Basil AsSadhan
Basil AsSadhan
Associate Prof. of Electrical Engineering, King Saud Univ.
Verified email at - Homepage
Cited by
Cited by
Detecting botnets using command and control traffic
B AsSadhan, JMF Moura, D Lapsley, C Jones, WT Strayer
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
Hidden Markov models and alert correlations for the prediction of advanced persistent threats
I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ...
IEEE Access 7, 99508-99520, 2019
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
B AsSadhan, JMF Moura
Journal of advanced research 5 (4), 435-448, 2014
Periodic behavior in botnet command and control channels traffic
B AsSadhan, JMF Moura, D Lapsley
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
Anomaly detection using dynamic time warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
2019 IEEE International Conference on Computational Science and Engineering …, 2019
A basic probability assignment methodology for unsupervised wireless intrusion detection
I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ...
IEEE Access 6, 40008-40023, 2018
Trusted UAV network coverage using blockchain, machine learning, and auction mechanisms
AS Khan, G Chen, Y Rahulamathavan, G Zheng, B Assadhan, ...
IEEE access 8, 118219-118234, 2020
Anomaly detection based on LRD behavior analysis of decomposed control and data planes network traffic using SOSS and FARIMA models
B AsSadhan, K Zeb, J Al-Muhtadi, S Alshebeili
IEEE Access 5, 13501-13519, 2017
Anomaly-based network intrusion detection using SVM
Y Zhang, Q Yang, S Lambotharan, K Kyriakopoulos, I Ghafir, B AsSadhan
2019 11th International conference on wireless communications and signal …, 2019
Blockchain-based distributive auction for relay-assisted secure communications
AS Khan, Y Rahulamathavan, B Basutli, G Zheng, B AsSadhan, ...
IEEE Access 7, 95555-95568, 2019
Analysis of P2P, IRC and HTTP traffic for botnets detection
B AsSadhan, A Bashaiwth, J Al-Muhtadi, S Alshebeili
Peer-to-Peer Networking and Applications 11, 848-861, 2018
Network traffic behavior analysis by decomposition into control and data planes
B AsSadhan, H Kim, JMF Moura, X Wang
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008
Countermeasures against adversarial examples in radio signal classification
L Zhang, S Lambotharan, G Zheng, B AsSadhan, F Roli
IEEE Wireless Communications Letters 10 (8), 1830-1834, 2021
Economic metric to improve spam detectors
F Gillani, E Al-Shaer, B AsSadhan
Journal of Network and Computer Applications 65, 131-143, 2016
Network traffic reduction and representation
LKB Melhim, M Jemmali, B AsSadhan, H Alquhayz
International Journal of Sensor Networks 33 (4), 239-249, 2020
Addressing multi-stage attacks using expert knowledge and contextual information
FJ Aparicio-Navarro, TA Chadza, KG Kyriakopoulos, I Ghafir, ...
2019 22nd Conference on Innovation in Clouds, Internet and Networks and …, 2019
Long-range dependence analysis of control and data planes network traffic
B AsSadhan, H Kim, JMF Moura
Saudi International Innovation Conference (SIIC), Leeds, UK, 2008
Volume based anomaly detection using LRD analysis of decomposed network traffic
K Zeb, B AsSadhan, J Al-Muhtadi, S Alshebeili, A Bashaiwth
Fourth edition of the International Conference on the Innovative Computing …, 2014
Second order Kalman filtering channel estimation and machine learning methods for spectrum sensing in cognitive radio networks
OP Awe, DA Babatunde, S Lambotharan, B AsSadhan
Wireless Networks 27 (5), 3273-3286, 2021
Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic
K Zeb, B AsSadhan, J Al-Muhtadi, S Alshebeili
2016 7th International Conference on Information and communication Systems …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20