


default search action
Nabil Seddigh
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [d4]Jeffrey A. Adjei, Nur Zincir-Heywood, Malcom Heywood, Nabil Seddigh, Biswajit Nandy:
DALHOUSIE NIMS LAB IoT ATTACK DATASET 2025-1. IEEE DataPort, 2025 - 2024
- [c31]Jeffrey A. Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
IoT Device and State Identification based on Usage Patterns. CNSM 2024: 1-7 - [c30]Jeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
Identifying IoT Devices: A Machine Learning Analysis Using Traffic Flow Metadata. NOMS 2024: 1-7 - [c29]Craig Dillabaugh, Vamsikumar Tholeti, Delfin Y. Montuno, Nabil Seddigh, Biswajit Nandy, Margaret Ajibola:
Issues and Challenges in Machine Learning-based IoT Device Discovery: An Empirical Study. WF-IoT 2024: 1-7 - [d3]Jeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
DALHOUSIE NIMS LAB IOT 2024 DATASET. IEEE DataPort, 2024 - [d2]Jeffrey Attakorah Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
DALHOUSIE NIMS LAB BENIGN DATASET 2024-2. IEEE DataPort, 2024 - 2023
- [c28]Marwa A. Elsayed, Patrick Russell, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
Anomaly Detection for IoT Networks: Empirical Study. CCECE 2023: 432-437 - [c27]Zolboo Erdenebaatar, Riyad Alshammari, Biswajit Nandy, Nabil Seddigh, Marwa Elsayed, Nur Zincir-Heywood:
Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study. ICCCN 2023: 1-10 - [c26]Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones. NOMS 2023: 1-5 - [c25]Zolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood:
Instant Messaging Application Encrypted Traffic Generation System. NOMS 2023: 1-3 - [c24]Patrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
On the Fence: Anomaly Detection in IoT Networks. NOMS 2023: 1-4 - [d1]Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Encrypted Mobile Instant Messaging Traffic Dataset. IEEE DataPort, 2023 - 2021
- [j2]Ali Safari Khatouni
, Nabil Seddigh, Biswajit Nandy, Ayse Nur Zincir-Heywood:
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors. J. Netw. Syst. Manag. 29(1): 8 (2021)
2010 – 2019
- 2019
- [c23]Nabil Seddigh, Biswajit Nandy, Don Bennett, Yonglin Ren, Serge Dolgikh
, Colin Zeidler, Juhandre Knoetze, Naveen Sai Muthyala:
A Framework & System for Classification of Encrypted Network Traffic using Machine Learning. CNSM 2019: 1-5 - 2017
- [c22]Kevin Wong, Craig Dillabaugh, Nabil Seddigh, Biswajit Nandy:
Enhancing Suricata intrusion detection system for cyber security in SCADA networks. CCECE 2017: 1-5 - 2015
- [c21]Yang Hong, Changcheng Huang, Biswajit Nandy, Nabil Seddigh:
Iterative-tuning support vector machine for network traffic classification. IM 2015: 458-466 - [c20]Athanasios Delimargas, Emmanouil Skevakis, Hassan Halabian, Ioannis Lambadaris, Nabil Seddigh, Biswajit Nandy, Rupinder Makkar:
IPCA for network anomaly detection. MILCOM 2015: 617-622 - 2014
- [j1]Stevan Novakov, Chung-Horng Lung, Ioannis Lambadaris, Nabil Seddigh:
A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection. Int. J. Mob. Comput. Multim. Commun. 6(1): 17-53 (2014) - [c19]M. F. Rabbi Ur Rashid, Chung-Horng Lung, Marc St-Hilaire, Biswajit Nandy, Nabil Seddigh:
Combining SPF and source routing for an efficient probing solution in IPv6 topology discovery. GIIS 2014: 1-6 - [c18]Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy:
Entropy-based robust PCA for communication network anomaly detection. ICCC 2014: 171-175 - [c17]Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy:
Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering. TrustCom 2014: 823-830 - 2013
- [c16]Duo Liu, Chung-Horng Lung, Ioannis Lambadaris, Nabil Seddigh:
Network traffic anomaly detection using clustering techniques and performance comparison. CCECE 2013: 1-4 - [c15]Gajen Piraisoody, Changcheng Huang, Biswajit Nandy, Nabil Seddigh:
Classification of applications in HTTP tunnels. CloudNet 2013: 67-74 - [c14]Stevan Novakov, Chung-Horng Lung, Ioannis Lambadaris, Nabil Seddigh:
Studies in applying PCA and wavelet algorithms for network traffic anomaly detection. HPSR 2013: 185-190 - [c13]Ahmed Bashir, Changcheng Huang, Biswajit Nandy, Nabil Seddigh:
Classifying P2P activity in Netflow records: A case study on BitTorrent. ICC 2013: 3018-3023 - 2010
- [c12]Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont:
Security advances and challenges in 4G wireless networks. PST 2010: 62-71
2000 – 2009
- 2006
- [c11]Nabil Seddigh, Andrew Ross, Peter Pieda, Rupinder Makkar, Biswajit Nandy, Lathif Masood:
Improving Network Infrastructure Security using Geospatial Technology. CCECE 2006: 1601-1604 - [c10]F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy:
Experimental evaluation of network security through a hierarchical quantitative metrics model. Communication, Network, and Information Security 2006: 156-164 - 2004
- [c9]Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield:
Current Trends and Advances in Information Assurance Metrics. PST 2004: 197-205 - 2002
- [c8]Frank Akujobi, Ioannis Lambadaris, Rupinder Makkar, Nabil Seddigh, Biswajit Nandy:
BECN for congestion control in TCP/IP networks: study and comparative evaluation. GLOBECOM 2002: 2588-2593 - 2001
- [c7]M. Baines, Nabil Seddigh, Biswajit Nandy, Peter Pieda, Michael Devetsikiotis:
Using TCP models to understand bandwidth assurance in a Differentiated Services network. GLOBECOM 2001: 1800-1805 - [c6]Nabil Seddigh, Michael Devetsikiotis:
Studies of TCP's retransmission timeout mechanism. ICC 2001: 1834-1840 - 2000
- [c5]Rupinder Makkar, Ioannis Lambadaris, Jamal Hadi Salim, Nabil Seddigh, Biswajit Nandy, Jozef Babiarz:
Empirical study of buffer management scheme for Diffserv assured forwarding PHB. ICCCN 2000: 632-637 - [c4]Fulu Li, Nabil Seddigh, Biswajit Nandy, Diego Matute:
An Empirical Study of Today's Internet Traffic for Differentiated Services IP QoS. ISCC 2000: 207-213 - [c3]Biswajit Nandy, Nabil Seddigh, Peter Pieda, Jeremy Ethridge:
Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks. NETWORKING 2000: 540-554 - [i1]Wenjia Fang, Nabil Seddigh, Biswajit Nandy:
A Time Sliding Window Three Colour Marker (TSWTCM). RFC 2859: 1-9 (2000)
1990 – 1999
- 1999
- [c2]Uvais Ahmed, Ioannis Lambadaris, Thomas Kunz, Jamal Hadi Salim, Biswajit Nandy, Nabil Seddigh:
Performance Evaluation of Explicit Congestion Notification (ECN) in IP networks. Multimedia Information Systems 1999: 96-98 - 1998
- [c1]Biswajit Nandy, Nabil Seddigh, A. S. J. Chapman, Jamal Hadi Salim:
A Connectionless Approach to Providing QoS in IP Networks. HPN 1998: 363-379
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-08 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint