Basil AsSadhan

Orcid: 0000-0002-8074-0433

According to our database1, Basil AsSadhan authored at least 26 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Explanation of LSTM-Based DDoS Attack Classification Using SHAP With Pattern Dependency.
IEEE Access, 2024

2023
Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices.
IEEE Internet Things J., February, 2023

Bayesian Optimization-Driven Adversarial Poisoning Attacks Against Distributed Learning.
IEEE Access, 2023

2021
Second order Kalman filtering channel estimation and machine learning methods for spectrum sensing in cognitive radio networks.
Wirel. Networks, 2021

Countermeasures Against Adversarial Examples in Radio Signal Classification.
IEEE Wirel. Commun. Lett., 2021

Denial of service detection using dynamic time warping.
Int. J. Netw. Manag., 2021

Detecting Network Attacks Exhibiting Irregular Periodic Behavior.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
Machine Learning Aided Blockchain Assisted Framework for Wireless Networks.
IEEE Netw., 2020

A robust anomaly detection method using a constant false alarm rate approach.
Multim. Tools Appl., 2020

Network traffic reduction and representation.
Int. J. Sens. Networks, 2020

Network anomaly detection using a cross-correlation-based long-range dependence analysis.
Int. J. Netw. Manag., 2020

Joint beamforming and admission control for cache-enabled Cloud-RAN with limited fronthaul capacity.
IET Signal Process., 2020

Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms.
IEEE Access, 2020

2019
Blockchain-Based Distributive Auction for Relay-Assisted Secure Communications.
IEEE Access, 2019

Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats.
IEEE Access, 2019

Anomaly-Based Network Intrusion Detection Using SVM.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

Anomaly Detection Using Dynamic Time Warping.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
Analysis of P2P, IRC and HTTP traffic for botnets detection.
Peer-to-Peer Netw. Appl., 2018

A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection.
IEEE Access, 2018

2017
Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models.
IEEE Access, 2017

2016
Economic metric to improve spam detectors.
J. Netw. Comput. Appl., 2016

2009
Detecting Botnets Using Command and Control Traffic.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Periodic Behavior in Botnet Command and Control Channels Traffic.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Network traffic behavior analysis by decomposition into control and data planes.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2006
Comparative evaluation of different classifiers for robust distorted-character recognition.
Proceedings of the Document Recognition and Retrieval XIII, 2006


  Loading...