Search Results - "AsSadhan, Basil"

Refine Results
  1. 1

    Enhancing Explanation of LSTM-Based DDoS Attack Classification Using SHAP With Pattern Dependency by Assadhan, Basil, Bashaiwth, Abdulmuneem, Binsalleeh, Hamad

    Published in IEEE access (2024)
    “…DDoS attacks pose serious threats to the availability and reliability of computer networks. With the increasing complexity of DDoS attacks, the accurate…”
    Get full text
    Journal Article
  2. 2

    Second order Kalman filtering channel estimation and machine learning methods for spectrum sensing in cognitive radio networks by Awe, Olusegun Peter, Babatunde, Daniel Adebowale, Lambotharan, Sangarapillai, AsSadhan, Basil

    Published in Wireless networks (01-07-2021)
    “…We address the problem of spectrum sensing in decentralized cognitive radio networks using a parametric machine learning method. In particular, to mitigate…”
    Get full text
    Journal Article
  3. 3

    An Explanation of the LSTM Model Used for DDoS Attacks Classification by Bashaiwth, Abdulmuneem, Binsalleeh, Hamad, AsSadhan, Basil

    Published in Applied sciences (01-08-2023)
    “…With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding…”
    Get full text
    Journal Article
  4. 4

    Bayesian Optimization-Driven Adversarial Poisoning Attacks Against Distributed Learning by Aristodemou, Marios, Liu, Xiaolan, Lambotharan, Sangarapillai, AsSadhan, Basil

    Published in IEEE access (2023)
    “…Metaverse is envisioned to be the next-generation human-centric Internet which can offer an immersive experience for users with a broad application in…”
    Get full text
    Journal Article
  5. 5

    Complement-Class Harmonized Naïve Bayes Classifier by Alenazi, Fahad S., El Hindi, Khalil, AsSadhan, Basil

    Published in Applied sciences (01-04-2023)
    “…Naïve Bayes (NB) classification performance degrades if the conditional independence assumption is not satisfied or if the conditional probability estimate is…”
    Get full text
    Journal Article
  6. 6

    Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats by Ghafir, Ibrahim, Kyriakopoulos, Konstantinos G., Lambotharan, Sangarapillai, Aparicio-Navarro, Francisco J., Assadhan, Basil, Binsalleeh, Hamad, Diab, Diab M.

    Published in IEEE access (2019)
    “…Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced…”
    Get full text
    Journal Article
  7. 7

    Blockchain-Based Distributive Auction for Relay-Assisted Secure Communications by Khan, Amjad Saeed, Rahulamathavan, Yogachandran, Basutli, Bokamoso, Zheng, Gan, Assadhan, Basil, Lambotharan, Sangarapillai

    Published in IEEE access (2019)
    “…Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative…”
    Get full text
    Journal Article
  8. 8

    Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models by Assadhan, Basil, Zeb, Khan, Al-Muhtadi, Jalal, Alshebeili, Saleh

    Published in IEEE access (2017)
    “…The detection of anomalies in network traffic, such as low volume attacks and abnormalities, has become a pressing problem in today's large volume of Internet…”
    Get full text
    Journal Article
  9. 9

    An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic by AsSadhan, Basil, Moura, José M.F.

    Published in Journal of advanced research (01-07-2014)
    “…Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to…”
    Get full text
    Journal Article
  10. 10

    A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection by Ghafir, Ibrahim, Kyriakopoulos, Konstantinos G., Aparicio-Navarro, Francisco J., Lambotharan, Sangarapillai, Assadhan, Basil, Binsalleeh, Hamad

    Published in IEEE access (01-01-2018)
    “…The broadcast nature of wireless local area networks has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at…”
    Get full text
    Journal Article
  11. 11

    A robust anomaly detection method using a constant false alarm rate approach by AsSadhan, Basil, AlShaalan, Rayan, Diab, Diab M., Alzoghaiby, Abraham, Alshebeili, Saleh, Al-Muhtadi, Jalal, Bin-Abbas, Hesham, El-Samie, Fathi Abd

    Published in Multimedia tools and applications (01-05-2020)
    “…With the rapid growth of information and communication technologies, the number of security threats in computer networks is substantially increasing; thus, the…”
    Get full text
    Journal Article
  12. 12

    Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms by Khan, Amjad Saeed, Chen, Gaojie, Rahulamathavan, Yogachandran, Zheng, Gan, Assadhan, Basil, Lambotharan, Sangarapillai

    Published in IEEE access (2020)
    “…The UAV is emerging as one of the greatest technology developments for rapid network coverage provisioning at affordable cost. The aim of this paper is to…”
    Get full text
    Journal Article
  13. 13

    Countermeasures Against Adversarial Examples in Radio Signal Classification by Zhang, Lu, Lambotharan, Sangarapillai, Zheng, Gan, AsSadhan, Basil, Roli, Fabio

    Published in IEEE wireless communications letters (01-08-2021)
    “…Deep learning algorithms have been shown to be powerful in many communication network design problems, including that in automatic modulation classification…”
    Get full text
    Journal Article
  14. 14

    Machine Learning Aided Blockchain Assisted Framework for Wireless Networks by Khan, Amjad Saeed, Zhang, Xinruo, Lambotharan, Sangarapillai, Zheng, Gan, AsSadhan, Basil, Hanzo, Lajos

    Published in IEEE network (01-09-2020)
    “…Inspired by its success in financial sectors, the blockchain technique is emerging as an enabling technology for secure distributed control and management of…”
    Get full text
    Journal Article
  15. 15

    Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices by Zhang, Lu, Lambotharan, Sangarapillai, Zheng, Gan, Liao, Guisheng, AsSadhan, Basil, Roli, Fabio

    Published in IEEE internet of things journal (01-02-2023)
    “…Due to great success of transformers in many applications such as natural language processing and computer vision, transformers have been successfully applied…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis by AsSadhan, Basil, Alzoghaiby, Abraham, Binsalleeh, Hamad, Kyriakopoulos, Konstantinos G., Lambotharan, Sangarapillai

    “…Summary The detection of anomalies in network traffic is an important task in today's Internet. Among various anomaly detection methods, the techniques based…”
    Get full text
    Journal Article
  18. 18

    Analysis of P2P, IRC and HTTP traffic for botnets detection by AsSadhan, Basil, Bashaiwth, Abdulmuneem, Al-Muhtadi, Jalal, Alshebeili, Saleh

    Published in Peer-to-peer networking and applications (01-09-2018)
    “…Botnets are widespread and have become a major threat to network security. A botnet is a group of infected computers that are controlled by a botmaster…”
    Get full text
    Journal Article
  19. 19

    Denial of service detection using dynamic time warping by Diab, Diab M., AsSadhan, Basil, Binsalleeh, Hamad, Lambotharan, Sangarapillai, Kyriakopoulos, Konstantinos G., Ghafir, Ibrahim

    “…Summary With the rapid growth of security threats in computer networks, the need for developing efficient security‐warning systems is substantially increasing…”
    Get full text
    Journal Article
  20. 20

    Detecting Network Attacks Exhibiting Irregular Periodic Behavior by Bashaiwth, Abdulmuneem, AsSadhan, Basil

    “…There are several Internet applications that exhibit periodic behavior. Some of these applications are benign such as E-mail and software updates, while others…”
    Get full text
    Conference Proceeding