@inproceedings{bb374000,
AUTHOR = "Hido, S. and Morimura, T.",
TITLE = "Temporal feature selection for time-series prediction",
BOOKTITLE = ICPR12,
YEAR = "2012",
PAGES = "3557-3560",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368108"}
@inproceedings{bb374001,
AUTHOR = "Liu, S. and Yamada, M. and Collier, N. and Sugiyama, M.",
TITLE = "Change-Point Detection in Time-Series Data by Relative Density-Ratio
Estimation",
BOOKTITLE = SSSPR12,
YEAR = "2012",
PAGES = "363-372",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368109"}
@inproceedings{bb374002,
AUTHOR = "Deng, J.Q. and Chen, D.R.",
TITLE = "Hooke and jeeves algorithm for linear least-square problems in sparse
signal reconstruction",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "16-20",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368110"}
@inproceedings{bb374003,
AUTHOR = "Rodriguez, N. and Rubio, J. and Yanez, E.",
TITLE = "Wavelet Autoregressive Model for Monthly Sardines Catches Forecasting
Off Central Southern Chile",
BOOKTITLE = CIARP11,
YEAR = "2011",
PAGES = "654-663",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368111"}
@inproceedings{bb374004,
AUTHOR = "Jibia, A.U. and Salami, M.J.E. and Khalifa, O.O. and Elfaki, F.",
TITLE = "Cramer-Rao Lower Bound for Parameter Estimation of Multiexponential
Signals",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368112"}
@inproceedings{bb374005,
AUTHOR = "Wen, F. and Wan, Q.",
TITLE = "Time Delay Estimation Based on Mutual Information Estimation",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368113"}
@inproceedings{bb374006,
AUTHOR = "Li, X.M. and Tao, R. and Wang, Y.",
TITLE = "Time Delay Estimation Based on the Fractional Fourier Transform in the
Passive System",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368114"}
@inproceedings{bb374007,
AUTHOR = "Wang, T. and Wan, Q.",
TITLE = "Sparse Signal Recovery via Multi-Residual Based Greedy Method",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368115"}
@inproceedings{bb374008,
AUTHOR = "Li, Z.L. and Chen, H. and Yao, C. and Li, J. and Yang, N.",
TITLE = "Sparse Signal Recovery via Optimized Orthogonal Matching Pursuit",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368116"}
@inproceedings{bb374009,
AUTHOR = "Hanias, M.P. and Karras, D.A. and Mobarak, M.",
TITLE = "Non-Linear Analysis and Time Series Prediction of an Electrical
Analogue of the Mechanical Double Pendulum",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368117"}
@inproceedings{bb374010,
AUTHOR = "Nelson, D. and Loughlin, P.J. and Cristobal, G. and Cohen, L.",
TITLE = "Time-frequency methods for biological signal estimation",
BOOKTITLE = ICPR00,
YEAR = "2000",
PAGES = "Vol III: 110-114",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT368118"}
@article{bb374011,
AUTHOR = "Xing, D.S. and Girolami, M.A.",
TITLE = "Employing Latent Dirichlet Allocation for fraud detection in
telecommunications",
JOURNAL = PRL,
VOLUME = "28",
YEAR = "2007",
NUMBER = "13",
MONTH = "October",
PAGES = "1727-1734",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368119"}
@article{bb374012,
AUTHOR = "Celikoglu, H.B. and Gedizlioglu, E. and Dell'Orco, M.",
TITLE = "A Node-Based Modeling Approach for the Continuous Dynamic Network
Loading Problem",
JOURNAL = ITS,
VOLUME = "10",
YEAR = "2009",
NUMBER = "1",
MONTH = "March",
PAGES = "165-174",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368120"}
@article{bb374013,
AUTHOR = "Beghdad, R.",
TITLE = "Modelling intrusion detection as an allocation problem",
JOURNAL = PRL,
VOLUME = "30",
YEAR = "2009",
NUMBER = "8",
MONTH = "June",
PAGES = "774-779",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368121"}
@article{bb374014,
AUTHOR = "Thinh, T.N. and Kittitornkun, S. and Tomiyama, S.",
TITLE = "PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS",
JOURNAL = IEICE,
VOLUME = "E92-D",
YEAR = "2009",
NUMBER = "5",
MONTH = "May",
PAGES = "1049-1061",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368122"}
@article{bb374015,
AUTHOR = "Kim, K.J. and Tsiftsis, T.A.",
TITLE = "Performance Analysis of Cyclically Prefixed Single-Carrier
Transmissions With Outdated Opportunistic User Selection",
JOURNAL = SPLetters,
VOLUME = "17",
YEAR = "2010",
NUMBER = "10",
MONTH = "October",
PAGES = "847-850",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368123"}
@article{bb374016,
AUTHOR = "Taysi, Z.C. and Yavuz, A.G.",
TITLE = "Routing Protocols for GeoNet: A Survey",
JOURNAL = ITS,
VOLUME = "13",
YEAR = "2012",
NUMBER = "2",
MONTH = "June",
PAGES = "939-954",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368124"}
@article{bb374017,
AUTHOR = "Huang, Y.C. and Rao, B.D.",
TITLE = "Sum Rate Analysis of One-Pico-Inside OFDMA Network With Opportunistic
Scheduling and Selective Feedback",
JOURNAL = SPLetters,
VOLUME = "19",
YEAR = "2012",
NUMBER = "7",
MONTH = "July",
PAGES = "383-386",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368125"}
@article{bb374018,
AUTHOR = "Nguyen, H.X. and Roughan, M.",
TITLE = "Improving Hidden Markov Model Inferences With Private Data From
Multiple Observers",
JOURNAL = SPLetters,
VOLUME = "19",
YEAR = "2012",
NUMBER = "10",
MONTH = "October",
PAGES = "696-699",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368126"}
@article{bb374019,
AUTHOR = "Krishnamurthy, V. and Hoiles, W.",
TITLE = "Afriat's Test for Detecting Malicious Agents",
JOURNAL = SPLetters,
VOLUME = "19",
YEAR = "2012",
NUMBER = "12",
MONTH = "December",
PAGES = "801-804",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368127"}
@article{bb374020,
AUTHOR = "Wang, C. and Li, Y. and Jin, D.P. and Chen, S.",
TITLE = "On the Serviceability of Mobile Vehicular Cloudlets in a Large-Scale
Urban Environment",
JOURNAL = ITS,
VOLUME = "17",
YEAR = "2016",
NUMBER = "10",
MONTH = "October",
PAGES = "2960-2970",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368128"}
@article{bb374021,
AUTHOR = "Romero Zurita, N. and McLernon, D. and Ghogho, M. and Swami, A.",
TITLE = "PHY Layer Security Based on Protected Zone and Artificial Noise",
JOURNAL = SPLetters,
VOLUME = "20",
YEAR = "2013",
NUMBER = "5",
MONTH = "May",
PAGES = "487-490",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368129"}
@article{bb374022,
AUTHOR = "Chandrasekaran, S. and Vaideeswaran, J.",
TITLE = "Meta-scheduler using agents for fault tolerance in computational grid",
JOURNAL = IJCVR,
VOLUME = "4",
YEAR = "2014",
NUMBER = "4",
PAGES = "294-329",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368130"}
@article{bb374023,
AUTHOR = "Shen, Y. and Liu, Y.T. and Liu, J. and Yang, H.W. and Yang, D.C.",
TITLE = "A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error
Protection Rateless Code",
JOURNAL = IEICE,
VOLUME = "E97-D",
YEAR = "2014",
NUMBER = "11",
MONTH = "November",
PAGES = "2903-2911",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368131"}
@article{bb374024,
AUTHOR = "Bhuyan, M.H. and Bhattacharyya, D.K. and Kalita, J.K.",
TITLE = "An empirical evaluation of information metrics for low-rate and
high-rate DDoS attack detection",
JOURNAL = PRL,
VOLUME = "51",
YEAR = "2015",
NUMBER = "1",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368132"}
@article{bb374025,
AUTHOR = "Fu, B. and Xiao, Y. and Liang, X.N. and Chen, C.L.P.",
TITLE = "Bio-inspired Group Modeling and Analysis for Intruder Detection in
Mobile Sensor/Robotic Networks",
JOURNAL = Cyber,
VOLUME = "45",
YEAR = "2015",
NUMBER = "1",
MONTH = "January",
PAGES = "103-115",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368133"}
@article{bb374026,
AUTHOR = "Hui, H. and Swindlehurst, A.L. and Li, G.B. and Liang, J.L.",
TITLE = "Secure Relay and Jammer Selection for Physical Layer Security",
JOURNAL = SPLetters,
VOLUME = "22",
YEAR = "2015",
NUMBER = "8",
MONTH = "August",
PAGES = "1147-1151",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368134"}
@article{bb374027,
AUTHOR = "Meng, X.M. and Wu, S. and Kuang, L.L. and Lu, J.H.",
TITLE = "An Expectation Propagation Perspective on Approximate Message Passing",
JOURNAL = SPLetters,
VOLUME = "22",
YEAR = "2015",
NUMBER = "8",
MONTH = "August",
PAGES = "1194-1197",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368135"}
@article{bb374028,
AUTHOR = "Rawat, D.B. and Bajracharya, C.",
TITLE = "Detection of False Data Injection Attacks in Smart Grid Communication
Systems",
JOURNAL = SPLetters,
VOLUME = "22",
YEAR = "2015",
NUMBER = "10",
MONTH = "October",
PAGES = "1652-1656",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368136"}
@article{bb374029,
AUTHOR = "Rastegarnia, A. and Khalili, A. and Bazzi, W.M. and Sanei, S.",
TITLE = "An incremental LMS network with reduced communication delay",
JOURNAL = SIViP,
VOLUME = "10",
YEAR = "2016",
NUMBER = "4",
MONTH = "April",
PAGES = "769-775",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368137"}
@article{bb374030,
AUTHOR = "Brandt, R. and Mochaourab, R. and Bengtsson, M.",
TITLE = "Globally Optimal Base Station Clustering in Interference
Alignment-Based Multicell Networks",
JOURNAL = SPLetters,
VOLUME = "23",
YEAR = "2016",
NUMBER = "4",
MONTH = "April",
PAGES = "512-516",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368138"}
@article{bb374031,
AUTHOR = "Jo, H.G. and Son, T.Y. and Jeong, S.Y. and Kang, S.J.",
TITLE = "Proximity-Based Asynchronous Messaging Platform for Location-Based
Internet of Things Service",
JOURNAL = IJGI,
VOLUME = "5",
YEAR = "2016",
NUMBER = "7",
PAGES = "116",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368139"}
@article{bb374032,
AUTHOR = "Utkovski, Z. and Simeone, O. and Dimitrova, T. and Popovski, P.",
TITLE = "Random Access in C-RAN for User Activity Detection With
Limited-Capacity Fronthaul",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "1",
MONTH = "January",
PAGES = "17-21",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368140"}
@article{bb374033,
AUTHOR = "Yu, N.Y.",
TITLE = "Indistinguishability of Compressed Encryption With Circulant Matrices
for Wireless Security",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "2",
MONTH = "February",
PAGES = "181-185",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368141"}
@article{bb374034,
AUTHOR = "Chen, Q. and Kang, D. and He, Y. and Chang, T.H. and Liu, Y.F.",
TITLE = "Joint Power and Admission Control Based on Channel Distribution
Information: A Novel Two-Timescale Approach",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "2",
MONTH = "February",
PAGES = "196-200",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368142"}
@article{bb374035,
AUTHOR = "Li, W. and Wang, X. and Moran, B.",
TITLE = "Wireless Signal Travel Distance Estimation Using Non-Coprime
Wavelengths",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "1",
MONTH = "January",
PAGES = "27-31",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368143"}
@article{bb374036,
AUTHOR = "Kwon, M. and Park, H.",
TITLE = "Distributed Network Formation Strategy for Network Coding Based
Wireless Networks",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "4",
MONTH = "April",
PAGES = "432-436",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368144"}
@inproceedings{bb374037,
AUTHOR = "Larhlimi, A. and Mestari, M. and El Khaili, M.",
TITLE = "GPU parallel neural hierarchical multi objective solver for burst
routing and wavelength assignment",
BOOKTITLE = ISCV17,
YEAR = "2017",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368145"}
@article{bb374038,
AUTHOR = "Yin, H. and Zhang, X. and Zhao, S. and Luo, Y. and Tian, C. and Sekar, V.",
TITLE = "Tradeoffs Between Cost and Performance for CDN Provisioning Based on
Coordinate Transformation",
JOURNAL = MultMed,
VOLUME = "19",
YEAR = "2017",
NUMBER = "11",
MONTH = "November",
PAGES = "2583-2596",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368146"}
@article{bb374039,
AUTHOR = "Guerreiro, P. and Xavier, J.",
TITLE = "Distributed Learning With Time Correlated Information",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "11",
MONTH = "November",
PAGES = "1636-1640",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368147"}
@article{bb374040,
AUTHOR = "Hu, D. and Zhang, Q. and Yang, P. and Qin, J.",
TITLE = "Proactive Monitoring via Jamming in Amplify-and-Forward Relay
Networks",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "11",
MONTH = "November",
PAGES = "1714-1718",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368148"}
@article{bb374041,
AUTHOR = "AlEroud, A.F. and Karabatis, G.",
TITLE = "Queryable Semantics to Detect Cyber-Attacks:
A Flow-Based Detection Approach",
JOURNAL = SMCS,
VOLUME = "48",
YEAR = "2018",
NUMBER = "2",
MONTH = "February",
PAGES = "207-223",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368149"}
@article{bb374042,
AUTHOR = "Kozik, R.",
TITLE = "Distributing extreme learning machines with Apache Spark for
NetFlow-based malware activity detection",
JOURNAL = PRL,
VOLUME = "101",
YEAR = "2018",
NUMBER = "1",
PAGES = "14-20",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368150"}
@article{bb374043,
AUTHOR = "Ghofrani, F. and Keshavarz Haddad, A. and Jamshidi, A.",
TITLE = "A new probabilistic classifier based on decomposable models with
application to internet traffic",
JOURNAL = PR,
VOLUME = "77",
YEAR = "2018",
PAGES = "1-11",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368151"}
@article{bb374044,
AUTHOR = "Japkowicz, N. and Elovici, Y.",
TITLE = "Introduction to the Special Issue on Data Mining for Cybersecurity",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "3-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368152"}
@article{bb374045,
AUTHOR = "Noble, J. and Adams, N.",
TITLE = "Real-Time Dynamic Network Anomaly Detection",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "5-18",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368153"}
@article{bb374046,
AUTHOR = "Grolman, E. and Finkelshtein, A. and Puzis, R. and Shabtai, A. and Celniker, G. and Katzir, Z. and Rosenfeld, L.",
TITLE = "Transfer Learning for User Action Identication in Mobile Apps via
Encrypted Traffic Analysis",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "40-53",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368154"}
@article{bb374047,
AUTHOR = "Li, B. and Yao, Y. and Chen, H. and Li, Y. and Huang, S.",
TITLE = "Wireless Information Surveillance and Intervention Over Multiple
Suspicious Links",
JOURNAL = SPLetters,
VOLUME = "25",
YEAR = "2018",
NUMBER = "8",
MONTH = "August",
PAGES = "1131-1135",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368155"}
@article{bb374048,
AUTHOR = "Meng, W.",
TITLE = "Intrusion Detection in the Era of IoT: Building Trust via Traffic
Filtering and Sampling",
JOURNAL = Computer,
VOLUME = "51",
YEAR = "2018",
NUMBER = "7",
MONTH = "July",
PAGES = "36-43",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368156"}
@article{bb374049,
AUTHOR = "Jimenez Tejero, C.E. and Sallares, V. and Ranero, C.R.",
TITLE = "Appraisal of Instantaneous Phase-Based Functions in Adjoint Waveform
Inversion",
JOURNAL = GeoRS,
VOLUME = "56",
YEAR = "2018",
NUMBER = "9",
MONTH = "September",
PAGES = "5185-5197",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368157"}
@article{bb374050,
AUTHOR = "Chen, C.H. and Lo, K.R.",
TITLE = "Applications of Internet of Things",
JOURNAL = IJGI,
VOLUME = "7",
YEAR = "2018",
NUMBER = "9",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368158"}
@article{bb374051,
AUTHOR = "Mousavinejad, E. and Yang, F. and Han, Q. and Vlacic, L.",
TITLE = "A Novel Cyber Attack Detection Method in Networked Control Systems",
JOURNAL = Cyber,
VOLUME = "48",
YEAR = "2018",
NUMBER = "11",
MONTH = "November",
PAGES = "3254-3264",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368159"}
@article{bb374052,
AUTHOR = "Shang, Y.",
TITLE = "Subgraph Robustness of Complex Networks Under Attacks",
JOURNAL = SMCS,
VOLUME = "49",
YEAR = "2019",
NUMBER = "4",
MONTH = "April",
PAGES = "821-832",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368160"}
@article{bb374053,
AUTHOR = "Phetlasy, S. and Ohzahata, S. and Wu, C. and Kato, T.",
TITLE = "A Sequential Classifiers Combination Method to Reduce False Negative
for Intrusion Detection System",
JOURNAL = IEICE,
VOLUME = "E102-D",
YEAR = "2019",
NUMBER = "5",
MONTH = "May",
PAGES = "888-897",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368161"}
@article{bb374054,
AUTHOR = "Gao, N. and Qin, Z. and Jing, X.",
TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless
Communications",
JOURNAL = SPLetters,
VOLUME = "26",
YEAR = "2019",
NUMBER = "6",
MONTH = "June",
PAGES = "938-942",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368162"}
@article{bb374055,
AUTHOR = "Cho, K. and Lee, S. and Khisti, A.",
TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable
Batteries",
JOURNAL = SPLetters,
VOLUME = "26",
YEAR = "2019",
NUMBER = "7",
MONTH = "July",
PAGES = "971-975",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368163"}
@article{bb374056,
AUTHOR = "Antal, M. and Egyed Zsigmond, E.",
TITLE = "Intrusion detection using mouse dynamics",
JOURNAL = IET-Bio,
VOLUME = "8",
YEAR = "2019",
NUMBER = "5",
MONTH = "September",
PAGES = "285-294",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368164"}
@article{bb374057,
AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.",
TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things
Data: A Review and Case Study",
JOURNAL = RS,
VOLUME = "11",
YEAR = "2019",
NUMBER = "19",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368165"}
@article{bb374058,
AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.",
TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm",
JOURNAL = JVCIR,
VOLUME = "65",
YEAR = "2019",
PAGES = "102646",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368166"}
@article{bb374059,
AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.",
TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile
fog computing",
JOURNAL = JVCIR,
VOLUME = "65",
YEAR = "2019",
PAGES = "102656",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368167"}
@article{bb374060,
AUTHOR = "Hwang, K.",
TITLE = "Blocking of operation of unauthorised software using MQTT",
JOURNAL = IJCVR,
VOLUME = "9",
YEAR = "2019",
NUMBER = "6",
PAGES = "609-620",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368168"}
@article{bb374061,
AUTHOR = "Chen, X.F. and Yu, S.Z.",
TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN",
JOURNAL = IEICE,
VOLUME = "E99-D",
YEAR = "2016",
NUMBER = "9",
MONTH = "September",
PAGES = "2395-2399",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368169"}
@inproceedings{bb374062,
AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.",
TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory
and Mechanism Design",
BOOKTITLE = MMMod20,
YEAR = "2020",
PAGES = "II:651-668",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368170"}
@article{bb374063,
AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.",
TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension
Approximate Entropy",
JOURNAL = SPLetters,
VOLUME = "27",
YEAR = "2020",
PAGES = "471-475",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368171"}
@article{bb374064,
AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.",
TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black
and White Binary Image",
JOURNAL = IEICE,
VOLUME = "E103-D",
YEAR = "2020",
NUMBER = "4",
MONTH = "April",
PAGES = "896-900",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368172"}
@article{bb374065,
AUTHOR = "Kim, K.",
TITLE = "Intrusion Detection System Using Deep Learning and Its Application to
Wi-Fi Network",
JOURNAL = IEICE,
VOLUME = "E103-D",
YEAR = "2020",
NUMBER = "7",
MONTH = "July",
PAGES = "1433-1447",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368173"}
@inproceedings{bb374066,
AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.",
TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams
in Azimuth Plane for WLAN Wireless System",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368174"}
@article{bb374067,
AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.",
TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio
Access in IoT Fog Networks",
JOURNAL = SPLetters,
VOLUME = "28",
YEAR = "2021",
PAGES = "728-732",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368175"}
@article{bb374068,
AUTHOR = "Park, S.H. and Jin, X.",
TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for
Multi-User Systems",
JOURNAL = SPLetters,
VOLUME = "28",
YEAR = "2021",
PAGES = "917-921",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368176"}
@article{bb374069,
AUTHOR = "Wang, Z. and Blum, R.S.",
TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks",
JOURNAL = SPLetters,
VOLUME = "28",
YEAR = "2021",
PAGES = "1002-1005",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368177"}
@article{bb374070,
AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.",
TITLE = "Multi-type relational clustering for enterprise cyber-security
networks",
JOURNAL = PRL,
VOLUME = "149",
YEAR = "2021",
PAGES = "172-178",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368178"}
@article{bb374071,
AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.",
TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes",
JOURNAL = IJCVR,
VOLUME = "11",
YEAR = "2021",
NUMBER = "4",
PAGES = "357-373",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368179"}
@inproceedings{bb374072,
AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.",
TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL
Databases",
BOOKTITLE = MCPR21,
YEAR = "2021",
PAGES = "23-32",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368180"}
@article{bb374073,
AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.",
TITLE = "CAN-Bus Attack Detection With Deep Learning",
JOURNAL = ITS,
VOLUME = "22",
YEAR = "2021",
NUMBER = "8",
MONTH = "August",
PAGES = "5081-5090",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368181"}
@article{bb374074,
AUTHOR = "Cho, Y.B.",
TITLE = "Malware classifier for dynamic deep learning algorithm",
JOURNAL = IJCVR,
VOLUME = "11",
YEAR = "2021",
NUMBER = "5",
PAGES = "486-496",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368182"}
@article{bb374075,
AUTHOR = "Chou, D. and Jiang, M.",
TITLE = "A Survey on Data-Driven Network Intrusion Detection",
JOURNAL = Surveys,
VOLUME = "54",
YEAR = "2021",
NUMBER = "9",
MONTH = "October",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368183"}
@article{bb374076,
AUTHOR = "Arulananth, T.S. and Baskar, M. and Anbarasu, V. and Thiagarajan, R. and Rajendran, T. and Balaji, A.",
TITLE = "Multi party secure data access management in cloud using user centric
block chain data encryption",
JOURNAL = PRL,
VOLUME = "152",
YEAR = "2021",
PAGES = "295-301",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368184"}
@article{bb374077,
AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.",
TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive
Model Resolving the Security Issues in IoT Based Models",
JOURNAL = PRL,
VOLUME = "152",
YEAR = "2021",
PAGES = "428-435",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368185"}
@article{bb374078,
AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.",
TITLE = "Protection motivation theory using multi-factor authentication for
providing security over social networking sites",
JOURNAL = PRL,
VOLUME = "152",
YEAR = "2021",
PAGES = "218-224",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368186"}
@article{bb374079,
AUTHOR = "Wei, S.M. and Pan, J.H.",
TITLE = "Resilience of Urban Network Structure in China:
The Perspective of Disruption",
JOURNAL = IJGI,
VOLUME = "10",
YEAR = "2021",
NUMBER = "12",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368187"}
@article{bb374080,
AUTHOR = "Saveetha, D. and Maragatham, G.",
TITLE = "Design of Blockchain enabled intrusion detection model for detecting
security attacks using deep learning",
JOURNAL = PRL,
VOLUME = "153",
YEAR = "2022",
PAGES = "24-28",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368188"}
@article{bb374081,
AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.",
TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature
Selection",
JOURNAL = IEICE,
VOLUME = "E105-D",
YEAR = "2022",
NUMBER = "5",
MONTH = "May",
PAGES = "1024-1038",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368189"}
@article{bb374082,
AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.",
TITLE = "Cloud security based attack detection using transductive learning
integrated with Hidden Markov Model",
JOURNAL = PRL,
VOLUME = "157",
YEAR = "2022",
PAGES = "16-26",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368190"}
@article{bb374083,
AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.",
TITLE = "Network optimization using defender system in cloud computing
security based intrusion detection system withgame theory deep neural
network (IDSGT-DNN)",
JOURNAL = PRL,
VOLUME = "156",
YEAR = "2022",
PAGES = "142-151",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368191"}
@article{bb374084,
AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.",
TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to
Denial-of-Service Attacks",
JOURNAL = SMCS,
VOLUME = "52",
YEAR = "2022",
NUMBER = "5",
MONTH = "May",
PAGES = "3326-3336",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368192"}
@article{bb374085,
AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.T.",
TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification",
JOURNAL = RS,
VOLUME = "14",
YEAR = "2022",
NUMBER = "9",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368193"}
@article{bb374086,
AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.",
TITLE = "Task adaptive siamese neural networks for open-set recognition of
encrypted network traffic with bidirectional dropout",
JOURNAL = PRL,
VOLUME = "159",
YEAR = "2022",
PAGES = "132-139",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368194"}
@article{bb374087,
AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.",
TITLE = "Automated Software Defect Detection and Identification in Vehicular
Embedded Systems",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "7",
MONTH = "July",
PAGES = "6963-6973",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368195"}
@article{bb374088,
AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.",
TITLE = "An Intrusion Detection Method Based on Machine Learning and State
Observer for Train-Ground Communication Systems",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "7",
MONTH = "July",
PAGES = "6608-6620",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368196"}
@article{bb374089,
AUTHOR = "Kye, H. and Kim, M. and Kwon, M.",
TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised
Learning Approach",
JOURNAL = SPLetters,
VOLUME = "29",
YEAR = "2022",
PAGES = "1908-1912",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368197"}
@article{bb374090,
AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.",
TITLE = "Wrapper feature selection method based differential evolution and
extreme learning machine for intrusion detection system",
JOURNAL = PR,
VOLUME = "132",
YEAR = "2022",
PAGES = "108912",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368198"}
@article{bb374091,
AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.",
TITLE = "Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "10",
MONTH = "October",
PAGES = "17425-17439",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368199"}
@article{bb374092,
AUTHOR = "Sathish, N. and Valarmathi, N.",
TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's
chi-squared distribution and decision tree classifiers",
JOURNAL = PRL,
VOLUME = "162",
YEAR = "2022",
PAGES = "15-21",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368200"}
@article{bb374093,
AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.",
TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular
Networks",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "11",
MONTH = "November",
PAGES = "22596-22606",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368201"}
@inproceedings{bb374094,
AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.",
TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior
Profiling",
BOOKTITLE = "ICPR22",
YEAR = "2022",
PAGES = "1865-1870",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368202"}
@article{bb374095,
AUTHOR = "Wang, Y.Z. and Liu, Q. and Mihankhah, E. and Lv, C. and Wang, D.",
TITLE = "Detection and Isolation of Sensor Attacks for Autonomous Vehicles:
Framework, Algorithms, and Validation",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "7",
MONTH = "July",
PAGES = "8247-8259",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368203"}
@article{bb374096,
AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Al Otaibi, S. and Tian, Z.H.",
TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and
Weight Self-Learning",
JOURNAL = ITS,
VOLUME = "24",
YEAR = "2023",
NUMBER = "7",
MONTH = "July",
PAGES = "7642-7652",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368204"}
@article{bb374097,
AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.",
TITLE = "Detecting Android Malware With Pre-Existing Image Classification
Neural Networks",
JOURNAL = SPLetters,
VOLUME = "30",
YEAR = "2023",
PAGES = "858-862",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368205"}
@article{bb374098,
AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.",
TITLE = "Distributed edge-event-triggered consensus of multi-agent system
under DoS attack",
JOURNAL = PRL,
VOLUME = "174",
YEAR = "2023",
PAGES = "118-123",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368206"}
@article{bb374099,
AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z.L. and Deng, Z.Y. and Ling, X. and Xiang, W.",
TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet
traffic data",
JOURNAL = PR,
VOLUME = "146",
YEAR = "2024",
PAGES = "109999",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT368207"}
Last update:Feb 26, 2026 at 10:58:24