Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Basil Assadhan"'
Publikováno v:
IEEE Access, Vol 12, Pp 90707-90725 (2024)
DDoS attacks pose serious threats to the availability and reliability of computer networks. With the increasing complexity of DDoS attacks, the accurate detection and classification of these attacks is essential to ensure the protection of network sy
Externí odkaz:
https://doaj.org/article/c75848b36b014d29898064a374edb4cb
Publikováno v:
IEEE Access, Vol 11, Pp 86214-86226 (2023)
Metaverse is envisioned to be the next-generation human-centric Internet which can offer an immersive experience for users with a broad application in healthcare, education, entertainment, and industries. These applications require the analysis of ma
Externí odkaz:
https://doaj.org/article/8eec3519dbc34547b2997e3cf1a4196d
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 8820 (2023)
With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding how machine learning models work is not trivial. This is particularly true for complex and no
Externí odkaz:
https://doaj.org/article/aebf5f15763a414d8c618661e3b82135
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 4852 (2023)
Naïve Bayes (NB) classification performance degrades if the conditional independence assumption is not satisfied or if the conditional probability estimate is not realistic due to the attributes of correlation and scarce data, respectively. Many wor
Externí odkaz:
https://doaj.org/article/601adb1dc0cc4665aa2086c855aa6e46
Autor:
Amjad Saeed Khan, Gaojie Chen, Yogachandran Rahulamathavan, Gan Zheng, Basil Assadhan, Sangarapillai Lambotharan
Publikováno v:
IEEE Access, Vol 8, Pp 118219-118234 (2020)
The UAV is emerging as one of the greatest technology developments for rapid network coverage provisioning at affordable cost. The aim of this paper is to outsource network coverage of a specific area according to a desired quality of service require
Externí odkaz:
https://doaj.org/article/e5f545ddc200465b88a83cf0670ba061
Autor:
Amjad Saeed Khan, Yogachandran Rahulamathavan, Bokamoso Basutli, Gan Zheng, Basil Assadhan, Sangarapillai Lambotharan
Publikováno v:
IEEE Access, Vol 7, Pp 95555-95568 (2019)
Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative relaying has emerged as a robust solution for achieving PLS due to multipath diversity and rel
Externí odkaz:
https://doaj.org/article/97a1020ac3064a84b35dfa47236cb6e2
Autor:
Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan, Francisco J. Aparicio-Navarro, Basil Assadhan, Hamad Binsalleeh, Diab M. Diab
Publikováno v:
IEEE Access, Vol 7, Pp 99508-99520 (2019)
Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced persistent threats (APTs) have emerged as a new and complex version of multi-stage attacks (MSAs), t
Externí odkaz:
https://doaj.org/article/0d32df2849f14f7eb4071f7aae4946b3
Autor:
Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil Assadhan, Hamad Binsalleeh
Publikováno v:
IEEE Access, Vol 6, Pp 40008-40023 (2018)
The broadcast nature of wireless local area networks has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication, and rogue access point attacks. The implementation of n
Externí odkaz:
https://doaj.org/article/8aaa4c29ec82489aa08b74ff74c0dcfe
Publikováno v:
IEEE Access, Vol 5, Pp 13501-13519 (2017)
The detection of anomalies in network traffic, such as low volume attacks and abnormalities, has become a pressing problem in today's large volume of Internet traffic. To this end, various anomaly detection techniques have been developed, including t
Externí odkaz:
https://doaj.org/article/ddae40614d1f4c0a820e0e1efad6be13
An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic
Autor:
Basil AsSadhan, José M.F. Moura
Publikováno v:
Journal of Advanced Research, Vol 5, Iss 4, Pp 435-448 (2014)
Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communi
Externí odkaz:
https://doaj.org/article/dbee6aa7d7bb4f60a4718eea354c72fa