An Explanation of the LSTM Model Used for DDoS Attacks Classification
Bashaiwth, Abdulmuneem, Binsalleeh, Hamad, AsSadhan, Basil
Published in Applied sciences (01.08.2023)
Published in Applied sciences (01.08.2023)
Get full text
Journal Article
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats
Ghafir, Ibrahim, Kyriakopoulos, Konstantinos G., Lambotharan, Sangarapillai, Aparicio-Navarro, Francisco J., Assadhan, Basil, Binsalleeh, Hamad, Diab, Diab M.
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
Ghafir, Ibrahim, Kyriakopoulos, Konstantinos G., Aparicio-Navarro, Francisco J., Lambotharan, Sangarapillai, Assadhan, Basil, Binsalleeh, Hamad
Published in IEEE access (01.01.2018)
Published in IEEE access (01.01.2018)
Get full text
Journal Article
A robust anomaly detection method using a constant false alarm rate approach
AsSadhan, Basil, AlShaalan, Rayan, Diab, Diab M., Alzoghaiby, Abraham, Alshebeili, Saleh, Al-Muhtadi, Jalal, Bin-Abbas, Hesham, El-Samie, Fathi Abd
Published in Multimedia tools and applications (01.05.2020)
Published in Multimedia tools and applications (01.05.2020)
Get full text
Journal Article
Countermeasures Against Adversarial Examples in Radio Signal Classification
Zhang, Lu, Lambotharan, Sangarapillai, Zheng, Gan, AsSadhan, Basil, Roli, Fabio
Published in IEEE wireless communications letters (01.08.2021)
Published in IEEE wireless communications letters (01.08.2021)
Get full text
Journal Article
Machine Learning Aided Blockchain Assisted Framework for Wireless Networks
Khan, Amjad Saeed, Zhang, Xinruo, Lambotharan, Sangarapillai, Zheng, Gan, AsSadhan, Basil, Hanzo, Lajos
Published in IEEE network (01.09.2020)
Published in IEEE network (01.09.2020)
Get full text
Journal Article
Economic metric to improve spam detectors
Gillani, Fida, Al-Shaer, Ehab, AsSadhan, Basil
Published in Journal of network and computer applications (01.04.2016)
Published in Journal of network and computer applications (01.04.2016)
Get full text
Journal Article
Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis
AsSadhan, Basil, Alzoghaiby, Abraham, Binsalleeh, Hamad, Kyriakopoulos, Konstantinos G., Lambotharan, Sangarapillai
Published in International journal of network management (01.11.2020)
Published in International journal of network management (01.11.2020)
Get full text
Journal Article
Analysis of P2P, IRC and HTTP traffic for botnets detection
AsSadhan, Basil, Bashaiwth, Abdulmuneem, Al-Muhtadi, Jalal, Alshebeili, Saleh
Published in Peer-to-peer networking and applications (01.09.2018)
Published in Peer-to-peer networking and applications (01.09.2018)
Get full text
Journal Article