Hidden Markov models and alert correlations for the prediction of advanced persistent threats I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ... IEEE Access 7, 99508-99520, 2019 | 98 | 2019 |
Detecting botnets using command and control traffic B AsSadhan, JMF Moura, D Lapsley, C Jones, WT Strayer 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 87 | 2009 |
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic B AsSadhan, JMF Moura Journal of advanced research 5 (4), 435-448, 2014 | 60 | 2014 |
Periodic behavior in botnet command and control channels traffic B AsSadhan, JMF Moura, D Lapsley GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 53 | 2009 |
Anomaly detection using dynamic time warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 52 | 2019 |
A basic probability assignment methodology for unsupervised wireless intrusion detection I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ... IEEE Access 6, 40008-40023, 2018 | 39 | 2018 |
Anomaly-based network intrusion detection using SVM Y Zhang, Q Yang, S Lambotharan, K Kyriakopoulos, I Ghafir, B AsSadhan 2019 11th International conference on wireless communications and signal …, 2019 | 38 | 2019 |
Trusted UAV network coverage using blockchain, machine learning, and auction mechanisms AS Khan, G Chen, Y Rahulamathavan, G Zheng, B Assadhan, ... IEEE access 8, 118219-118234, 2020 | 36 | 2020 |
Anomaly detection based on LRD behavior analysis of decomposed control and data planes network traffic using SOSS and FARIMA models B AsSadhan, K Zeb, J Al-Muhtadi, S Alshebeili IEEE Access 5, 13501-13519, 2017 | 33 | 2017 |
Blockchain-based distributive auction for relay-assisted secure communications AS Khan, Y Rahulamathavan, B Basutli, G Zheng, B AsSadhan, ... IEEE Access 7, 95555-95568, 2019 | 27 | 2019 |
Countermeasures against adversarial examples in radio signal classification L Zhang, S Lambotharan, G Zheng, B AsSadhan, F Roli IEEE Wireless Communications Letters 10 (8), 1830-1834, 2021 | 26 | 2021 |
Analysis of P2P, IRC and HTTP traffic for botnets detection B AsSadhan, A Bashaiwth, J Al-Muhtadi, S Alshebeili Peer-to-Peer Networking and Applications 11, 848-861, 2018 | 25 | 2018 |
Network traffic behavior analysis by decomposition into control and data planes B AsSadhan, H Kim, JMF Moura, X Wang 2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008 | 22 | 2008 |
Addressing multi-stage attacks using expert knowledge and contextual information FJ Aparicio-Navarro, TA Chadza, KG Kyriakopoulos, I Ghafir, ... 2019 22nd Conference on Innovation in Clouds, Internet and Networks and …, 2019 | 20 | 2019 |
Denial of service detection using dynamic time warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... International Journal of Network Management 31 (6), e2159, 2021 | 14 | 2021 |
An explanation of the LSTM model used for DDoS attacks classification A Bashaiwth, H Binsalleeh, B AsSadhan Applied Sciences 13 (15), 8820, 2023 | 13 | 2023 |
Attention-based adversarial robust distillation in radio signal classifications for low-power IoT devices L Zhang, S Lambotharan, G Zheng, G Liao, B AsSadhan, F Roli IEEE Internet of Things Journal 10 (3), 2646-2657, 2022 | 13 | 2022 |
Network traffic reduction and representation LKB Melhim, M Jemmali, B AsSadhan, H Alquhayz International Journal of Sensor Networks 33 (4), 239-249, 2020 | 12 | 2020 |
Economic metric to improve spam detectors F Gillani, E Al-Shaer, B AsSadhan Journal of Network and Computer Applications 65, 131-143, 2016 | 12 | 2016 |
Machine learning aided blockchain assisted framework for wireless networks AS Khan, X Zhang, S Lambotharan, G Zheng, B AsSadhan, L Hanzo IEEE Network 34 (5), 262-268, 2020 | 11 | 2020 |