@article{bb372000,
        AUTHOR = "Shang, Y.",
        TITLE = "Subgraph Robustness of Complex Networks Under Attacks",
        JOURNAL = SMCS,
        VOLUME = "49",
        YEAR = "2019",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "821-832",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366109"}

@article{bb372001,
        AUTHOR = "Phetlasy, S. and Ohzahata, S. and Wu, C. and Kato, T.",
        TITLE = "A Sequential Classifiers Combination Method to Reduce False Negative
for Intrusion Detection System",
        JOURNAL = IEICE,
        VOLUME = "E102-D",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366110"}

@article{bb372002,
        AUTHOR = "Gao, N. and Qin, Z. and Jing, X.",
        TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless
Communications",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "938-942",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366111"}

@article{bb372003,
        AUTHOR = "Cho, K. and Lee, S. and Khisti, A.",
        TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable
Batteries",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "971-975",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366112"}

@article{bb372004,
        AUTHOR = "Antal, M. and Egyed Zsigmond, E.",
        TITLE = "Intrusion detection using mouse dynamics",
        JOURNAL = IET-Bio,
        VOLUME = "8",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "285-294",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366113"}

@article{bb372005,
        AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.",
        TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things
Data: A Review and Case Study",
        JOURNAL = RS,
        VOLUME = "11",
        YEAR = "2019",
        NUMBER = "19",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366114"}

@article{bb372006,
        AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.",
        TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366115"}

@article{bb372007,
        AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.",
        TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile
fog computing",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366116"}

@article{bb372008,
        AUTHOR = "Hwang, K.",
        TITLE = "Blocking of operation of unauthorised software using MQTT",
        JOURNAL = IJCVR,
        VOLUME = "9",
        YEAR = "2019",
        NUMBER = "6",
        PAGES = "609-620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366117"}

@article{bb372009,
        AUTHOR = "Chen, X.F. and Yu, S.Z.",
        TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN",
        JOURNAL = IEICE,
        VOLUME = "E99-D",
        YEAR = "2016",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "2395-2399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366118"}

@inproceedings{bb372010,
        AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.",
        TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory
and Mechanism Design",
        BOOKTITLE = MMMod20,
        YEAR = "2020",
        PAGES = "II:651-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366119"}

@article{bb372011,
        AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.",
        TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension
Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "27",
        YEAR = "2020",
        PAGES = "471-475",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366120"}

@article{bb372012,
        AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.",
        TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black
and White Binary Image",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "896-900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366121"}

@article{bb372013,
        AUTHOR = "Kim, K.",
        TITLE = "Intrusion Detection System Using Deep Learning and Its Application to
Wi-Fi Network",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "1433-1447",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366122"}

@inproceedings{bb372014,
        AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.",
        TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams
in Azimuth Plane for WLAN Wireless System",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366123"}

@article{bb372015,
        AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.",
        TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio
Access in IoT Fog Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "728-732",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366124"}

@article{bb372016,
        AUTHOR = "Park, S.H. and Jin, X.",
        TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for
Multi-User Systems",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "917-921",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366125"}

@article{bb372017,
        AUTHOR = "Wang, Z. and Blum, R.S.",
        TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "1002-1005",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366126"}

@article{bb372018,
        AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.",
        TITLE = "Multi-type relational clustering for enterprise cyber-security
networks",
        JOURNAL = PRL,
        VOLUME = "149",
        YEAR = "2021",
        PAGES = "172-178",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366127"}

@article{bb372019,
        AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.",
        TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "4",
        PAGES = "357-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366128"}

@inproceedings{bb372020,
        AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.",
        TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL
Databases",
        BOOKTITLE = MCPR21,
        YEAR = "2021",
        PAGES = "23-32",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366129"}

@article{bb372021,
        AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.",
        TITLE = "CAN-Bus Attack Detection With Deep Learning",
        JOURNAL = ITS,
        VOLUME = "22",
        YEAR = "2021",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5081-5090",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366130"}

@article{bb372022,
        AUTHOR = "Cho, Y.B.",
        TITLE = "Malware classifier for dynamic deep learning algorithm",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "5",
        PAGES = "486-496",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366131"}

@article{bb372023,
        AUTHOR = "Chou, D. and Jiang, M.",
        TITLE = "A Survey on Data-Driven Network Intrusion Detection",
        JOURNAL = Surveys,
        VOLUME = "54",
        YEAR = "2021",
        NUMBER = "9",
        MONTH = "October",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366132"}

@article{bb372024,
        AUTHOR = "Arulananth, T.S. and Baskar, M. and Anbarasu, V. and Thiagarajan, R. and Rajendran, T. and Balaji, A.",
        TITLE = "Multi party secure data access management in cloud using user centric
block chain data encryption",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "295-301",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366133"}

@article{bb372025,
        AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.",
        TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive
Model Resolving the Security Issues in IoT Based Models",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "428-435",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366134"}

@article{bb372026,
        AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.",
        TITLE = "Protection motivation theory using multi-factor authentication for
providing security over social networking sites",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "218-224",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366135"}

@article{bb372027,
        AUTHOR = "Wei, S.M. and Pan, J.H.",
        TITLE = "Resilience of Urban Network Structure in China:
The Perspective of Disruption",
        JOURNAL = IJGI,
        VOLUME = "10",
        YEAR = "2021",
        NUMBER = "12",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366136"}

@article{bb372028,
        AUTHOR = "Saveetha, D. and Maragatham, G.",
        TITLE = "Design of Blockchain enabled intrusion detection model for detecting
security attacks using deep learning",
        JOURNAL = PRL,
        VOLUME = "153",
        YEAR = "2022",
        PAGES = "24-28",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366137"}

@article{bb372029,
        AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.",
        TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature
Selection",
        JOURNAL = IEICE,
        VOLUME = "E105-D",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1024-1038",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366138"}

@article{bb372030,
        AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.",
        TITLE = "Cloud security based attack detection using transductive learning
integrated with Hidden Markov Model",
        JOURNAL = PRL,
        VOLUME = "157",
        YEAR = "2022",
        PAGES = "16-26",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366139"}

@article{bb372031,
        AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.",
        TITLE = "Network optimization using defender system in cloud computing
security based intrusion detection system withgame theory deep neural
network (IDSGT-DNN)",
        JOURNAL = PRL,
        VOLUME = "156",
        YEAR = "2022",
        PAGES = "142-151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366140"}

@article{bb372032,
        AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.",
        TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to
Denial-of-Service Attacks",
        JOURNAL = SMCS,
        VOLUME = "52",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "3326-3336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366141"}

@article{bb372033,
        AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.T.",
        TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366142"}

@article{bb372034,
        AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.",
        TITLE = "Task adaptive siamese neural networks for open-set recognition of
encrypted network traffic with bidirectional dropout",
        JOURNAL = PRL,
        VOLUME = "159",
        YEAR = "2022",
        PAGES = "132-139",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366143"}

@article{bb372035,
        AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.",
        TITLE = "Automated Software Defect Detection and Identification in Vehicular
Embedded Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6963-6973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366144"}

@article{bb372036,
        AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.",
        TITLE = "An Intrusion Detection Method Based on Machine Learning and State
Observer for Train-Ground Communication Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6608-6620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366145"}

@article{bb372037,
        AUTHOR = "Kye, H. and Kim, M. and Kwon, M.",
        TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised
Learning Approach",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "1908-1912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366146"}

@article{bb372038,
        AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.",
        TITLE = "Wrapper feature selection method based differential evolution and
extreme learning machine for intrusion detection system",
        JOURNAL = PR,
        VOLUME = "132",
        YEAR = "2022",
        PAGES = "108912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366147"}

@article{bb372039,
        AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.",
        TITLE = "Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "17425-17439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366148"}

@article{bb372040,
        AUTHOR = "Sathish, N. and Valarmathi, N.",
        TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's
chi-squared distribution and decision tree classifiers",
        JOURNAL = PRL,
        VOLUME = "162",
        YEAR = "2022",
        PAGES = "15-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366149"}

@article{bb372041,
        AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.",
        TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular
Networks",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "22596-22606",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366150"}

@inproceedings{bb372042,
        AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.",
        TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior
Profiling",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "1865-1870",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366151"}

@article{bb372043,
        AUTHOR = "Wang, Y.Z. and Liu, Q. and Mihankhah, E. and Lv, C. and Wang, D.",
        TITLE = "Detection and Isolation of Sensor Attacks for Autonomous Vehicles:
Framework, Algorithms, and Validation",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "8247-8259",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366152"}

@article{bb372044,
        AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Al Otaibi, S. and Tian, Z.H.",
        TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and
Weight Self-Learning",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7642-7652",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366153"}

@article{bb372045,
        AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.",
        TITLE = "Detecting Android Malware With Pre-Existing Image Classification
Neural Networks",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "858-862",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366154"}

@article{bb372046,
        AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.",
        TITLE = "Distributed edge-event-triggered consensus of multi-agent system
under DoS attack",
        JOURNAL = PRL,
        VOLUME = "174",
        YEAR = "2023",
        PAGES = "118-123",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366155"}

@article{bb372047,
        AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z.L. and Deng, Z.Y. and Ling, X. and Xiang, W.",
        TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet
traffic data",
        JOURNAL = PR,
        VOLUME = "146",
        YEAR = "2024",
        PAGES = "109999",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366156"}

@article{bb372048,
        AUTHOR = "Lee, S. and Choi, W. and Jo, H.J. and Lee, D.H.",
        TITLE = "ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive
Intrusion Detection System",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12406-12421",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366157"}

@article{bb372049,
        AUTHOR = "Zhou, J. and Xie, G.Q. and Zeng, H.B. and Zhang, W.Z. and Yang, L.T. and Alazab, M. and Li, R.",
        TITLE = "A Model-Based Method for Enabling Source Mapping and Intrusion
Detection on Proprietary Can Bus",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12922-12932",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366158"}

@article{bb372050,
        AUTHOR = "Chougule, A. and Kohli, V. and Chamola, V. and Yu, F.R.",
        TITLE = "Multibranch Reconstruction Error (MbRE) Intrusion Detection
Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc
Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "13068-13077",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366159"}

@article{bb372051,
        AUTHOR = "Almutlaq, S. and Derhab, A. and Hassan, M.M. and Kaur, K.",
        TITLE = "Two-Stage Intrusion Detection System in Intelligent Transportation
Systems Using Rule Extraction Methods From Deep Neural Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15687-15701",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366160"}

@article{bb372052,
        AUTHOR = "Qian, Z.J. and Zhong, S. and Sun, G.F. and Xing, X.S. and Jin, Y.",
        TITLE = "A Formal Approach to Design and Security Verification of Operating
Systems for Intelligent Transportation Systems Based on Object Model",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15459-15467",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366161"}

@article{bb372053,
        AUTHOR = "da Cruz, M.A.A. and Abbade, L.R. and Lorenz, P. and Mafra, S.B. and Rodrigues, J.J.P.C.",
        TITLE = "Detecting Compromised IoT Devices Through XGBoost",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15392-15399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366162"}

@article{bb372054,
        AUTHOR = "Li, Y. and Zhu, L. and Wang, H.W. and Yu, F.R. and Tang, T. and Zhang, D.J.",
        TITLE = "Joint Security and Resources Allocation Scheme Design in Edge
Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "13948-13961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366163"}

@article{bb372055,
        AUTHOR = "Zahid, M.U. and Nisar, M.D. and Shah, M.H. and Hussain, S.A.",
        TITLE = "Specific Emitter Identification Based on Multi-Scale
Multi-Dimensional Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "850-854",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366164"}

@article{bb372056,
        AUTHOR = "Prashanthi, M. and Mohan, M.C.",
        TITLE = "Hybrid Optimization-Based Neural Network Classifier for Software Defect
Prediction",
        JOURNAL = IJIG,
        VOLUME = "24",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "July",
        PAGES = "2450045",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366165"}

@article{bb372057,
        AUTHOR = "Shumovskaia, V. and Kayaalp, M. and Sayed, A.H.",
        TITLE = "Detection of Malicious Agents in Social Learning",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "1745-1749",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366166"}

@article{bb372058,
        AUTHOR = "Lavanya, V. and Sekhar, P.C.",
        TITLE = "Efficient Cybersecurity Model Using Wavelet Deep CNN and Enhanced Rain
Optimization Algorithm",
        JOURNAL = IJIG,
        VOLUME = "24",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "July",
        PAGES = "2450048",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366167"}

@article{bb372059,
        AUTHOR = "Darabi, B. and Bag Mohammadi, M. and Karami, M.",
        TITLE = "A micro Reinforcement Learning architecture for Intrusion Detection
Systems",
        JOURNAL = PRL,
        VOLUME = "185",
        YEAR = "2024",
        PAGES = "81-86",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366168"}

@article{bb372060,
        AUTHOR = "Yan, P. and Tan, S.Q. and Wang, M. and Huang, J.W.",
        TITLE = "Enhanced Dynamic Analysis for Malware Detection With Gradient Attack",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "2825-2829",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366169"}

@article{bb372061,
        AUTHOR = "He, X.F. and Li, L.X. and Peng, H.P. and Tong, F.H.",
        TITLE = "An Efficient Image Privacy Preservation Scheme for Smart City
Applications Using Compressive Sensing and Multi-Level Encryption",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "14958-14972",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366170"}

@article{bb372062,
        AUTHOR = "Prathibha, L. and Fatima, K.",
        TITLE = "A Novel High-Speed Data Encryption Scheme for Internet of Medical
Things Using Modified Elliptic Curve Diffie-Hellman and Advance
Encryption Standard",
        JOURNAL = IJIG,
        VOLUME = "24",
        YEAR = "2024",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "2340004",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366171"}

@article{bb372063,
        AUTHOR = "Cai, X. and Shi, K. and Sun, Y.B. and Cao, J.D. and Kwon, O.M. and Qiao, C. and Tian, Z.H.",
        TITLE = "Design of Intelligent Control Under Machine Learning Supervision and
Signal Compression Mechanism Design for NCSs Under DoS Attacks",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "15116-15121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366172"}

@article{bb372064,
        AUTHOR = "Qi, W.H. and Yin, H. and Park, J.H. and Wu, Z.G. and Yan, H.C.",
        TITLE = "Intelligent Finite-Time Protocol-Based Stabilization for Networked
UMV Systems With DoS Attacks",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "16734-16744",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366173"}

@article{bb372065,
        AUTHOR = "Gao, D. and Ou, L.Y. and Liu, Y. and Yang, Q. and Wang, H.G.",
        TITLE = "DeepSpoof: Deep Reinforcement Learning-Based Spoofing Attack in
Cross-Technology Multimedia Communication",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "10879-10891",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366174"}

@article{bb372066,
        AUTHOR = "Yu, W. and Huang, D.Q. and Wang, X.L. and Xu, K.",
        TITLE = "Recovery-Based Distributed Adaptive ILC With Fading Compensation for
MHSTs Under DoS Attacks: A Model-Free Approach",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "20535-20546",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366175"}

@article{bb372067,
        AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.",
        TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive
Neural Networks",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "29-39",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366176"}

@article{bb372068,
        AUTHOR = "Liu, G. and Tian, E. and Zhao, X. and Chen, H.",
        TITLE = "Critical-Area-Based Stochastic DoS Attack Strategy Design Against
Remote State Estimation in Multi-Area Power Systems",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "291-295",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366177"}

@article{bb372069,
        AUTHOR = "Jin, Z.W. and Ma, M. and Wang, Z. and Sun, C.Y.",
        TITLE = "Optimal Transmission Schedule With Privacy Preservation for
Cyber-Physical System Against Eavesdropping Attack",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "436-440",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366178"}

@article{bb372070,
        AUTHOR = "Pan, X.D. and Zhang, M. and Yan, Y.F. and Zhang, S.Y. and Yang, M.",
        TITLE = "Matryoshka: Exploiting the Over-Parametrization of Deep Learning
Models for Covert Data Transmission",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "663-678",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366179"}

@article{bb372071,
        AUTHOR = "Carletti, V. and Foggia, P. and Rosa, F. and Vento, M.",
        TITLE = "Detecting malicious IoT network communication through Graph Neural
Networks in real-world conditions",
        JOURNAL = PRL,
        VOLUME = "189",
        YEAR = "2025",
        PAGES = "92-98",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366180"}

@article{bb372072,
        AUTHOR = "Adelipour, S. and Razgahi, E.A.D. and Haeri, M.",
        TITLE = "Vulnerability Mitigation of Urban Traffic Control Against
Cyberattacks Using Secure Multi-Party Computation",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "4568-4578",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366181"}

@article{bb372073,
        AUTHOR = "Kayyidavazhiyil, A.",
        TITLE = "Combined Tri-Classifiers for IoT Botnet Detection with Tuned Training
Weights",
        JOURNAL = IJIG,
        VOLUME = "25",
        YEAR = "2025",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "2550007",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366182"}

@article{bb372074,
        AUTHOR = "Wazid, M. and Singh, J. and Pandey, C. and Sherratt, R.S. and Das, A.K. and Giri, D. and Park, Y.",
        TITLE = "Explainable Deep Learning-Enabled Malware Attack Detection for
IoT-Enabled Intelligent Transportation Systems",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "7231-7244",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366183"}

@article{bb372075,
        AUTHOR = "Whig, P. and Sharma, R.",
        TITLE = "Synergising machine learning and blockchain for enhanced fraud
detection",
        JOURNAL = IJCVR,
        VOLUME = "15",
        YEAR = "2025",
        NUMBER = "3",
        PAGES = "269-285",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366184"}

@article{bb372076,
        AUTHOR = "Chandan, M. and Santhi, S.G. and Rao, T.S.",
        TITLE = "Combined Shallow and Deep Learning Models for Malware Detection in Wsn",
        JOURNAL = IJIG,
        VOLUME = "25",
        YEAR = "2025",
        NUMBER = "4",
        MONTH = "July",
        PAGES = "2550034",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366185"}

@article{bb372077,
        AUTHOR = "Wei, L. and Yang, J. and Jin, H. and Cui, J. and Li, J.X. and He, D.",
        TITLE = "Sustainable Learning-Based Intrusion Detection System for VANETs",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "10080-10091",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366186"}

@article{bb372078,
        AUTHOR = "Liu, Y.Y. and Xue, L. and Wang, S. and Luo, X. and Zhao, K. and Jing, P.F. and Ma, X.B. and Tang, Y. and Zhou, H.Y.",
        TITLE = "Vehicular Intrusion Detection System for Controller Area Network:
A Comprehensive Survey and Evaluation",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "10979-11009",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366187"}

@article{bb372079,
        AUTHOR = "Zhang, R. and Liu, L. and Park, J.H. and Zeng, D.Q. and Xie, X.P.",
        TITLE = "Secure Consensus for Multi-Agent Systems With Euler-Lagrange Dynamics
and Multiple DoS Attacks",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "10008-10018",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366188"}

@article{bb372080,
        AUTHOR = "Ma, J.H. and Du, Y.F. and Liu, M.L. and Luo, X.Y. and Li, J.",
        TITLE = "AIBW: Average Interval-Based Watermarking for Tracking Down Network
Attacks",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "2977-2981",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366189"}

@article{bb372081,
        AUTHOR = "Mehdi, S.A. and Hussain, S.Z.",
        TITLE = "Experimentative analysis of artificial immune system algorithms for
intrusion detection in IoT networks",
        JOURNAL = IJCVR,
        VOLUME = "15",
        YEAR = "2025",
        NUMBER = "5",
        PAGES = "577-587",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366190"}

@article{bb372082,
        AUTHOR = "Wang, X. and Ma, L. and Das, S.K. and Liu, Z.H.",
        TITLE = "ReMeNet: A Memory-Enhanced GAN Model for Intrusion Detection in
Transportation Cyber-Physical Systems",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "14264-14276",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366191"}

@article{bb372083,
        AUTHOR = "Qiu, C.Y. and Nan, G. and Xia, H.R. and Weng, Z. and Wang, X.T. and Shen, M. and Tao, X.F. and Liu, J.",
        TITLE = "Disentangled Dynamic Intrusion Detection",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "10528-10545",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366192"}

@article{bb372084,
        AUTHOR = "Li, Y. and Zhang, J.X. and Wang, X.L. and Guan, X.P.",
        TITLE = "An Optimal Hybrid Fake-Acknowledgment Attack Strategy on State
Estimation With Energy Constraint",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "3804-3808",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366193"}

@article{bb372085,
        AUTHOR = "Ullah, I. and Khalil, I. and Bai, X.S. and Garg, S. and Kaddoum, G. and Hossain, M.S.",
        TITLE = "An Ensemble-Based Hybrid Model for the Detection of Attacks in the
Internet of Vehicular Things",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "17914-17927",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366194"}

@article{bb372086,
        AUTHOR = "Satheesh, K.K.S.V.A. and Sree, T.K.",
        TITLE = "Enhancing cloud security with authentication for securing sensitive
information",
        JOURNAL = PR,
        VOLUME = "171",
        YEAR = "2026",
        PAGES = "112345",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366195"}

@article{bb372087,
        AUTHOR = "Chen, M. and Zhang, R. and Liu, L. and Zeng, D.Q. and Zhang, L. and Xiao, J.",
        TITLE = "Secure Consensus of MASs Subject to DoS Attacks: A New
Dynamic-Memory-Weight-Dependent Security Control Protocol",
        JOURNAL = SMCS,
        VOLUME = "55",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "9722-9737",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366196"}

@article{bb372088,
        AUTHOR = "Guo, C. and Gong, B. and Li, Z. and Gong, M. and Zhu, H.T.",
        TITLE = "FORT: A Forward Secure and Threshold Authorized Multi-Authority
Attribute-Based Signature Scheme for Multimedia IoT",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "8859-8874",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366197"}

@article{bb372089,
        AUTHOR = "Xu, J.J. and Li, Y. and Wang, Z. and Li, Y.C. and Guan, X.P.",
        TITLE = "An Optimal Periodic Attack Schedule Against Estimation Over
Infinite-Time Horizon",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "4099-4103",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366198"}

@article{bb372090,
        AUTHOR = "Zhang, A. and Sun, Z. and Jiang, Q.G. and Wang, K. and Li, M. and Wang, B.L.",
        TITLE = "LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle
Network Intrusion Detection",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "23358-23373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366199"}

@article{bb372091,
        AUTHOR = "Benghename, Y. and Lounis, A. and Sallak, M. and Schon, W.",
        TITLE = "Cybersecurity Standards Across Industries: A Critical Analysis of
Current Practices and Future Directions in the Railway Sector",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "21371-21392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366200"}

@article{bb372092,
        AUTHOR = "Razzaq, H.H. and Al Rammahi, L.F.M.H. and Mahdi, A.M.",
        TITLE = "Modified Whale Algorithm and Morley PSO-ML-Based Hyperparameter
Optimization for Intrusion Detection",
        JOURNAL = IJIG,
        VOLUME = "26",
        YEAR = "2026",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "2650009",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366201"}

@article{bb372093,
        AUTHOR = "Shao, Z. and Ding, W.R. and Zhang, D. and Xiao, J. and Zhang, H. and Zheng, Y.K.",
        TITLE = "Cross-attention relation network based on metric learning for
few-shot specific emitter identification",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112699",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366202"}

@inproceedings{bb372094,
        AUTHOR = "Berqia, A. and Bouijij, H. and Merimi, A. and Ouaggane, A.",
        TITLE = "Detecting DDoS Attacks using Machine Learning in IoT Environment",
        BOOKTITLE = ISCV24,
        YEAR = "2024",
        PAGES = "1-8",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366203"}

@inproceedings{bb372095,
        AUTHOR = "Hsu, T.C. and Lu, H.S.",
        TITLE = "Designing a Secure and Scalable Service Model Using Blockchain and
MQTT for IoT Devices",
        BOOKTITLE = IoTDesign24,
        YEAR = "2024",
        PAGES = "645-653",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366204"}

@inproceedings{bb372096,
        AUTHOR = "Kannan, B.B. and Sriramulu, S.",
        TITLE = "Hybrid Convolutional Neural Networks To Create An Attack Detection
Framework For A Wireless Sensor Network Based Health Care Application",
        BOOKTITLE = ICCVMI23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366205"}

@inproceedings{bb372097,
        AUTHOR = "Tang, F. and Yu, B.Y. and Zhao, S.X. and Xu, M.",
        TITLE = "Towards Fraudulent URL Classification with Large Language Model based
on Deep Learning",
        BOOKTITLE = CVIDL23,
        YEAR = "2023",
        PAGES = "503-507",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366206"}

@inproceedings{bb372098,
        AUTHOR = "Benchadi, D.Y.M. and Batalo, B. and Fukui, K.",
        TITLE = "Malware Detection Using Kernel Constrained Subspace Method",
        BOOKTITLE = MVA23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366207"}

@inproceedings{bb372099,
        AUTHOR = "Dong, Q. and Sun, T.T. and Li, T.W. and Lu, X.Q. and Yan, K.",
        TITLE = "Anomaly Intrusion Detection in Online Learning Space Based on XGBoost",
        BOOKTITLE = ICIVC22,
        YEAR = "2022",
        PAGES = "968-973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT366208"}

Last update:Jan 8, 2026 at 12:52:16