Detecting botnets using command and control traffic B AsSadhan, JMF Moura, D Lapsley, C Jones, WT Strayer 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 86 | 2009 |
Hidden Markov models and alert correlations for the prediction of advanced persistent threats I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ... IEEE Access 7, 99508-99520, 2019 | 84 | 2019 |
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic B AsSadhan, JMF Moura Journal of advanced research 5 (4), 435-448, 2014 | 60 | 2014 |
Periodic behavior in botnet command and control channels traffic B AsSadhan, JMF Moura, D Lapsley GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 53 | 2009 |
Anomaly detection using dynamic time warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 45 | 2019 |
A basic probability assignment methodology for unsupervised wireless intrusion detection I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ... IEEE Access 6, 40008-40023, 2018 | 37 | 2018 |
Trusted UAV network coverage using blockchain, machine learning, and auction mechanisms AS Khan, G Chen, Y Rahulamathavan, G Zheng, B Assadhan, ... IEEE access 8, 118219-118234, 2020 | 35 | 2020 |
Anomaly detection based on LRD behavior analysis of decomposed control and data planes network traffic using SOSS and FARIMA models B AsSadhan, K Zeb, J Al-Muhtadi, S Alshebeili IEEE Access 5, 13501-13519, 2017 | 30 | 2017 |
Anomaly-based network intrusion detection using SVM Y Zhang, Q Yang, S Lambotharan, K Kyriakopoulos, I Ghafir, B AsSadhan 2019 11th International conference on wireless communications and signal …, 2019 | 29 | 2019 |
Analysis of P2P, IRC and HTTP traffic for botnets detection B AsSadhan, A Bashaiwth, J Al-Muhtadi, S Alshebeili Peer-to-Peer Networking and Applications 11, 848-861, 2018 | 25 | 2018 |
Blockchain-based distributive auction for relay-assisted secure communications AS Khan, Y Rahulamathavan, B Basutli, G Zheng, B AsSadhan, ... IEEE Access 7, 95555-95568, 2019 | 24 | 2019 |
Countermeasures against adversarial examples in radio signal classification L Zhang, S Lambotharan, G Zheng, B AsSadhan, F Roli IEEE Wireless Communications Letters 10 (8), 1830-1834, 2021 | 22 | 2021 |
Network traffic behavior analysis by decomposition into control and data planes B AsSadhan, H Kim, JMF Moura, X Wang 2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008 | 21 | 2008 |
Addressing multi-stage attacks using expert knowledge and contextual information FJ Aparicio-Navarro, TA Chadza, KG Kyriakopoulos, I Ghafir, ... 2019 22nd Conference on Innovation in Clouds, Internet and Networks and …, 2019 | 14 | 2019 |
Network traffic reduction and representation LKB Melhim, M Jemmali, B AsSadhan, H Alquhayz International Journal of Sensor Networks 33 (4), 239-249, 2020 | 13 | 2020 |
Economic metric to improve spam detectors F Gillani, E Al-Shaer, B AsSadhan Journal of Network and Computer Applications 65, 131-143, 2016 | 12 | 2016 |
Long-range dependence analysis of control and data planes network traffic B AsSadhan, H Kim, JMF Moura Saudi International Innovation Conference (SIIC), Leeds, UK, 2008 | 11 | 2008 |
Denial of service detection using dynamic time warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... International Journal of Network Management 31 (6), e2159, 2021 | 10 | 2021 |
Machine learning aided blockchain assisted framework for wireless networks AS Khan, X Zhang, S Lambotharan, G Zheng, B AsSadhan, L Hanzo IEEE Network 34 (5), 262-268, 2020 | 10 | 2020 |
Volume based anomaly detection using LRD analysis of decomposed network traffic K Zeb, B AsSadhan, J Al-Muhtadi, S Alshebeili, A Bashaiwth Fourth edition of the International Conference on the Innovative Computing …, 2014 | 10 | 2014 |