PUBLICATIONS

Books

  1. باسل السدحان، يوميات باحث في مهد الإنترنت ... تجربة طالب سعودي في الشركة التي أنشأت الإنترنت، دار مدارك للنشر – دبي – الإمارات العربية المتحدة، 2013.

Journals

  1. Loai K. B. Melhim, Mahdi Jemmali, and Basil AsSadhan, “Network Traffic Reduction and Representation,” accepted International Journal of Sensor Networks 2020.
  2. Amjad Saeed Khan, Xinruo Zhang, Sangarapillai Lambotharan, Gan Zheng, Basil AsSadhan, Lajos Hanzo, “Machine Learning Aided Blockchain Assisted Framework for Wireless Networks,” accepted IEEE Network Magazine, 2020.
  3. Basil AsSadhan, Abraham Alzoghaiby, Hamad BinSalleeh, Konstantinos G. Kyriakopoulos, and Sangarapillai Lambotharan, “Network Anomaly Detection Using a Cross-Correlation Based LRD Analysis,” accepted International Journal of Network Management, 2020.
  4. Ashraf Bsebsu, Gan Zheng, Sangarapillai Lambotharan, Kanapathippillai Cumanan, and Basil AsSadhan, “Joint Beamforming and Admission control for Cache-Enabled Cloud-RAN with Limited Fronthaul Capacity,” IET Signal Processing, vol. 14, no. 5, pp. 278-287, July 2020.
  5. Amjad Saeed Khan, Gaojie Chen, Yogachandran Rahulamathavan, Gan Zheng, Basil AsSadhan, and Sangarapillai Lambotharan, “Trusted UAV Network Coverage using Blockchain, Machine Learning and Auction Mechanisms,” IEEE Access , vol 8, pp. 118219-118234, 2020.
  6. Basil AsSadhan, Rayan AlShaalan, Abraham Alzoghaiby, Diab M. Diab, Saleh Alshebeili, Jalal Al-Muhtadi, Hesham Bin-Abbas, and Fathi Sayed, “A Robust Anomaly Detection Technique Using A Constant False Alarm Rate Approach,” Multimedia Tools and Applications, vol. 79, no. 17-18, pp 12727-12750, May 2020.
  7. Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan, Francisco J. Aparicio-Navarro, Basil AsSadhan, Hamad BinSalleeh, and Diab M. Diab, “Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats,” IEEE Access, vol. 7, pp. 99508-99520, 2019.
  8. Amjad Saeed Khan, Yogachandran Rahulamathavan, Bokamoso Basutli, Gan Zheng, Basil AsSadhan, and Sangarapillai Lambotharan, “Blockchain-based distributive auction for relay-assisted secure communications,” accepted at IEEE Access, vol. 7, pp. 95555-95568, 2019.
  9. Basil AsSadhan, Abdulmuneem Bashaiwth, Jalal Al-Muhtadi, and Saleh Alshebeili, “Analysis of P2P, IRC and HTTP Traffic for Botnets Detection,” Peer-to-Peer Networking and Applications, vol. 11, no. 5, pp. 848-861, September 2018.
  10. Ibrahim. Ghafir, Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil AsSadhan, and Hamad BinSalleeh, “A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection,” IEEE Access, vol. 6, pp. 40008-40023, 2018.
  11. Basil AsSadhan, Khan Zeb, Jalal Al-Muhtadi, and Saleh Alshebeili, “Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic using SOSS and FARIMA Models,” IEEE Access, vol. 5, pp. 13501-13519, 2017.
  12. Fida Gillani, Ehab Al-Shaer, and Basil AsSadhan, “Economic Metric to Improve Spam Detectors,” Journal of Network and Computer Applications, vol. 85,  pp. 131-143, April 2016.
  13. باسل السدحان، "المرجعية الأكاديمية لبرامج هندسة الحاسب في الجامعات السعودية والعالمية والإقليمية – دراسة مقارنة" مجلة جامعة الملك سعود - العلوم الهندسية، 28 (إصدار خاص)، 92-115، 2016.
  14. Basil AsSadhan and José M. F. Moura, “An Efficient Method to Detect Periodic Behavior in Botnet Traffic by Analyzing Control Plane Traffic,” Journal of Advanced Research, vol. 5, no. 4, pp. 435 – 448, July 2014.

 Conferences

  1. Arwa Alzammam, Hamad Binsalleeh, Basil AsSadhan, Kostas Kyriakopoulos, and Sangarapillai Lambotharan, “Comparative Analysis on Imbalanced Multi-class Classification for Malware Samples Using CNN,” in Proceedings of the 1st IEEE International Conference on Advances in the Emerging Computing Technologies, Madinah, Saudi Arabia, February 10 – 12, 2020.v
  2. Yuan Zhang, Qinghai Yang, Sangarapillai Lambotharan, Konstantinos Kyriakopoulos, Ibrahim Ghafir, and Basil AsSadhan, “Anomaly-Based Network Intrusion Detection Using SVM,” in Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, Xi'an, China, October 23 – 25, 2019.
  3. Fahad S. Alenazi, Khalil El Hindi, and Basil AsSadhan, “Fine-Tuning Naïve Bayes for Imbalanced Datasets,” in Proceedings of the 2019 International Conference on Data Science (ICDATA’19), Las Vegas, NV, USA, July 29– August 1, 2019.
  4. Diab M. Diab, Basil AsSadhan, Hamad Binsalleeh, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos and, Ibrahim Ghafir, “Anomaly Detection using Dynamic Time Warping,” in Proceedings the 22nd IEEE International Conference on Computational Science and Engineering, New York, NY, USA, August 1 – 3, 2019.
  5. Francisco J. Aparicio-Navarro, Timothy A. Chadza, Konstantinos G. Kyriakopoulos, Ibrahim. Ghafir, Sangarapillai Lambotharan, and Basil AsSadhan, “Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information,” in Proceedings of the 22nd Conference on Innovation in Clouds, Internet and Networks (ICIN 2019), Paris, France, February 19 – 21, 2019.
  6. Khan Zeb, Basil AsSadhan, Jalal Al-Muhtadi, and Saleh Alshebeili, “Anomaly Detection using Wavelet-Based Estimation of LRD in Packet and Byte Count of Control Traffic,” accepted in Proceedings of the International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, April 5 – 7, 2016.
  7. Khan Zeb, Basil AsSadhan, Jalal Al-Muhtadi, Saleh Alshebeili, and Abdulmuneem Bashaiwth, “Volume Based Anomaly Detection using LRD Analysis of Decomposed Network Traffic,” in Proceedings of the 4th International Conference on Innovative Computing Technology (INTECH), Luton, UK, August 13 – 15, 2014.
  8. Rayan AlShaalan, Basil AsSadhan, Jalal Al-Muhtadi, Hesham Bin-Abbas, Fathi Sayed, and Saleh Alshebeili, “Constant False Alarm Rate Anomaly-Based Approach for Network Intrusion Detection,” in Proceedings of International Conference on High-capacity Optical Networks and Emerging/Enabling Technologies (HONET), Magosa, Cyprus, December 11–13, 2013.
  9. Syed Usman Ali, Essam A. Al-Ammar, Basil AsSadhan, and Syed Danish Maqbool, “Comparative Study of Various Security Algorithms Used in Smart Meters,” in Proceedings of IEEE PES Innovative Smart Grid Technologies (ISGT) – Middle East, Jeddah, Saudi Arabia, December 17-20, 2011.
  10. Basil AsSadhan, José M. F. Moura, and David Lapsley, “Periodic Behavior in Botnet Command and Control Channels Traffic,” in Proceedings of IEEE GLOBECOM, Honolulu, Hawaii, USA, November 30 – December 4, 2009.
  11. Basil AsSadhan, José M. F. Moura, David Lapsley, Christine Jones, and W. Timothy Strayer, “Detecting Botnets using Command and Control Traffic,” in Proceedings of IEEE International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, July 9–11, 2009.
  12. Basil AsSadhan, Hyong Kim, and José M. F. Moura, “Long-Range Dependence Analysis of Control and Data Planes Network Traffic,” presented at the Saudi International Innovation Conference (SIIC), Leeds, UK, June 9–10, 2008.
  13. Basil AsSadhan, Hyong Kim, José M. F. Moura, Xiaohui Wang, “Network Traffic Behavior Analysis by Decomposition into Control and Data Planes,” in Proceedings of the 4th International Workshop on Security in Systems and Networks (SSN) in conjunction with IEEE IPDPS 2008, Miami, FL, USA, April 18, 2008.
  14. Basil As-Sadhan, Ziad Al Bawab, Ammar El Seed, and Mohamed Noamany, “Comparative Evaluation of Different Classifiers for Robust Distorted Character Recognition,”  in Proceedings of SPIE, Document Recognition and Retrieval XIII, San Jose, CA, USA, January 15–19, 2006.