Search Results - "AsSadhan, Basil"
-
1
Enhancing Explanation of LSTM-Based DDoS Attack Classification Using SHAP With Pattern Dependency
Published in IEEE access (2024)“…DDoS attacks pose serious threats to the availability and reliability of computer networks. With the increasing complexity of DDoS attacks, the accurate…”
Get full text
Journal Article -
2
Second order Kalman filtering channel estimation and machine learning methods for spectrum sensing in cognitive radio networks
Published in Wireless networks (01-07-2021)“…We address the problem of spectrum sensing in decentralized cognitive radio networks using a parametric machine learning method. In particular, to mitigate…”
Get full text
Journal Article -
3
An Explanation of the LSTM Model Used for DDoS Attacks Classification
Published in Applied sciences (01-08-2023)“…With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding…”
Get full text
Journal Article -
4
Bayesian Optimization-Driven Adversarial Poisoning Attacks Against Distributed Learning
Published in IEEE access (2023)“…Metaverse is envisioned to be the next-generation human-centric Internet which can offer an immersive experience for users with a broad application in…”
Get full text
Journal Article -
5
Complement-Class Harmonized Naïve Bayes Classifier
Published in Applied sciences (01-04-2023)“…Naïve Bayes (NB) classification performance degrades if the conditional independence assumption is not satisfied or if the conditional probability estimate is…”
Get full text
Journal Article -
6
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats
Published in IEEE access (2019)“…Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced…”
Get full text
Journal Article -
7
Blockchain-Based Distributive Auction for Relay-Assisted Secure Communications
Published in IEEE access (2019)“…Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative…”
Get full text
Journal Article -
8
Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models
Published in IEEE access (2017)“…The detection of anomalies in network traffic, such as low volume attacks and abnormalities, has become a pressing problem in today's large volume of Internet…”
Get full text
Journal Article -
9
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
Published in Journal of advanced research (01-07-2014)“…Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to…”
Get full text
Journal Article -
10
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
Published in IEEE access (01-01-2018)“…The broadcast nature of wireless local area networks has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at…”
Get full text
Journal Article -
11
A robust anomaly detection method using a constant false alarm rate approach
Published in Multimedia tools and applications (01-05-2020)“…With the rapid growth of information and communication technologies, the number of security threats in computer networks is substantially increasing; thus, the…”
Get full text
Journal Article -
12
Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms
Published in IEEE access (2020)“…The UAV is emerging as one of the greatest technology developments for rapid network coverage provisioning at affordable cost. The aim of this paper is to…”
Get full text
Journal Article -
13
Countermeasures Against Adversarial Examples in Radio Signal Classification
Published in IEEE wireless communications letters (01-08-2021)“…Deep learning algorithms have been shown to be powerful in many communication network design problems, including that in automatic modulation classification…”
Get full text
Journal Article -
14
Machine Learning Aided Blockchain Assisted Framework for Wireless Networks
Published in IEEE network (01-09-2020)“…Inspired by its success in financial sectors, the blockchain technique is emerging as an enabling technology for secure distributed control and management of…”
Get full text
Journal Article -
15
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Published in IEEE internet of things journal (01-02-2023)“…Due to great success of transformers in many applications such as natural language processing and computer vision, transformers have been successfully applied…”
Get full text
Journal Article -
16
Economic metric to improve spam detectors
Published in Journal of network and computer applications (01-04-2016)Get full text
Journal Article -
17
Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis
Published in International journal of network management (01-11-2020)“…Summary The detection of anomalies in network traffic is an important task in today's Internet. Among various anomaly detection methods, the techniques based…”
Get full text
Journal Article -
18
Analysis of P2P, IRC and HTTP traffic for botnets detection
Published in Peer-to-peer networking and applications (01-09-2018)“…Botnets are widespread and have become a major threat to network security. A botnet is a group of infected computers that are controlled by a botmaster…”
Get full text
Journal Article -
19
Denial of service detection using dynamic time warping
Published in International journal of network management (01-11-2021)“…Summary With the rapid growth of security threats in computer networks, the need for developing efficient security‐warning systems is substantially increasing…”
Get full text
Journal Article -
20
Detecting Network Attacks Exhibiting Irregular Periodic Behavior
Published in 2021 International Symposium on Networks, Computers and Communications (ISNCC) (31-10-2021)“…There are several Internet applications that exhibit periodic behavior. Some of these applications are benign such as E-mail and software updates, while others…”
Get full text
Conference Proceeding