@inproceedings{bb311900, AUTHOR = "Li, S.S. and Chen, D. and Zhang, J. and Wang, H.Y. and Li, L. and Qian, Y.Y. and Liu, H.", TITLE = "Software Vulnerability Detection Based on Anomaly-Attention", BOOKTITLE = ICRVC22, YEAR = "2022", PAGES = "261-265", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306333"} @inproceedings{bb311901, AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z.W. and Wang, X. and Jing, R.Q.", TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "3775-3782", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306334"} @inproceedings{bb311902, AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.", TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs", BOOKTITLE = ICPR21, YEAR = "2021", PAGES = "9068-9075", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306335"} @inproceedings{bb311903, AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.", TITLE = "Large Scale Graph Based Network Forensics Analysis", BOOKTITLE = IWBDAF20, YEAR = "2020", PAGES = "457-469", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306336"} @inproceedings{bb311904, AUTHOR = "Scalas, M. and Rieck, K. and Giacinto, G.", TITLE = "Explanation-driven Characterization of Android Ransomware", BOOKTITLE = EDL-AI20, YEAR = "2020", PAGES = "228-242", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306337"} @inproceedings{bb311905, AUTHOR = "Chen, L. and Qiu, H.J. and Kuang, X.Y. and Xu, A.D. and Yang, Y.W.", TITLE = "Intelligent Data Security Threat Discovery Model Based on Grid Data", BOOKTITLE = ICIVC21, YEAR = "2021", PAGES = "458-463", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306338"} @inproceedings{bb311906, AUTHOR = "Saber, O. and Mazri, T.", TITLE = "Smart City Security Issues: the Main Attacks and Countermeasures", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "465-472", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306339"} @inproceedings{bb311907, AUTHOR = "Ikrissi, G. and Mazri, T.", TITLE = "IoT-based Smart Environments: State of the Art, Security Threats and Solutions", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "279-286", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306340"} @inproceedings{bb311908, AUTHOR = "Niu, L. and Song, Y. and Chu, J. and Li, S.", TITLE = "Analysis of the Attacker and Defender GAN Models for the Indoor Navigation Network", BOOKTITLE = ISPRS21, YEAR = "2021", PAGES = "B4-2021: 237-242", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306341"} @inproceedings{bb311909, AUTHOR = "Toka, K.O. and Dikilitas, Y. and Oktay, T. and Sayar, A.", TITLE = "Securing Iot With Blockchain", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "529-532", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306342"} @inproceedings{bb311910, AUTHOR = "Ozarpa, C. and Avci, I. and Kinaci, B.F. and Arapoglu, S. and Kara, S.A.", TITLE = "Cyber Attacks on Scada Based Traffic Light Control Systems in the Smart Cities", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "411-415", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306343"} @inproceedings{bb311911, AUTHOR = "Moulad, L. and Chaabita, R. and Balar, K.", TITLE = "Wireless Sensor Network: Towards An Improvement of Security Policy", BOOKTITLE = SmartCityApp21, YEAR = "2021", PAGES = "379-383", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306344"} @inproceedings{bb311912, AUTHOR = "Miryahyaie, S. and Ebrahimpour komleh, H. and Nickfarjam, A.M.", TITLE = "ACO-based Intrusion Detection Method in Computer Networks using Fuzzy Association Rules", BOOKTITLE = IPRIA21, YEAR = "2021", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306345"} @inproceedings{bb311913, AUTHOR = "Mohseni, M. and Tanha, J.", TITLE = "A Density-based Undersampling Approach to Intrusion Detection", BOOKTITLE = IPRIA21, YEAR = "2021", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306346"} @inproceedings{bb311914, AUTHOR = "Liu, Y.G. and Ning, Z. and Zhang, J.J. and Wang, X.P.", TITLE = "Monitory Consensus Mechanism of Blockchain for Internet of Things", BOOKTITLE = ICIVC21, YEAR = "2021", PAGES = "425-430", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306347"} @inproceedings{bb311915, AUTHOR = "Chen, L. and Xian, M. and Liu, J.", TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus", BOOKTITLE = CVIDL20, YEAR = "2020", PAGES = "206-209", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306348"} @inproceedings{bb311916, AUTHOR = "Prima, B. and Bouhorma, M.", TITLE = "Using Transfer Learning for Malware Classification", BOOKTITLE = SmartCityApp20, YEAR = "2020", PAGES = "343-349", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306349"} @inproceedings{bb311917, AUTHOR = "El Bakkouri, N. and Mazri, T.", TITLE = "Security Threats In Smart Healthcare", BOOKTITLE = SmartCityApp20, YEAR = "2020", PAGES = "209-214", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306350"} @inproceedings{bb311918, AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.", TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306351"} @inproceedings{bb311919, AUTHOR = "Mennour, H. and Mostefai, S.", TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306352"} @inproceedings{bb311920, AUTHOR = "Sebbah, A. and Kadri, B.", TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306353"} @inproceedings{bb311921, AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.", TITLE = "DOS attack forecasting: A comparative study on wrapper feature selection", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306354"} @inproceedings{bb311922, AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.", TITLE = "Behavioral Security in Covert Communication Systems", BOOKTITLE = IWDW19, YEAR = "2019", PAGES = "377-392", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306355"} @inproceedings{bb311923, AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.", TITLE = "Intelligent Recognition of TCP Intrusions for Embedded Micro-controllers", BOOKTITLE = NTIAP19, YEAR = "2019", PAGES = "361-373", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306356"} @inproceedings{bb311924, AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.", TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion Detection", BOOKTITLE = ICPR18, YEAR = "2018", PAGES = "682-687", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306357"} @inproceedings{bb311925, AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.", TITLE = "Botnet Detection based on Fuzzy Association Rules", BOOKTITLE = ICPR18, YEAR = "2018", PAGES = "578-584", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306358"} @inproceedings{bb311926, AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.", TITLE = "Cyber Vulnerability: An Attentional Dilemma", BOOKTITLE = VAMR18, YEAR = "2018", PAGES = "II: 331-340", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306359"} @inproceedings{bb311927, AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.", TITLE = "Trust in Autonomous Systems for Threat Analysis: A Simulation Methodology", BOOKTITLE = VAMR18, YEAR = "2018", PAGES = "II: 341-353", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306360"} @article{bb311928, AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.", TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "29-39", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306361"} @article{bb311929, AUTHOR = "Taylor, A. and Leblanc, S. and Japkowicz, N.", TITLE = "Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "54-62", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306362"} @article{bb311930, AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.", TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "63-73", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306363"} @inproceedings{bb311931, AUTHOR = "Menemencioglu, O. and Orak, I.M.", TITLE = "Geographical Assesment of Results From Preventing the Parameter Tampering in A Web Application", BOOKTITLE = GeoAdvances17, YEAR = "2017", PAGES = "69-71", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306364"} @inproceedings{bb311932, AUTHOR = "Herrera Semenets, V. and Perez Garcia, O.A. and Gago Alonso, A. and Hernandez Leon, R.", TITLE = "A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion Detection", BOOKTITLE = CIARP17, YEAR = "2017", PAGES = "289-297", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306365"} @inproceedings{bb311933, AUTHOR = "Mohan, R. and Chaudhury, S. and Lall, B.", TITLE = "Incremental Learning of Non-stationary Temporal Causal Networks for Telecommunication Domain", BOOKTITLE = PReMI17, YEAR = "2017", PAGES = "501-508", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306366"} @inproceedings{bb311934, AUTHOR = "Elejla, O.E. and Belaton, B. and Anbar, M. and Alijla, B.O.", TITLE = "IPv6 OS Fingerprinting Methods: Review", BOOKTITLE = IVIC17, YEAR = "2017", PAGES = "661-668", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306367"} @inproceedings{bb311935, AUTHOR = "Zabri, Z. and Nohuddin, P.N.E.", TITLE = "Analyzing and Detecting Network Intrusion Behavior Using Packet Capture", BOOKTITLE = IVIC17, YEAR = "2017", PAGES = "750-761", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306368"} @inproceedings{bb311936, AUTHOR = "Zyad, E. and Khalid, C. and Mohammed, B.", TITLE = "Combination of R1-PCA and median LDA for anomaly network detection", BOOKTITLE = ISCV17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306369"} @inproceedings{bb311937, AUTHOR = "Alaoui, E.A.A. and Lamhamdi, M.", TITLE = "Study of the energy performance of DTN protocols", BOOKTITLE = ISCV17, YEAR = "2017", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306370"} @inproceedings{bb311938, AUTHOR = "Sadek, B.A. and Houssaine, T.E. and Noreddine, C.", TITLE = "A robust PID controller for active queue management framework in congested routers", BOOKTITLE = ISCV17, YEAR = "2017", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306371"} @inproceedings{bb311939, AUTHOR = "Kempa, W.M.", TITLE = "On buffer overflow duration in WSN with a vacation-type power saving mechanism", BOOKTITLE = WSSIP17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306372"} @inproceedings{bb311940, AUTHOR = "Korona, M. and Skowron, K. and Trzepinski, M. and Rawski, M.", TITLE = "FPGA implementation of IPsec protocol suite for multigigabit networks", BOOKTITLE = WSSIP17, YEAR = "2017", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306373"} @inproceedings{bb311941, AUTHOR = "Geller, B.", TITLE = "Advanced synchronization techniques for the Internet of Things", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "180-184", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306374"} @inproceedings{bb311942, AUTHOR = "Yang, J. and Geller, B. and Arbi, T.", TITLE = "Proposal of a multi-standard transceiver for the WBAN Internet of Things", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "369-373", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306375"} @inproceedings{bb311943, AUTHOR = "Massaoudi, A. and Sellami, N. and Siala, M.", TITLE = "On the impact of pdf-matched quantization for heterogeneous cognitive radio networks", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "259-263", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306376"} @inproceedings{bb311944, AUTHOR = "NasrLeila, I. and Atallah, N. and Cherif, S. and Geller, B.", TITLE = "Time synchronization in IoT networks: Case of a wireless body area network", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "297-301", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306377"} @inproceedings{bb311945, AUTHOR = "Rihani, M.A. and Prevotet, J.C. and Nouvel, F. and Mroue, M. and Mohanna, Y.", TITLE = "ARM-FPGA based platform for automated adaptive wireless communication systems using partial reconfiguration technique", BOOKTITLE = DASIP16, YEAR = "2016", PAGES = "113-120", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306378"} @inproceedings{bb311946, AUTHOR = "Moreac, E. and Rossi, A. and Laurent, J. and Bomel, P.", TITLE = "Crosstalk-aware link power model for Networks-on-Chip", BOOKTITLE = DASIP16, YEAR = "2016", PAGES = "121-128", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306379"} @inproceedings{bb311947, AUTHOR = "Abbes, Y. and Najeh, S. and Besbes, H.", TITLE = "Tractable framework for modeling and analyzing Joint CoMP Transmission and eICIC technology in two-tier heterogeneous cellular networks", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306380"} @inproceedings{bb311948, AUTHOR = "Essassi, S. and Hamila, R. and Cherif, S. and Siala, M. and Hasna, M.O.", TITLE = "Power control and RB allocation in cloud radio access networks", BOOKTITLE = ISIVC16, YEAR = "2016", PAGES = "148-152", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306381"} @inproceedings{bb311949, AUTHOR = "Mashhadi, F. and Asaduzzaman, A. and Mridha, M.F.", TITLE = "A novel resource scheduling approach to improve the reliability of Shuffle-exchange networks", BOOKTITLE = IVPR17, YEAR = "2017", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306382"} @inproceedings{bb311950, AUTHOR = "Xie, J.L. and Dang, J.W. and Li, C. and Lian, X.P. and Lin, J.", TITLE = "Ecology-inspired Admission Control scheme in heterogeneous wireless Networks", BOOKTITLE = ICIVC16, YEAR = "2016", PAGES = "140-144", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306383"} @inproceedings{bb311951, AUTHOR = "Isikdag, U. and Pilouk, M.", TITLE = "Integration Of Geo-sensor Feeds And Event Consumer Services For Real-time Representation of IOT Nodes", BOOKTITLE = ISPRS16, YEAR = "2016", PAGES = "B4: 267-274", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306384"} @inproceedings{bb311952, AUTHOR = "Al Shamisi, A. and Louvieris, P. and Al Mualla, M. and Mihajlov, M.", TITLE = "Towards a theoretical framework for an active cyber situational awareness model", BOOKTITLE = WSSIP16, YEAR = "2016", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306385"} @inproceedings{bb311953, AUTHOR = "Peter, T. and Pavol, H. and Lukas, D.", TITLE = "Implementation and evaluation of IPv6 to IPv4 transition mechanisms in network simulator 3", BOOKTITLE = WSSIP16, YEAR = "2016", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306386"} @inproceedings{bb311954, AUTHOR = "Al Jumeily, D. and Hussain, A. and MacDermott, A. and Seeckts, G. and Lunn, J.", TITLE = "Methods and techniques to support the development of fraud detection system", BOOKTITLE = WSSIP15, YEAR = "2015", PAGES = "224-227", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306387"} @inproceedings{bb311955, AUTHOR = "Safiulin, I. and Schwarz, S. and Rupp, M.", TITLE = "System level simulation of LTE MBSFN networks with high mobility users", BOOKTITLE = WSSIP15, YEAR = "2015", PAGES = "21-24", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306388"} @inproceedings{bb311956, AUTHOR = "Berisha, T. and Midoglu, C. and Homayouni, S. and Svoboda, P. and Rupp, M.", TITLE = "Measurement setup for automatized baselining of WLAN network performance", BOOKTITLE = WSSIP15, YEAR = "2015", PAGES = "25-28", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306389"} @inproceedings{bb311957, AUTHOR = "Marah, H.M. and Elrajubi, O.M. and Abouda, A.A.", TITLE = "Fraud detection in international calls using fuzzy logic", BOOKTITLE = ICCVIA15, YEAR = "2015", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306390"} @inproceedings{bb311958, AUTHOR = "Lu, C.L. and Zhai, L. and Liu, T. and Li, N.", TITLE = "Network Intrusion Detection Based on Neural Networks and D-S Evidence", BOOKTITLE = VSWS15, YEAR = "2015", PAGES = "332-343", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306391"} @inproceedings{bb311959, AUTHOR = "Wei, Z. and Deng, R.H. and Shen, J. and Zhu, J.X. and Ouyang, K. and Wu, Y.D.", TITLE = "Multidimensional Context Awareness in Mobile Devices", BOOKTITLE = MMMod15, YEAR = "2015", PAGES = "II: 38-49", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306392"} @inproceedings{bb311960, AUTHOR = "Ju, X.Y.", TITLE = "Android malware detection through permission and package", BOOKTITLE = ICWAPR14, YEAR = "2014", PAGES = "61-65", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306393"} @inproceedings{bb311961, AUTHOR = "Kuri Morales, A. and Cortes Arce, I.", TITLE = "Improved Performance of Computer Networks by Embedded Pattern Detection", BOOKTITLE = MCPR14, YEAR = "2014", PAGES = "21-30", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306394"} @inproceedings{bb311962, AUTHOR = "Vegh, L. and Miclea, L.", TITLE = "A new approach towards increased security in cyber-physical systems", BOOKTITLE = WSSIP14, YEAR = "2014", PAGES = "175-178", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306395"} @inproceedings{bb311963, AUTHOR = "Dziurzanski, P. and Maka, T.", TITLE = "Network on chips link bandwidth minimization of deadlock-free multi-path routing", BOOKTITLE = WSSIP14, YEAR = "2014", PAGES = "131-134", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306396"} @inproceedings{bb311964, AUTHOR = "Serrano, J.M.B. and Palancar, J.H. and Cumplido, R.", TITLE = "High Throughput Signature Based Platform for Network Intrusion Detection", BOOKTITLE = CIARP13, YEAR = "2013", PAGES = "II:544-551", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306397"} @inproceedings{bb311965, AUTHOR = "Saxena, S. and Kumar, A. and Roy, S.S.", TITLE = "Determination of network vulnerability factor using rough set", BOOKTITLE = ICSIPR13, YEAR = "2013", PAGES = "263-268", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306398"} @inproceedings{bb311966, AUTHOR = "Tran, T. and Ha, Q.P.", TITLE = "Parameterised quadratic constraints for network systems subject to multiple communication topologies", BOOKTITLE = ICARCV12, YEAR = "2012", PAGES = "221-228", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306399"} @inproceedings{bb311967, AUTHOR = "Xin, K. and Cao, X.H. and Cheng, P. and Chen, J.M.", TITLE = "Optimal controller location in wireless sensor and actuator networks", BOOKTITLE = ICARCV12, YEAR = "2012", PAGES = "560-565", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306400"} @inproceedings{bb311968, AUTHOR = "Wu, M.Q. and Xia, Y.Q. and Fu, M.Y.", TITLE = "Application of NPC in wireless networked control systems", BOOKTITLE = ICARCV12, YEAR = "2012", PAGES = "584-589", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306401"} @inproceedings{bb311969, AUTHOR = "Xu, J. and Xie, L.H. and Khanna, N. and Chee, W.H.", TITLE = "Cooperative control in HNMSim: A 3D hybrid networked MAS simulator", BOOKTITLE = ICARCV12, YEAR = "2012", PAGES = "626-631", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306402"} @inproceedings{bb311970, AUTHOR = "Yuan, X.D. and Yu, M. and Xiao, W.D.", TITLE = "Robust stabilization of multiple coupled networked control system via jump linear system approach", BOOKTITLE = ICARCV12, YEAR = "2012", PAGES = "690-694", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306403"} @inproceedings{bb311971, AUTHOR = "Cheng, H. and Chen, Y. and Wong, W.S. and Yang, Q. and Shen, L.F.", TITLE = "Protocol sequence based wireless media access control in networked control systems", BOOKTITLE = ICARCV12, YEAR = "2012", PAGES = "707-712", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306404"} @inproceedings{bb311972, AUTHOR = "Corona, I. and Tronci, R. and Giacinto, G.", TITLE = "SuStorID: A multiple classifier system for the protection of web services", BOOKTITLE = ICPR12, YEAR = "2012", PAGES = "2375-2378", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306405"} @inproceedings{bb311973, AUTHOR = "Gao, Y. and Zheng, S.J.", TITLE = "A metadata access strategy of learning resources based on HDFS", BOOKTITLE = IASP11, YEAR = "2011", PAGES = "620-622", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306406"} @inproceedings{bb311974, AUTHOR = "Yang, F.Y. and Liu, H.C.", TITLE = "Research in HDFS based on the campus network environment", BOOKTITLE = IASP11, YEAR = "2011", PAGES = "648-652", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306407"} @inproceedings{bb311975, AUTHOR = "Zhang, R.Z. and Li, L.Q. and Zhang, C.J.", TITLE = "The application of middleware technology to communication network real-time monitoring system", BOOKTITLE = IASP11, YEAR = "2011", PAGES = "488-491", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306408"} @inproceedings{bb311976, AUTHOR = "Huang, W. and Zheng, S.J. and Zhang, P.", TITLE = "Research of data packet transmission based on SMS services", BOOKTITLE = IASP11, YEAR = "2011", PAGES = "557-560", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306409"} @inproceedings{bb311977, AUTHOR = "Zhao, F.Z. and Li, R. and Kang, Y.B.", TITLE = "Stability analysis of FAST TCP using PI transfer function", BOOKTITLE = IASP11, YEAR = "2011", PAGES = "52-55", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306410"} @inproceedings{bb311978, AUTHOR = "Atila, U. and Karas, I.R.", TITLE = "Genetic Algorithm-Aided Routing on 3D Dynamic Networks", BOOKTITLE = GeoInfo10, YEAR = "2010", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306411"} @inproceedings{bb311979, AUTHOR = "Nguyen, H.T. and Franke, K. and Petrovic, S.", TITLE = "Towards a Generic Feature-Selection Measure for Intrusion Detection", BOOKTITLE = ICPR10, YEAR = "2010", PAGES = "1529-1532", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306412"} @inproceedings{bb311980, AUTHOR = "Gargiulo, F. and Sansone, C.", TITLE = "Improving Performance of Network Traffic Classification Systems by Cleaning Training Data", BOOKTITLE = ICPR10, YEAR = "2010", PAGES = "2768-2771", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306413"} @inproceedings{bb311981, AUTHOR = "Blauensteiner, P. and Kampel, M. and Musik, C. and Vogtenhuber, S.", TITLE = "A socio-technical approach for event detection in security critical infrastructure", BOOKTITLE = SISM10, YEAR = "2010", PAGES = "23-30", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306414"} @inproceedings{bb311982, AUTHOR = "Guo, W.P. and Li, Z.L. and Chen, Y. and Zhao, X.M.", TITLE = "Security design for Instant Messaging system based on RSA and triple DES", BOOKTITLE = IASP09, YEAR = "2009", PAGES = "415-418", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306415"} @inproceedings{bb311983, AUTHOR = "Mazzariello, C. and Sansone, C.", TITLE = "Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers", BOOKTITLE = CIAP09, YEAR = "2009", PAGES = "883-892", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306416"} @inproceedings{bb311984, AUTHOR = "Li, M. and Li, M.", TITLE = "A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306417"} @inproceedings{bb311985, AUTHOR = "Subhan, F. and Hasbullah, H.B.", TITLE = "Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems", BOOKTITLE = IVIC09, YEAR = "2009", PAGES = "759-769", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306418"} @inproceedings{bb311986, AUTHOR = "Benkic, K. and Malajner, M. and Planinsic, P. and Cucej, Z.", TITLE = "On Line Measurements and Visualization of Distances in WSN with RSSI Parameter", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306419"} @inproceedings{bb311987, AUTHOR = "Ribeiro, F.N. and Zorzo, S.D.", TITLE = "A Quantitative Evaluation of Privacy in Location Based Services", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306420"} @inproceedings{bb311988, AUTHOR = "Khan, I. and Karras, D.A.", TITLE = "An Efficient Cross Layer Intra and Inter Domain Mobility Solution for IEEE 802.16e Mobile WiMAX", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306421"} @inproceedings{bb311989, AUTHOR = "Mach, P. and Bestak, R.", TITLE = "Analysis and Performance Evaluation of IEEE 802.16 Enhanced with Decentrally Controlled Relays", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306422"} @inproceedings{bb311990, AUTHOR = "Malajner, M. and Benkic, K. and Planinsic, P. and Cucej, Z.", TITLE = "The Accuracy of Propagation Models for Distance Measurement between WSN Nodes", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306423"} @inproceedings{bb311991, AUTHOR = "Kovacik, T. and Kotuliak, I.", TITLE = "Traffic Characterization in IP Multimedia Subsystem", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306424"} @inproceedings{bb311992, AUTHOR = "Christou, P. and Kyriakoulakos, K. and Sotiriadis, E. and Papadopoulos, K. and Mplemenos, G.G. and Papaefstathiou, I.", TITLE = "Low-Power Security Modules Optimized for WSNs", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306425"} @inproceedings{bb311993, AUTHOR = "Kapetanovic, T. and Kapetanovic, A.", TITLE = "Modeling and Implementation of the Complex Telecommunication Systems Using the High Performance Computing Resources", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306426"} @inproceedings{bb311994, AUTHOR = "Ulvan, M. and Bestak, R.", TITLE = "Delay Performance of Session Establishment Signaling in IP Multimedia Subsystem", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306427"} @inproceedings{bb311995, AUTHOR = "Kantzavelou, I. and Katsikas, S.K.", TITLE = "Playing Games with Internal Attackers Repeatedly", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306428"} @inproceedings{bb311996, AUTHOR = "Spathoulas, G.P. and Katsikas, S.K.", TITLE = "Using a Fuzzy Inference System to Reduce False Positives in Intrusion Detection", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306429"} @inproceedings{bb311997, AUTHOR = "Ulvan, A. and Bestak, R.", TITLE = "The Analysis of Scanning Time in IEEE802.16m's Handover Procedure", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306430"} @inproceedings{bb311998, AUTHOR = "Neruda, M. and Vrana, J. and Bestak, R.", TITLE = "Femtocells in 3G Mobile Networks", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306431"} @inproceedings{bb311999, AUTHOR = "Geneiatakis, D. and Vrakas, N. and Lambrinoudakis, C.", TITLE = "Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks", BOOKTITLE = WSSIP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT306432"}