@article{bb332900, AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.", TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models", JOURNAL = PRL, VOLUME = "152", YEAR = "2021", PAGES = "428-435", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327205"} @article{bb332901, AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.", TITLE = "Protection motivation theory using multi-factor authentication for providing security over social networking sites", JOURNAL = PRL, VOLUME = "152", YEAR = "2021", PAGES = "218-224", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327206"} @article{bb332902, AUTHOR = "Wei, S.M. and Pan, J.H.", TITLE = "Resilience of Urban Network Structure in China: The Perspective of Disruption", JOURNAL = IJGI, VOLUME = "10", YEAR = "2021", NUMBER = "12", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327207"} @article{bb332903, AUTHOR = "Saveetha, D. and Maragatham, G.", TITLE = "Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning", JOURNAL = PRL, VOLUME = "153", YEAR = "2022", PAGES = "24-28", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327208"} @article{bb332904, AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.", TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection", JOURNAL = IEICE, VOLUME = "E105-D", YEAR = "2022", NUMBER = "5", MONTH = "May", PAGES = "1024-1038", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327209"} @article{bb332905, AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.", TITLE = "Cloud security based attack detection using transductive learning integrated with Hidden Markov Model", JOURNAL = PRL, VOLUME = "157", YEAR = "2022", PAGES = "16-26", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327210"} @article{bb332906, AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.", TITLE = "Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)", JOURNAL = PRL, VOLUME = "156", YEAR = "2022", PAGES = "142-151", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327211"} @article{bb332907, AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.", TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service Attacks", JOURNAL = SMCS, VOLUME = "52", YEAR = "2022", NUMBER = "5", MONTH = "May", PAGES = "3326-3336", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327212"} @article{bb332908, AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.", TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification", JOURNAL = RS, VOLUME = "14", YEAR = "2022", NUMBER = "9", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327213"} @article{bb332909, AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.", TITLE = "Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout", JOURNAL = PRL, VOLUME = "159", YEAR = "2022", PAGES = "132-139", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327214"} @article{bb332910, AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.", TITLE = "Automated Software Defect Detection and Identification in Vehicular Embedded Systems", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "6963-6973", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327215"} @article{bb332911, AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.", TITLE = "An Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "6608-6620", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327216"} @article{bb332912, AUTHOR = "dos Santos Roque, A. and Jazdi, N. and de Freitas, E.P. and Pereira, C.E.", TITLE = "A Fault Modeling Based Runtime Diagnostic Mechanism for Vehicular Distributed Control Systems", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "7220-7232", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327217"} @article{bb332913, AUTHOR = "Taguchi, S. and Yoshimura, T.", TITLE = "Online Estimation and Prediction of Large-Scale Network Traffic From Sparse Probe Vehicle Data", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "7233-7243", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327218"} @article{bb332914, AUTHOR = "Cai, X.Q. and Wu, C. and Sheng, J. and Wang, Y.M. and Ai, B.", TITLE = "Spectrum Situation Awareness Based on Time-Series Depth Networks for LTE-R Communication System", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "8629-8640", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327219"} @article{bb332915, AUTHOR = "Kye, H. and Kim, M. and Kwon, M.", TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised Learning Approach", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "1908-1912", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327220"} @article{bb332916, AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.", TITLE = "Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system", JOURNAL = PR, VOLUME = "132", YEAR = "2022", PAGES = "108912", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327221"} @article{bb332917, AUTHOR = "He, Y.C. and Jia, Z.J. and Hu, M.S. and Cui, C. and Cheng, Y. and Yang, Y.Y.", TITLE = "The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "9", MONTH = "September", PAGES = "16833-16841", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327222"} @article{bb332918, AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.", TITLE = "Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "10", MONTH = "October", PAGES = "17425-17439", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327223"} @article{bb332919, AUTHOR = "Sathish, N. and Valarmathi, N.", TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's chi-squared distribution and decision tree classifiers", JOURNAL = PRL, VOLUME = "162", YEAR = "2022", PAGES = "15-21", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327224"} @article{bb332920, AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.", TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "11", MONTH = "November", PAGES = "22596-22606", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327225"} @inproceedings{bb332921, AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.", TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior Profiling", BOOKTITLE = "ICPR22", YEAR = "2022", PAGES = "1865-1870", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327226"} @article{bb332922, AUTHOR = "Koroniotis, N. and Moustafa, N. and Schiliro, F. and Gauravaram, P. and Janicke, H.", TITLE = "The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "2", MONTH = "February", PAGES = "2368-2381", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327227"} @article{bb332923, AUTHOR = "Duan, X. and Yan, H. and Tian, D.X. and Zhou, J. and Su, J. and Hao, W.", TITLE = "In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "2", MONTH = "February", PAGES = "2122-2134", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327228"} @article{bb332924, AUTHOR = "Wang, K. and Zhang, A. and Sun, H.R. and Wang, B.L.", TITLE = "Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "2", MONTH = "February", PAGES = "1843-1854", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327229"} @article{bb332925, AUTHOR = "Rajapaksha, S. and Kalutarage, H. and Al Kadri, M.O. and Petrovski, A. and Madzudzo, G. and Cheah, M.", TITLE = "AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey", JOURNAL = Surveys, VOLUME = "55", YEAR = "2023", NUMBER = "11", MONTH = "February", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327230"} @article{bb332926, AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Otaibi, S.A. and Tian, Z.H.", TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "7", MONTH = "July", PAGES = "7642-7652", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327231"} @article{bb332927, AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.", TITLE = "Detecting Android Malware With Pre-Existing Image Classification Neural Networks", JOURNAL = SPLetters, VOLUME = "30", YEAR = "2023", PAGES = "858-862", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327232"} @article{bb332928, AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.", TITLE = "Distributed edge-event-triggered consensus of multi-agent system under DoS attack", JOURNAL = PRL, VOLUME = "174", YEAR = "2023", PAGES = "118-123", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327233"} @article{bb332929, AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z. and Deng, Z.Y. and Ling, X. and Xiang, W.", TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet traffic data", JOURNAL = PR, VOLUME = "146", YEAR = "2024", PAGES = "109999", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327234"} @article{bb332930, AUTHOR = "Lee, S. and Choi, W. and Jo, H.J. and Lee, D.H.", TITLE = "ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "12406-12421", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327235"} @article{bb332931, AUTHOR = "Zhou, J. and Xie, G.Q. and Zeng, H.B. and Zhang, W.Z. and Yang, L.T. and Alazab, M. and Li, R.", TITLE = "A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "12922-12932", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327236"} @article{bb332932, AUTHOR = "Chougule, A. and Kohli, V. and Chamola, V. and Yu, F.R.", TITLE = "Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "13068-13077", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327237"} @article{bb332933, AUTHOR = "Almutlaq, S. and Derhab, A. and Hassan, M.M. and Kaur, K.", TITLE = "Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15687-15701", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327238"} @article{bb332934, AUTHOR = "Zhang, J. and Gong, B. and Waqas, M. and Tu, S.S. and Chen, S.", TITLE = "Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15051-15065", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327239"} @article{bb332935, AUTHOR = "Anbalagan, S. and Raja, G. and Gurumoorthy, S. and Suresh, R.D. and Dev, K.", TITLE = "IIDS: Intelligent Intrusion Detection System for Sustainable Development in Autonomous Vehicles", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15866-15875", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327240"} @article{bb332936, AUTHOR = "Qian, Z.J. and Zhong, S. and Sun, G.F. and Xing, X.S. and Jin, Y.", TITLE = "A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15459-15467", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327241"} @article{bb332937, AUTHOR = "da Cruz, M.A.A. and Abbade, L.R. and Lorenz, P. and Mafra, S.B. and Rodrigues, J.J.P.C.", TITLE = "Detecting Compromised IoT Devices Through XGBoost", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15392-15399", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327242"} @article{bb332938, AUTHOR = "Li, Y. and Zhu, L. and Wang, H.W. and Yu, F.R. and Tang, T. and Zhang, D.J.", TITLE = "Joint Security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "13948-13961", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327243"} @article{bb332939, AUTHOR = "Zahid, M.U. and Nisar, M.D. and Shah, M.H. and Hussain, S.A.", TITLE = "Specific Emitter Identification Based on Multi-Scale Multi-Dimensional Approximate Entropy", JOURNAL = SPLetters, VOLUME = "31", YEAR = "2024", PAGES = "850-854", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327244"} @article{bb332940, AUTHOR = "Yang, H. and Li, T.C. and Yan, J. and Elvira, V.", TITLE = "Hierarchical Average Fusion With GM-PHD Filters Against FDI and DoS Attacks", JOURNAL = SPLetters, VOLUME = "31", YEAR = "2024", PAGES = "934-938", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327245"} @inproceedings{bb332941, AUTHOR = "Hsu, T.C. and Lu, H.S.", TITLE = "Designing a Secure and Scalable Service Model Using Blockchain and MQTT for IoT Devices", BOOKTITLE = IoTDesign24, YEAR = "2024", PAGES = "645-653", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327246"} @inproceedings{bb332942, AUTHOR = "Kannan, B.B. and Sriramulu, S.", TITLE = "Hybrid Convolutional Neural Networks To Create An Attack Detection Framework For A Wireless Sensor Network Based Health Care Application", BOOKTITLE = ICCVMI23, YEAR = "2023", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327247"} @inproceedings{bb332943, AUTHOR = "Tang, F. and Yu, B.Y. and Zhao, S.X. and Xu, M.", TITLE = "Towards Fraudulent URL Classification with Large Language Model based on Deep Learning", BOOKTITLE = CVIDL23, YEAR = "2023", PAGES = "503-507", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327248"} @inproceedings{bb332944, AUTHOR = "Benchadi, D.Y.M. and Batalo, B. and Fukui, K.", TITLE = "Malware Detection Using Kernel Constrained Subspace Method", BOOKTITLE = MVA23, YEAR = "2023", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327249"} @inproceedings{bb332945, AUTHOR = "Dong, Q. and Sun, T.T. and Li, T.W. and Lu, X.Q. and Yan, K.", TITLE = "Anomaly Intrusion Detection in Online Learning Space Based on XGBoost", BOOKTITLE = ICIVC22, YEAR = "2022", PAGES = "968-973", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327250"} @inproceedings{bb332946, AUTHOR = "Li, S.S. and Chen, D. and Zhang, J. and Wang, H.Y. and Li, L. and Qian, Y.Y. and Liu, H.", TITLE = "Software Vulnerability Detection Based on Anomaly-Attention", BOOKTITLE = ICRVC22, YEAR = "2022", PAGES = "261-265", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327251"} @inproceedings{bb332947, AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z.W. and Wang, X. and Jing, R.Q.", TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "3775-3782", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327252"} @inproceedings{bb332948, AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.", TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "9068-9075", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327253"} @inproceedings{bb332949, AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.", TITLE = "Large Scale Graph Based Network Forensics Analysis", BOOKTITLE = IWBDAF20, YEAR = "2020", PAGES = "457-469", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327254"} @inproceedings{bb332950, AUTHOR = "Scalas, M. and Rieck, K. and Giacinto, G.", TITLE = "Explanation-driven Characterization of Android Ransomware", BOOKTITLE = EDL-AI20, YEAR = "2020", PAGES = "228-242", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327255"} @inproceedings{bb332951, AUTHOR = "Chen, L. and Qiu, H.J. and Kuang, X.Y. and Xu, A.D. and Yang, Y.W.", TITLE = "Intelligent Data Security Threat Discovery Model Based on Grid Data", BOOKTITLE = ICIVC21, YEAR = "2021", PAGES = "458-463", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327256"} @inproceedings{bb332952, AUTHOR = "Ikrissi, G. and Mazri, T.", TITLE = "IoT-based Smart Environments: State of the Art, Security Threats and Solutions", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "279-286", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327257"} @inproceedings{bb332953, AUTHOR = "Niu, L. and Song, Y. and Chu, J. and Li, S.", TITLE = "Analysis of the Attacker and Defender GAN Models for the Indoor Navigation Network", BOOKTITLE = ISPRS21, YEAR = "2021", PAGES = "B4-2021: 237-242", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327258"} @inproceedings{bb332954, AUTHOR = "Toka, K.O. and Dikilitas, Y. and Oktay, T. and Sayar, A.", TITLE = "Securing Iot With Blockchain", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "529-532", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327259"} @inproceedings{bb332955, AUTHOR = "Ozarpa, C. and Avci, I. and Kinaci, B.F. and Arapoglu, S. and Kara, S.A.", TITLE = "Cyber Attacks on Scada Based Traffic Light Control Systems in the Smart Cities", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "411-415", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327260"} @inproceedings{bb332956, AUTHOR = "Moulad, L. and Chaabita, R. and Balar, K.", TITLE = "Wireless Sensor Network: Towards An Improvement of Security Policy", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "379-383", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327261"} @inproceedings{bb332957, AUTHOR = "Miryahyaie, S. and Ebrahimpour komleh, H. and Nickfarjam, A.M.", TITLE = "ACO-based Intrusion Detection Method in Computer Networks using Fuzzy Association Rules", BOOKTITLE = IPRIA21, YEAR = "2021", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327262"} @inproceedings{bb332958, AUTHOR = "Mohseni, M. and Tanha, J.", TITLE = "A Density-based Undersampling Approach to Intrusion Detection", BOOKTITLE = IPRIA21, YEAR = "2021", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327263"} @inproceedings{bb332959, AUTHOR = "Liu, Y.G. and Ning, Z. and Zhang, J.J. and Wang, X.P.", TITLE = "Monitory Consensus Mechanism of Blockchain for Internet of Things", BOOKTITLE = ICIVC21, YEAR = "2021", PAGES = "425-430", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327264"} @inproceedings{bb332960, AUTHOR = "Chen, L. and Xian, M. and Liu, J.", TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus", BOOKTITLE = CVIDL20, YEAR = "2020", PAGES = "206-209", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327265"} @inproceedings{bb332961, AUTHOR = "Prima, B. and Bouhorma, M.", TITLE = "Using Transfer Learning for Malware Classification", BOOKTITLE = SmartCityApp20, YEAR = "2020", PAGES = "343-349", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327266"} @inproceedings{bb332962, AUTHOR = "El Bakkouri, N. and Mazri, T.", TITLE = "Security Threats In Smart Healthcare", BOOKTITLE = SmartCityApp20, YEAR = "2020", PAGES = "209-214", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327267"} @inproceedings{bb332963, AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.", TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327268"} @inproceedings{bb332964, AUTHOR = "Mennour, H. and Mostefai, S.", TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327269"} @inproceedings{bb332965, AUTHOR = "Sebbah, A. and Kadri, B.", TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327270"} @inproceedings{bb332966, AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.", TITLE = "DOS attack forecasting: A comparative study on wrapper feature selection", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327271"} @inproceedings{bb332967, AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.", TITLE = "Behavioral Security in Covert Communication Systems", BOOKTITLE = IWDW19, YEAR = "2019", PAGES = "377-392", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327272"} @inproceedings{bb332968, AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.", TITLE = "Intelligent Recognition of TCP Intrusions for Embedded Micro-controllers", BOOKTITLE = NTIAP19, YEAR = "2019", PAGES = "361-373", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327273"} @inproceedings{bb332969, AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.", TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion Detection", BOOKTITLE = ICPR18, YEAR = "2018", PAGES = "682-687", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327274"} @inproceedings{bb332970, AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.", TITLE = "Botnet Detection based on Fuzzy Association Rules", BOOKTITLE = ICPR18, YEAR = "2018", PAGES = "578-584", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327275"} @inproceedings{bb332971, AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.", TITLE = "Cyber Vulnerability: An Attentional Dilemma", BOOKTITLE = VAMR18, YEAR = "2018", PAGES = "II: 331-340", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327276"} @inproceedings{bb332972, AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.", TITLE = "Trust in Autonomous Systems for Threat Analysis: A Simulation Methodology", BOOKTITLE = VAMR18, YEAR = "2018", PAGES = "II: 341-353", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327277"} @article{bb332973, AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.", TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "29-39", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327278"} @article{bb332974, AUTHOR = "Taylor, A. and Leblanc, S. and Japkowicz, N.", TITLE = "Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "54-62", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327279"} @article{bb332975, AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.", TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "63-73", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327280"} @inproceedings{bb332976, AUTHOR = "Menemencioglu, O. and Orak, I.M.", TITLE = "Geographical Assesment of Results From Preventing the Parameter Tampering in A Web Application", BOOKTITLE = GeoAdvances17, YEAR = "2017", PAGES = "69-71", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327281"} @inproceedings{bb332977, AUTHOR = "Herrera Semenets, V. and Perez Garcia, O.A. and Gago Alonso, A. and Hernandez Leon, R.", TITLE = "A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion Detection", BOOKTITLE = CIARP17, YEAR = "2017", PAGES = "289-297", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327282"} @inproceedings{bb332978, AUTHOR = "Mohan, R. and Chaudhury, S. and Lall, B.", TITLE = "Incremental Learning of Non-stationary Temporal Causal Networks for Telecommunication Domain", BOOKTITLE = PReMI17, YEAR = "2017", PAGES = "501-508", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327283"} @inproceedings{bb332979, AUTHOR = "Elejla, O.E. and Belaton, B. and Anbar, M. and Alijla, B.O.", TITLE = "IPv6 OS Fingerprinting Methods: Review", BOOKTITLE = IVIC17, YEAR = "2017", PAGES = "661-668", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327284"} @inproceedings{bb332980, AUTHOR = "Zabri, Z. and Nohuddin, P.N.E.", TITLE = "Analyzing and Detecting Network Intrusion Behavior Using Packet Capture", BOOKTITLE = IVIC17, YEAR = "2017", PAGES = "750-761", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327285"} @inproceedings{bb332981, AUTHOR = "Zyad, E. and Khalid, C. and Mohammed, B.", TITLE = "Combination of R1-PCA and median LDA for anomaly network detection", BOOKTITLE = ISCV17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327286"} @inproceedings{bb332982, AUTHOR = "Alaoui, E.A.A. and Lamhamdi, M.", TITLE = "Study of the energy performance of DTN protocols", BOOKTITLE = ISCV17, YEAR = "2017", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327287"} @inproceedings{bb332983, AUTHOR = "Sadek, B.A. and Houssaine, T.E. and Noreddine, C.", TITLE = "A robust PID controller for active queue management framework in congested routers", BOOKTITLE = ISCV17, YEAR = "2017", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327288"} @inproceedings{bb332984, AUTHOR = "Kempa, W.M.", TITLE = "On buffer overflow duration in WSN with a vacation-type power saving mechanism", BOOKTITLE = WSSIP17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327289"} @inproceedings{bb332985, AUTHOR = "Korona, M. and Skowron, K. and Trzepinski, M. and Rawski, M.", TITLE = "FPGA implementation of IPsec protocol suite for multigigabit networks", BOOKTITLE = WSSIP17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327290"} @inproceedings{bb332986, AUTHOR = "Geller, B.", TITLE = "Advanced synchronization techniques for the Internet of Things", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "180-184", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327291"} @inproceedings{bb332987, AUTHOR = "Yang, J. and Geller, B. and Arbi, T.", TITLE = "Proposal of a multi-standard transceiver for the WBAN Internet of Things", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "369-373", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327292"} @inproceedings{bb332988, AUTHOR = "Massaoudi, A. and Sellami, N. and Siala, M.", TITLE = "On the impact of pdf-matched quantization for heterogeneous cognitive radio networks", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "259-263", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327293"} @inproceedings{bb332989, AUTHOR = "NasrLeila, I. and Atallah, N. and Cherif, S. and Geller, B.", TITLE = "Time synchronization in IoT networks: Case of a wireless body area network", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "297-301", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327294"} @inproceedings{bb332990, AUTHOR = "Rihani, M.A. and Prevotet, J.C. and Nouvel, F. and Mroue, M. and Mohanna, Y.", TITLE = "ARM-FPGA based platform for automated adaptive wireless communication systems using partial reconfiguration technique", BOOKTITLE = DASIP16, YEAR = "2016", PAGES = "113-120", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327295"} @inproceedings{bb332991, AUTHOR = "Moreac, E. and Rossi, A. and Laurent, J. and Bomel, P.", TITLE = "Crosstalk-aware link power model for Networks-on-Chip", BOOKTITLE = DASIP16, YEAR = "2016", PAGES = "121-128", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327296"} @inproceedings{bb332992, AUTHOR = "Abbes, Y. and Najeh, S. and Besbes, H.", TITLE = "Tractable framework for modeling and analyzing Joint CoMP Transmission and eICIC technology in two-tier heterogeneous cellular networks", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327297"} @inproceedings{bb332993, AUTHOR = "Essassi, S. and Hamila, R. and Cherif, S. and Siala, M. and Hasna, M.O.", TITLE = "Power control and RB allocation in cloud radio access networks", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "148-152", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327298"} @inproceedings{bb332994, AUTHOR = "Mashhadi, F. and Asaduzzaman, A. and Mridha, M.F.", TITLE = "A novel resource scheduling approach to improve the reliability of Shuffle-exchange networks", BOOKTITLE = IVPR17, YEAR = "2017", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327299"} @inproceedings{bb332995, AUTHOR = "Xie, J.L. and Dang, J.W. and Li, C. and Lian, X.P. and Lin, J.", TITLE = "Ecology-inspired Admission Control scheme in heterogeneous wireless Networks", BOOKTITLE = ICIVC16, YEAR = "2016", PAGES = "140-144", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327300"} @inproceedings{bb332996, AUTHOR = "Isikdag, U. and Pilouk, M.", TITLE = "Integration Of Geo-sensor Feeds And Event Consumer Services For Real-time Representation of IOT Nodes", BOOKTITLE = ISPRS16, YEAR = "2016", PAGES = "B4: 267-274", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327301"} @inproceedings{bb332997, AUTHOR = "Al Shamisi, A. and Louvieris, P. and Al Mualla, M. and Mihajlov, M.", TITLE = "Towards a theoretical framework for an active cyber situational awareness model", BOOKTITLE = WSSIP16, YEAR = "2016", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327302"} @inproceedings{bb332998, AUTHOR = "Peter, T. and Pavol, H. and Lukas, D.", TITLE = "Implementation and evaluation of IPv6 to IPv4 transition mechanisms in network simulator 3", BOOKTITLE = WSSIP16, YEAR = "2016", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327303"} @inproceedings{bb332999, AUTHOR = "Al Jumeily, D. and Hussain, A. and MacDermott, A. and Seeckts, G. and Lunn, J.", TITLE = "Methods and techniques to support the development of fraud detection system", BOOKTITLE = WSSIP15, YEAR = "2015", PAGES = "224-227", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327304"}