BibTeX records: Basil AsSadhan

download as .bib file

@article{DBLP:journals/access/AristodemouLLA23,
  author       = {Marios Aristodemou and
                  Xiaolan Liu and
                  Sangarapillai Lambotharan and
                  Basil AsSadhan},
  title        = {Bayesian Optimization-Driven Adversarial Poisoning Attacks Against
                  Distributed Learning},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {86214--86226},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3304541},
  doi          = {10.1109/ACCESS.2023.3304541},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AristodemouLLA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangLZLAR23,
  author       = {Lu Zhang and
                  Sangarapillai Lambotharan and
                  Gan Zheng and
                  Guisheng Liao and
                  Basil AsSadhan and
                  Fabio Roli},
  title        = {Attention-Based Adversarial Robust Distillation in Radio Signal Classifications
                  for Low-Power IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {3},
  pages        = {2646--2657},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3215188},
  doi          = {10.1109/JIOT.2022.3215188},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangLZLAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DiabABLKG21,
  author       = {Diab M. Diab and
                  Basil AsSadhan and
                  Hamad Binsalleeh and
                  Sangarapillai Lambotharan and
                  Konstantinos G. Kyriakopoulos and
                  Ibrahim Ghafir},
  title        = {Denial of service detection using dynamic time warping},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2159},
  doi          = {10.1002/NEM.2159},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/DiabABLKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/ZhangLZAR21,
  author       = {Lu Zhang and
                  Sangarapillai Lambotharan and
                  Gan Zheng and
                  Basil AsSadhan and
                  Fabio Roli},
  title        = {Countermeasures Against Adversarial Examples in Radio Signal Classification},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {10},
  number       = {8},
  pages        = {1830--1834},
  year         = {2021},
  url          = {https://doi.org/10.1109/LWC.2021.3083099},
  doi          = {10.1109/LWC.2021.3083099},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/ZhangLZAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AweBLA21,
  author       = {Olusegun Peter Awe and
                  Daniel Adebowale Babatunde and
                  Sangarapillai Lambotharan and
                  Basil AsSadhan},
  title        = {Second order Kalman filtering channel estimation and machine learning
                  methods for spectrum sensing in cognitive radio networks},
  journal      = {Wirel. Networks},
  volume       = {27},
  number       = {5},
  pages        = {3273--3286},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11276-021-02627-w},
  doi          = {10.1007/S11276-021-02627-W},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/AweBLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/BashaiwthA21,
  author       = {Abdulmuneem Bashaiwth and
                  Basil AsSadhan},
  title        = {Detecting Network Attacks Exhibiting Irregular Periodic Behavior},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2021, Dubai, United Arab Emirates, October 31 - November 2,
                  2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISNCC52172.2021.9615739},
  doi          = {10.1109/ISNCC52172.2021.9615739},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isncc/BashaiwthA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanCRZAL20,
  author       = {Amjad Saeed Khan and
                  Gaojie Chen and
                  Yogachandran Rahulamathavan and
                  Gan Zheng and
                  Basil AsSadhan and
                  Sangarapillai Lambotharan},
  title        = {Trusted {UAV} Network Coverage Using Blockchain, Machine Learning,
                  and Auction Mechanisms},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {118219--118234},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3003894},
  doi          = {10.1109/ACCESS.2020.3003894},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanCRZAL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-spr/BsebsuZLCA20,
  author       = {Ashraf Bsebsu and
                  Gan Zheng and
                  Sangarapillai Lambotharan and
                  Kanapathippillai Cumanan and
                  Basil AsSadhan},
  title        = {Joint beamforming and admission control for cache-enabled Cloud-RAN
                  with limited fronthaul capacity},
  journal      = {{IET} Signal Process.},
  volume       = {14},
  number       = {5},
  pages        = {278--287},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-spr.2019.0247},
  doi          = {10.1049/IET-SPR.2019.0247},
  timestamp    = {Mon, 13 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-spr/BsebsuZLCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AsSadhanABKL20,
  author       = {Basil AsSadhan and
                  Abraham Alzoghaiby and
                  Hamad Binsalleeh and
                  Konstantinos G. Kyriakopoulos and
                  Sangarapillai Lambotharan},
  title        = {Network anomaly detection using a cross-correlation-based long-range
                  dependence analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2129},
  doi          = {10.1002/NEM.2129},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AsSadhanABKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/MelhimJAA20,
  author       = {Loai Kayed B. Melhim and
                  Mahdi Jemmali and
                  Basil AsSadhan and
                  Hani Alquhayz},
  title        = {Network traffic reduction and representation},
  journal      = {Int. J. Sens. Networks},
  volume       = {33},
  number       = {4},
  pages        = {239--249},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSNET.2020.109193},
  doi          = {10.1504/IJSNET.2020.109193},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/MelhimJAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AsSadhanADAAABE20,
  author       = {Basil AsSadhan and
                  Rayan AlShaalan and
                  Diab M. Diab and
                  Abraham Alzoghaiby and
                  Saleh AlShebeili and
                  Jalal Al{-}Muhtadi and
                  Hesham Bin{-}Abbas and
                  Fathi E. Abd El{-}Samie},
  title        = {A robust anomaly detection method using a constant false alarm rate
                  approach},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {17-18},
  pages        = {12727--12750},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-08653-8},
  doi          = {10.1007/S11042-020-08653-8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AsSadhanADAAABE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/KhanZLZAH20,
  author       = {Amjad Saeed Khan and
                  Xinruo Zhang and
                  Sangarapillai Lambotharan and
                  Gan Zheng and
                  Basil AsSadhan and
                  Lajos Hanzo},
  title        = {Machine Learning Aided Blockchain Assisted Framework for Wireless
                  Networks},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {5},
  pages        = {262--268},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.1900643},
  doi          = {10.1109/MNET.011.1900643},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/KhanZLZAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanRBZAL19,
  author       = {Amjad Saeed Khan and
                  Yogachandran Rahulamathavan and
                  Bokamoso Basutli and
                  Gan Zheng and
                  Basil AsSadhan and
                  Sangarapillai Lambotharan},
  title        = {Blockchain-Based Distributive Auction for Relay-Assisted Secure Communications},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {95555--95568},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2929136},
  doi          = {10.1109/ACCESS.2019.2929136},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanRBZAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhafirKLAABD19,
  author       = {Ibrahim Ghafir and
                  Konstantinos G. Kyriakopoulos and
                  Sangarapillai Lambotharan and
                  Francisco J. Aparicio{-}Navarro and
                  Basil AsSadhan and
                  Hamad Binsalleeh and
                  Diab M. Diab},
  title        = {Hidden Markov Models and Alert Correlations for the Prediction of
                  Advanced Persistent Threats},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {99508--99520},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2930200},
  doi          = {10.1109/ACCESS.2019.2930200},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GhafirKLAABD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/DiabABLKG19,
  author       = {Diab M. Diab and
                  Basil AsSadhan and
                  Hamad Binsalleeh and
                  Sangarapillai Lambotharan and
                  Konstantinos G. Kyriakopoulos and
                  Ibrahim Ghafir},
  editor       = {Meikang Qiu},
  title        = {Anomaly Detection Using Dynamic Time Warping},
  booktitle    = {2019 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3,
                  2019},
  pages        = {193--198},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSE/EUC.2019.00045},
  doi          = {10.1109/CSE/EUC.2019.00045},
  timestamp    = {Tue, 28 Jan 2020 15:18:52 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/DiabABLKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icin/Aparicio-Navarro19,
  author       = {Francisco J. Aparicio{-}Navarro and
                  Timothy A. Chadza and
                  Konstantinos G. Kyriakopoulos and
                  Ibrahim Ghafir and
                  Sangarapillai Lambotharan and
                  Basil AsSadhan},
  editor       = {Alex Galis and
                  Fabrice Guillemin and
                  Rogier Noldus and
                  Stefano Secci and
                  Filip Idzikowski and
                  M{\"{u}}ge Sayit},
  title        = {Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual
                  Information},
  booktitle    = {22nd Conference on Innovation in Clouds, Internet and Networks and
                  Workshops, {ICIN} 2019, Paris, France, February 19-21, 2019},
  pages        = {188--194},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICIN.2019.8685841},
  doi          = {10.1109/ICIN.2019.8685841},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icin/Aparicio-Navarro19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/ZhangYLKGA19,
  author       = {Yuan Zhang and
                  Qinghai Yang and
                  Sangarapillai Lambotharan and
                  Konstantinos G. Kyriakopoulos and
                  Ibrahim Ghafir and
                  Basil AsSadhan},
  title        = {Anomaly-Based Network Intrusion Detection Using {SVM}},
  booktitle    = {11th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2019, Xi'an, China, October 23-25, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WCSP.2019.8927907},
  doi          = {10.1109/WCSP.2019.8927907},
  timestamp    = {Tue, 17 Dec 2019 14:06:26 +0100},
  biburl       = {https://dblp.org/rec/conf/wcsp/ZhangYLKGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhafirKALAB18,
  author       = {Ibrahim Ghafir and
                  Konstantinos G. Kyriakopoulos and
                  Francisco J. Aparicio{-}Navarro and
                  Sangarapillai Lambotharan and
                  Basil AsSadhan and
                  Hamad Binsalleeh},
  title        = {A Basic Probability Assignment Methodology for Unsupervised Wireless
                  Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {40008--40023},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2855078},
  doi          = {10.1109/ACCESS.2018.2855078},
  timestamp    = {Wed, 15 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GhafirKALAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/AsSadhanBAA18,
  author       = {Basil AsSadhan and
                  Abdulmuneem Bashaiwth and
                  Jalal Al{-}Muhtadi and
                  Saleh AlShebeili},
  title        = {Analysis of P2P, {IRC} and {HTTP} traffic for botnets detection},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {5},
  pages        = {848--861},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0586-0},
  doi          = {10.1007/S12083-017-0586-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/AsSadhanBAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AsSadhanZAA17,
  author       = {Basil AsSadhan and
                  Khan Zeb and
                  Jalal Al{-}Muhtadi and
                  Saleh AlShebeili},
  title        = {Anomaly Detection Based on {LRD} Behavior Analysis of Decomposed Control
                  and Data Planes Network Traffic Using {SOSS} and {FARIMA} Models},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {13501--13519},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2689001},
  doi          = {10.1109/ACCESS.2017.2689001},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AsSadhanZAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GillaniAA16,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer and
                  Basil AsSadhan},
  title        = {Economic metric to improve spam detectors},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {65},
  pages        = {131--143},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.02.019},
  doi          = {10.1016/J.JNCA.2016.02.019},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GillaniAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AsSadhanML09,
  author       = {Basil AsSadhan and
                  Jos{\'{e}} M. F. Moura and
                  David E. Lapsley},
  title        = {Periodic Behavior in Botnet Command and Control Channels Traffic},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5426172},
  doi          = {10.1109/GLOCOM.2009.5426172},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AsSadhanML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/AsSadhanMLJS09,
  author       = {Basil AsSadhan and
                  Jos{\'{e}} M. F. Moura and
                  David E. Lapsley and
                  Christine E. Jones and
                  W. Timothy Strayer},
  title        = {Detecting Botnets Using Command and Control Traffic},
  booktitle    = {Proceedings of The Eighth {IEEE} International Symposium on Networking
                  Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
                  Massachusetts, {USA}},
  pages        = {156--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCA.2009.56},
  doi          = {10.1109/NCA.2009.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/AsSadhanMLJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/AsSadhanKMW08,
  author       = {Basil AsSadhan and
                  Hyong Kim and
                  Jos{\'{e}} M. F. Moura and
                  Xiaohui Wang},
  title        = {Network traffic behavior analysis by decomposition into control and
                  data planes},
  booktitle    = {22nd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPDPS.2008.4536559},
  doi          = {10.1109/IPDPS.2008.4536559},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/AsSadhanKMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drr/AsSadhanBSN06,
  author       = {Basil AsSadhan and
                  Ziad Al Bawab and
                  Ammar El Seed and
                  Mohammed Noamany},
  editor       = {Kazem Taghva and
                  Xiaofan Lin},
  title        = {Comparative evaluation of different classifiers for robust distorted-character
                  recognition},
  booktitle    = {Document Recognition and Retrieval XIII, San Jose, California, USA,
                  January 15, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6067},
  pages        = {60670O},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.643156},
  doi          = {10.1117/12.643156},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drr/AsSadhanBSN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics