@inproceedings{bb311900,
        AUTHOR = "Li, S.S. and Chen, D. and Zhang, J. and Wang, H.Y. and Li, L. and Qian, Y.Y. and Liu, H.",
        TITLE = "Software Vulnerability Detection Based on Anomaly-Attention",
        BOOKTITLE = ICRVC22,
        YEAR = "2022",
        PAGES = "261-265",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306333"}

@inproceedings{bb311901,
        AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z.W. and Wang, X. and Jing, R.Q.",
        TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative
Adversarial Networks for Malware Classification",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "3775-3782",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306334"}

@inproceedings{bb311902,
        AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.",
        TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "9068-9075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306335"}

@inproceedings{bb311903,
        AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.",
        TITLE = "Large Scale Graph Based Network Forensics Analysis",
        BOOKTITLE = IWBDAF20,
        YEAR = "2020",
        PAGES = "457-469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306336"}

@inproceedings{bb311904,
        AUTHOR = "Scalas, M. and Rieck, K. and Giacinto, G.",
        TITLE = "Explanation-driven Characterization of Android Ransomware",
        BOOKTITLE = EDL-AI20,
        YEAR = "2020",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306337"}

@inproceedings{bb311905,
        AUTHOR = "Chen, L. and Qiu, H.J. and Kuang, X.Y. and Xu, A.D. and Yang, Y.W.",
        TITLE = "Intelligent Data Security Threat Discovery Model Based on Grid Data",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "458-463",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306338"}

@inproceedings{bb311906,
        AUTHOR = "Saber, O. and Mazri, T.",
        TITLE = "Smart City Security Issues: the Main Attacks and Countermeasures",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "465-472",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306339"}

@inproceedings{bb311907,
        AUTHOR = "Ikrissi, G. and Mazri, T.",
        TITLE = "IoT-based Smart Environments: State of the Art, Security Threats and
Solutions",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "279-286",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306340"}

@inproceedings{bb311908,
        AUTHOR = "Niu, L. and Song, Y. and Chu, J. and Li, S.",
        TITLE = "Analysis of the Attacker and Defender GAN Models for the Indoor
Navigation Network",
        BOOKTITLE = ISPRS21,
        YEAR = "2021",
        PAGES = "B4-2021: 237-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306341"}

@inproceedings{bb311909,
        AUTHOR = "Toka, K.O. and Dikilitas, Y. and Oktay, T. and Sayar, A.",
        TITLE = "Securing Iot With Blockchain",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "529-532",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306342"}

@inproceedings{bb311910,
        AUTHOR = "Ozarpa, C. and Avci, I. and Kinaci, B.F. and Arapoglu, S. and Kara, S.A.",
        TITLE = "Cyber Attacks on Scada Based Traffic Light Control Systems in the Smart
Cities",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "411-415",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306343"}

@inproceedings{bb311911,
        AUTHOR = "Moulad, L. and Chaabita, R. and Balar, K.",
        TITLE = "Wireless Sensor Network: Towards An Improvement of Security Policy",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "379-383",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306344"}

@inproceedings{bb311912,
        AUTHOR = "Miryahyaie, S. and Ebrahimpour komleh, H. and Nickfarjam, A.M.",
        TITLE = "ACO-based Intrusion Detection Method in Computer Networks using Fuzzy
Association Rules",
        BOOKTITLE = IPRIA21,
        YEAR = "2021",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306345"}

@inproceedings{bb311913,
        AUTHOR = "Mohseni, M. and Tanha, J.",
        TITLE = "A Density-based Undersampling Approach to Intrusion Detection",
        BOOKTITLE = IPRIA21,
        YEAR = "2021",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306346"}

@inproceedings{bb311914,
        AUTHOR = "Liu, Y.G. and Ning, Z. and Zhang, J.J. and Wang, X.P.",
        TITLE = "Monitory Consensus Mechanism of Blockchain for Internet of Things",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "425-430",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306347"}

@inproceedings{bb311915,
        AUTHOR = "Chen, L. and Xian, M. and Liu, J.",
        TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus",
        BOOKTITLE = CVIDL20,
        YEAR = "2020",
        PAGES = "206-209",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306348"}

@inproceedings{bb311916,
        AUTHOR = "Prima, B. and Bouhorma, M.",
        TITLE = "Using Transfer Learning for Malware Classification",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "343-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306349"}

@inproceedings{bb311917,
        AUTHOR = "El Bakkouri, N. and Mazri, T.",
        TITLE = "Security Threats In Smart Healthcare",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "209-214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306350"}

@inproceedings{bb311918,
        AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.",
        TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306351"}

@inproceedings{bb311919,
        AUTHOR = "Mennour, H. and Mostefai, S.",
        TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306352"}

@inproceedings{bb311920,
        AUTHOR = "Sebbah, A. and Kadri, B.",
        TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC
and Fuzzy Extractor",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306353"}

@inproceedings{bb311921,
        AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.",
        TITLE = "DOS attack forecasting: A comparative study on wrapper feature
selection",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306354"}

@inproceedings{bb311922,
        AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.",
        TITLE = "Behavioral Security in Covert Communication Systems",
        BOOKTITLE = IWDW19,
        YEAR = "2019",
        PAGES = "377-392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306355"}

@inproceedings{bb311923,
        AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.",
        TITLE = "Intelligent Recognition of TCP Intrusions for Embedded
Micro-controllers",
        BOOKTITLE = NTIAP19,
        YEAR = "2019",
        PAGES = "361-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306356"}

@inproceedings{bb311924,
        AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.",
        TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion
Detection",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "682-687",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306357"}

@inproceedings{bb311925,
        AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.",
        TITLE = "Botnet Detection based on Fuzzy Association Rules",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "578-584",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306358"}

@inproceedings{bb311926,
        AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.",
        TITLE = "Cyber Vulnerability: An Attentional Dilemma",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 331-340",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306359"}

@inproceedings{bb311927,
        AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.",
        TITLE = "Trust in Autonomous Systems for Threat Analysis:
A Simulation Methodology",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 341-353",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306360"}

@article{bb311928,
        AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.",
        TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive
Neural Networks",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "29-39",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306361"}

@article{bb311929,
        AUTHOR = "Taylor, A. and Leblanc, S. and Japkowicz, N.",
        TITLE = "Probing the Limits of Anomaly Detectors for Automobiles with a
Cyberattack Framework",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "54-62",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306362"}

@article{bb311930,
        AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.",
        TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet
of Things: A Text-Mining Approach",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "63-73",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306363"}

@inproceedings{bb311931,
        AUTHOR = "Menemencioglu, O. and Orak, I.M.",
        TITLE = "Geographical Assesment of Results From Preventing the Parameter
Tampering in A Web Application",
        BOOKTITLE = GeoAdvances17,
        YEAR = "2017",
        PAGES = "69-71",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306364"}

@inproceedings{bb311932,
        AUTHOR = "Herrera Semenets, V. and Perez Garcia, O.A. and Gago Alonso, A. and Hernandez Leon, R.",
        TITLE = "A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion
Detection",
        BOOKTITLE = CIARP17,
        YEAR = "2017",
        PAGES = "289-297",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306365"}

@inproceedings{bb311933,
        AUTHOR = "Mohan, R. and Chaudhury, S. and Lall, B.",
        TITLE = "Incremental Learning of Non-stationary Temporal Causal Networks for
Telecommunication Domain",
        BOOKTITLE = PReMI17,
        YEAR = "2017",
        PAGES = "501-508",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306366"}

@inproceedings{bb311934,
        AUTHOR = "Elejla, O.E. and Belaton, B. and Anbar, M. and Alijla, B.O.",
        TITLE = "IPv6 OS Fingerprinting Methods: Review",
        BOOKTITLE = IVIC17,
        YEAR = "2017",
        PAGES = "661-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306367"}

@inproceedings{bb311935,
        AUTHOR = "Zabri, Z. and Nohuddin, P.N.E.",
        TITLE = "Analyzing and Detecting Network Intrusion Behavior Using Packet Capture",
        BOOKTITLE = IVIC17,
        YEAR = "2017",
        PAGES = "750-761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306368"}

@inproceedings{bb311936,
        AUTHOR = "Zyad, E. and Khalid, C. and Mohammed, B.",
        TITLE = "Combination of R1-PCA and median LDA for anomaly network detection",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306369"}

@inproceedings{bb311937,
        AUTHOR = "Alaoui, E.A.A. and Lamhamdi, M.",
        TITLE = "Study of the energy performance of DTN protocols",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306370"}

@inproceedings{bb311938,
        AUTHOR = "Sadek, B.A. and Houssaine, T.E. and Noreddine, C.",
        TITLE = "A robust PID controller for active queue management framework in
congested routers",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306371"}

@inproceedings{bb311939,
        AUTHOR = "Kempa, W.M.",
        TITLE = "On buffer overflow duration in WSN with a vacation-type power saving
mechanism",
        BOOKTITLE = WSSIP17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306372"}

@inproceedings{bb311940,
        AUTHOR = "Korona, M. and Skowron, K. and Trzepinski, M. and Rawski, M.",
        TITLE = "FPGA implementation of IPsec protocol suite for multigigabit networks",
        BOOKTITLE = WSSIP17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306373"}

@inproceedings{bb311941,
        AUTHOR = "Geller, B.",
        TITLE = "Advanced synchronization techniques for the Internet of Things",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "180-184",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306374"}

@inproceedings{bb311942,
        AUTHOR = "Yang, J. and Geller, B. and Arbi, T.",
        TITLE = "Proposal of a multi-standard transceiver for the WBAN Internet of
Things",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "369-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306375"}

@inproceedings{bb311943,
        AUTHOR = "Massaoudi, A. and Sellami, N. and Siala, M.",
        TITLE = "On the impact of pdf-matched quantization for heterogeneous cognitive
radio networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "259-263",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306376"}

@inproceedings{bb311944,
        AUTHOR = "NasrLeila, I. and Atallah, N. and Cherif, S. and Geller, B.",
        TITLE = "Time synchronization in IoT networks:
Case of a wireless body area network",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "297-301",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306377"}

@inproceedings{bb311945,
        AUTHOR = "Rihani, M.A. and Prevotet, J.C. and Nouvel, F. and Mroue, M. and Mohanna, Y.",
        TITLE = "ARM-FPGA based platform for automated adaptive wireless communication
systems using partial reconfiguration technique",
        BOOKTITLE = DASIP16,
        YEAR = "2016",
        PAGES = "113-120",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306378"}

@inproceedings{bb311946,
        AUTHOR = "Moreac, E. and Rossi, A. and Laurent, J. and Bomel, P.",
        TITLE = "Crosstalk-aware link power model for Networks-on-Chip",
        BOOKTITLE = DASIP16,
        YEAR = "2016",
        PAGES = "121-128",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306379"}

@inproceedings{bb311947,
        AUTHOR = "Abbes, Y. and Najeh, S. and Besbes, H.",
        TITLE = "Tractable framework for modeling and analyzing Joint CoMP
Transmission and eICIC technology in two-tier heterogeneous cellular
networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306380"}

@inproceedings{bb311948,
        AUTHOR = "Essassi, S. and Hamila, R. and Cherif, S. and Siala, M. and Hasna, M.O.",
        TITLE = "Power control and RB allocation in cloud radio access networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "148-152",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306381"}

@inproceedings{bb311949,
        AUTHOR = "Mashhadi, F. and Asaduzzaman, A. and Mridha, M.F.",
        TITLE = "A novel resource scheduling approach to improve the reliability of
Shuffle-exchange networks",
        BOOKTITLE = IVPR17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306382"}

@inproceedings{bb311950,
        AUTHOR = "Xie, J.L. and Dang, J.W. and Li, C. and Lian, X.P. and Lin, J.",
        TITLE = "Ecology-inspired Admission Control scheme in heterogeneous wireless
Networks",
        BOOKTITLE = ICIVC16,
        YEAR = "2016",
        PAGES = "140-144",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306383"}

@inproceedings{bb311951,
        AUTHOR = "Isikdag, U. and Pilouk, M.",
        TITLE = "Integration Of Geo-sensor Feeds And Event Consumer Services For
Real-time Representation of IOT Nodes",
        BOOKTITLE = ISPRS16,
        YEAR = "2016",
        PAGES = "B4: 267-274",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306384"}

@inproceedings{bb311952,
        AUTHOR = "Al Shamisi, A. and Louvieris, P. and Al Mualla, M. and Mihajlov, M.",
        TITLE = "Towards a theoretical framework for an active cyber situational
awareness model",
        BOOKTITLE = WSSIP16,
        YEAR = "2016",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306385"}

@inproceedings{bb311953,
        AUTHOR = "Peter, T. and Pavol, H. and Lukas, D.",
        TITLE = "Implementation and evaluation of IPv6 to IPv4 transition mechanisms
in network simulator 3",
        BOOKTITLE = WSSIP16,
        YEAR = "2016",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306386"}

@inproceedings{bb311954,
        AUTHOR = "Al Jumeily, D. and Hussain, A. and MacDermott, A. and Seeckts, G. and Lunn, J.",
        TITLE = "Methods and techniques to support the development of fraud detection
system",
        BOOKTITLE = WSSIP15,
        YEAR = "2015",
        PAGES = "224-227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306387"}

@inproceedings{bb311955,
        AUTHOR = "Safiulin, I. and Schwarz, S. and Rupp, M.",
        TITLE = "System level simulation of LTE MBSFN networks with high mobility
users",
        BOOKTITLE = WSSIP15,
        YEAR = "2015",
        PAGES = "21-24",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306388"}

@inproceedings{bb311956,
        AUTHOR = "Berisha, T. and Midoglu, C. and Homayouni, S. and Svoboda, P. and Rupp, M.",
        TITLE = "Measurement setup for automatized baselining of WLAN network
performance",
        BOOKTITLE = WSSIP15,
        YEAR = "2015",
        PAGES = "25-28",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306389"}

@inproceedings{bb311957,
        AUTHOR = "Marah, H.M. and Elrajubi, O.M. and Abouda, A.A.",
        TITLE = "Fraud detection in international calls using fuzzy logic",
        BOOKTITLE = ICCVIA15,
        YEAR = "2015",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306390"}

@inproceedings{bb311958,
        AUTHOR = "Lu, C.L. and Zhai, L. and Liu, T. and Li, N.",
        TITLE = "Network Intrusion Detection Based on Neural Networks and D-S Evidence",
        BOOKTITLE = VSWS15,
        YEAR = "2015",
        PAGES = "332-343",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306391"}

@inproceedings{bb311959,
        AUTHOR = "Wei, Z. and Deng, R.H. and Shen, J. and Zhu, J.X. and Ouyang, K. and Wu, Y.D.",
        TITLE = "Multidimensional Context Awareness in Mobile Devices",
        BOOKTITLE = MMMod15,
        YEAR = "2015",
        PAGES = "II: 38-49",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306392"}

@inproceedings{bb311960,
        AUTHOR = "Ju, X.Y.",
        TITLE = "Android malware detection through permission and package",
        BOOKTITLE = ICWAPR14,
        YEAR = "2014",
        PAGES = "61-65",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306393"}

@inproceedings{bb311961,
        AUTHOR = "Kuri Morales, A. and Cortes Arce, I.",
        TITLE = "Improved Performance of Computer Networks by Embedded Pattern Detection",
        BOOKTITLE = MCPR14,
        YEAR = "2014",
        PAGES = "21-30",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306394"}

@inproceedings{bb311962,
        AUTHOR = "Vegh, L. and Miclea, L.",
        TITLE = "A new approach towards increased security in cyber-physical systems",
        BOOKTITLE = WSSIP14,
        YEAR = "2014",
        PAGES = "175-178",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306395"}

@inproceedings{bb311963,
        AUTHOR = "Dziurzanski, P. and Maka, T.",
        TITLE = "Network on chips link bandwidth minimization of deadlock-free
multi-path routing",
        BOOKTITLE = WSSIP14,
        YEAR = "2014",
        PAGES = "131-134",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306396"}

@inproceedings{bb311964,
        AUTHOR = "Serrano, J.M.B. and Palancar, J.H. and Cumplido, R.",
        TITLE = "High Throughput Signature Based Platform for Network Intrusion
Detection",
        BOOKTITLE = CIARP13,
        YEAR = "2013",
        PAGES = "II:544-551",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306397"}

@inproceedings{bb311965,
        AUTHOR = "Saxena, S. and Kumar, A. and Roy, S.S.",
        TITLE = "Determination of network vulnerability factor using rough set",
        BOOKTITLE = ICSIPR13,
        YEAR = "2013",
        PAGES = "263-268",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306398"}

@inproceedings{bb311966,
        AUTHOR = "Tran, T. and Ha, Q.P.",
        TITLE = "Parameterised quadratic constraints for network systems subject to
multiple communication topologies",
        BOOKTITLE = ICARCV12,
        YEAR = "2012",
        PAGES = "221-228",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306399"}

@inproceedings{bb311967,
        AUTHOR = "Xin, K. and Cao, X.H. and Cheng, P. and Chen, J.M.",
        TITLE = "Optimal controller location in wireless sensor and actuator networks",
        BOOKTITLE = ICARCV12,
        YEAR = "2012",
        PAGES = "560-565",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306400"}

@inproceedings{bb311968,
        AUTHOR = "Wu, M.Q. and Xia, Y.Q. and Fu, M.Y.",
        TITLE = "Application of NPC in wireless networked control systems",
        BOOKTITLE = ICARCV12,
        YEAR = "2012",
        PAGES = "584-589",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306401"}

@inproceedings{bb311969,
        AUTHOR = "Xu, J. and Xie, L.H. and Khanna, N. and Chee, W.H.",
        TITLE = "Cooperative control in HNMSim: A 3D hybrid networked MAS simulator",
        BOOKTITLE = ICARCV12,
        YEAR = "2012",
        PAGES = "626-631",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306402"}

@inproceedings{bb311970,
        AUTHOR = "Yuan, X.D. and Yu, M. and Xiao, W.D.",
        TITLE = "Robust stabilization of multiple coupled networked control system via
jump linear system approach",
        BOOKTITLE = ICARCV12,
        YEAR = "2012",
        PAGES = "690-694",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306403"}

@inproceedings{bb311971,
        AUTHOR = "Cheng, H. and Chen, Y. and Wong, W.S. and Yang, Q. and Shen, L.F.",
        TITLE = "Protocol sequence based wireless media access control in networked
control systems",
        BOOKTITLE = ICARCV12,
        YEAR = "2012",
        PAGES = "707-712",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306404"}

@inproceedings{bb311972,
        AUTHOR = "Corona, I. and Tronci, R. and Giacinto, G.",
        TITLE = "SuStorID: A multiple classifier system for the protection of web
services",
        BOOKTITLE = ICPR12,
        YEAR = "2012",
        PAGES = "2375-2378",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306405"}

@inproceedings{bb311973,
        AUTHOR = "Gao, Y. and Zheng, S.J.",
        TITLE = "A metadata access strategy of learning resources based on HDFS",
        BOOKTITLE = IASP11,
        YEAR = "2011",
        PAGES = "620-622",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306406"}

@inproceedings{bb311974,
        AUTHOR = "Yang, F.Y. and Liu, H.C.",
        TITLE = "Research in HDFS based on the campus network environment",
        BOOKTITLE = IASP11,
        YEAR = "2011",
        PAGES = "648-652",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306407"}

@inproceedings{bb311975,
        AUTHOR = "Zhang, R.Z. and Li, L.Q. and Zhang, C.J.",
        TITLE = "The application of middleware technology to communication network
real-time monitoring system",
        BOOKTITLE = IASP11,
        YEAR = "2011",
        PAGES = "488-491",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306408"}

@inproceedings{bb311976,
        AUTHOR = "Huang, W. and Zheng, S.J. and Zhang, P.",
        TITLE = "Research of data packet transmission based on SMS services",
        BOOKTITLE = IASP11,
        YEAR = "2011",
        PAGES = "557-560",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306409"}

@inproceedings{bb311977,
        AUTHOR = "Zhao, F.Z. and Li, R. and Kang, Y.B.",
        TITLE = "Stability analysis of FAST TCP using PI transfer function",
        BOOKTITLE = IASP11,
        YEAR = "2011",
        PAGES = "52-55",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306410"}

@inproceedings{bb311978,
        AUTHOR = "Atila, U. and Karas, I.R.",
        TITLE = "Genetic Algorithm-Aided Routing on 3D Dynamic Networks",
        BOOKTITLE = GeoInfo10,
        YEAR = "2010",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306411"}

@inproceedings{bb311979,
        AUTHOR = "Nguyen, H.T. and Franke, K. and Petrovic, S.",
        TITLE = "Towards a Generic Feature-Selection Measure for Intrusion Detection",
        BOOKTITLE = ICPR10,
        YEAR = "2010",
        PAGES = "1529-1532",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306412"}

@inproceedings{bb311980,
        AUTHOR = "Gargiulo, F. and Sansone, C.",
        TITLE = "Improving Performance of Network Traffic Classification Systems by
Cleaning Training Data",
        BOOKTITLE = ICPR10,
        YEAR = "2010",
        PAGES = "2768-2771",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306413"}

@inproceedings{bb311981,
        AUTHOR = "Blauensteiner, P. and Kampel, M. and Musik, C. and Vogtenhuber, S.",
        TITLE = "A socio-technical approach for event detection in security critical
infrastructure",
        BOOKTITLE = SISM10,
        YEAR = "2010",
        PAGES = "23-30",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306414"}

@inproceedings{bb311982,
        AUTHOR = "Guo, W.P. and Li, Z.L. and Chen, Y. and Zhao, X.M.",
        TITLE = "Security design for Instant Messaging system based on RSA and triple
DES",
        BOOKTITLE = IASP09,
        YEAR = "2009",
        PAGES = "415-418",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306415"}

@inproceedings{bb311983,
        AUTHOR = "Mazzariello, C. and Sansone, C.",
        TITLE = "Anomaly-Based Detection of IRC Botnets by Means of One-Class Support
Vector Classifiers",
        BOOKTITLE = CIAP09,
        YEAR = "2009",
        PAGES = "883-892",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306416"}

@inproceedings{bb311984,
        AUTHOR = "Li, M. and Li, M.",
        TITLE = "A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306417"}

@inproceedings{bb311985,
        AUTHOR = "Subhan, F. and Hasbullah, H.B.",
        TITLE = "Designing of Roaming Protocol for Bluetooth Equipped Multi Agent
Systems",
        BOOKTITLE = IVIC09,
        YEAR = "2009",
        PAGES = "759-769",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306418"}

@inproceedings{bb311986,
        AUTHOR = "Benkic, K. and Malajner, M. and Planinsic, P. and Cucej, Z.",
        TITLE = "On Line Measurements and Visualization of Distances in WSN with RSSI
Parameter",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306419"}

@inproceedings{bb311987,
        AUTHOR = "Ribeiro, F.N. and Zorzo, S.D.",
        TITLE = "A Quantitative Evaluation of Privacy in Location Based Services",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306420"}

@inproceedings{bb311988,
        AUTHOR = "Khan, I. and Karras, D.A.",
        TITLE = "An Efficient Cross Layer Intra and Inter Domain Mobility Solution for
IEEE 802.16e Mobile WiMAX",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306421"}

@inproceedings{bb311989,
        AUTHOR = "Mach, P. and Bestak, R.",
        TITLE = "Analysis and Performance Evaluation of IEEE 802.16 Enhanced with
Decentrally Controlled Relays",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306422"}

@inproceedings{bb311990,
        AUTHOR = "Malajner, M. and Benkic, K. and Planinsic, P. and Cucej, Z.",
        TITLE = "The Accuracy of Propagation Models for Distance Measurement between WSN
Nodes",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306423"}

@inproceedings{bb311991,
        AUTHOR = "Kovacik, T. and Kotuliak, I.",
        TITLE = "Traffic Characterization in IP Multimedia Subsystem",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306424"}

@inproceedings{bb311992,
        AUTHOR = "Christou, P. and Kyriakoulakos, K. and Sotiriadis, E. and Papadopoulos, K. and Mplemenos, G.G. and Papaefstathiou, I.",
        TITLE = "Low-Power Security Modules Optimized for WSNs",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306425"}

@inproceedings{bb311993,
        AUTHOR = "Kapetanovic, T. and Kapetanovic, A.",
        TITLE = "Modeling and Implementation of the Complex Telecommunication Systems
Using the High Performance Computing Resources",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306426"}

@inproceedings{bb311994,
        AUTHOR = "Ulvan, M. and Bestak, R.",
        TITLE = "Delay Performance of Session Establishment Signaling in IP Multimedia
Subsystem",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306427"}

@inproceedings{bb311995,
        AUTHOR = "Kantzavelou, I. and Katsikas, S.K.",
        TITLE = "Playing Games with Internal Attackers Repeatedly",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306428"}

@inproceedings{bb311996,
        AUTHOR = "Spathoulas, G.P. and Katsikas, S.K.",
        TITLE = "Using a Fuzzy Inference System to Reduce False Positives in Intrusion
Detection",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306429"}

@inproceedings{bb311997,
        AUTHOR = "Ulvan, A. and Bestak, R.",
        TITLE = "The Analysis of Scanning Time in IEEE802.16m's Handover Procedure",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306430"}

@inproceedings{bb311998,
        AUTHOR = "Neruda, M. and Vrana, J. and Bestak, R.",
        TITLE = "Femtocells in 3G Mobile Networks",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306431"}

@inproceedings{bb311999,
        AUTHOR = "Geneiatakis, D. and Vrakas, N. and Lambrinoudakis, C.",
        TITLE = "Performance Evaluation of a Flooding Detection Mechanism for VoIP
Networks",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306432"}

Last update: