Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Basil AsSadhan
@article{DBLP:journals/access/AristodemouLLA23, author = {Marios Aristodemou and Xiaolan Liu and Sangarapillai Lambotharan and Basil AsSadhan}, title = {Bayesian Optimization-Driven Adversarial Poisoning Attacks Against Distributed Learning}, journal = {{IEEE} Access}, volume = {11}, pages = {86214--86226}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3304541}, doi = {10.1109/ACCESS.2023.3304541}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AristodemouLLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangLZLAR23, author = {Lu Zhang and Sangarapillai Lambotharan and Gan Zheng and Guisheng Liao and Basil AsSadhan and Fabio Roli}, title = {Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {3}, pages = {2646--2657}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3215188}, doi = {10.1109/JIOT.2022.3215188}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangLZLAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DiabABLKG21, author = {Diab M. Diab and Basil AsSadhan and Hamad Binsalleeh and Sangarapillai Lambotharan and Konstantinos G. Kyriakopoulos and Ibrahim Ghafir}, title = {Denial of service detection using dynamic time warping}, journal = {Int. J. Netw. Manag.}, volume = {31}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/nem.2159}, doi = {10.1002/NEM.2159}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/DiabABLKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/ZhangLZAR21, author = {Lu Zhang and Sangarapillai Lambotharan and Gan Zheng and Basil AsSadhan and Fabio Roli}, title = {Countermeasures Against Adversarial Examples in Radio Signal Classification}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {10}, number = {8}, pages = {1830--1834}, year = {2021}, url = {https://doi.org/10.1109/LWC.2021.3083099}, doi = {10.1109/LWC.2021.3083099}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/ZhangLZAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AweBLA21, author = {Olusegun Peter Awe and Daniel Adebowale Babatunde and Sangarapillai Lambotharan and Basil AsSadhan}, title = {Second order Kalman filtering channel estimation and machine learning methods for spectrum sensing in cognitive radio networks}, journal = {Wirel. Networks}, volume = {27}, number = {5}, pages = {3273--3286}, year = {2021}, url = {https://doi.org/10.1007/s11276-021-02627-w}, doi = {10.1007/S11276-021-02627-W}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AweBLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/BashaiwthA21, author = {Abdulmuneem Bashaiwth and Basil AsSadhan}, title = {Detecting Network Attacks Exhibiting Irregular Periodic Behavior}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2021, Dubai, United Arab Emirates, October 31 - November 2, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISNCC52172.2021.9615739}, doi = {10.1109/ISNCC52172.2021.9615739}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isncc/BashaiwthA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanCRZAL20, author = {Amjad Saeed Khan and Gaojie Chen and Yogachandran Rahulamathavan and Gan Zheng and Basil AsSadhan and Sangarapillai Lambotharan}, title = {Trusted {UAV} Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms}, journal = {{IEEE} Access}, volume = {8}, pages = {118219--118234}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3003894}, doi = {10.1109/ACCESS.2020.3003894}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanCRZAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-spr/BsebsuZLCA20, author = {Ashraf Bsebsu and Gan Zheng and Sangarapillai Lambotharan and Kanapathippillai Cumanan and Basil AsSadhan}, title = {Joint beamforming and admission control for cache-enabled Cloud-RAN with limited fronthaul capacity}, journal = {{IET} Signal Process.}, volume = {14}, number = {5}, pages = {278--287}, year = {2020}, url = {https://doi.org/10.1049/iet-spr.2019.0247}, doi = {10.1049/IET-SPR.2019.0247}, timestamp = {Mon, 13 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-spr/BsebsuZLCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/AsSadhanABKL20, author = {Basil AsSadhan and Abraham Alzoghaiby and Hamad Binsalleeh and Konstantinos G. Kyriakopoulos and Sangarapillai Lambotharan}, title = {Network anomaly detection using a cross-correlation-based long-range dependence analysis}, journal = {Int. J. Netw. Manag.}, volume = {30}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/nem.2129}, doi = {10.1002/NEM.2129}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AsSadhanABKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/MelhimJAA20, author = {Loai Kayed B. Melhim and Mahdi Jemmali and Basil AsSadhan and Hani Alquhayz}, title = {Network traffic reduction and representation}, journal = {Int. J. Sens. Networks}, volume = {33}, number = {4}, pages = {239--249}, year = {2020}, url = {https://doi.org/10.1504/IJSNET.2020.109193}, doi = {10.1504/IJSNET.2020.109193}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/MelhimJAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AsSadhanADAAABE20, author = {Basil AsSadhan and Rayan AlShaalan and Diab M. Diab and Abraham Alzoghaiby and Saleh AlShebeili and Jalal Al{-}Muhtadi and Hesham Bin{-}Abbas and Fathi E. Abd El{-}Samie}, title = {A robust anomaly detection method using a constant false alarm rate approach}, journal = {Multim. Tools Appl.}, volume = {79}, number = {17-18}, pages = {12727--12750}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-08653-8}, doi = {10.1007/S11042-020-08653-8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AsSadhanADAAABE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/KhanZLZAH20, author = {Amjad Saeed Khan and Xinruo Zhang and Sangarapillai Lambotharan and Gan Zheng and Basil AsSadhan and Lajos Hanzo}, title = {Machine Learning Aided Blockchain Assisted Framework for Wireless Networks}, journal = {{IEEE} Netw.}, volume = {34}, number = {5}, pages = {262--268}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.1900643}, doi = {10.1109/MNET.011.1900643}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/KhanZLZAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanRBZAL19, author = {Amjad Saeed Khan and Yogachandran Rahulamathavan and Bokamoso Basutli and Gan Zheng and Basil AsSadhan and Sangarapillai Lambotharan}, title = {Blockchain-Based Distributive Auction for Relay-Assisted Secure Communications}, journal = {{IEEE} Access}, volume = {7}, pages = {95555--95568}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2929136}, doi = {10.1109/ACCESS.2019.2929136}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanRBZAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhafirKLAABD19, author = {Ibrahim Ghafir and Konstantinos G. Kyriakopoulos and Sangarapillai Lambotharan and Francisco J. Aparicio{-}Navarro and Basil AsSadhan and Hamad Binsalleeh and Diab M. Diab}, title = {Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats}, journal = {{IEEE} Access}, volume = {7}, pages = {99508--99520}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2930200}, doi = {10.1109/ACCESS.2019.2930200}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GhafirKLAABD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/DiabABLKG19, author = {Diab M. Diab and Basil AsSadhan and Hamad Binsalleeh and Sangarapillai Lambotharan and Konstantinos G. Kyriakopoulos and Ibrahim Ghafir}, editor = {Meikang Qiu}, title = {Anomaly Detection Using Dynamic Time Warping}, booktitle = {2019 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3, 2019}, pages = {193--198}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSE/EUC.2019.00045}, doi = {10.1109/CSE/EUC.2019.00045}, timestamp = {Tue, 28 Jan 2020 15:18:52 +0100}, biburl = {https://dblp.org/rec/conf/cse/DiabABLKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icin/Aparicio-Navarro19, author = {Francisco J. Aparicio{-}Navarro and Timothy A. Chadza and Konstantinos G. Kyriakopoulos and Ibrahim Ghafir and Sangarapillai Lambotharan and Basil AsSadhan}, editor = {Alex Galis and Fabrice Guillemin and Rogier Noldus and Stefano Secci and Filip Idzikowski and M{\"{u}}ge Sayit}, title = {Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information}, booktitle = {22nd Conference on Innovation in Clouds, Internet and Networks and Workshops, {ICIN} 2019, Paris, France, February 19-21, 2019}, pages = {188--194}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIN.2019.8685841}, doi = {10.1109/ICIN.2019.8685841}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icin/Aparicio-Navarro19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/ZhangYLKGA19, author = {Yuan Zhang and Qinghai Yang and Sangarapillai Lambotharan and Konstantinos G. Kyriakopoulos and Ibrahim Ghafir and Basil AsSadhan}, title = {Anomaly-Based Network Intrusion Detection Using {SVM}}, booktitle = {11th International Conference on Wireless Communications and Signal Processing, {WCSP} 2019, Xi'an, China, October 23-25, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WCSP.2019.8927907}, doi = {10.1109/WCSP.2019.8927907}, timestamp = {Tue, 17 Dec 2019 14:06:26 +0100}, biburl = {https://dblp.org/rec/conf/wcsp/ZhangYLKGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhafirKALAB18, author = {Ibrahim Ghafir and Konstantinos G. Kyriakopoulos and Francisco J. Aparicio{-}Navarro and Sangarapillai Lambotharan and Basil AsSadhan and Hamad Binsalleeh}, title = {A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection}, journal = {{IEEE} Access}, volume = {6}, pages = {40008--40023}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2855078}, doi = {10.1109/ACCESS.2018.2855078}, timestamp = {Wed, 15 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GhafirKALAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/AsSadhanBAA18, author = {Basil AsSadhan and Abdulmuneem Bashaiwth and Jalal Al{-}Muhtadi and Saleh AlShebeili}, title = {Analysis of P2P, {IRC} and {HTTP} traffic for botnets detection}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {5}, pages = {848--861}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0586-0}, doi = {10.1007/S12083-017-0586-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/AsSadhanBAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AsSadhanZAA17, author = {Basil AsSadhan and Khan Zeb and Jalal Al{-}Muhtadi and Saleh AlShebeili}, title = {Anomaly Detection Based on {LRD} Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using {SOSS} and {FARIMA} Models}, journal = {{IEEE} Access}, volume = {5}, pages = {13501--13519}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2689001}, doi = {10.1109/ACCESS.2017.2689001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AsSadhanZAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GillaniAA16, author = {Fida Gillani and Ehab Al{-}Shaer and Basil AsSadhan}, title = {Economic metric to improve spam detectors}, journal = {J. Netw. Comput. Appl.}, volume = {65}, pages = {131--143}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.02.019}, doi = {10.1016/J.JNCA.2016.02.019}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GillaniAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AsSadhanML09, author = {Basil AsSadhan and Jos{\'{e}} M. F. Moura and David E. Lapsley}, title = {Periodic Behavior in Botnet Command and Control Channels Traffic}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5426172}, doi = {10.1109/GLOCOM.2009.5426172}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AsSadhanML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/AsSadhanMLJS09, author = {Basil AsSadhan and Jos{\'{e}} M. F. Moura and David E. Lapsley and Christine E. Jones and W. Timothy Strayer}, title = {Detecting Botnets Using Command and Control Traffic}, booktitle = {Proceedings of The Eighth {IEEE} International Symposium on Networking Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge, Massachusetts, {USA}}, pages = {156--162}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCA.2009.56}, doi = {10.1109/NCA.2009.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/AsSadhanMLJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/AsSadhanKMW08, author = {Basil AsSadhan and Hyong Kim and Jos{\'{e}} M. F. Moura and Xiaohui Wang}, title = {Network traffic behavior analysis by decomposition into control and data planes}, booktitle = {22nd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008}, pages = {1--8}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IPDPS.2008.4536559}, doi = {10.1109/IPDPS.2008.4536559}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/AsSadhanKMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drr/AsSadhanBSN06, author = {Basil AsSadhan and Ziad Al Bawab and Ammar El Seed and Mohammed Noamany}, editor = {Kazem Taghva and Xiaofan Lin}, title = {Comparative evaluation of different classifiers for robust distorted-character recognition}, booktitle = {Document Recognition and Retrieval XIII, San Jose, California, USA, January 15, 2006}, series = {{SPIE} Proceedings}, volume = {6067}, pages = {60670O}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.643156}, doi = {10.1117/12.643156}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drr/AsSadhanBSN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.