@inproceedings{bb373100,
AUTHOR = "Moulad, L. and Chaabita, R. and Balar, K.",
TITLE = "Wireless Sensor Network: Towards An Improvement of Security Policy",
BOOKTITLE = SmartCityApp21,
YEAR = "2021",
PAGES = "379-383",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367208"}
@inproceedings{bb373101,
AUTHOR = "Miryahyaie, S. and Ebrahimpour komleh, H. and Nickfarjam, A.M.",
TITLE = "ACO-based Intrusion Detection Method in Computer Networks using Fuzzy
Association Rules",
BOOKTITLE = IPRIA21,
YEAR = "2021",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367209"}
@inproceedings{bb373102,
AUTHOR = "Mohseni, M. and Tanha, J.",
TITLE = "A Density-based Undersampling Approach to Intrusion Detection",
BOOKTITLE = IPRIA21,
YEAR = "2021",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367210"}
@inproceedings{bb373103,
AUTHOR = "Liu, Y.G. and Ning, Z.H. and Zhang, J.J. and Wang, X.P.",
TITLE = "Monitory Consensus Mechanism of Blockchain for Internet of Things",
BOOKTITLE = ICIVC21,
YEAR = "2021",
PAGES = "425-430",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367211"}
@inproceedings{bb373104,
AUTHOR = "Chen, L. and Xian, M. and Liu, J.",
TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus",
BOOKTITLE = CVIDL20,
YEAR = "2020",
PAGES = "206-209",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367212"}
@inproceedings{bb373105,
AUTHOR = "Prima, B. and Bouhorma, M.",
TITLE = "Using Transfer Learning for Malware Classification",
BOOKTITLE = SmartCityApp20,
YEAR = "2020",
PAGES = "343-349",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367213"}
@inproceedings{bb373106,
AUTHOR = "El Bakkouri, N. and Mazri, T.",
TITLE = "Security Threats In Smart Healthcare",
BOOKTITLE = SmartCityApp20,
YEAR = "2020",
PAGES = "209-214",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367214"}
@inproceedings{bb373107,
AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.",
TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367215"}
@inproceedings{bb373108,
AUTHOR = "Mennour, H. and Mostefai, S.",
TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367216"}
@inproceedings{bb373109,
AUTHOR = "Sebbah, A. and Kadri, B.",
TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC
and Fuzzy Extractor",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367217"}
@inproceedings{bb373110,
AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.",
TITLE = "DOS attack forecasting: A comparative study on wrapper feature
selection",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367218"}
@inproceedings{bb373111,
AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.",
TITLE = "Behavioral Security in Covert Communication Systems",
BOOKTITLE = IWDW19,
YEAR = "2019",
PAGES = "377-392",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367219"}
@inproceedings{bb373112,
AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.",
TITLE = "Intelligent Recognition of TCP Intrusions for Embedded
Micro-controllers",
BOOKTITLE = NTIAP19,
YEAR = "2019",
PAGES = "361-373",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367220"}
@inproceedings{bb373113,
AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.",
TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion
Detection",
BOOKTITLE = ICPR18,
YEAR = "2018",
PAGES = "682-687",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367221"}
@inproceedings{bb373114,
AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.",
TITLE = "Botnet Detection based on Fuzzy Association Rules",
BOOKTITLE = ICPR18,
YEAR = "2018",
PAGES = "578-584",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367222"}
@inproceedings{bb373115,
AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.",
TITLE = "Cyber Vulnerability: An Attentional Dilemma",
BOOKTITLE = VAMR18,
YEAR = "2018",
PAGES = "II: 331-340",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367223"}
@inproceedings{bb373116,
AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.",
TITLE = "Trust in Autonomous Systems for Threat Analysis:
A Simulation Methodology",
BOOKTITLE = VAMR18,
YEAR = "2018",
PAGES = "II: 341-353",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367224"}
@article{bb373117,
AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.",
TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet
of Things: A Text-Mining Approach",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "63-73",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367225"}
@inproceedings{bb373118,
AUTHOR = "Menemencioglu, O. and Orak, I.M.",
TITLE = "Geographical Assesment of Results From Preventing the Parameter
Tampering in A Web Application",
BOOKTITLE = GeoAdvances17,
YEAR = "2017",
PAGES = "69-71",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367226"}
@inproceedings{bb373119,
AUTHOR = "Herrera Semenets, V. and Perez Garcia, O.A. and Gago Alonso, A. and Hernandez Leon, R.",
TITLE = "A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion
Detection",
BOOKTITLE = CIARP17,
YEAR = "2017",
PAGES = "289-297",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367227"}
@inproceedings{bb373120,
AUTHOR = "Mohan, R. and Chaudhury, S. and Lall, B.",
TITLE = "Incremental Learning of Non-stationary Temporal Causal Networks for
Telecommunication Domain",
BOOKTITLE = PReMI17,
YEAR = "2017",
PAGES = "501-508",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367228"}
@inproceedings{bb373121,
AUTHOR = "Elejla, O.E. and Belaton, B. and Anbar, M. and Alijla, B.O.",
TITLE = "IPv6 OS Fingerprinting Methods: Review",
BOOKTITLE = IVIC17,
YEAR = "2017",
PAGES = "661-668",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367229"}
@inproceedings{bb373122,
AUTHOR = "Zabri, Z. and Nohuddin, P.N.E.",
TITLE = "Analyzing and Detecting Network Intrusion Behavior Using Packet Capture",
BOOKTITLE = IVIC17,
YEAR = "2017",
PAGES = "750-761",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367230"}
@inproceedings{bb373123,
AUTHOR = "Zyad, E. and Khalid, C. and Mohammed, B.",
TITLE = "Combination of R1-PCA and median LDA for anomaly network detection",
BOOKTITLE = ISCV17,
YEAR = "2017",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367231"}
@inproceedings{bb373124,
AUTHOR = "Alaoui, E.A.A. and Lamhamdi, M.",
TITLE = "Study of the energy performance of DTN protocols",
BOOKTITLE = ISCV17,
YEAR = "2017",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367232"}
@inproceedings{bb373125,
AUTHOR = "Sadek, B.A. and Houssaine, T.E. and Noreddine, C.",
TITLE = "A robust PID controller for active queue management framework in
congested routers",
BOOKTITLE = ISCV17,
YEAR = "2017",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367233"}
@inproceedings{bb373126,
AUTHOR = "Kempa, W.M.",
TITLE = "On buffer overflow duration in WSN with a vacation-type power saving
mechanism",
BOOKTITLE = WSSIP17,
YEAR = "2017",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367234"}
@inproceedings{bb373127,
AUTHOR = "Korona, M. and Skowron, K. and Trzepinski, M. and Rawski, M.",
TITLE = "FPGA implementation of IPsec protocol suite for multigigabit networks",
BOOKTITLE = WSSIP17,
YEAR = "2017",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367235"}
@inproceedings{bb373128,
AUTHOR = "Geller, B.",
TITLE = "Advanced synchronization techniques for the Internet of Things",
BOOKTITLE = ISIVC16,
YEAR = "2016",
PAGES = "180-184",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367236"}
@inproceedings{bb373129,
AUTHOR = "Yang, J. and Geller, B. and Arbi, T.",
TITLE = "Proposal of a multi-standard transceiver for the WBAN Internet of
Things",
BOOKTITLE = ISIVC16,
YEAR = "2016",
PAGES = "369-373",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367237"}
@inproceedings{bb373130,
AUTHOR = "Massaoudi, A. and Sellami, N. and Siala, M.",
TITLE = "On the impact of pdf-matched quantization for heterogeneous cognitive
radio networks",
BOOKTITLE = ISIVC16,
YEAR = "2016",
PAGES = "259-263",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367238"}
@inproceedings{bb373131,
AUTHOR = "NasrLeila, I. and Atallah, N. and Cherif, S. and Geller, B.",
TITLE = "Time synchronization in IoT networks:
Case of a wireless body area network",
BOOKTITLE = ISIVC16,
YEAR = "2016",
PAGES = "297-301",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367239"}
@inproceedings{bb373132,
AUTHOR = "Rihani, M.A. and Prevotet, J.C. and Nouvel, F. and Mroue, M. and Mohanna, Y.",
TITLE = "ARM-FPGA based platform for automated adaptive wireless communication
systems using partial reconfiguration technique",
BOOKTITLE = DASIP16,
YEAR = "2016",
PAGES = "113-120",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367240"}
@inproceedings{bb373133,
AUTHOR = "Moreac, E. and Rossi, A. and Laurent, J. and Bomel, P.",
TITLE = "Crosstalk-aware link power model for Networks-on-Chip",
BOOKTITLE = DASIP16,
YEAR = "2016",
PAGES = "121-128",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367241"}
@inproceedings{bb373134,
AUTHOR = "Abbes, Y. and Najeh, S. and Besbes, H.",
TITLE = "Tractable framework for modeling and analyzing Joint CoMP
Transmission and eICIC technology in two-tier heterogeneous cellular
networks",
BOOKTITLE = ISIVC16,
YEAR = "2016",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367242"}
@inproceedings{bb373135,
AUTHOR = "Essassi, S. and Hamila, R. and Cherif, S. and Siala, M. and Hasna, M.O.",
TITLE = "Power control and RB allocation in cloud radio access networks",
BOOKTITLE = ISIVC16,
YEAR = "2016",
PAGES = "148-152",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367243"}
@inproceedings{bb373136,
AUTHOR = "Mashhadi, F. and Asaduzzaman, A. and Mridha, M.F.",
TITLE = "A novel resource scheduling approach to improve the reliability of
Shuffle-exchange networks",
BOOKTITLE = IVPR17,
YEAR = "2017",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367244"}
@inproceedings{bb373137,
AUTHOR = "Xie, J.L. and Dang, J.W. and Li, C.R. and Lian, X.P. and Lin, J.T.",
TITLE = "Ecology-inspired Admission Control scheme in heterogeneous wireless
Networks",
BOOKTITLE = ICIVC16,
YEAR = "2016",
PAGES = "140-144",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367245"}
@inproceedings{bb373138,
AUTHOR = "Isikdag, U. and Pilouk, M.",
TITLE = "Integration Of Geo-sensor Feeds And Event Consumer Services For
Real-time Representation of IOT Nodes",
BOOKTITLE = ISPRS16,
YEAR = "2016",
PAGES = "B4: 267-274",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367246"}
@inproceedings{bb373139,
AUTHOR = "Al Shamisi, A. and Louvieris, P. and Al Mualla, M. and Mihajlov, M.",
TITLE = "Towards a theoretical framework for an active cyber situational
awareness model",
BOOKTITLE = WSSIP16,
YEAR = "2016",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367247"}
@inproceedings{bb373140,
AUTHOR = "Peter, T. and Pavol, H. and Lukas, D.",
TITLE = "Implementation and evaluation of IPv6 to IPv4 transition mechanisms
in network simulator 3",
BOOKTITLE = WSSIP16,
YEAR = "2016",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367248"}
@inproceedings{bb373141,
AUTHOR = "Al Jumeily, D. and Hussain, A. and MacDermott, A. and Seeckts, G. and Lunn, J.",
TITLE = "Methods and techniques to support the development of fraud detection
system",
BOOKTITLE = WSSIP15,
YEAR = "2015",
PAGES = "224-227",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367249"}
@inproceedings{bb373142,
AUTHOR = "Safiulin, I. and Schwarz, S. and Rupp, M.",
TITLE = "System level simulation of LTE MBSFN networks with high mobility
users",
BOOKTITLE = WSSIP15,
YEAR = "2015",
PAGES = "21-24",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367250"}
@inproceedings{bb373143,
AUTHOR = "Berisha, T. and Midoglu, C. and Homayouni, S. and Svoboda, P. and Rupp, M.",
TITLE = "Measurement setup for automatized baselining of WLAN network
performance",
BOOKTITLE = WSSIP15,
YEAR = "2015",
PAGES = "25-28",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367251"}
@inproceedings{bb373144,
AUTHOR = "Marah, H.M. and Elrajubi, O.M. and Abouda, A.A.",
TITLE = "Fraud detection in international calls using fuzzy logic",
BOOKTITLE = ICCVIA15,
YEAR = "2015",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367252"}
@inproceedings{bb373145,
AUTHOR = "Lu, C.L. and Zhai, L. and Liu, T. and Li, N.",
TITLE = "Network Intrusion Detection Based on Neural Networks and D-S Evidence",
BOOKTITLE = VSWS15,
YEAR = "2015",
PAGES = "332-343",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367253"}
@inproceedings{bb373146,
AUTHOR = "Wei, Z. and Deng, R.H. and Shen, J. and Zhu, J.X. and Ouyang, K. and Wu, Y.D.",
TITLE = "Multidimensional Context Awareness in Mobile Devices",
BOOKTITLE = MMMod15,
YEAR = "2015",
PAGES = "II: 38-49",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367254"}
@inproceedings{bb373147,
AUTHOR = "Ju, X.Y.",
TITLE = "Android malware detection through permission and package",
BOOKTITLE = ICWAPR14,
YEAR = "2014",
PAGES = "61-65",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367255"}
@inproceedings{bb373148,
AUTHOR = "Kuri Morales, A. and Cortes Arce, I.",
TITLE = "Improved Performance of Computer Networks by Embedded Pattern Detection",
BOOKTITLE = MCPR14,
YEAR = "2014",
PAGES = "21-30",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367256"}
@inproceedings{bb373149,
AUTHOR = "Vegh, L. and Miclea, L.",
TITLE = "A new approach towards increased security in cyber-physical systems",
BOOKTITLE = WSSIP14,
YEAR = "2014",
PAGES = "175-178",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367257"}
@inproceedings{bb373150,
AUTHOR = "Dziurzanski, P. and Maka, T.",
TITLE = "Network on chips link bandwidth minimization of deadlock-free
multi-path routing",
BOOKTITLE = WSSIP14,
YEAR = "2014",
PAGES = "131-134",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367258"}
@inproceedings{bb373151,
AUTHOR = "Serrano, J.M.B. and Palancar, J.H. and Cumplido, R.",
TITLE = "High Throughput Signature Based Platform for Network Intrusion
Detection",
BOOKTITLE = CIARP13,
YEAR = "2013",
PAGES = "II:544-551",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367259"}
@inproceedings{bb373152,
AUTHOR = "Saxena, S. and Kumar, A. and Roy, S.S.",
TITLE = "Determination of network vulnerability factor using rough set",
BOOKTITLE = ICSIPR13,
YEAR = "2013",
PAGES = "263-268",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367260"}
@inproceedings{bb373153,
AUTHOR = "Tran, T. and Ha, Q.P.",
TITLE = "Parameterised quadratic constraints for network systems subject to
multiple communication topologies",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "221-228",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367261"}
@inproceedings{bb373154,
AUTHOR = "Xin, K. and Cao, X.H. and Cheng, P. and Chen, J.M.",
TITLE = "Optimal controller location in wireless sensor and actuator networks",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "560-565",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367262"}
@inproceedings{bb373155,
AUTHOR = "Wu, M.Q. and Xia, Y.Q. and Fu, M.Y.",
TITLE = "Application of NPC in wireless networked control systems",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "584-589",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367263"}
@inproceedings{bb373156,
AUTHOR = "Xu, J. and Xie, L.H. and Khanna, N. and Chee, W.H.",
TITLE = "Cooperative control in HNMSim: A 3D hybrid networked MAS simulator",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "626-631",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367264"}
@inproceedings{bb373157,
AUTHOR = "Yuan, X.D. and Yu, M. and Xiao, W.D.",
TITLE = "Robust stabilization of multiple coupled networked control system via
jump linear system approach",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "690-694",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367265"}
@inproceedings{bb373158,
AUTHOR = "Cheng, H. and Chen, Y. and Wong, W.S. and Yang, Q. and Shen, L.F.",
TITLE = "Protocol sequence based wireless media access control in networked
control systems",
BOOKTITLE = ICARCV12,
YEAR = "2012",
PAGES = "707-712",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367266"}
@inproceedings{bb373159,
AUTHOR = "Corona, I. and Tronci, R. and Giacinto, G.",
TITLE = "SuStorID: A multiple classifier system for the protection of web
services",
BOOKTITLE = ICPR12,
YEAR = "2012",
PAGES = "2375-2378",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367267"}
@inproceedings{bb373160,
AUTHOR = "Gao, Y.Q. and Zheng, S.J.",
TITLE = "A metadata access strategy of learning resources based on HDFS",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "620-622",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367268"}
@inproceedings{bb373161,
AUTHOR = "Yang, F.Y. and Liu, H.C.",
TITLE = "Research in HDFS based on the campus network environment",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "648-652",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367269"}
@inproceedings{bb373162,
AUTHOR = "Zhang, R.Z. and Li, L.Q. and Zhang, C.J.",
TITLE = "The application of middleware technology to communication network
real-time monitoring system",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "488-491",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367270"}
@inproceedings{bb373163,
AUTHOR = "Huang, W. and Zheng, S.J. and Zhang, P.",
TITLE = "Research of data packet transmission based on SMS services",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "557-560",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367271"}
@inproceedings{bb373164,
AUTHOR = "Zhao, F.Z. and Li, R. and Kang, Y.B.",
TITLE = "Stability analysis of FAST TCP using PI transfer function",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "52-55",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367272"}
@inproceedings{bb373165,
AUTHOR = "Atila, U. and Karas, I.R.",
TITLE = "Genetic Algorithm-Aided Routing on 3D Dynamic Networks",
BOOKTITLE = GeoInfo10,
YEAR = "2010",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367273"}
@inproceedings{bb373166,
AUTHOR = "Nguyen, H.T. and Franke, K. and Petrovic, S.",
TITLE = "Towards a Generic Feature-Selection Measure for Intrusion Detection",
BOOKTITLE = ICPR10,
YEAR = "2010",
PAGES = "1529-1532",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367274"}
@inproceedings{bb373167,
AUTHOR = "Gargiulo, F. and Sansone, C.",
TITLE = "Improving Performance of Network Traffic Classification Systems by
Cleaning Training Data",
BOOKTITLE = ICPR10,
YEAR = "2010",
PAGES = "2768-2771",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367275"}
@inproceedings{bb373168,
AUTHOR = "Blauensteiner, P. and Kampel, M. and Musik, C. and Vogtenhuber, S.",
TITLE = "A socio-technical approach for event detection in security critical
infrastructure",
BOOKTITLE = SISM10,
YEAR = "2010",
PAGES = "23-30",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367276"}
@inproceedings{bb373169,
AUTHOR = "Guo, W.P. and Li, Z.L. and Chen, Y. and Zhao, X.M.",
TITLE = "Security design for Instant Messaging system based on RSA and triple
DES",
BOOKTITLE = IASP09,
YEAR = "2009",
PAGES = "415-418",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367277"}
@inproceedings{bb373170,
AUTHOR = "Mazzariello, C. and Sansone, C.",
TITLE = "Anomaly-Based Detection of IRC Botnets by Means of One-Class Support
Vector Classifiers",
BOOKTITLE = CIAP09,
YEAR = "2009",
PAGES = "883-892",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367278"}
@inproceedings{bb373171,
AUTHOR = "Li, M. and Li, M.",
TITLE = "A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367279"}
@inproceedings{bb373172,
AUTHOR = "Subhan, F. and Hasbullah, H.B.",
TITLE = "Designing of Roaming Protocol for Bluetooth Equipped Multi Agent
Systems",
BOOKTITLE = IVIC09,
YEAR = "2009",
PAGES = "759-769",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367280"}
@inproceedings{bb373173,
AUTHOR = "Benkic, K. and Malajner, M. and Planinsic, P. and Cucej, Z.",
TITLE = "On Line Measurements and Visualization of Distances in WSN with RSSI
Parameter",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367281"}
@inproceedings{bb373174,
AUTHOR = "Ribeiro, F.N. and Zorzo, S.D.",
TITLE = "A Quantitative Evaluation of Privacy in Location Based Services",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367282"}
@inproceedings{bb373175,
AUTHOR = "Khan, I. and Karras, D.A.",
TITLE = "An Efficient Cross Layer Intra and Inter Domain Mobility Solution for
IEEE 802.16e Mobile WiMAX",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367283"}
@inproceedings{bb373176,
AUTHOR = "Mach, P. and Bestak, R.",
TITLE = "Analysis and Performance Evaluation of IEEE 802.16 Enhanced with
Decentrally Controlled Relays",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367284"}
@inproceedings{bb373177,
AUTHOR = "Malajner, M. and Benkic, K. and Planinsic, P. and Cucej, Z.",
TITLE = "The Accuracy of Propagation Models for Distance Measurement between WSN
Nodes",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367285"}
@inproceedings{bb373178,
AUTHOR = "Kovacik, T. and Kotuliak, I.",
TITLE = "Traffic Characterization in IP Multimedia Subsystem",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367286"}
@inproceedings{bb373179,
AUTHOR = "Christou, P. and Kyriakoulakos, K. and Sotiriadis, E. and Papadopoulos, K. and Mplemenos, G.G. and Papaefstathiou, I.",
TITLE = "Low-Power Security Modules Optimized for WSNs",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367287"}
@inproceedings{bb373180,
AUTHOR = "Kapetanovic, T. and Kapetanovic, A.",
TITLE = "Modeling and Implementation of the Complex Telecommunication Systems
Using the High Performance Computing Resources",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367288"}
@inproceedings{bb373181,
AUTHOR = "Ulvan, M. and Bestak, R.",
TITLE = "Delay Performance of Session Establishment Signaling in IP Multimedia
Subsystem",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367289"}
@inproceedings{bb373182,
AUTHOR = "Kantzavelou, I. and Katsikas, S.K.",
TITLE = "Playing Games with Internal Attackers Repeatedly",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367290"}
@inproceedings{bb373183,
AUTHOR = "Spathoulas, G.P. and Katsikas, S.K.",
TITLE = "Using a Fuzzy Inference System to Reduce False Positives in Intrusion
Detection",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367291"}
@inproceedings{bb373184,
AUTHOR = "Ulvan, A. and Bestak, R.",
TITLE = "The Analysis of Scanning Time in IEEE802.16m's Handover Procedure",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367292"}
@inproceedings{bb373185,
AUTHOR = "Neruda, M. and Vrana, J. and Bestak, R.",
TITLE = "Femtocells in 3G Mobile Networks",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367293"}
@inproceedings{bb373186,
AUTHOR = "Geneiatakis, D. and Vrakas, N. and Lambrinoudakis, C.",
TITLE = "Performance Evaluation of a Flooding Detection Mechanism for VoIP
Networks",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367294"}
@inproceedings{bb373187,
AUTHOR = "Akbari, A. and Soruri, M. and Jalali, S.V.",
TITLE = "Survey of Stable Clustering for Mobile Ad Hoc Networks",
BOOKTITLE = ICMV09,
YEAR = "2009",
PAGES = "3-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367295"}
@inproceedings{bb373188,
AUTHOR = "Zhong, N. and He, Z.W. and Kuang, J.M. and Fang, J.",
TITLE = "Research on the Performance Evaluation Technique for Communication
Network",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367296"}
@inproceedings{bb373189,
AUTHOR = "Zhang, Y.Q. and Yu, X.F. and Zhang, Y.J.",
TITLE = "The Design of a Wireless Node of Strain Data Acquisition",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-3",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367297"}
@inproceedings{bb373190,
AUTHOR = "Papazoglou, P.M. and Karras, D.A. and Papademetriou, R.C.",
TITLE = "An Efficient Distributed Event Scheduling Algorithm for Large Scale
Wireless Communications Simulation Modelling",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367298"}
@inproceedings{bb373191,
AUTHOR = "Charilas, D.E. and Markaki, O.I. and Vlacheas, P.T.",
TITLE = "Admission Control as a Non-Cooperative Multi-Stage Game between
Wireless Networks",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367299"}
@inproceedings{bb373192,
AUTHOR = "Tatsiopoulos, C. and Ktena, A.",
TITLE = "A Smart ZIGBEE Based Wireless Sensor Meter System",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367300"}
@inproceedings{bb373193,
AUTHOR = "Besson, L. and Leleu, P.",
TITLE = "A Distributed Intrusion Detection System for Ad-Hoc Wireless Sensor
Networks: The AWISSENET Distributed Intrusion Detection System",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-3",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367301"}
@inproceedings{bb373194,
AUTHOR = "di Gesu, V. and Lo Bosco, G. and Friedman, J.H.",
TITLE = "Intruders pattern identification",
BOOKTITLE = ICPR08,
YEAR = "2008",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367302"}
@inproceedings{bb373195,
AUTHOR = "Yang, D. and Qi, H.R.",
TITLE = "A network intrusion detection method using independent component
analysis",
BOOKTITLE = ICPR08,
YEAR = "2008",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367303"}
@inproceedings{bb373196,
AUTHOR = "Este, A. and Gargiulo, F. and Gringoli, F. and Salgarelli, L. and Sansone, C.",
TITLE = "Pattern Recognition Approaches for Classifying IP Flows",
BOOKTITLE = SSPR08,
YEAR = "2008",
PAGES = "885-895",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367304"}
@inproceedings{bb373197,
AUTHOR = "Rao, D.S. and Kumar, G.N. and Mallick, D.K. and Jana, P.K.",
TITLE = "Parallel Construction of Conflict Graph for Phylogenetic Network
Problem",
BOOKTITLE = PReMI07,
YEAR = "2007",
PAGES = "398-405",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367305"}
@inproceedings{bb373198,
AUTHOR = "Morin, B. and Debar, H.",
TITLE = "Conceptual Analysis of Intrusion Alarms",
BOOKTITLE = CIAP05,
YEAR = "2005",
PAGES = "91-98",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367306"}
@inproceedings{bb373199,
AUTHOR = "Zanero, S.",
TITLE = "Analyzing TCP Traffic Patterns Using Self Organizing Maps",
BOOKTITLE = CIAP05,
YEAR = "2005",
PAGES = "83-90",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT367307"}
Last update:Feb 17, 2026 at 20:06:16