International Workshop on Privacy and Assurance, in conjunction with ARES’2008, pp. 950-957, 2008.

   

Angevine D., Zincir-Heywood A. N., “A Preliminary Investigation of Skype Traffic Classification Using a minimalist Feature Set”, Proceedings of the IEEE International Workshop on Privacy and Security by means of Artificial Intelligence, in conjunction with ARES’2008, , pp. 1075-1079, 2008.

   

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “A Hierarchical SOM based Intrusion Detection System”, Engineering Applications of Artificial Intelligence, 20(4), 439-451, 2007.

   

Zhang Y., Milios E., Zincir-Heywood A. N., “A Comparative Study on Key Phrase Extraction Methods in automatic Web Site Summarization”, Journal of Digital Information Management, 5(5), pp. 323-332, 2007.

   

Makanju A., Zincir-Heywood A. N., “Investigating Cross-Platform Robustness for Machine Learning Based IDSs on 802.11 Networks”, International Journal of Computer Science and Network Security, pp. 1-9, 2007.

   

Alshammari R., Zincir-Heywood A. N., "A Flow based Approach for SSH Traffic Detection",  Proceedings of the IEEE International Conference on System, Man and Cybernetics - SMC'2007, pp. 296-301, 2007.

   

Yeloglu O., Zincir-Heywood A. N., Heywood M. I., "Growing Recurrent Self Organizing Map", Proceedings of the IEEE International Conference on System, Man and Cybernetics - SMC'2007, pp. 290-295, 2007.

   

Kayacik H. G., Zincir-Heywood A. N., “On the Contribution of Preamble to Information Hiding in Mimicry Attacks”, Proceedings of the IEEE Symposium on Security in Networks and Distributed Systems - SSNDS’2007, pp. 632-638, 2007.

   

Luo X., Zincir-Heywood A. N., “Incorporating Temporal Information for Document Classification”, Proceedings of the Workshop on Text Data Mining and Management - TDMM’2007 with the IEEE ICDE’2007, pp. 780-789, 2007.

   

Kayacik H. G., Heywood M. I., Zincir-Heywood A. N., “Evolving buffer overflow attacks with detector feedback”, Proceedings of the EVOCOMNET’2007, Springer-Verlag LNCS 4448, pp. 11-20, 2007.

  

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “Automatically Evading IDS Using GP Authored Attacks”, Proceedings of the IEEE Computational intelligence in Security and Defense Applications - CISDA’2007, pp. 153-160, 2007.

   

Makanju A., Laroche P., Zincir-Heywood A. N., “A Comparison Between Signature and Machine Learning Based Detectors”, Proceedings of the IEEE Computational intelligence in Security and Defense Applications - CISDA’2007, pp. 213-219, 2007.

   

Liang S., Zincir-Heywood A. N., Heywood M. I., “Adding More Intelligence to the Network Routing Problem: AntNet and GA-agents”, Applied Soft Computing, 6(3), pp. 244-257, 2006.

   

Kayacik H. G., Zincir-Heywood A. N., “Using Self-Organizing Maps to Build an Attack Map for Forensic Analysis”, Proceedings of the ACM International Conference on Privacy, Security, and Trust – PST’2006, pp. 285-293, 2006.

   

Luo X., Heywood M. I., Zincir-Heywood A. N., “Benchmarking a Recurrent Linear GP Model on Prediction and Control Problems”, Proceedings of the ICIC 2006 – International Conference on Intelligent Computing, Springer-Verlag LNCIS 344, pp. 845-850, 2006.

   

Kayacik H. G., Heywood M. I., Zincir-Heywood A. N., “On Evolving Buffer Overflow Attacks Using Genetic Programming”, Proceedings of the ACM GECCO 2006 - Genetic and Evolutionary Computation Conference, pp. 1667-1673, 2006.

   

Luo X., Zincir-Heywood A. N., “Evolving Recurrent Linear-GP for Document Classification and Word Tracking”, Proceedings of the IEEE CEC 2006 – Conference on Evolutionary Computation, pp. 8605-8612, 2006.

   

Laroche P., Zincir-Heywood A. N., “Genetic Programming Based WiFi Data Link Layer Attack Detection”, Proceedings of the IEEE CNSR 2006 – Conference on Computer Networks and Services Research, pp. 285-292, 2006.

   

Laroche P., Zincir-Heywood A. N., “802.11 De-authentication Attack Detection Using Genetic Programming", Proceedings of the 9th European Conference on Genetic Programming, pp. 1-12, Springer-Verlag LNCS 3905, 2006.

   

Hu Y., Zincir-Heywood A. N., “Modeling Using Behaviors from FTP Server Logs”, Proceedings of the IEEE CNSR – Conference on Computer Networks and Services Research, pp. 320-322, 2006.

   

Wetmore L., Heywood M. I., Zincir-Heywood A. N., “Speeding up the Self Organizing Feature Map Using Dynamic Subset Selection”, Neural Processing Letters, 22, pp. 17-32, 2005.

   

Song D., Heywood M. I., Zincir-Heywood A. N., “Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection”, IEEE Transactions on Evolutionary Computation, 9(3), pp. 225-240, 2005.

   

Shi Z., Milios E., Zincir-Heywood A. N., “Post-supervised Template Induction for Information Extraction from Lists and Tables in Dynamic Web Sources”, Journal of Intelligent Information Systems, 22(4), pp. 1-25, 2005.

   

Zhang Y., Zincir-Heywood A. N., Milios E., “Narrative Text Classification and Automatic Key Phrase Extraction in Web Document Corpora”, Proceedings of the ACM WIDM’2005, pp. 51-58,  2005.

   

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “Evolving Successful Stack Owerflow Attacks for Vulnerability Testing”, Proceedings of the ACSAC 2005 – Annual Computer Security Applications Conference, pp. 225-234, 2005.

   

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Benchmark”, Proceedings of the PST 2005 – International Conference on Privacy, Security, and Trust, pp. 85-89, 2005.

   

Lichodzijewski P., Heywood M. I., Zincir-Heywood A. N., “CasGP: Building Cascaded Hierarchical Models Using Niching”, Proceedings of the IEEE CEC 2005 – Conference on Evolutionary Computation, pp. 1180-1187, 2005.

   

Luo X., Zincir-Heywood A. N., "Comparison of a SOM Based Sequence Analysis System and Naive Bayesian for Spam Filtering", Proceedings of the IEEE IJCNN 2005 – International joint Conference on Neural Networks, pp. 2571-2576, 2005.

   

Wetmore L., Zincir-Heywood A. N., Heywood M. I., "Training the SOM Efficiently: An Example from Intrusion Detection", Proceedings of the IEEE IJCNN 2005 – International joint Conference on Neural Networks, pp. 1575-1580, 2005.

   

Laroche P., Zincir-Heywood A. N., “802.11 Network Intrusion Detection using Genetic Programming", Proceedings of the Second Workshop on Military and Security Applications of Evolutionary Computation, 2005.

   

Kayacik, G. H., Zincir-Heywood, A. N., "Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms", Proceedings of the IEEE ISI 2005 – International Conference on Intelligence and Security Informatics, Springer Verlag LNCS 3495, pp. 362-368, 2005.

   

Kayacik, G. H., Zincir-Heywood, A. N., "Generating Representative Traffic for Intrusion Detection System Benchmarking", Proceedings of the IEEE CNSR 2005 – Conference on Computer Networks and Services Research, pp. 112-117, 2005.

   

Hu X., Zincir-Heywood, A. N., “Understanding the Performance of Cooperative Web Caching Systems”, Proceedings of the IEEE CNSR 2005 – Conference on Computer Networks and Services Research, pp. 183-188, 2005.

   

Luo X., Zincir-Heywood A. N., “Evaluation of Two Systems on Multi-class Multi-label Document Classification”, Proceedings of the 15th ISMIS 2005 – International Symposium on Methodologies for Intelligent Systems, Springer Verlag LNAI 3488, pp. 161-169, 2005.

   

Luo X., Heywood M. I., Zincir-Heywood A. N., “Evolving Recurrent Models Using Linear Genetic Programming”, Proceedings of GECCO, pp. 1787-1788, 2005.

   

Zhang Y., Zincir-Heywood A. N., Milios E., “World Wide Web Site Summarization”, Web Intelligence and Agent Systems: An International Journal, 2(1), pp. 39-54, 2004.

   

Tunali T., Zincir-Heywood A. N., “A Heuristic Approach to Network Optimized Mapping of a Distributed Resource Discovery Architecture”, International Journal of Computer Applications in Technology, 19(1), pp. 43-50, 2004.

   

Luo X., Zincir-Heywood A. N., “Combining Word-based and Word Co-occurrence based sequence analysis for text categorization”, Proceedings of the Third International Conference on Machine Learning and Cybernetics, ICMLC’2004, pp.1580-1585, 2004.

   

Luo X., Zincir-Heywood A. N., “Analyzing the Temporal Sequences for Text Categorization”, Proceedings of the 8th International conference on Knowledge-Based Intelligent Information and Engineering Systems – KES’2004, pp. 498-505, Springer-Verlag LNAI 3215, 2004.

   

Luo X., Zincir-Heywood A. N., “Capturing Temporal Sequences for Text Representation Using Hierarchical SOMs”, Proceedings of the 2004 International Conference on Machine Learning Models, Technologies and Applications – MLMTA’04, pp. 977-983, 2004.

   

Zhang Y., Milios E., Zincir-Heywood A. N., “A comparison of keyword- and keyterm-based methods for automatic web site summarization”, Proceedings of ATEM’2004 – The AAAI Workshop on Adaptive Text Extraction and Mining, pp. 15-20, 2004.

   

Lichodzijewski P., Heywood M. I., Zincir-Heywood A. N., “Cascaded GP Models for Data Mining”, Proceedings of the IEEE Congress on Evolutionary Computation – CEC’2004, pp. 2258-2264, 2004.

   

Yun H., Zincir-Heywood A. N., “Intelligent Ants for Adaptive Network Routing”, Proceedings of 2nd Annual Communication Networks and Services Research Conference – CNSR’2004, pp. 255-261, 2004.

   

Zhou Y., Zincir-Heywood A. N., “Intelligent Agents for Routing on Mobile Ad-Hoc Networks”, Proceedings of 2nd Annual Communication Networks and Services Research Conference – CNSR’2004, pp. 249-254, 2004.

   

Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., “On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection”, Proceedings of 2nd Annual Communication Networks and Services Research Conference – CNSR’2004, pp. 181-189, 2004. Received Best Paper Award

   

Zhang Y., Zincir-Heywood A. N., Milios E., “Term-based Clustering and Summarization of Web Page Collections”, Proceedings of AI’2004, pp. 60-74, 2004.

   

Luo X., Zincir-Heywood A. N., “Evaluation of Three Dimensionality Reduction Techniques for Document Classification”, Proceedings of the IEEE CCECE, pp. 181-184, 2004.

  

Lichodzijewski P., Wetmore L., Zincir-Heywood A. N., “Pie: Scalable Routing in Peer-to-Peer Networks”, Proceedings of the IEEE CCECE, pp. 51-54, 2004.

   

Zhou A. T., Blustein J., Zincir-Heywood A. N., “Assessing and Improving Security Software: New Heuristics for IDS Interfaces”, Proceedings of the IEEE CCECE, pp. 1641-1644, 2004.

   

Dong S., Curry R., Heywood M. I., Zincir-Heywood A. N., “On the efficient Mining of Network Audit Data using Genetic Programming”, Proceedings of the Workshop on Military and Security Applications of Evolutionary Programming, 2004.

   

Grundke E.W., Zincir-Heywood A. N., “A Uniform Continuum Model for Scaling Ad-Hoc Networks”, Proceedings of the 2nd International Conference on Ad-Hoc Networks and Wireless, Springer-Verlag, as Lecture Notes in Computer Science (LNCS 2865), pp. 96-103, 2003.

   

Luo X., Zincir-Heywood A. N., “A Comparison of SOM Based Document Categorization Systems”, Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1786-1791, 2003.

   

Kayacik G. H., Zincir-Heywood A. N., Heywood M.I., “On the Capability of an SOM based Intrusion Detection System”, Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1808-1813, 2003.

   

Song D., Heywood M.I., Zincir-Heywood A. N., “A Linear Genetic Programming approach to Intrusion Detection”, Proceedings of GECCO 2003 - Genetic and Evolutionary Computation Conference, pp. 2325-2336, 2003.

   

Zhang Y., Zincir-Heywood A. N., Milios E., “Summarizing Web Sites Automatically”, Proceedings of the 16th Conference of the Canadian Society for Computational Studies of Intelligence – AI’2003, Lectures Notes in Computer Science, Springer-Verlag, LNAI 2671 – Advances in Artificial Intelligence, pp.283-296, 2003. Received Best Paper Award

   

Shi Z., Milios E., Zincir-Heywood A. N., “Post-supervised Template Induction for Dynamic Web Sources”, Proceedings of the 16th Conference of the Canadian Society for Computational Studies of Intelligence – AI’2003, Lectures Notes in Computer Science, Springer-Verlag, LNAI 2671 – Advances in Artificial Intelligence, pp.268-282, 2003.

   

Kayacik G. H., Zincir-Heywood A. N., “A Case Study of Three Open Source Security Management Tools”, Proceedings of the IFIP/IEEE Eight International Symposium on Integrated Network Management, ISBN 1-4020-7418-2, pp. 101-105, 2003.

   

Tufts-Conrad D. J., Zincir-Heywood A. N., Zitner D., SOM – Feature Extraction from Patient Discharge Summaries, Proceedings of the ACM Symposium on Applied Computing, pp. 263-267, 2003.

   

Boyce C. A. P., Zincir-Heywood A. N., “A Comparison of Four Intrusion Detection Systems for Secure E-Business”, Proceedings of the International Conference on Electronic Commerce Research, pp. 302-314, 2003.

   

Liang Y., Jost A., Zincir-Heywood A. N., “Supporting Micro-Mobility with Multi Protocol Handoff Mechanism”, Proceedings of the IEEE CCECE, pp. 1621-1624, 2003.

   

Zincir-Heywood A. N., Heywood M. I., Chatwin C. R., “Object-oriented Design of Digital Library Platforms for Multiagent Environments”, IEEE Transactions on Knowledge and Data Engineering, 14(2), pp.281-295, 2002.

   

Liang S., Zincir-Heywood A. N., Heywood M. I., "Intelligent Packets for Dynamic Network Routing Using Distributed Genetic Algorithm", Proceedings of the GECCO 2002 - Genetic and Evolutionary Computation Conference, pp.88-96, 2002. Received Best Paper Award in Artificial life, Adaptive behaviour, Agents and Ant colony optimization

   

Lichodzijewski P., Zincir-Heywood A. N., Heywood M. I., “Host-Based Intrusion Detection Using Self-Organizing Maps”, Proceedings of the IEEE 2002 International Joint Conference on Neural Networks, pp. 1714-1719, 2002.

   

Liang S., Zincir-Heywood A. N., Heywood M. I., “The Effect of Routing under Local Information using a Social Insect Metaphor”, Proceedings of the IEEE 2002 Congress on Evolutionary Computation, pp. 1438-1443, 2002.

   

Shi P., Zincir-Heywood A. N., Heywood M. I., “Mirror Site Organization on Packet Switched Networks Using a Social Insect Metaphor”, Proceedings of the 21st Biennial Symposium on Communications, pp. 382-387, 2002.

   

Lichodzijewski P., Zincir-Heywood A. N., Heywood M. I., “Dynamic Intrusion Detection Using Self Organizing Maps”, Proceedings of the 14th Annual Canadian Information Technology Security Symposium, 2002.

   

Hu X., Zincir-Heywood A. N., Heywood M. I., “Testing a Cognitive Packet Concept on a LAN”, Proceedings of the IEEE CCECE, pp. 1577-1582, 2002.

   

Yang Y., Zincir-Heywood A. N., Heywood M. I., Srinivas S., “Agent Based Routing Algorithms on  a LAN”, Proceedings of the IEEE CCECE, pp. 1442-1447, 2002.

   

Corbin N., Zincir-Heywood A. N., “E-commerce: A Case Study of Barbados’ Tourism and Hospitality Industry”, Proceedings of the International Conference on Industry, Engineering and Management Systems, 2002.

   

Nair S., Zincir-Heywood A. N., “Outsourcing – Factors in the Phenomenon”, The Fourth International Conference on Electronic Commerce Research, ISBN 0-9716253-0-1, pp. 37-45, 2001.

   

Sengul A., Parlak D., Zincir-Heywood A. N., Eren S., “From Search Engines’ Viewpoint: Web Pages Designed in Turkey”, Information Technology for Development, 9, pp. 13-23, 2000.

   

Heywood M. I., Zincir-Heywood A. N., Chatwin C. R., “Digital Library Query Clearing Using Prioritized Clustering and Fuzzy Decision Making”,  Journal of Information Processing & Management, 36(4), pp. 571-583, 2000.

   

Zincir-Heywood A. N., Heywood M. I., Chatwin C. R., Tunali T., “Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search”, International Journal of Cooperative Information Systems, 9(3), pp. 229-254, 2000.

 

Selected Publications