@article{bb332900,
        AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.",
        TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive
Model Resolving the Security Issues in IoT Based Models",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "428-435",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327205"}

@article{bb332901,
        AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.",
        TITLE = "Protection motivation theory using multi-factor authentication for
providing security over social networking sites",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "218-224",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327206"}

@article{bb332902,
        AUTHOR = "Wei, S.M. and Pan, J.H.",
        TITLE = "Resilience of Urban Network Structure in China:
The Perspective of Disruption",
        JOURNAL = IJGI,
        VOLUME = "10",
        YEAR = "2021",
        NUMBER = "12",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327207"}

@article{bb332903,
        AUTHOR = "Saveetha, D. and Maragatham, G.",
        TITLE = "Design of Blockchain enabled intrusion detection model for detecting
security attacks using deep learning",
        JOURNAL = PRL,
        VOLUME = "153",
        YEAR = "2022",
        PAGES = "24-28",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327208"}

@article{bb332904,
        AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.",
        TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature
Selection",
        JOURNAL = IEICE,
        VOLUME = "E105-D",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1024-1038",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327209"}

@article{bb332905,
        AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.",
        TITLE = "Cloud security based attack detection using transductive learning
integrated with Hidden Markov Model",
        JOURNAL = PRL,
        VOLUME = "157",
        YEAR = "2022",
        PAGES = "16-26",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327210"}

@article{bb332906,
        AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.",
        TITLE = "Network optimization using defender system in cloud computing
security based intrusion detection system withgame theory deep neural
network (IDSGT-DNN)",
        JOURNAL = PRL,
        VOLUME = "156",
        YEAR = "2022",
        PAGES = "142-151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327211"}

@article{bb332907,
        AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.",
        TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to
Denial-of-Service Attacks",
        JOURNAL = SMCS,
        VOLUME = "52",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "3326-3336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327212"}

@article{bb332908,
        AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.",
        TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327213"}

@article{bb332909,
        AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.",
        TITLE = "Task adaptive siamese neural networks for open-set recognition of
encrypted network traffic with bidirectional dropout",
        JOURNAL = PRL,
        VOLUME = "159",
        YEAR = "2022",
        PAGES = "132-139",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327214"}

@article{bb332910,
        AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.",
        TITLE = "Automated Software Defect Detection and Identification in Vehicular
Embedded Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6963-6973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327215"}

@article{bb332911,
        AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.",
        TITLE = "An Intrusion Detection Method Based on Machine Learning and State
Observer for Train-Ground Communication Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6608-6620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327216"}

@article{bb332912,
        AUTHOR = "dos Santos Roque, A. and Jazdi, N. and de Freitas, E.P. and Pereira, C.E.",
        TITLE = "A Fault Modeling Based Runtime Diagnostic Mechanism for Vehicular
Distributed Control Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7220-7232",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327217"}

@article{bb332913,
        AUTHOR = "Taguchi, S. and Yoshimura, T.",
        TITLE = "Online Estimation and Prediction of Large-Scale Network Traffic From
Sparse Probe Vehicle Data",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7233-7243",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327218"}

@article{bb332914,
        AUTHOR = "Cai, X.Q. and Wu, C. and Sheng, J. and Wang, Y.M. and Ai, B.",
        TITLE = "Spectrum Situation Awareness Based on Time-Series Depth Networks for
LTE-R Communication System",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "8629-8640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327219"}

@article{bb332915,
        AUTHOR = "Kye, H. and Kim, M. and Kwon, M.",
        TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised
Learning Approach",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "1908-1912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327220"}

@article{bb332916,
        AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.",
        TITLE = "Wrapper feature selection method based differential evolution and
extreme learning machine for intrusion detection system",
        JOURNAL = PR,
        VOLUME = "132",
        YEAR = "2022",
        PAGES = "108912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327221"}

@article{bb332917,
        AUTHOR = "He, Y.C. and Jia, Z.J. and Hu, M.S. and Cui, C. and Cheng, Y. and Yang, Y.Y.",
        TITLE = "The Hybrid Similar Neighborhood Robust Factorization Machine Model
for Can Bus Intrusion Detection in the In-Vehicle Network",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "16833-16841",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327222"}

@article{bb332918,
        AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.",
        TITLE = "Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "17425-17439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327223"}

@article{bb332919,
        AUTHOR = "Sathish, N. and Valarmathi, N.",
        TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's
chi-squared distribution and decision tree classifiers",
        JOURNAL = PRL,
        VOLUME = "162",
        YEAR = "2022",
        PAGES = "15-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327224"}

@article{bb332920,
        AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.",
        TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular
Networks",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "22596-22606",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327225"}

@inproceedings{bb332921,
        AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.",
        TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior
Profiling",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "1865-1870",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327226"}

@article{bb332922,
        AUTHOR = "Koroniotis, N. and Moustafa, N. and Schiliro, F. and Gauravaram, P. and Janicke, H.",
        TITLE = "The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins
Architecture in IIoT-Based Smart Airports",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "2368-2381",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327227"}

@article{bb332923,
        AUTHOR = "Duan, X. and Yan, H. and Tian, D.X. and Zhou, J. and Su, J. and Hao, W.",
        TITLE = "In-Vehicle CAN Bus Tampering Attacks Detection for Connected and
Autonomous Vehicles Using an Improved Isolation Forest Method",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "2122-2134",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327228"}

@article{bb332924,
        AUTHOR = "Wang, K. and Zhang, A. and Sun, H.R. and Wang, B.L.",
        TITLE = "Analysis of Recent Deep-Learning-Based Intrusion Detection Methods
for In-Vehicle Network",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "1843-1854",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327229"}

@article{bb332925,
        AUTHOR = "Rajapaksha, S. and Kalutarage, H. and Al Kadri, M.O. and Petrovski, A. and Madzudzo, G. and Cheah, M.",
        TITLE = "AI-Based Intrusion Detection Systems for In-Vehicle Networks:
A Survey",
        JOURNAL = Surveys,
        VOLUME = "55",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "February",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327230"}

@article{bb332926,
        AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Otaibi, S.A. and Tian, Z.H.",
        TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and
Weight Self-Learning",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7642-7652",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327231"}

@article{bb332927,
        AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.",
        TITLE = "Detecting Android Malware With Pre-Existing Image Classification
Neural Networks",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "858-862",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327232"}

@article{bb332928,
        AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.",
        TITLE = "Distributed edge-event-triggered consensus of multi-agent system
under DoS attack",
        JOURNAL = PRL,
        VOLUME = "174",
        YEAR = "2023",
        PAGES = "118-123",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327233"}

@article{bb332929,
        AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z. and Deng, Z.Y. and Ling, X. and Xiang, W.",
        TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet
traffic data",
        JOURNAL = PR,
        VOLUME = "146",
        YEAR = "2024",
        PAGES = "109999",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327234"}

@article{bb332930,
        AUTHOR = "Lee, S. and Choi, W. and Jo, H.J. and Lee, D.H.",
        TITLE = "ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive
Intrusion Detection System",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12406-12421",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327235"}

@article{bb332931,
        AUTHOR = "Zhou, J. and Xie, G.Q. and Zeng, H.B. and Zhang, W.Z. and Yang, L.T. and Alazab, M. and Li, R.",
        TITLE = "A Model-Based Method for Enabling Source Mapping and Intrusion
Detection on Proprietary Can Bus",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12922-12932",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327236"}

@article{bb332932,
        AUTHOR = "Chougule, A. and Kohli, V. and Chamola, V. and Yu, F.R.",
        TITLE = "Multibranch Reconstruction Error (MbRE) Intrusion Detection
Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc
Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "13068-13077",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327237"}

@article{bb332933,
        AUTHOR = "Almutlaq, S. and Derhab, A. and Hassan, M.M. and Kaur, K.",
        TITLE = "Two-Stage Intrusion Detection System in Intelligent Transportation
Systems Using Rule Extraction Methods From Deep Neural Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15687-15701",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327238"}

@article{bb332934,
        AUTHOR = "Zhang, J. and Gong, B. and Waqas, M. and Tu, S.S. and Chen, S.",
        TITLE = "Many-Objective Optimization Based Intrusion Detection for in-Vehicle
Network Security",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15051-15065",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327239"}

@article{bb332935,
        AUTHOR = "Anbalagan, S. and Raja, G. and Gurumoorthy, S. and Suresh, R.D. and Dev, K.",
        TITLE = "IIDS: Intelligent Intrusion Detection System for Sustainable
Development in Autonomous Vehicles",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15866-15875",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327240"}

@article{bb332936,
        AUTHOR = "Qian, Z.J. and Zhong, S. and Sun, G.F. and Xing, X.S. and Jin, Y.",
        TITLE = "A Formal Approach to Design and Security Verification of Operating
Systems for Intelligent Transportation Systems Based on Object Model",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15459-15467",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327241"}

@article{bb332937,
        AUTHOR = "da Cruz, M.A.A. and Abbade, L.R. and Lorenz, P. and Mafra, S.B. and Rodrigues, J.J.P.C.",
        TITLE = "Detecting Compromised IoT Devices Through XGBoost",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15392-15399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327242"}

@article{bb332938,
        AUTHOR = "Li, Y. and Zhu, L. and Wang, H.W. and Yu, F.R. and Tang, T. and Zhang, D.J.",
        TITLE = "Joint Security and Resources Allocation Scheme Design in Edge
Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "13948-13961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327243"}

@article{bb332939,
        AUTHOR = "Zahid, M.U. and Nisar, M.D. and Shah, M.H. and Hussain, S.A.",
        TITLE = "Specific Emitter Identification Based on Multi-Scale
Multi-Dimensional Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "850-854",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327244"}

@article{bb332940,
        AUTHOR = "Yang, H. and Li, T.C. and Yan, J. and Elvira, V.",
        TITLE = "Hierarchical Average Fusion With GM-PHD Filters Against FDI and DoS
Attacks",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "934-938",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327245"}

@inproceedings{bb332941,
        AUTHOR = "Hsu, T.C. and Lu, H.S.",
        TITLE = "Designing a Secure and Scalable Service Model Using Blockchain and
MQTT for IoT Devices",
        BOOKTITLE = IoTDesign24,
        YEAR = "2024",
        PAGES = "645-653",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327246"}

@inproceedings{bb332942,
        AUTHOR = "Kannan, B.B. and Sriramulu, S.",
        TITLE = "Hybrid Convolutional Neural Networks To Create An Attack Detection
Framework For A Wireless Sensor Network Based Health Care Application",
        BOOKTITLE = ICCVMI23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327247"}

@inproceedings{bb332943,
        AUTHOR = "Tang, F. and Yu, B.Y. and Zhao, S.X. and Xu, M.",
        TITLE = "Towards Fraudulent URL Classification with Large Language Model based
on Deep Learning",
        BOOKTITLE = CVIDL23,
        YEAR = "2023",
        PAGES = "503-507",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327248"}

@inproceedings{bb332944,
        AUTHOR = "Benchadi, D.Y.M. and Batalo, B. and Fukui, K.",
        TITLE = "Malware Detection Using Kernel Constrained Subspace Method",
        BOOKTITLE = MVA23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327249"}

@inproceedings{bb332945,
        AUTHOR = "Dong, Q. and Sun, T.T. and Li, T.W. and Lu, X.Q. and Yan, K.",
        TITLE = "Anomaly Intrusion Detection in Online Learning Space Based on XGBoost",
        BOOKTITLE = ICIVC22,
        YEAR = "2022",
        PAGES = "968-973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327250"}

@inproceedings{bb332946,
        AUTHOR = "Li, S.S. and Chen, D. and Zhang, J. and Wang, H.Y. and Li, L. and Qian, Y.Y. and Liu, H.",
        TITLE = "Software Vulnerability Detection Based on Anomaly-Attention",
        BOOKTITLE = ICRVC22,
        YEAR = "2022",
        PAGES = "261-265",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327251"}

@inproceedings{bb332947,
        AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z.W. and Wang, X. and Jing, R.Q.",
        TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative
Adversarial Networks for Malware Classification",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "3775-3782",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327252"}

@inproceedings{bb332948,
        AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.",
        TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "9068-9075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327253"}

@inproceedings{bb332949,
        AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.",
        TITLE = "Large Scale Graph Based Network Forensics Analysis",
        BOOKTITLE = IWBDAF20,
        YEAR = "2020",
        PAGES = "457-469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327254"}

@inproceedings{bb332950,
        AUTHOR = "Scalas, M. and Rieck, K. and Giacinto, G.",
        TITLE = "Explanation-driven Characterization of Android Ransomware",
        BOOKTITLE = EDL-AI20,
        YEAR = "2020",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327255"}

@inproceedings{bb332951,
        AUTHOR = "Chen, L. and Qiu, H.J. and Kuang, X.Y. and Xu, A.D. and Yang, Y.W.",
        TITLE = "Intelligent Data Security Threat Discovery Model Based on Grid Data",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "458-463",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327256"}

@inproceedings{bb332952,
        AUTHOR = "Ikrissi, G. and Mazri, T.",
        TITLE = "IoT-based Smart Environments: State of the Art, Security Threats and
Solutions",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "279-286",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327257"}

@inproceedings{bb332953,
        AUTHOR = "Niu, L. and Song, Y. and Chu, J. and Li, S.",
        TITLE = "Analysis of the Attacker and Defender GAN Models for the Indoor
Navigation Network",
        BOOKTITLE = ISPRS21,
        YEAR = "2021",
        PAGES = "B4-2021: 237-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327258"}

@inproceedings{bb332954,
        AUTHOR = "Toka, K.O. and Dikilitas, Y. and Oktay, T. and Sayar, A.",
        TITLE = "Securing Iot With Blockchain",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "529-532",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327259"}

@inproceedings{bb332955,
        AUTHOR = "Ozarpa, C. and Avci, I. and Kinaci, B.F. and Arapoglu, S. and Kara, S.A.",
        TITLE = "Cyber Attacks on Scada Based Traffic Light Control Systems in the Smart
Cities",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "411-415",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327260"}

@inproceedings{bb332956,
        AUTHOR = "Moulad, L. and Chaabita, R. and Balar, K.",
        TITLE = "Wireless Sensor Network: Towards An Improvement of Security Policy",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "379-383",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327261"}

@inproceedings{bb332957,
        AUTHOR = "Miryahyaie, S. and Ebrahimpour komleh, H. and Nickfarjam, A.M.",
        TITLE = "ACO-based Intrusion Detection Method in Computer Networks using Fuzzy
Association Rules",
        BOOKTITLE = IPRIA21,
        YEAR = "2021",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327262"}

@inproceedings{bb332958,
        AUTHOR = "Mohseni, M. and Tanha, J.",
        TITLE = "A Density-based Undersampling Approach to Intrusion Detection",
        BOOKTITLE = IPRIA21,
        YEAR = "2021",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327263"}

@inproceedings{bb332959,
        AUTHOR = "Liu, Y.G. and Ning, Z. and Zhang, J.J. and Wang, X.P.",
        TITLE = "Monitory Consensus Mechanism of Blockchain for Internet of Things",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "425-430",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327264"}

@inproceedings{bb332960,
        AUTHOR = "Chen, L. and Xian, M. and Liu, J.",
        TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus",
        BOOKTITLE = CVIDL20,
        YEAR = "2020",
        PAGES = "206-209",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327265"}

@inproceedings{bb332961,
        AUTHOR = "Prima, B. and Bouhorma, M.",
        TITLE = "Using Transfer Learning for Malware Classification",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "343-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327266"}

@inproceedings{bb332962,
        AUTHOR = "El Bakkouri, N. and Mazri, T.",
        TITLE = "Security Threats In Smart Healthcare",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "209-214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327267"}

@inproceedings{bb332963,
        AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.",
        TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327268"}

@inproceedings{bb332964,
        AUTHOR = "Mennour, H. and Mostefai, S.",
        TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327269"}

@inproceedings{bb332965,
        AUTHOR = "Sebbah, A. and Kadri, B.",
        TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC
and Fuzzy Extractor",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327270"}

@inproceedings{bb332966,
        AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.",
        TITLE = "DOS attack forecasting: A comparative study on wrapper feature
selection",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327271"}

@inproceedings{bb332967,
        AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.",
        TITLE = "Behavioral Security in Covert Communication Systems",
        BOOKTITLE = IWDW19,
        YEAR = "2019",
        PAGES = "377-392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327272"}

@inproceedings{bb332968,
        AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.",
        TITLE = "Intelligent Recognition of TCP Intrusions for Embedded
Micro-controllers",
        BOOKTITLE = NTIAP19,
        YEAR = "2019",
        PAGES = "361-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327273"}

@inproceedings{bb332969,
        AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.",
        TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion
Detection",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "682-687",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327274"}

@inproceedings{bb332970,
        AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.",
        TITLE = "Botnet Detection based on Fuzzy Association Rules",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "578-584",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327275"}

@inproceedings{bb332971,
        AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.",
        TITLE = "Cyber Vulnerability: An Attentional Dilemma",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 331-340",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327276"}

@inproceedings{bb332972,
        AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.",
        TITLE = "Trust in Autonomous Systems for Threat Analysis:
A Simulation Methodology",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 341-353",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327277"}

@article{bb332973,
        AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.",
        TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive
Neural Networks",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "29-39",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327278"}

@article{bb332974,
        AUTHOR = "Taylor, A. and Leblanc, S. and Japkowicz, N.",
        TITLE = "Probing the Limits of Anomaly Detectors for Automobiles with a
Cyberattack Framework",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "54-62",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327279"}

@article{bb332975,
        AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.",
        TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet
of Things: A Text-Mining Approach",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "63-73",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327280"}

@inproceedings{bb332976,
        AUTHOR = "Menemencioglu, O. and Orak, I.M.",
        TITLE = "Geographical Assesment of Results From Preventing the Parameter
Tampering in A Web Application",
        BOOKTITLE = GeoAdvances17,
        YEAR = "2017",
        PAGES = "69-71",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327281"}

@inproceedings{bb332977,
        AUTHOR = "Herrera Semenets, V. and Perez Garcia, O.A. and Gago Alonso, A. and Hernandez Leon, R.",
        TITLE = "A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion
Detection",
        BOOKTITLE = CIARP17,
        YEAR = "2017",
        PAGES = "289-297",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327282"}

@inproceedings{bb332978,
        AUTHOR = "Mohan, R. and Chaudhury, S. and Lall, B.",
        TITLE = "Incremental Learning of Non-stationary Temporal Causal Networks for
Telecommunication Domain",
        BOOKTITLE = PReMI17,
        YEAR = "2017",
        PAGES = "501-508",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327283"}

@inproceedings{bb332979,
        AUTHOR = "Elejla, O.E. and Belaton, B. and Anbar, M. and Alijla, B.O.",
        TITLE = "IPv6 OS Fingerprinting Methods: Review",
        BOOKTITLE = IVIC17,
        YEAR = "2017",
        PAGES = "661-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327284"}

@inproceedings{bb332980,
        AUTHOR = "Zabri, Z. and Nohuddin, P.N.E.",
        TITLE = "Analyzing and Detecting Network Intrusion Behavior Using Packet Capture",
        BOOKTITLE = IVIC17,
        YEAR = "2017",
        PAGES = "750-761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327285"}

@inproceedings{bb332981,
        AUTHOR = "Zyad, E. and Khalid, C. and Mohammed, B.",
        TITLE = "Combination of R1-PCA and median LDA for anomaly network detection",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327286"}

@inproceedings{bb332982,
        AUTHOR = "Alaoui, E.A.A. and Lamhamdi, M.",
        TITLE = "Study of the energy performance of DTN protocols",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327287"}

@inproceedings{bb332983,
        AUTHOR = "Sadek, B.A. and Houssaine, T.E. and Noreddine, C.",
        TITLE = "A robust PID controller for active queue management framework in
congested routers",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327288"}

@inproceedings{bb332984,
        AUTHOR = "Kempa, W.M.",
        TITLE = "On buffer overflow duration in WSN with a vacation-type power saving
mechanism",
        BOOKTITLE = WSSIP17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327289"}

@inproceedings{bb332985,
        AUTHOR = "Korona, M. and Skowron, K. and Trzepinski, M. and Rawski, M.",
        TITLE = "FPGA implementation of IPsec protocol suite for multigigabit networks",
        BOOKTITLE = WSSIP17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327290"}

@inproceedings{bb332986,
        AUTHOR = "Geller, B.",
        TITLE = "Advanced synchronization techniques for the Internet of Things",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "180-184",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327291"}

@inproceedings{bb332987,
        AUTHOR = "Yang, J. and Geller, B. and Arbi, T.",
        TITLE = "Proposal of a multi-standard transceiver for the WBAN Internet of
Things",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "369-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327292"}

@inproceedings{bb332988,
        AUTHOR = "Massaoudi, A. and Sellami, N. and Siala, M.",
        TITLE = "On the impact of pdf-matched quantization for heterogeneous cognitive
radio networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "259-263",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327293"}

@inproceedings{bb332989,
        AUTHOR = "NasrLeila, I. and Atallah, N. and Cherif, S. and Geller, B.",
        TITLE = "Time synchronization in IoT networks:
Case of a wireless body area network",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "297-301",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327294"}

@inproceedings{bb332990,
        AUTHOR = "Rihani, M.A. and Prevotet, J.C. and Nouvel, F. and Mroue, M. and Mohanna, Y.",
        TITLE = "ARM-FPGA based platform for automated adaptive wireless communication
systems using partial reconfiguration technique",
        BOOKTITLE = DASIP16,
        YEAR = "2016",
        PAGES = "113-120",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327295"}

@inproceedings{bb332991,
        AUTHOR = "Moreac, E. and Rossi, A. and Laurent, J. and Bomel, P.",
        TITLE = "Crosstalk-aware link power model for Networks-on-Chip",
        BOOKTITLE = DASIP16,
        YEAR = "2016",
        PAGES = "121-128",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327296"}

@inproceedings{bb332992,
        AUTHOR = "Abbes, Y. and Najeh, S. and Besbes, H.",
        TITLE = "Tractable framework for modeling and analyzing Joint CoMP
Transmission and eICIC technology in two-tier heterogeneous cellular
networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327297"}

@inproceedings{bb332993,
        AUTHOR = "Essassi, S. and Hamila, R. and Cherif, S. and Siala, M. and Hasna, M.O.",
        TITLE = "Power control and RB allocation in cloud radio access networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "148-152",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327298"}

@inproceedings{bb332994,
        AUTHOR = "Mashhadi, F. and Asaduzzaman, A. and Mridha, M.F.",
        TITLE = "A novel resource scheduling approach to improve the reliability of
Shuffle-exchange networks",
        BOOKTITLE = IVPR17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327299"}

@inproceedings{bb332995,
        AUTHOR = "Xie, J.L. and Dang, J.W. and Li, C. and Lian, X.P. and Lin, J.",
        TITLE = "Ecology-inspired Admission Control scheme in heterogeneous wireless
Networks",
        BOOKTITLE = ICIVC16,
        YEAR = "2016",
        PAGES = "140-144",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327300"}

@inproceedings{bb332996,
        AUTHOR = "Isikdag, U. and Pilouk, M.",
        TITLE = "Integration Of Geo-sensor Feeds And Event Consumer Services For
Real-time Representation of IOT Nodes",
        BOOKTITLE = ISPRS16,
        YEAR = "2016",
        PAGES = "B4: 267-274",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327301"}

@inproceedings{bb332997,
        AUTHOR = "Al Shamisi, A. and Louvieris, P. and Al Mualla, M. and Mihajlov, M.",
        TITLE = "Towards a theoretical framework for an active cyber situational
awareness model",
        BOOKTITLE = WSSIP16,
        YEAR = "2016",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327302"}

@inproceedings{bb332998,
        AUTHOR = "Peter, T. and Pavol, H. and Lukas, D.",
        TITLE = "Implementation and evaluation of IPv6 to IPv4 transition mechanisms
in network simulator 3",
        BOOKTITLE = WSSIP16,
        YEAR = "2016",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327303"}

@inproceedings{bb332999,
        AUTHOR = "Al Jumeily, D. and Hussain, A. and MacDermott, A. and Seeckts, G. and Lunn, J.",
        TITLE = "Methods and techniques to support the development of fraud detection
system",
        BOOKTITLE = WSSIP15,
        YEAR = "2015",
        PAGES = "224-227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327304"}

Last update:Apr 27, 2024 at 11:46:35