Modelling and Mining of Networked Information Spaces

Publications (2001-2012)

    Articles in refereed publications (2012)

  1. A. Bonato, G. Kemkes, and P. Pralat, Almost all cop-win graphs contain a universal vertex, Discrete Mathematics 312 (2012), 1652-1657.

  2. A. Bonato, J. Janssen, and P. Pralat, Geometric protean graphs, Internet Mathematics 8 (2012), 2-28.

  3. A. Bonato, M.E. Messinger, and P. Pralat, Fighting Constrained Fires in Graphs, Theoretical Computer Science 434 (2012), 11-22.

  4. A. Bonato, D. Mitsche, and P. Pralat, Vertex-pursuit in hierarchical social networks, In: Proceedings of the 9th annual conference on Theory and Applications of Models of Computation (TAMC 2012), 2012.

  5. O-Y. Chan and P. Pralat, Chipping away at the edges: how long does it take?, Journal of Combinatorics 3 (2012), 101-121.

  6. C. Cooper, A. Frieze, and P. Pralat, Some typical properties of the Spatial Preferred Attachment model, In: Proceedings of the 9th Workshop on Algorithms and Models for the Web Graph (WAW 2012), 2012.

  7. F. Fomin, P. Golovach, and P. Pralat, Cops and Robber with Constraints, SIAM Journal on Discrete Mathematics 26 (2012), 571-590.

  8. M. Hurshman, J. Janssen, N. Kalyaniwalla, Model selection for social networks using graphlets, accepted to Internet Mathematics, 2012.
  9. J. Janssen, P. Pralat, R. Wilson, Geometric properties of the spatial preferred attachment model, accepted to J. Advances of Applied Mathematics, 2012. Monographs and books (2011)

  10. A. Bonato, R. Nowakowski, The Game of Cops and Robbers on Graphs, AMS STML Series, 2011.

  11. A. Bonato, A. Tian, Complex Networks and Social Networks, invited book chapter in "Social Networks", Springer Mathematics in Industry Series, 2011.

    Articles in refereed publications (2011)

  12. R. Alshammari, A. N. Zincir-Heywood, Can Encrypted Traffic be identified without Port Numbers, IP Addresses and Payload Inspection?, Computer Networks, 55 (2011) 1326-1350.

  13. R. Alshammari, A. N. Zincir-Heywood, Is Machine Learning losing the battle to produce transportable signatures against VoIP traffic?, In: IEEE Congress on Evolutionary Computation, 2011.

  14. D. Arndt, A. N. Zincir-Heywood, A Comparison of Three Machine Learning Techniques for Encrypted Network Traffic Analysis, In: IEEE International Symposium on Computational Intelligence for Security and Defense Applications, pp. 107-114, 2011.

  15. C. Bacquet, A. N. Zincir-Heywood, M. I. Heywood Genetic optimization and hierarchical clustering applied to encrypted traffic identification. In: IEEE Symposium on Computational Intelligence in Cyber Security. pp 194--201 (best paper award recipient), 2011.

  16. A. Bonato, N. Hadi, P. Horn, P. Pralat, C. Wang, Models of on-line social networks, Internet Mathematics 6 (2011) 285-313.

  17. C. Cooper, P. Pralat, Scale-free graphs of increasing degree, Random Structures and Algorithms 38 (2011) 396-421.

  18. J. Doucette, M. I. Heywood Revisiting the Acrobot 'height' task: An example of efficient evolutionary policy search under an episodic goal seeking task. In: IEEE Congress on Evolutionary Computation. pp 468-475, 2011.

  19. A. Henry, P. Pralat, CQ. Zhang, The Emergence of Segregation in Evolving Social Networks, Proceedings of the National Academy of Sciences 108 (2011) 8605-8610.

  20. A. Henry, P. Pralat, Rank-Based Models of Network Structure and the Discovery of Content, In:Proceedings of the 8th Workshop on Algorithms and Models for the Web Graph (WAW 2011), Lecture Notes in Computer Science 6732, Springer, 2011, 62-73.

  21. H. G. Kayacik, A. N. Zincir-Heywood, M. I. Heywood Can a good offence be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Applied Soft Computing 11 (2011) 4366-4383.

  22. P. LaRoche, A. N. Zincir-Heywood, M. I. Heywood Exploring the State Space of an Application Protocol: A Case study of SMTP, In: IEEE Symposium on Computational Intelligence on Cyber Security, pp. 152-159, 2011.

  23. A. Makanju, A. N. Zincir-Heywood, E. Milios, Storage and Retrieval of System Log Events using a Structured Schema based on Message Type Transformation, In: ACM Symposium on Applied Computing pp. 525-531, 2011.

  24. A. R. McIntyre, M. I. Heywood Classification as clustering: A Pareto cooperative-competitive GP approach, Evolutionary Computation 19 (2011) 137-166.

  25. M.E. Messinger, R. Nowakowski, P. Pralat, Cleaning with Brooms, Graphs and Combinatorics 27 (2011), 251-267.

  26. P. Pralat, Cleaning random d-regular graphs with Brooms, Graphs and Combinatorics 27 (2011), 567-584.

  27. P. Pralat, Connectivity threshold and recovery time in rank-based models for complex networks, Discrete Mathematics 311 (2011), 932-939.

  28. P. Pralat, and C. Wang, An edge deletion model for complex networks, Theoretical Computer Science 412 (2011), 5111-5120.

  29. O. Yeloglu, E. Milios, A. N. Zincir-Heywood, Multi-Document Summarization of Scientific Corpora, In: ACM Symposium on Applied Computing, pp. 251-258, 2011.


    Articles in refereed publications (2010)

  30. Alshammari R., Zincir-Heywood A.N., An Investigation on the identification of VoIP Traffic: Case Study on Gtalk and Skype, In Proceedings of the IEEE CNSM 2010.

  31. Alshammari R., Zincir-Heywood A.N., Unveiling Skype Encrypted Tunnels using GP, In Proceedings of the IEEE World Congress on Computational Intelligence WCCI CEC,2010.

  32. Bacquet C., Zincir-Heywood A.N., Heywood M. I., An Analysis of Clustering Objectives for Feature Selection Applied to Encrypted Traffic Identification, In Proceedings of the IEEE World Congress on Computational Intelligence WCCI CEC, 2010.

  33. R. Angelova, M. Lipczak, E. Milios, P. Pralat, Investigating the properties of a social bookmarking and tagging network, International Journal of Data Warehousing and Mining 6 (2010) 1-19.

  34. Bacquet C., Gumus K., Tizer D., Zincir-Heywood A.N., Heywood M. I., A Comparison of Unsupervised Learning Techniques for Encrypted Traffic Identification, Journal of Information Assurance and Security, vol. 5, pp.464-472, 2010.

  35. Sotiris Batsakis, Euripides G.M. Petrakis, Evangelos Milios, Improving the Performance of Focused Web Crawlers Data and Knowledge Engineering Vol. 68, No. 10 1001-1013.

  36. A. Bonato, J. Janssen, P. Pralat, A geometric model for on-line social networks, In: Proceedings of 3rd Workshop on Online Social Networks (WOSN 2010).

  37. S. Gaspers, M.E. Messinger, R. Nowakowski, P. Pralat, Parallel cleaning of a network, Disc. Applied Math. 158 (2010) 467-478.

  38. J. Janssen Spatial models for virtual networks, In: "Computability in Europe", Ferreira et al., eds., LNCS (2010).

  39. J. Janssen, P. Pralat, Rank-based attachment leads to power law graphs, SIAM Journal on Discrete Mathematics 24 (2010) 420-440.

  40. J. Janssen, P. Pralat, R. Wilson, Estimating node similarity from co-citation in a spatial graph model, In: Proceedings of 2010 ACM Symposium on Applied Computing--Special Track on Self-organizing Complex Systems.

  41. LaRoche P., Zincir-Heywood A. N., Heywood M. I., Using Code Bloat to Obfuscate Evolved Network Traffic, In Proceedings of the European Workshop on the Application of Nature-inspired Techniques for Telecommunication Networks and other Parallel and Distributed Systems, Springer, Lecture Notes in Computer Science series, pp. 101-110, April 2010.

  42. Marek Lipczak, Evangelos Milios Learning in Efficient Tag Recommendation In: ACM Recommender Systems 2010, Barcelona, Sep. 26-30.

  43. Marek Lipczak, Evangelos Milios The impact of resource title on tags in collaborative tagging systems In: 21st ACM Conference on Hypertext and Hypermedia, Toronto, Canada, June 13-16, 2010 (long paper), pp. 179-188.

  44. Marek Lipczak, Yeming Hu, Yael Kollet, Evangelos Milios Tag Sources for Recommendation in Collaborative Tagging Systems In: ECML/PKDD 2009 Discovery Challenge Workshop, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases Bled, Slovenia, Sep. 7-11, 2009, 16 p. (First place in ``content-based'' recommendation task, third place in ``graph-based'' recommendation task and first place in ``online'' recommendation task, from approx. 30 participants).

  45. Marek Lipczak, Evangelos Milios Agglomerative Genetic Algorithm for Clustering in Social Networks In: The ACM Genetic and Evolutionary Computation Conference (GECCO-2009) July 8-12, 2009, Montreal, pp. 1243-1250.

  46. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios, Robust Learning Intrusion Detection for Attacks on Wireless Networks Intelligent Data Analysis: An International Journal (IDA) Vol. 7 No. 6 1-9.

  47. Adetokunbo Makanju, A. Nur Zincir Heywood, Evangelos E. Milios An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs In: Proceedings of the 7th International Conference on Quantitative Evaluation of SysTems QEST 2010, Williamsburg, Virginia, USA, September 15 - 18, 2010, 10 p.

  48. Adetokunbo Makanju, A. Nur Zincir Heywood, Evangelos E. Milios Fast Entropy Based Alert Detection in Super Computer Logs. In: Proceedings of the 2010 DSN Workshop on Proactive Failure Avoidance, Recovery and Maintenance, PFARM 2010 Chicago, USA, June 28, 2010, 7 p.

  49. Adetokunbo Makanju , A. Nur Zincir Heywood, Evangelos E. Milios Extracting Message Types from BlueGene/L's Logs In: Proceedings of the ACM SIGOPS SOSP Workshop on the Analysis of System Logs, WASL 2009 Big Sky Resort, Big Sky, Montana, October 14, 2009, 7 p.

  50. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios Clustering Event Logs Using Iterative Partitioning In: ACM SIGKDD Conference on Knowledge Discovery and Data Mining, June 28-July 1, 2009, Paris, pp. 1255-1264.

  51. M.M. Shafiei, H. Chipman, Mixed membership stochastic blockmodels for transactional data, In: Proceedings of NIPS workshop on Analyzing Networks and Learning With Graphs.

  52. Hathai Tanta-ngai, Evangelos Milios, Vlado Keselj Self-Organizing Peer-to-Peer Network for Collaborative Document Tracking Workshop on Complex Networks in Information and Knowledge Management (CNIKM), part of the ACM 18th Conference on Information and Knowledge Management (CIKM) 2009 Hongkong, China, Nov. 2-6, 2009, pp. 59-66.

  53. Xiaomeng Wan, Evangelos Milios, Nauzer Kalyaniwalla Link-based Event Detection in Email Communication Networks In: 24th Annual ACM Symposium on Applied Computing, March 8 - 12, 2009, Honolulu, Hawaii, USA, pp. 1506-1510.

  54. Xiaomeng Wan, Evangelos Milios, Nauzer Kalyaniwalla, Jeannette Janssen Link-based Anomaly Detection in Communication Networks In: 2008 IEEE/WIC/ACM International Workshop on Computational Social Networks (IWSCN 2008) Dec 9-12, 2008, Sydney, Australia, pp. 402-405.


    Articles in refereed publications (2009)

  55. W. Aiello, A. Bonato, C. Cooper, J. Janssen, P. Pralat, A spatial web graph model with local influence regions, Internet Mathematics 5 (2009) 175-196.

  56. R. Alshammari, P. Lichodzijewski, M.I. Heywood, A.N. Zincir-Heywood, Classifying SSH encrypted traffic with minimum packet header features using genetic programming, In: Proceedings of Defense applications of computational intelligence workshop. Genetic and Evolutionary Computation Conference.

  57. R. Alshammari, A.N. Zincir-Heywood, Machine learning based encrypted traffic classification: identifying SSH and Skype, In: Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.

  58. R. Alshammari, A.N. Zincir-Heywood, Generalization of signatures for SSH encrypted traffic identification, In: Proceedings of the IEEE Symposium on Computational Intelligence on Cyber Security, 2009.

  59. R. Alshammari, A.N. Zincir-Heywood, A. Farrag, Performance comparison of four rule sets: an example for encrypted traffic classification, In: Proceedings of the IEEE Conference on Privacy, Security and Trust, 2009.

  60. C. Bacquet, A. N. Zincir-Heywood, M. I. Heywood, An investigation of multi-objective genetic algorithms for encrypted traffic identification, In: Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, Springer Advances on Soft Computing series, 2009.

  61. S. Batsakis, E.G.M. Petrakis, E. Milios, Improving the performance of focused web crawlers, Data and Knowledge Engineering, 68 No. 10 (2009) 1001-1013.

  62. A. Bonato, N. Hadi, P. Horn, P. Pralat, C. Wang, Dynamic models of on-line social networks, Proceedings of WAW'09, 2009.

  63. A. Bonato, J. Janssen, C. Wang, The n-ordered graphs - a new graph class, Journal of Graph Theory 60 (2009) 204-218.

  64. A. Bonato, J. Janssen, Infinite limits and adjacency properties of a generalized copying model, Internet Mathematics 4 (2009) 199-223.

  65. A. Bonato, P. Pralat, C. Wang, Pursuit-evasion in models of complex networks, Internet Mathematics 4 (2009) 419-436.

  66. N.E. Clarke, S. Finbow, S.L. Fitzpatrick, M.E. Messenger, R.J. Nowakowski, Seepage in directed acyclic graphs. Australas. J. Combin. 43 (2009) 91-102.

  67. R. Curry, M.I. Heywood One-class genetic programming, In: Proceedings of the European Conference on Genetic Programming.

  68. J. Doucette, P. Lichodzijewski, M.I. Heywood, Evolving coevolutionary classifiers under large attribute spaces, In: Genetic Programming: Theory and Practice VII.

  69. S. Gaspers, M.E. Messinger, R. Nowakowski, P. Pralat, Clean the graph before you draw it!, Information Processing Letters. 109 (2009), 463-467.

  70. H.G. Kayacik, A.N. Zincir-Heywood, M.I. Heywood, S. Burschka, Generating mimicry attacks using genetic programming: a benchmarking study, In: Proceedings of IEEE Computational Intelligence in Cyber Security.

  71. H.G. Kayacik, M.I. Heywood, A.N. Zincir-Heywood, S. Burshka, Testing detector parameterization using evolutionary exploit generation, In: Proceedings of the European Workshop on Evolutionary Computation in Communications, Networks and Connected Systems.

  72. H.G. Kayacik, A.N. Zincir-Heywood, M. I. Heywood, S. Burshka, Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing, In: Proceedings of the IEEE Symposium of Computational Intelligence in Security and Defense Applications.

  73. P. LaRoche, A.N. Zincir-Heywood, M.I. Heywood, Evolving TCP/IP packets: a case study of port scans, In: Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009 .

  74. H.C. Lee, A. Borodin, Cluster based personalized search, In: Proceedings of WAW'09.

  75. P. Lichodzijewski, M.I. Heywood, Binary versus real-valued reward functions under coevolutionary reinforcement learning, In: Proceedings of the European Conference on Artificial Evolution.

  76. M. Lipczak, Y. Hu, Y. Kollet, E. Milios, Tag sources for recommendation in collaborative tagging systems, In: Proceedings of the ECML/PKDD 2009 Discovery Challenge Workshop, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases. First place in vcontent-based" recommendation task, third place in "graph-based" recommendation task and first place in "online" recommendation task.

  77. M. Lipczak, E. Milios, Agglomerative genetic algorithm for clustering in social networks, In: Proceedings of the The ACM Genetic and Evolutionary Computation Conference (GECCO-2009), July 8-12, 2009, Montreal.

  78. A. Makanju, A.N. Zincir-Heywood, E. Milios, Extracting message types from BlueGene/Ls logs, In: Proceedings of the ACM / Usenix Workshop on the Analysis of System Logs, 2009.

  79. A. Makanju, A.N. Zincir-Heywood, E. Milios, Clustering of event logs using iterative partitioning, In: Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, 2009.

  80. M.E. Messinger R.J. Nowakowski, The robot cleans up (extended abstract), In: Proceedings of COCOA'08, 2009.

  81. M.E. Messinger, R.J. Nowakowski, The Robot Cleans Up, J. Combin. Optimization 18 (2009) 350-361.

  82. P. Pralat, Cleaning random graphs with brushes, Australasian Journal of Combinatorics 43 (2009) 237-251.

  83. P. Pralat, N. Wormald, Growing protean graphs, Internet Mathematics 4 (2009) 1-16.

  84. X. Wan, E. Milios, N. Kalyaniwalla: Link-based event detection in email communication networks, Proceedings of the 24th Annual ACM Symposium on Applied Computing, March 8 - 12, 2009, Honolulu, Hawaii, USA.

  85. X. Wan, E. Milios, N. Kalyaniwalla, J. Janssen: Link-based anomaly detection in communication networks, Proceedings of the 2008 IEEE/WIC/ACM International Workshop on Computational Social Networks (IWSCN 2008), Dec 9-12, 2008, Sydney, Australia.

    Non-Refereed Contributions (2009)

  86. C. Bouveyron, H. Chipman, E. Come, Supervised Classification and Visualization of Social Networks Based on a Probabilistic Latent Space Model, Refereed poster in 7th International Workshop on Mining and Learning with Graphs

  87. N. Hadi, Models of on-line social networks, Master's Thesis, Wilfrid Laurier University, 2009.

  88. S. Henderson, Revenue maximization in ad slot auctions, Master's Thesis, University of Toronto, 2009.

  89. H. G. Kayacik, Can the best defense be a good offense? Evolving (mimicry) attacks for detector vulnerability testing under a 'black-box' assumption, PhD Thesis, Dalhousie University, 2009.

  90. M. Mahdi Shafiei, Leveraging structural information for statistical topic models of text, PhD thesis, Dalhousie University, August 2009.

  91. R. Wilson, Properties of the spatial preferential attachment model, Master's Thesis, Dalhousie University, 2009.


    Monographs and books (2008)

  92. A. Bonato, A Course on the Web Graph, AMS Graduate Mathematics Series and AARMS Monograph Series, 2008.

    Articles in refereed publications (2008)

  93. N. Alon, P. Pralat, N. Wormald, Cleaning regular graphs with brushes, SIAM Journal on Discrete Mathematics 23 (2008) 233-250.

  94. E. Baratis, E.G.M. Petrakis, E. Milios, Automatic Web Site Summarization by Image Content: A Case Study with Logo and Trademark Images, IEEE Transactions on Knowledge and Data Engineering 20 (2008) 1195-1204.

  95. P. Lichodzijewski , M.I. Heywood, Coevolutionary bid-based Genetic Programming for problem decomposition in classification, Genetic Programming and Evolvable Machines, 9 Springer-Verlag, pp 331-365, 2008.

  96. M.E. Messinger, R. Nowakowski, P. Pralat, Cleaning a network with brushes, Theoretical Computer Science 399 (2008) 191-205.

  97. P. Pralat, A note on the diameter of protean graphs, Discrete Mathematics 308 (2008) 3399-3406.

    Articles in refereed conference proceedings (2008)

  98. R. Alshammari, A.N. Zincir-Heywood, Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification, In: IEEE Computational Intelligence in Security for Information Systems, October 2008.

  99. R. Alshammari, A.N. Zincir-Heywood, Investigating Two Different Approaches for Encrypted Traffic Classification, In: Proceedings of IEEE Conference on Privacy, Security and Trust, 2008.

  100. R. Angelova, M. Lipczak, E. Milios, and P. Pralat, Characterizing a social bookmarking and tagging network, In: Mining Social Data (MSoDa), a Workshop of the 18th European Conference on Artificial Intelligence (ECAI 2008), 21 July 2008, University of Patras, Greece.

  101. D. Angevine, A.N. Zincir-Heywood, A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set, In: Proceedings of IEEE International Workshop on Privacy and Security by means of Artificial Intelligence, in conjunction with the ARES'2008, 2008.

  102. E. Baratis, E.G.M. Petrakis, E. Milios, Automatic Web Site Summarization by Image Content: A Case Study with Logo and Trademark Images In: IEEE Transactions on Knowledge and Data Engineering.

  103. A. Bonato, D. Delic, C. Wang, Universal random semi-directed graphs, In: Proceedings of ROGICS'08.

  104. A. George, A. Makanju, E. Milios, A. Zincir-Heywood N., M. Latzel, S. Stergiopoulos, NetPal: A Dynamic Network Administration Knowledge Base, In: 18th Annual International Conference on Computer Science and Software Engineering (CASCON 2008), Oct 27-30, 2008, Richmond Hill, Ontario, Canada.

  105. A. George, A. Makanju, A.N. Zincir-Heywood, E. Milios, Information Retrieval in Network Administration, In: Proceedings of IEEE Conference on Computer Networks and Services Research (CNSR 2008), May 5-8, 2008, Halifax, Canada, pp. 561-568.

  106. H.G. Kayacik, A.N. Zincir-Heywood, Mimicry Attacks Demystified: What Can Attackers Do To Evade Detection?, In: Proceedings of IEEE Conference on Privacy, Security and Trust, 2008. Received Best Paper Award.

  107. H.C. Lee, A. Borodin, and L. Goldsmith, Extracting and Ranking Viral Communities Using Seeds and Content Similarity, in Proceedings of HT, 2008.

  108. P. Lichodzijewski, M.I. Heywood, Managing team-based problem solving with symbiotic bid-based Genetic Programming, In: Proceedings of the Genetic and Evolutionary Computation Conference, 2008.

  109. M. Lipczak, Tag Recommendation for Folksonomies Oriented towards Individual Users, In: Proceedings of the ECML/PKDD 2008 Discovery Challenge Workshop, part of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Antwerp, Belgium (system earned 2nd place).

  110. M. Lipczak, J. Blustein, E. Milios, Natural Search Pointers - a query formulation method for structured information search, In: Proceedings of the Conference on Human System Interaction, HIS'08, Krakow (Poland), May 25-27, 2008. Publisher: IEEE Computer Society Press.

  111. A. Makanju, S. Brooks, A. Nur Zincir-Heywood, E. Milios, LogView: Visualizing Event Log Clusters, In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust (PST2008) , October 1-3, 2008, Fredericton, New Brunswick, Canada.

  112. A. Makanju, A.N. Zincir-Heywood, E. Milios, Adaptability of a GP based IDS on Wireless Networks, In: Proceedings of IEEE International Conference on Availability, Reliability and Security - ARES, March 4-7, 2008, Barcelona, Spain, pp. 310-318, 2008.

  113. A. McIntyre, M.I. Heywood, Cooperative problem decomposition in Pareto competitive classifier models of coevolution, In: 11th European Conference on Genetic Programming, 2008.

  114. A. McIntyre, M.I. Heywood, Pareto cooperative-competitive Genetic Programming: A classification benchmarking study, Chapter 2 in Genetic Programming: Theory and Practice, Springer-Verlag, Volume V, pp 14-30, 2008.

  115. M.E. Messinger, R. J. Nowakowski, The robot cleans up, In: Proceedings of COCOA 2008.

  116. P. Pralat, Protean graphs with a variety of ranking schemes, In: Proceedings of the 2nd Annual International Conference on Combinatorial Optimization and Applications (COCOA'08).

  117. M. Shafiei, E. Milios, A Statistical Model for Topic Segmentation and Clustering, In: Proceedings of the 21st Canadian Conference on Artificial Intelligence, 2008.

  118. X. Wan, E. Milios, N. Kalyaniwalla, Link-based Event Detection in Email Communication Networks, In: Proceedings of the 24th Annual ACM Symposium on Applied Computing, 2009.

  119. X. Wan, E. Milios, N. Kalyaniwalla, J. Janssen, Link-based Anomaly Detection in Communication Networks, In: IEEE/WIC/ACM International Workshop on Computational Social Networks (IWSCN 2008), 2008.

    Non-refereed publications (2008)

  120. R. Alshamarri, Automatically Classifying Encrypted Network Traffic: A Case Study of SSH, Masters Thesis, Dalhousie University, 2008.

  121. M. Hurshman, Graph Metrics and Continuity, Masters Thesis, Dalhousie University, 2008.

  122. A. MacIntyre, Novelty Detection + Coevolution = Automatic Problem Decomposition: A Framework for Scalable Genetic Programming Classifiers, PhD Thesis, Dalhousie University, November 2007.

  123. L. Samarbakhsh, Web Search Algorithms and Pagerank, Masters Thesis, Wilfrid Laurier University, May 2008.


    Monographs, books, and book chapters (2007)

  124. A. Bonato, F. Chung Graham (eds.), Proceedings of the 5th Workshop On Algorithms And Models For The Web-Graph (WAW'07), 2007.

  125. J. Janssen, P. Pralat (eds.), Proceedings of the 4th Workshop on Combinatorial and Algorithmic Aspects of Networking (CAAN'07), 2007.

    Articles in refereed publications (2007)

  126. R. Curry, P. Lichodzijewski, M.I. Heywood, Scaling genetic programming to large datasets using hierarchical dynamic subset selection, IEEE Transactions on Systems, Man and Cybernetics -- Part B: Cybernetics 37 1065-1073.

    Articles in refereed conference proceedings (2007)

  127. W. Aiello, A. Bonato, C. Cooper, J. Janssen, P. Pralat, A spatial web graph model with local influence regions, In: Proceedings of WAW07.

  128. R. Alshammari, A.N. Zincir-Heywood, A flow based approach for SSH traffic detection, In: Proceedings of the IEEE International Conference on System, Man and Cybernetics - SMC'2007.

  129. A. Bonato, P. Pralat, C. Wang, Vertex pursuit games in stochastic network models, In: Proceedings of CAAN'07.

  130. R. Dorrigiv, A. Lopez-Ortiz, P. Pralat, Search algorithms for unstructured peer-to-peer networks, In: Proceedings of the 32nd IEEE Conference on Local Computer Networks, 2007.

  131. J. Healy, J. Janssen, E. Milios, W. Aiello, Characterization of graphs using k-cores, In: Proceedings of Algorithms and Models for the Web-Graph: Fourth International Workshop, WAW 2006, Banff, Canada, Nov. 30 - Dec. 1, 2006, Proceeedings, Lecture Notes in Computer Science, LNCS-4936, Springer Verlag, 2008.

  132. H.G. Kayacik, M.I. Heywood, A.N. Zincir-Heywood, Evolving buffer overflow attacks with detector feedback, 4th European Workshop on the Application of Nature-inspired Techniques to Telecommunication Networks and other Connected Systems (EvoCOMNET'07). Lecture Notes in Computer Science.

  133. H.G. Kayacik, A.N. Zincir-Heywood, M.I. Heywood, Automatically evading IDS using GP authored attacks, IEEE Computational Intelligence for Security and Defense Applications. IEEE Press, 153-160.

  134. H.G. Kayacik, A.N. Zincir-Heywood, On the contribution of preamble to information hiding in mimicry attacks, In: Proceedings of the IEEE Symposium on Security in Networks and Distributed Systems - SSNDS'2007.

  135. M. Lemczyk, M.I. Heywood, Training binary GP classifiers efficiently: a Pareto-coevolutionary approach, 10th European Conference on Genetic Programming, EuroGP'07. M. Ebner et al. (eds), Lecture Notes in Computer Science 4445 229-240.

  136. P. Lichodzijewski, M.I. Heywood, Pareto-coevolutionary genetic programming for problem decomposition in multi-class classification Proceedings of the Genetic and Evolutionary Computation Conference, GECCO'07.

  137. M.E. Messinger, R. Nowakowski, P. Pralat, N. Wormald, Cleaning random d-regular graphs with brushes using a degree-greedy algorithm, In: Proceedings of CAAN07.

  138. X. Wan, N. Kalyaniwalla, Capturing causality in communications graphs, In: Proceedings of DIMACS/DyDAn Workshop on Computational Methods for Dynamic Interaction Networks, 2007.

  139. O. Yeloglu, A.N. Zincir-Heywood, M.I. Heywood, Growing recurrent self organizing map, accepted to Proceedings of the IEEE International Conference on System, Man and Cybernetics - SMC'2007.

    Non-refereed publications (2007)

  140. Hongyu Liu, Probabilistic Models for Focused Web Crawling, PhD thesis, Dalhousie University, July 2007.

  141. I. Nargis, Modeling and Thematic Analysis of Neighborhood Structures in the Web and Hierarchical Identification of Web Communities, Masters Thesis, Memorial University, August 2007.

  142. Ozge Yeloglu, Growing Recurrent Self-Organizing Map, Master of Computer Science Thesis, Dalhousie University, August 2007.


    Monographs, books, and book chapters (2006)

  143. W. Aiello, A. Broder, J. Janssen, E. Milios, Proceedings of the 5th Workshop On Algorithms And Models For The Web-Graph (WAW'06), 2006.

    Articles in refereed publications (2006)

  144. H. Liu, J. Janssen, E. Milios, Using HMM to learn user browsing patterns for focused web crawling, Data and Knowledge Engineering 59 (2006) 270-291.

  145. T. Luczak, P. Pralat, Protean graphs, Internet Mathematics 3 (2006), 21-40.

  146. W. Lu, J. Janssen, E. Milios, N. Japkowicz, Y. Zhang, Node similarity in the citation graph, Knowledge and Information Systems (2006) 1-25.

  147. Z. Shi, E. Milios, N. Zincir-Heywood, Post-supervised template induction for information extraction from lists and tables in dynamic web sources, Journal of Intelligent Information Systems: Integrating Artificial Intelligence and Database Technologies 22 (2005) 1-25.

    Articles in refereed conference proceedings (2006)

  148. A. Hliaoutakis, G. Varelas, E.G.M. Petrakis, E. Milios, MedSearch: A retrieval system for medical information based on semantic similarity, 10th ECDL European Conference on Research and Advanced Technology for Digital Libraries (ECDL'2006), pp. 512-515, September, 17-22, 2006. Alicante, Spain.

  149. H.G. Kayacik, M.I. Heywood , A.N. Zincir-Heywood "On evolving buffer overflow attacks using genetic programming," Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 06, ACM Press, Washington D.C., July 8-12, 2006, pp 1667-1673, ISBN 1-59593-187-2.

  150. H.G. Kayacik, A.N. Zincir-Heywood, "Using self-organizing maps to build an attack map for forensic analysis", Proceedings of the ACM PST 2006 - International Conference on Privacy, Security and Trust, October 30th, 2006 - November 1st, 2006.

  151. H.C. Lee, W.G. Gao, Y.B. Miao, Geographically focused collaborative crawling, Proc. WWW2006.

  152. M. Lemczyk, M.I. Heywood , Pareto-coevolutionary genetic programming classifier, Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 6, ACM Press, Washington D.C., July 8-12, 2006, pp 945-946, ISBN 1-59593-187-2.

  153. M.R. McIntyre, M.I. Heywood , "MOGE: GP classification problem decomposition using multi-objective optimization," Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 6, ACM Press, Washington D.C., July 8-12, 2006, pp 863-870, ISBN 1-59593-187-2.

  154. X. Wan, J. Janssen, N. Kalyaniwalla, E. Milios, ``Statistical Analysis of Dynamic Graphs'', In: Network analysis in natural sciences and engineering, part of Adaptation in Artificial and Biological Systems(AISB'06) University of Bristol, Bristol, England, April 2006.

    Non-refereed publications (2006)

  155. Lee Hyun Chul, Extending Link Analysis for Novel Web Mining Applications, PhD Thesis, University of Toronto, Dept of Computer Science, Dec 2006.

  156. Ashley George, Local versus global wrapper functions in Genetic Programming, PhD thesis, Dalhousie University.

  157. Michal Lemczyk, Pareto-coevolutionary Genetic Programming Classifier, PhD thesis, Dalhousie University.

  158. C. Wang, Stochastic Models for Self-Organizing Networks and Infinite Graphs, PhD thesis, Dalhousie University.


    Articles in refereed publications (2005)

  159. A. Borodin, G. Roberts, J.S. Rosenthal, P. Tsaparas, Link Analysis Ranking: Algorithms, Experiments, and Theory, ACM Transactions on Internet Technology, volume 5, number 1, February 2005, pp. 231-297.

  160. H.G. Kayacik, A.N. Zincir-Heywood, M.I. Heywood, Intrusion Detection Systems, Encyclopaedia of Multimedia Technology and Networking, M. Pagani (ed). Idea Group Publishing, pp 494-499, 2005.

  161. D. Song, M.I. Heywood, A.N. Zincir-Heywood, Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection, IEEE Transactions on Evolutionary Computation, 9(3), pp 225-239, June 2005.

    Articles in refereed conference proceedings (2005)

  162. A. Alekhnovich, A. Borodin, J. Buresh-Oppenheim, R. Impagliazzo, A. Magen, T. Pitassi, Towards a Model for Backtracking Algorithms (Simple Dynamic Programming Revisted), Proceedings of Computational Complexity Conference (CCC), pp 308-322, June 2005.

  163. A. Bonato, J. Janssen, Infinite limits of the duplication model and graph folding, Proceedings of the European Conference on Combinatorics, Graph Theory, and Applications, Discrete Mathematics and Theoretical Computer Science.

  164. A. Borodin, D. Cashman, A. Magen, How well can Primal-Dual and Local-Ratio algorithms perform?, Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP), pp 943-955, July 2005.

  165. H.G. Kayacik, A.N. Zincir-Heywood, M.I. Heywood, Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Benchmark, Third Annual Conference on Privacy, Security and Trust, 12-14 October 2005, pp 85-89.

  166. C. Wang, Growth deletion models for the web graph and other massive networks, Proceedings of Combinatorial and Algorithmic Aspects of Networking, 2005.

  167. L. Wetmore, A.N. Zincir-Heywood, M.I. Heywood, Training the SOFM Efficiently: An Example from Intrusion Detection, IEEE-INNS International Joint Conference on Neural Networks, July 31-August 4, 2005, pp 1575-1580.


    Articles in refereed publications (2004)

  168. Y. An, J. Janssen, E. Milios, Characterizing and Mining the Citation Graph of Computer Science, Knowledge and Information Systems 6 (2004) 664-678.

  169. S. Angelopoulos, A. Borodin, The Power of Priority Algorithms for Facility Location and Set Cover, Algorithmica, volume 40, number 4, December 2004, pp. 271-291.

  170. A. Bonato, J. Janssen, Infinite limits of copying models of the web graph, Internet Mathematics 1 (2004) 193-213.

  171. A. Borodin, R. Ostrovsky, Y. Rabani, Subquadratic Approximation Algorithms For Clustering Problems in High Dimensional Spaces, Machine Learning 56 (2004) 153-167.

  172. Y. Zhang, N. Zincir-Heywood, E. Milios, World Wide Web Site Summarization, Web Intelligence and Agent Systems: An International Journal (The Web Intelligence Consortium), 2 (2004) 39-53.

    Articles in refereed conference proceedings (2004)

  173. Y. An, J. Janssen, E. Milios, Characterizing and Mining the Citation Graph of Computer Science Literature, Knowledge and Information Systems, Volume 6, Number 4 November, 2004.

  174. A. Bonato, A survey of web graph models, Proceedings of Combinatorial and Algorithm Aspects of Networking, 2004.

  175. A. Bonato, J. Janssen, Limits and power laws of models for the web graph and other networked information spaces, Proceedings of Combinatorial and Algorithm Aspects of Networking, 2004.

  176. H. Liu, J. Janssen, E. Milios, Probabilistic Models for Focused Web Crawling, 6th ACM International Workshop on Web Information and Data Management (WIDM 2004), 2004.

  177. H. Liu, J. Janssen, E. Milios, Focused Crawling by Learning HMM from User's Topic-specific Browsing, Proceedings of 2004 IEEE/WIC/ACM international Conference on Web Intelligence, 2004.

  178. H.C. Lee, J. Miao, Information extraction by embedding HMM to the set of induced linguistic features, Proceedings of SPIRE, 2004.


    Articles in refereed conference proceedings (2003)

  179. A. Borodin, R. Ostrovsky, Y. Rabani, Lower Bounds for High Dimensional Nearest Neighbor Search and Related Problems, Discrete and Computational Geometry - The Goodman-Polack Festschrift B. Aronov, S. Basu, J. Pach, M. Sharir, eds, Vol. 25 in the series: Algorithms and Combinatorics, Springer Verlag, Berlin, May 2003, pp 255-276.

  180. J.P. Grossman, Recursive Node Similarity in Networked Information Spaces, Proceedings of Innovative Internet Community Systems, 2003.

  181. H.C. Lee, A. Borodin, Perturbation of the hyper-linked environment, Proceedings of the 9th International and Computing Conference COCOON LNCS 2697 (2003), pp 272, 283.

  182. H.C. Lee, Metasearch via the co-citation graph, Proceedings of Internet Computing, 2003.

  183. H.C. Lee, A. Borodin, Perturbation of the hyperlinked-environment, Proceedings of the Ninth International Computing and Combinatorics Conference, 2003.


    Articles in refereed conference proceedings (2002)

  184. J. Janssen, N. Kalyaniwalla Compressibility as a model of local coherence in web graphs, I2CS, 2002.


    Papers in refereed conference proceedings (2001)

  185. W. Lu, J. Janssen, E. Milios, N. Japkowicz, Y. Zhang, Node Similarity in Networked Information Spaces, Knowledge and Information Systems, revised version submitted, September 2004. Presented at CASCON, 2001.