Follow
Basil AsSadhan
Basil AsSadhan
Associate Prof. of Electrical Engineering, King Saud Univ.
Verified email at ksu.edu.sa - Homepage
Title
Cited by
Cited by
Year
Detecting botnets using command and control traffic
B AsSadhan, JMF Moura, D Lapsley, C Jones, WT Strayer
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
862009
Hidden Markov models and alert correlations for the prediction of advanced persistent threats
I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ...
IEEE Access 7, 99508-99520, 2019
722019
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
B AsSadhan, JMF Moura
Journal of advanced research 5 (4), 435-448, 2014
622014
Periodic behavior in botnet command and control channels traffic
B AsSadhan, JMF Moura, D Lapsley
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
532009
A basic probability assignment methodology for unsupervised wireless intrusion detection
I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ...
IEEE Access 6, 40008-40023, 2018
322018
Anomaly detection using dynamic time warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
2019 IEEE International Conference on Computational Science and Engineering …, 2019
302019
Anomaly detection based on LRD behavior analysis of decomposed control and data planes network traffic using SOSS and FARIMA models
B AsSadhan, K Zeb, J Al-Muhtadi, S Alshebeili
IEEE Access 5, 13501-13519, 2017
292017
Trusted UAV network coverage using blockchain, machine learning, and auction mechanisms
AS Khan, G Chen, Y Rahulamathavan, G Zheng, B Assadhan, ...
IEEE Access 8, 118219-118234, 2020
282020
Analysis of P2P, IRC and HTTP traffic for botnets detection
B AsSadhan, A Bashaiwth, J Al-Muhtadi, S Alshebeili
Peer-to-Peer Networking and Applications 11, 848-861, 2018
252018
Blockchain-based distributive auction for relay-assisted secure communications
AS Khan, Y Rahulamathavan, B Basutli, G Zheng, B AsSadhan, ...
IEEE Access 7, 95555-95568, 2019
242019
Network traffic behavior analysis by decomposition into control and data planes
B AsSadhan, H Kim, JMF Moura, X Wang
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008
222008
Countermeasures against adversarial examples in radio signal classification
L Zhang, S Lambotharan, G Zheng, B AsSadhan, F Roli
IEEE Wireless Communications Letters 10 (8), 1830-1834, 2021
192021
Anomaly-based network intrusion detection using SVM
Y Zhang, Q Yang, S Lambotharan, K Kyriakopoulos, I Ghafir, B AsSadhan
2019 11th International conference on wireless communications and signal …, 2019
192019
Economic metric to improve spam detectors
F Gillani, E Al-Shaer, B AsSadhan
Journal of Network and Computer Applications 65, 131-143, 2016
122016
Network traffic reduction and representation
LKB Melhim, M Jemmali, B AsSadhan, H Alquhayz
International Journal of Sensor Networks 33 (4), 239-249, 2020
112020
Long-range dependence analysis of control and data planes network traffic
B AsSadhan, H Kim, JMF Moura
Saudi International Innovation Conference (SIIC), Leeds, UK, 2008
112008
Addressing multi-stage attacks using expert knowledge and contextual information
FJ Aparicio-Navarro, TA Chadza, KG Kyriakopoulos, I Ghafir, ...
2019 22nd Conference on Innovation in Clouds, Internet and Networks and …, 2019
102019
Volume based anomaly detection using LRD analysis of decomposed network traffic
K Zeb, B AsSadhan, J Al-Muhtadi, S Alshebeili, A Bashaiwth
Fourth edition of the International Conference on the Innovative Computing …, 2014
102014
Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic
K Zeb, B AsSadhan, J Al-Muhtadi, S Alshebeili
2016 7th International Conference on Information and communication Systems …, 2016
82016
Denial of service detection using dynamic time warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
International Journal of Network Management 31 (6), e2159, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20