@inproceedings{bb275700,
        AUTHOR = "Li, X.M. and Tao, R. and Wang, Y.",
        TITLE = "Time Delay Estimation Based on the Fractional Fourier Transform in the
Passive System",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT270333"}

@inproceedings{bb275701,
        AUTHOR = "Wang, T. and Wan, Q.",
        TITLE = "Sparse Signal Recovery via Multi-Residual Based Greedy Method",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT270334"}

@inproceedings{bb275702,
        AUTHOR = "Li, Z.L. and Chen, H. and Yao, C. and Li, J. and Yang, N.",
        TITLE = "Sparse Signal Recovery via Optimized Orthogonal Matching Pursuit",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT270335"}

@inproceedings{bb275703,
        AUTHOR = "Nelson, D. and Loughlin, P.J. and Cristobal, G. and Cohen, L.",
        TITLE = "Time-frequency methods for biological signal estimation",
        BOOKTITLE = ICPR00,
        YEAR = "2000",
        PAGES = "Vol III: 110-114",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT270336"}

@article{bb275704,
        AUTHOR = "Xing, D.S. and Girolami, M.A.",
        TITLE = "Employing Latent Dirichlet Allocation for fraud detection in
telecommunications",
        JOURNAL = PRL,
        VOLUME = "28",
        YEAR = "2007",
        NUMBER = "13",
        MONTH = "October",
        PAGES = "1727-1734",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270337"}

@article{bb275705,
        AUTHOR = "Celikoglu, H.B. and Gedizlioglu, E. and Dell'Orco, M.",
        TITLE = "A Node-Based Modeling Approach for the Continuous Dynamic Network
Loading Problem",
        JOURNAL = ITS,
        VOLUME = "10",
        YEAR = "2009",
        NUMBER = "1",
        MONTH = "March",
        PAGES = "165-174",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270338"}

@article{bb275706,
        AUTHOR = "Beghdad, R.",
        TITLE = "Modelling intrusion detection as an allocation problem",
        JOURNAL = PRL,
        VOLUME = "30",
        YEAR = "2009",
        NUMBER = "8",
        MONTH = "June",
        PAGES = "774-779",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270339"}

@article{bb275707,
        AUTHOR = "Thinh, T.N. and Kittitornkun, S. and Tomiyama, S.",
        TITLE = "PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS",
        JOURNAL = IEICE,
        VOLUME = "E92-D",
        YEAR = "2009",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1049-1061",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270340"}

@article{bb275708,
        AUTHOR = "Srivastav, A. and Ray, A.",
        TITLE = "Self-organization of sensor networks for detection of pervasive faults",
        JOURNAL = SIViP,
        VOLUME = "4",
        YEAR = "2010",
        NUMBER = "1",
        MONTH = "March",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270341"}

@article{bb275709,
        AUTHOR = "Tavallaee, M. and Stakhanova, N. and Ghorbani, A.A.",
        TITLE = "Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods",
        JOURNAL = SMC-C,
        VOLUME = "40",
        YEAR = "2010",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "516-524",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270342"}

@article{bb275710,
        AUTHOR = "Kim, K.J. and Tsiftsis, T.A.",
        TITLE = "Performance Analysis of Cyclically Prefixed Single-Carrier
Transmissions With Outdated Opportunistic User Selection",
        JOURNAL = SPLetters,
        VOLUME = "17",
        YEAR = "2010",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "847-850",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270343"}

@article{bb275711,
        AUTHOR = "Taysi, Z.C. and Yavuz, A.G.",
        TITLE = "Routing Protocols for GeoNet: A Survey",
        JOURNAL = ITS,
        VOLUME = "13",
        YEAR = "2012",
        NUMBER = "2",
        MONTH = "June",
        PAGES = "939-954",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270344"}

@article{bb275712,
        AUTHOR = "Huang, Y.C. and Rao, B.D.",
        TITLE = "Sum Rate Analysis of One-Pico-Inside OFDMA Network With Opportunistic
Scheduling and Selective Feedback",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "383-386",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270345"}

@article{bb275713,
        AUTHOR = "Nguyen, H.X. and Roughan, M.",
        TITLE = "Improving Hidden Markov Model Inferences With Private Data From
Multiple Observers",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "696-699",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270346"}

@article{bb275714,
        AUTHOR = "Shames, I. and Teixeira, A.M.H. and Sandberg, H. and Johansson, K.H.",
        TITLE = "Fault Detection and Mitigation in Kirchhoff Networks",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "749-752",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270347"}

@article{bb275715,
        AUTHOR = "Krishnamurthy, V. and Hoiles, W.",
        TITLE = "Afriat's Test for Detecting Malicious Agents",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "801-804",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270348"}

@article{bb275716,
        AUTHOR = "Li, Y. and Jin, D. and Wang, Z. and Zeng, L. and Chen, S.",
        TITLE = "Exponential and Power Law Distribution of Contact Duration in Urban
Vehicular Ad Hoc Networks",
        JOURNAL = SPLetters,
        VOLUME = "20",
        YEAR = "2013",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "110-113",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270349"}

@article{bb275717,
        AUTHOR = "Li, Y. and Jin, D. and Hui, P. and Wang, Z.C. and Chen, S.",
        TITLE = "Limits of Predictability for Large-Scale Urban Vehicular Mobility",
        JOURNAL = ITS,
        VOLUME = "15",
        YEAR = "2014",
        NUMBER = "6",
        MONTH = "December",
        PAGES = "2671-2682",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270350"}

@article{bb275718,
        AUTHOR = "Wang, C. and Li, Y. and Jin, D. and Chen, S.",
        TITLE = "On the Serviceability of Mobile Vehicular Cloudlets in a Large-Scale
Urban Environment",
        JOURNAL = ITS,
        VOLUME = "17",
        YEAR = "2016",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "2960-2970",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270351"}

@article{bb275719,
        AUTHOR = "Romero Zurita, N. and McLernon, D. and Ghogho, M. and Swami, A.",
        TITLE = "PHY Layer Security Based on Protected Zone and Artificial Noise",
        JOURNAL = SPLetters,
        VOLUME = "20",
        YEAR = "2013",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "487-490",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270352"}

@article{bb275720,
        AUTHOR = "Chandrasekaran, S. and Vaideeswaran, J.",
        TITLE = "Meta-scheduler using agents for fault tolerance in computational grid",
        JOURNAL = IJCVR,
        VOLUME = "4",
        YEAR = "2014",
        NUMBER = "4",
        PAGES = "294-329",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270353"}

@article{bb275721,
        AUTHOR = "Shen, Y. and Liu, Y.T. and Liu, J. and Yang, H.W. and Yang, D.C.",
        TITLE = "A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error
Protection Rateless Code",
        JOURNAL = IEICE,
        VOLUME = "E97-D",
        YEAR = "2014",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2903-2911",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270354"}

@article{bb275722,
        AUTHOR = "Bhuyan, M.H. and Bhattacharyya, D.K. and Kalita, J.K.",
        TITLE = "An empirical evaluation of information metrics for low-rate and
high-rate DDoS attack detection",
        JOURNAL = PRL,
        VOLUME = "51",
        YEAR = "2015",
        NUMBER = "1",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270355"}

@article{bb275723,
        AUTHOR = "Fu, B. and Xiao, Y. and Liang, X.N. and Chen, C.L.P.",
        TITLE = "Bio-inspired Group Modeling and Analysis for Intruder Detection in
Mobile Sensor/Robotic Networks",
        JOURNAL = Cyber,
        VOLUME = "45",
        YEAR = "2015",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "103-115",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270356"}

@article{bb275724,
        AUTHOR = "Hui, H. and Swindlehurst, A.L. and Li, G.B. and Liang, J.L.",
        TITLE = "Secure Relay and Jammer Selection for Physical Layer Security",
        JOURNAL = SPLetters,
        VOLUME = "22",
        YEAR = "2015",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1147-1151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270357"}

@article{bb275725,
        AUTHOR = "Meng, X.M. and Wu, S. and Kuang, L.L. and Lu, J.H.",
        TITLE = "An Expectation Propagation Perspective on Approximate Message Passing",
        JOURNAL = SPLetters,
        VOLUME = "22",
        YEAR = "2015",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1194-1197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270358"}

@article{bb275726,
        AUTHOR = "Rawat, D.B. and Bajracharya, C.",
        TITLE = "Detection of False Data Injection Attacks in Smart Grid Communication
Systems",
        JOURNAL = SPLetters,
        VOLUME = "22",
        YEAR = "2015",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "1652-1656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270359"}

@article{bb275727,
        AUTHOR = "Rastegarnia, A. and Khalili, A. and Bazzi, W.M. and Sanei, S.",
        TITLE = "An incremental LMS network with reduced communication delay",
        JOURNAL = SIViP,
        VOLUME = "10",
        YEAR = "2016",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "769-775",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270360"}

@article{bb275728,
        AUTHOR = "Brandt, R. and Mochaourab, R. and Bengtsson, M.",
        TITLE = "Globally Optimal Base Station Clustering in Interference
Alignment-Based Multicell Networks",
        JOURNAL = SPLetters,
        VOLUME = "23",
        YEAR = "2016",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "512-516",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270361"}

@article{bb275729,
        AUTHOR = "Jo, H.G. and Son, T.Y. and Jeong, S.Y. and Kang, S.J.",
        TITLE = "Proximity-Based Asynchronous Messaging Platform for Location-Based
Internet of Things Service",
        JOURNAL = IJGI,
        VOLUME = "5",
        YEAR = "2016",
        NUMBER = "7",
        PAGES = "116",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270362"}

@article{bb275730,
        AUTHOR = "Utkovski, Z. and Simeone, O. and Dimitrova, T. and Popovski, P.",
        TITLE = "Random Access in C-RAN for User Activity Detection With
Limited-Capacity Fronthaul",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "17-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270363"}

@article{bb275731,
        AUTHOR = "Yu, N.Y.",
        TITLE = "Indistinguishability of Compressed Encryption With Circulant Matrices
for Wireless Security",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "181-185",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270364"}

@article{bb275732,
        AUTHOR = "Chen, Q. and Kang, D. and He, Y. and Chang, T.H. and Liu, Y.F.",
        TITLE = "Joint Power and Admission Control Based on Channel Distribution
Information: A Novel Two-Timescale Approach",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "196-200",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270365"}

@article{bb275733,
        AUTHOR = "Li, W. and Wang, X. and Moran, B.",
        TITLE = "Wireless Signal Travel Distance Estimation Using Non-Coprime
Wavelengths",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "27-31",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270366"}

@article{bb275734,
        AUTHOR = "Kwon, M. and Park, H.",
        TITLE = "Distributed Network Formation Strategy for Network Coding Based
Wireless Networks",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "432-436",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270367"}

@article{bb275735,
        AUTHOR = "Sedjelmaci, H. and Senouci, S.M. and Ansari, N.",
        TITLE = "Intrusion Detection and Ejection Framework Against Lethal Attacks in
UAV-Aided Networks: A Bayesian Game-Theoretic Methodology",
        JOURNAL = ITS,
        VOLUME = "18",
        YEAR = "2017",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1143-1153",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270368"}

@inproceedings{bb275736,
        AUTHOR = "Larhlimi, A. and Mestari, M. and El Khaili, M.",
        TITLE = "GPU parallel neural hierarchical multi objective solver for burst
routing and wavelength assignment",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270369"}

@article{bb275737,
        AUTHOR = "Yin, H. and Zhang, X. and Zhao, S. and Luo, Y. and Tian, C. and Sekar, V.",
        TITLE = "Tradeoffs Between Cost and Performance for CDN Provisioning Based on
Coordinate Transformation",
        JOURNAL = MultMed,
        VOLUME = "19",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2583-2596",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270370"}

@article{bb275738,
        AUTHOR = "Guerreiro, P. and Xavier, J.",
        TITLE = "Distributed Learning With Time Correlated Information",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "1636-1640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270371"}

@article{bb275739,
        AUTHOR = "Hu, D. and Zhang, Q. and Yang, P. and Qin, J.",
        TITLE = "Proactive Monitoring via Jamming in Amplify-and-Forward Relay
Networks",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "1714-1718",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270372"}

@article{bb275740,
        AUTHOR = "AlEroud, A.F. and Karabatis, G.",
        TITLE = "Queryable Semantics to Detect Cyber-Attacks:
A Flow-Based Detection Approach",
        JOURNAL = SMCS,
        VOLUME = "48",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "207-223",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270373"}

@article{bb275741,
        AUTHOR = "Kozik, R.",
        TITLE = "Distributing extreme learning machines with Apache Spark for
NetFlow-based malware activity detection",
        JOURNAL = PRL,
        VOLUME = "101",
        YEAR = "2018",
        NUMBER = "1",
        PAGES = "14-20",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270374"}

@article{bb275742,
        AUTHOR = "Ghofrani, F. and Keshavarz Haddad, A. and Jamshidi, A.",
        TITLE = "A new probabilistic classifier based on decomposable models with
application to internet traffic",
        JOURNAL = PR,
        VOLUME = "77",
        YEAR = "2018",
        PAGES = "1-11",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270375"}

@article{bb275743,
        AUTHOR = "Japkowicz, N. and Elovici, Y.",
        TITLE = "Introduction to the Special Issue on Data Mining for Cybersecurity",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "3-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270376"}

@article{bb275744,
        AUTHOR = "Noble, J. and Adams, N.",
        TITLE = "Real-Time Dynamic Network Anomaly Detection",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "5-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270377"}

@article{bb275745,
        AUTHOR = "Grolman, E. and Finkelshtein, A. and Puzis, R. and Shabtai, A. and Celniker, G. and Katzir, Z. and Rosenfeld, L.",
        TITLE = "Transfer Learning for User Action Identication in Mobile Apps via
Encrypted Traffic Analysis",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "40-53",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270378"}

@article{bb275746,
        AUTHOR = "Li, B. and Yao, Y. and Chen, H. and Li, Y. and Huang, S.",
        TITLE = "Wireless Information Surveillance and Intervention Over Multiple
Suspicious Links",
        JOURNAL = SPLetters,
        VOLUME = "25",
        YEAR = "2018",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1131-1135",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270379"}

@article{bb275747,
        AUTHOR = "Meng, W.",
        TITLE = "Intrusion Detection in the Era of IoT: Building Trust via Traffic
Filtering and Sampling",
        JOURNAL = Computer,
        VOLUME = "51",
        YEAR = "2018",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "36-43",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270380"}

@article{bb275748,
        AUTHOR = "Jimenez Tejero, C.E. and Sallares, V. and Ranero, C.R.",
        TITLE = "Appraisal of Instantaneous Phase-Based Functions in Adjoint Waveform
Inversion",
        JOURNAL = GeoRS,
        VOLUME = "56",
        YEAR = "2018",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "5185-5197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270381"}

@article{bb275749,
        AUTHOR = "Chen, C.H. and Lo, K.R.",
        TITLE = "Applications of Internet of Things",
        JOURNAL = IJGI,
        VOLUME = "7",
        YEAR = "2018",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270382"}

@article{bb275750,
        AUTHOR = "Mousavinejad, E. and Yang, F. and Han, Q. and Vlacic, L.",
        TITLE = "A Novel Cyber Attack Detection Method in Networked Control Systems",
        JOURNAL = Cyber,
        VOLUME = "48",
        YEAR = "2018",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "3254-3264",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270383"}

@article{bb275751,
        AUTHOR = "Garg, S. and Kaur, K. and Kumar, N. and Rodrigues, J.J.P.C.",
        TITLE = "Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious
Flow Detection in SDN: A Social Multimedia Perspective",
        JOURNAL = MultMed,
        VOLUME = "21",
        YEAR = "2019",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "566-578",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270384"}

@article{bb275752,
        AUTHOR = "Shang, Y.",
        TITLE = "Subgraph Robustness of Complex Networks Under Attacks",
        JOURNAL = SMCS,
        VOLUME = "49",
        YEAR = "2019",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "821-832",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270385"}

@article{bb275753,
        AUTHOR = "Phetlasy, S. and Ohzahata, S. and Wu, C. and Kato, T.",
        TITLE = "A Sequential Classifiers Combination Method to Reduce False Negative
for Intrusion Detection System",
        JOURNAL = IEICE,
        VOLUME = "E102-D",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270386"}

@article{bb275754,
        AUTHOR = "Gao, N. and Qin, Z. and Jing, X.",
        TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless
Communications",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "938-942",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270387"}

@article{bb275755,
        AUTHOR = "Cho, K. and Lee, S. and Khisti, A.",
        TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable
Batteries",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "971-975",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270388"}

@article{bb275756,
        AUTHOR = "Antal, M. and Egyed Zsigmond, E.",
        TITLE = "Intrusion detection using mouse dynamics",
        JOURNAL = IET-Bio,
        VOLUME = "8",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "285-294",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270389"}

@article{bb275757,
        AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.",
        TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things
Data: A Review and Case Study",
        JOURNAL = RS,
        VOLUME = "11",
        YEAR = "2019",
        NUMBER = "19",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270390"}

@article{bb275758,
        AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.",
        TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270391"}

@article{bb275759,
        AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.",
        TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile
fog computing",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270392"}

@article{bb275760,
        AUTHOR = "Hwang, K.",
        TITLE = "Blocking of operation of unauthorised software using MQTT",
        JOURNAL = IJCVR,
        VOLUME = "9",
        YEAR = "2019",
        NUMBER = "6",
        PAGES = "609-620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270393"}

@article{bb275761,
        AUTHOR = "Chen, X.F. and Yu, S.Z.",
        TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN",
        JOURNAL = IEICE,
        VOLUME = "E99-D",
        YEAR = "2016",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "2395-2399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270394"}

@article{bb275762,
        AUTHOR = "Wu, W. and Li, R. and Xie, G. and An, J. and Bai, Y. and Zhou, J. and Li, K.",
        TITLE = "A Survey of Intrusion Detection for In-Vehicle Networks",
        JOURNAL = ITS,
        VOLUME = "21",
        YEAR = "2020",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "919-933",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270395"}

@inproceedings{bb275763,
        AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.",
        TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory
and Mechanism Design",
        BOOKTITLE = MMMod20,
        YEAR = "2020",
        PAGES = "II:651-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270396"}

@article{bb275764,
        AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.",
        TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension
Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "27",
        YEAR = "2020",
        PAGES = "471-475",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270397"}

@article{bb275765,
        AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.",
        TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black
and White Binary Image",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "896-900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270398"}

@article{bb275766,
        AUTHOR = "Ye, Z. and Ni, H.J. and Xu, Z.H. and Zhang, D.",
        TITLE = "Sensor fault estimation of networked vehicle suspension system with
deny-of-service attack",
        JOURNAL = IET-ITS,
        VOLUME = "14",
        YEAR = "2020",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "455-462",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270399"}

@article{bb275767,
        AUTHOR = "Kim, K.",
        TITLE = "Intrusion Detection System Using Deep Learning and Its Application to
Wi-Fi Network",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "1433-1447",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270400"}

@article{bb275768,
        AUTHOR = "Liang, J. and Lin, Q. and Chen, J. and Zhu, Y.",
        TITLE = "A Filter Model Based on Hidden Generalized Mixture Transition
Distribution Model for Intrusion Detection System in Vehicle Ad Hoc
Networks",
        JOURNAL = ITS,
        VOLUME = "21",
        YEAR = "2020",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "2707-2722",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270401"}

@inproceedings{bb275769,
        AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.",
        TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams
in Azimuth Plane for WLAN Wireless System",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270402"}

@article{bb275770,
        AUTHOR = "Li, J. and Wu, H.",
        TITLE = "Localisation algorithm for security access control in railway
communications",
        JOURNAL = IET-ITS,
        VOLUME = "14",
        YEAR = "2020",
        NUMBER = "14",
        MONTH = "December",
        PAGES = "2151-2159",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270403"}

@article{bb275771,
        AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.",
        TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio
Access in IoT Fog Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "728-732",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270404"}

@article{bb275772,
        AUTHOR = "Park, S.H. and Jin, X.",
        TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for
Multi-User Systems",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "917-921",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270405"}

@article{bb275773,
        AUTHOR = "Wang, Z. and Blum, R.S.",
        TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "1002-1005",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270406"}

@article{bb275774,
        AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.",
        TITLE = "Multi-type relational clustering for enterprise cyber-security
networks",
        JOURNAL = PRL,
        VOLUME = "149",
        YEAR = "2021",
        PAGES = "172-178",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270407"}

@article{bb275775,
        AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.",
        TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "4",
        PAGES = "357-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270408"}

@inproceedings{bb275776,
        AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.",
        TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL
Databases",
        BOOKTITLE = MCPR21,
        YEAR = "2021",
        PAGES = "23-32",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270409"}

@article{bb275777,
        AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.",
        TITLE = "CAN-Bus Attack Detection With Deep Learning",
        JOURNAL = ITS,
        VOLUME = "22",
        YEAR = "2021",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5081-5090",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270410"}

@article{bb275778,
        AUTHOR = "Cho, Y.B.",
        TITLE = "Malware classifier for dynamic deep learning algorithm",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "5",
        PAGES = "486-496",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270411"}

@inproceedings{bb275779,
        AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.",
        TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "9068-9075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270412"}

@inproceedings{bb275780,
        AUTHOR = "Zhou, S. and Li, X.H.",
        TITLE = "Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for
Network Intrusion Detection",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "8148-8155",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270413"}

@inproceedings{bb275781,
        AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z. and Wang, X. and Jing, R.Q.",
        TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative
Adversarial Networks for Malware Classification",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "3775-3782",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270414"}

@inproceedings{bb275782,
        AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.",
        TITLE = "Large Scale Graph Based Network Forensics Analysis",
        BOOKTITLE = IWBDAF20,
        YEAR = "2020",
        PAGES = "457-469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270415"}

@inproceedings{bb275783,
        AUTHOR = "Scalas, M. and Rieck, K. and Giacinto, G.",
        TITLE = "Explanation-driven Characterization of Android Ransomware",
        BOOKTITLE = EDL-AI20,
        YEAR = "2020",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270416"}

@inproceedings{bb275784,
        AUTHOR = "Chen, L. and Xian, M. and Liu, J.",
        TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus",
        BOOKTITLE = CVIDL20,
        YEAR = "2020",
        PAGES = "206-209",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270417"}

@inproceedings{bb275785,
        AUTHOR = "Prima, B. and Bouhorma, M.",
        TITLE = "Using Transfer Learning for Malware Classification",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "343-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270418"}

@inproceedings{bb275786,
        AUTHOR = "El Bakkouri, N. and Mazri, T.",
        TITLE = "Security Threats In Smart Healthcare",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "209-214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270419"}

@inproceedings{bb275787,
        AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.",
        TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270420"}

@inproceedings{bb275788,
        AUTHOR = "Mennour, H. and Mostefai, S.",
        TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270421"}

@inproceedings{bb275789,
        AUTHOR = "Sebbah, A. and Kadri, B.",
        TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC
and Fuzzy Extractor",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270422"}

@inproceedings{bb275790,
        AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.",
        TITLE = "DOS attack forecasting: A comparative study on wrapper feature
selection",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270423"}

@inproceedings{bb275791,
        AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.",
        TITLE = "Behavioral Security in Covert Communication Systems",
        BOOKTITLE = IWDW19,
        YEAR = "2019",
        PAGES = "377-392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270424"}

@inproceedings{bb275792,
        AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.",
        TITLE = "Intelligent Recognition of TCP Intrusions for Embedded
Micro-controllers",
        BOOKTITLE = NTIAP19,
        YEAR = "2019",
        PAGES = "361-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270425"}

@inproceedings{bb275793,
        AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.",
        TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion
Detection",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "682-687",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270426"}

@inproceedings{bb275794,
        AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.",
        TITLE = "Botnet Detection based on Fuzzy Association Rules",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "578-584",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270427"}

@inproceedings{bb275795,
        AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.",
        TITLE = "Cyber Vulnerability: An Attentional Dilemma",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 331-340",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270428"}

@inproceedings{bb275796,
        AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.",
        TITLE = "Trust in Autonomous Systems for Threat Analysis:
A Simulation Methodology",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 341-353",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270429"}

@article{bb275797,
        AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.",
        TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive
Neural Networks",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "29-39",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270430"}

@article{bb275798,
        AUTHOR = "Taylor, A. and Leblanc, S. and Japkowicz, N.",
        TITLE = "Probing the Limits of Anomaly Detectors for Automobiles with a
Cyberattack Framework",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "54-62",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270431"}

@article{bb275799,
        AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.",
        TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet
of Things: A Text-Mining Approach",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "63-73",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT270432"}

Last update:Nov 30, 2021 at 22:19:38