@inproceedings{bb368100,
AUTHOR = "Ravelomanantsoa, A. and Rabah, H. and Rouane, A.",
TITLE = "Fast and efficient signals recovery for deterministic compressive
sensing: Applications to biosignals",
BOOKTITLE = DASIP15,
YEAR = "2015",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362257"}
@inproceedings{bb368101,
AUTHOR = "Acuna, D. and Allende Cid, H. and Allende, H.",
TITLE = "The Effect of Innovation Assumptions on Asymmetric GARCH Models for
Volatility Forecasting",
BOOKTITLE = CIARP15,
YEAR = "2015",
PAGES = "527-534",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362258"}
@inproceedings{bb368102,
AUTHOR = "Aizenberg, I. and Sheremetov, L. and Villa Vargas, L.",
TITLE = "Multilayer Neural Network with Multi-Valued Neurons in Time Series
Forecasting of Oil Production",
BOOKTITLE = MCPR14,
YEAR = "2014",
PAGES = "61-70",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362259"}
@inproceedings{bb368103,
AUTHOR = "Ulloa, G. and Allende Cid, H. and Allende, H.",
TITLE = "Sieve Bootstrap Prediction Intervals for Contaminated Non-linear
Processes",
BOOKTITLE = CIARP13,
YEAR = "2013",
PAGES = "I:84-91",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362260"}
@inproceedings{bb368104,
AUTHOR = "Semenovich, D. and Sowmya, A. and Goldsmith, B.E.",
TITLE = "Predicting onsets of genocide with sparse additive models",
BOOKTITLE = ICPR12,
YEAR = "2012",
PAGES = "3549-3552",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362261"}
@inproceedings{bb368105,
AUTHOR = "Hirade, R. and Yoshizumi, T.",
TITLE = "Ensemble learning for change-point prediction",
BOOKTITLE = ICPR12,
YEAR = "2012",
PAGES = "1860-1863",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362262"}
@inproceedings{bb368106,
AUTHOR = "Takahashi, T. and Ide, T.",
TITLE = "Predicting battery life from usage trajectory patterns",
BOOKTITLE = ICPR12,
YEAR = "2012",
PAGES = "2946-2949",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362263"}
@inproceedings{bb368107,
AUTHOR = "Hido, S. and Morimura, T.",
TITLE = "Temporal feature selection for time-series prediction",
BOOKTITLE = ICPR12,
YEAR = "2012",
PAGES = "3557-3560",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362264"}
@inproceedings{bb368108,
AUTHOR = "Liu, S. and Yamada, M. and Collier, N. and Sugiyama, M.",
TITLE = "Change-Point Detection in Time-Series Data by Relative Density-Ratio
Estimation",
BOOKTITLE = SSSPR12,
YEAR = "2012",
PAGES = "363-372",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362265"}
@inproceedings{bb368109,
AUTHOR = "Deng, J.Q. and Chen, D.R.",
TITLE = "Hooke and jeeves algorithm for linear least-square problems in sparse
signal reconstruction",
BOOKTITLE = IASP11,
YEAR = "2011",
PAGES = "16-20",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362266"}
@inproceedings{bb368110,
AUTHOR = "Rodriguez, N. and Rubio, J. and Yanez, E.",
TITLE = "Wavelet Autoregressive Model for Monthly Sardines Catches Forecasting
Off Central Southern Chile",
BOOKTITLE = CIARP11,
YEAR = "2011",
PAGES = "654-663",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362267"}
@inproceedings{bb368111,
AUTHOR = "Jibia, A.U. and Salami, M.J.E. and Khalifa, O.O. and Elfaki, F.",
TITLE = "Cramer-Rao Lower Bound for Parameter Estimation of Multiexponential
Signals",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362268"}
@inproceedings{bb368112,
AUTHOR = "Wen, F. and Wan, Q.",
TITLE = "Time Delay Estimation Based on Mutual Information Estimation",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362269"}
@inproceedings{bb368113,
AUTHOR = "Li, X.M. and Tao, R. and Wang, Y.",
TITLE = "Time Delay Estimation Based on the Fractional Fourier Transform in the
Passive System",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362270"}
@inproceedings{bb368114,
AUTHOR = "Wang, T. and Wan, Q.",
TITLE = "Sparse Signal Recovery via Multi-Residual Based Greedy Method",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362271"}
@inproceedings{bb368115,
AUTHOR = "Li, Z.L. and Chen, H. and Yao, C. and Li, J. and Yang, N.",
TITLE = "Sparse Signal Recovery via Optimized Orthogonal Matching Pursuit",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362272"}
@inproceedings{bb368116,
AUTHOR = "Hanias, M.P. and Karras, D.A. and Mobarak, M.",
TITLE = "Non-Linear Analysis and Time Series Prediction of an Electrical
Analogue of the Mechanical Double Pendulum",
BOOKTITLE = WSSIP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362273"}
@inproceedings{bb368117,
AUTHOR = "Nelson, D. and Loughlin, P.J. and Cristobal, G. and Cohen, L.",
TITLE = "Time-frequency methods for biological signal estimation",
BOOKTITLE = ICPR00,
YEAR = "2000",
PAGES = "Vol III: 110-114",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT362274"}
@article{bb368118,
AUTHOR = "Xing, D.S. and Girolami, M.A.",
TITLE = "Employing Latent Dirichlet Allocation for fraud detection in
telecommunications",
JOURNAL = PRL,
VOLUME = "28",
YEAR = "2007",
NUMBER = "13",
MONTH = "October",
PAGES = "1727-1734",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362275"}
@article{bb368119,
AUTHOR = "Celikoglu, H.B. and Gedizlioglu, E. and Dell'Orco, M.",
TITLE = "A Node-Based Modeling Approach for the Continuous Dynamic Network
Loading Problem",
JOURNAL = ITS,
VOLUME = "10",
YEAR = "2009",
NUMBER = "1",
MONTH = "March",
PAGES = "165-174",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362276"}
@article{bb368120,
AUTHOR = "Beghdad, R.",
TITLE = "Modelling intrusion detection as an allocation problem",
JOURNAL = PRL,
VOLUME = "30",
YEAR = "2009",
NUMBER = "8",
MONTH = "June",
PAGES = "774-779",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362277"}
@article{bb368121,
AUTHOR = "Thinh, T.N. and Kittitornkun, S. and Tomiyama, S.",
TITLE = "PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS",
JOURNAL = IEICE,
VOLUME = "E92-D",
YEAR = "2009",
NUMBER = "5",
MONTH = "May",
PAGES = "1049-1061",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362278"}
@article{bb368122,
AUTHOR = "Kim, K.J. and Tsiftsis, T.A.",
TITLE = "Performance Analysis of Cyclically Prefixed Single-Carrier
Transmissions With Outdated Opportunistic User Selection",
JOURNAL = SPLetters,
VOLUME = "17",
YEAR = "2010",
NUMBER = "10",
MONTH = "October",
PAGES = "847-850",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362279"}
@article{bb368123,
AUTHOR = "Taysi, Z.C. and Yavuz, A.G.",
TITLE = "Routing Protocols for GeoNet: A Survey",
JOURNAL = ITS,
VOLUME = "13",
YEAR = "2012",
NUMBER = "2",
MONTH = "June",
PAGES = "939-954",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362280"}
@article{bb368124,
AUTHOR = "Huang, Y.C. and Rao, B.D.",
TITLE = "Sum Rate Analysis of One-Pico-Inside OFDMA Network With Opportunistic
Scheduling and Selective Feedback",
JOURNAL = SPLetters,
VOLUME = "19",
YEAR = "2012",
NUMBER = "7",
MONTH = "July",
PAGES = "383-386",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362281"}
@article{bb368125,
AUTHOR = "Nguyen, H.X. and Roughan, M.",
TITLE = "Improving Hidden Markov Model Inferences With Private Data From
Multiple Observers",
JOURNAL = SPLetters,
VOLUME = "19",
YEAR = "2012",
NUMBER = "10",
MONTH = "October",
PAGES = "696-699",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362282"}
@article{bb368126,
AUTHOR = "Krishnamurthy, V. and Hoiles, W.",
TITLE = "Afriat's Test for Detecting Malicious Agents",
JOURNAL = SPLetters,
VOLUME = "19",
YEAR = "2012",
NUMBER = "12",
MONTH = "December",
PAGES = "801-804",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362283"}
@article{bb368127,
AUTHOR = "Wang, C. and Li, Y. and Jin, D.P. and Chen, S.",
TITLE = "On the Serviceability of Mobile Vehicular Cloudlets in a Large-Scale
Urban Environment",
JOURNAL = ITS,
VOLUME = "17",
YEAR = "2016",
NUMBER = "10",
MONTH = "October",
PAGES = "2960-2970",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362284"}
@article{bb368128,
AUTHOR = "Romero Zurita, N. and McLernon, D. and Ghogho, M. and Swami, A.",
TITLE = "PHY Layer Security Based on Protected Zone and Artificial Noise",
JOURNAL = SPLetters,
VOLUME = "20",
YEAR = "2013",
NUMBER = "5",
MONTH = "May",
PAGES = "487-490",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362285"}
@article{bb368129,
AUTHOR = "Chandrasekaran, S. and Vaideeswaran, J.",
TITLE = "Meta-scheduler using agents for fault tolerance in computational grid",
JOURNAL = IJCVR,
VOLUME = "4",
YEAR = "2014",
NUMBER = "4",
PAGES = "294-329",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362286"}
@article{bb368130,
AUTHOR = "Shen, Y. and Liu, Y.T. and Liu, J. and Yang, H.W. and Yang, D.C.",
TITLE = "A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error
Protection Rateless Code",
JOURNAL = IEICE,
VOLUME = "E97-D",
YEAR = "2014",
NUMBER = "11",
MONTH = "November",
PAGES = "2903-2911",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362287"}
@article{bb368131,
AUTHOR = "Bhuyan, M.H. and Bhattacharyya, D.K. and Kalita, J.K.",
TITLE = "An empirical evaluation of information metrics for low-rate and
high-rate DDoS attack detection",
JOURNAL = PRL,
VOLUME = "51",
YEAR = "2015",
NUMBER = "1",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362288"}
@article{bb368132,
AUTHOR = "Fu, B. and Xiao, Y. and Liang, X.N. and Chen, C.L.P.",
TITLE = "Bio-inspired Group Modeling and Analysis for Intruder Detection in
Mobile Sensor/Robotic Networks",
JOURNAL = Cyber,
VOLUME = "45",
YEAR = "2015",
NUMBER = "1",
MONTH = "January",
PAGES = "103-115",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362289"}
@article{bb368133,
AUTHOR = "Hui, H. and Swindlehurst, A.L. and Li, G.B. and Liang, J.L.",
TITLE = "Secure Relay and Jammer Selection for Physical Layer Security",
JOURNAL = SPLetters,
VOLUME = "22",
YEAR = "2015",
NUMBER = "8",
MONTH = "August",
PAGES = "1147-1151",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362290"}
@article{bb368134,
AUTHOR = "Meng, X.M. and Wu, S. and Kuang, L.L. and Lu, J.H.",
TITLE = "An Expectation Propagation Perspective on Approximate Message Passing",
JOURNAL = SPLetters,
VOLUME = "22",
YEAR = "2015",
NUMBER = "8",
MONTH = "August",
PAGES = "1194-1197",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362291"}
@article{bb368135,
AUTHOR = "Rawat, D.B. and Bajracharya, C.",
TITLE = "Detection of False Data Injection Attacks in Smart Grid Communication
Systems",
JOURNAL = SPLetters,
VOLUME = "22",
YEAR = "2015",
NUMBER = "10",
MONTH = "October",
PAGES = "1652-1656",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362292"}
@article{bb368136,
AUTHOR = "Rastegarnia, A. and Khalili, A. and Bazzi, W.M. and Sanei, S.",
TITLE = "An incremental LMS network with reduced communication delay",
JOURNAL = SIViP,
VOLUME = "10",
YEAR = "2016",
NUMBER = "4",
MONTH = "April",
PAGES = "769-775",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362293"}
@article{bb368137,
AUTHOR = "Brandt, R. and Mochaourab, R. and Bengtsson, M.",
TITLE = "Globally Optimal Base Station Clustering in Interference
Alignment-Based Multicell Networks",
JOURNAL = SPLetters,
VOLUME = "23",
YEAR = "2016",
NUMBER = "4",
MONTH = "April",
PAGES = "512-516",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362294"}
@article{bb368138,
AUTHOR = "Jo, H.G. and Son, T.Y. and Jeong, S.Y. and Kang, S.J.",
TITLE = "Proximity-Based Asynchronous Messaging Platform for Location-Based
Internet of Things Service",
JOURNAL = IJGI,
VOLUME = "5",
YEAR = "2016",
NUMBER = "7",
PAGES = "116",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362295"}
@article{bb368139,
AUTHOR = "Utkovski, Z. and Simeone, O. and Dimitrova, T. and Popovski, P.",
TITLE = "Random Access in C-RAN for User Activity Detection With
Limited-Capacity Fronthaul",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "1",
MONTH = "January",
PAGES = "17-21",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362296"}
@article{bb368140,
AUTHOR = "Yu, N.Y.",
TITLE = "Indistinguishability of Compressed Encryption With Circulant Matrices
for Wireless Security",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "2",
MONTH = "February",
PAGES = "181-185",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362297"}
@article{bb368141,
AUTHOR = "Chen, Q. and Kang, D. and He, Y. and Chang, T.H. and Liu, Y.F.",
TITLE = "Joint Power and Admission Control Based on Channel Distribution
Information: A Novel Two-Timescale Approach",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "2",
MONTH = "February",
PAGES = "196-200",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362298"}
@article{bb368142,
AUTHOR = "Li, W. and Wang, X. and Moran, B.",
TITLE = "Wireless Signal Travel Distance Estimation Using Non-Coprime
Wavelengths",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "1",
MONTH = "January",
PAGES = "27-31",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362299"}
@article{bb368143,
AUTHOR = "Kwon, M. and Park, H.",
TITLE = "Distributed Network Formation Strategy for Network Coding Based
Wireless Networks",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "4",
MONTH = "April",
PAGES = "432-436",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362300"}
@inproceedings{bb368144,
AUTHOR = "Larhlimi, A. and Mestari, M. and El Khaili, M.",
TITLE = "GPU parallel neural hierarchical multi objective solver for burst
routing and wavelength assignment",
BOOKTITLE = ISCV17,
YEAR = "2017",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362301"}
@article{bb368145,
AUTHOR = "Yin, H. and Zhang, X. and Zhao, S. and Luo, Y. and Tian, C. and Sekar, V.",
TITLE = "Tradeoffs Between Cost and Performance for CDN Provisioning Based on
Coordinate Transformation",
JOURNAL = MultMed,
VOLUME = "19",
YEAR = "2017",
NUMBER = "11",
MONTH = "November",
PAGES = "2583-2596",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362302"}
@article{bb368146,
AUTHOR = "Guerreiro, P. and Xavier, J.",
TITLE = "Distributed Learning With Time Correlated Information",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "11",
MONTH = "November",
PAGES = "1636-1640",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362303"}
@article{bb368147,
AUTHOR = "Hu, D. and Zhang, Q. and Yang, P. and Qin, J.",
TITLE = "Proactive Monitoring via Jamming in Amplify-and-Forward Relay
Networks",
JOURNAL = SPLetters,
VOLUME = "24",
YEAR = "2017",
NUMBER = "11",
MONTH = "November",
PAGES = "1714-1718",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362304"}
@article{bb368148,
AUTHOR = "AlEroud, A.F. and Karabatis, G.",
TITLE = "Queryable Semantics to Detect Cyber-Attacks:
A Flow-Based Detection Approach",
JOURNAL = SMCS,
VOLUME = "48",
YEAR = "2018",
NUMBER = "2",
MONTH = "February",
PAGES = "207-223",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362305"}
@article{bb368149,
AUTHOR = "Kozik, R.",
TITLE = "Distributing extreme learning machines with Apache Spark for
NetFlow-based malware activity detection",
JOURNAL = PRL,
VOLUME = "101",
YEAR = "2018",
NUMBER = "1",
PAGES = "14-20",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362306"}
@article{bb368150,
AUTHOR = "Ghofrani, F. and Keshavarz Haddad, A. and Jamshidi, A.",
TITLE = "A new probabilistic classifier based on decomposable models with
application to internet traffic",
JOURNAL = PR,
VOLUME = "77",
YEAR = "2018",
PAGES = "1-11",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362307"}
@article{bb368151,
AUTHOR = "Japkowicz, N. and Elovici, Y.",
TITLE = "Introduction to the Special Issue on Data Mining for Cybersecurity",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "3-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362308"}
@article{bb368152,
AUTHOR = "Noble, J. and Adams, N.",
TITLE = "Real-Time Dynamic Network Anomaly Detection",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "5-18",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362309"}
@article{bb368153,
AUTHOR = "Grolman, E. and Finkelshtein, A. and Puzis, R. and Shabtai, A. and Celniker, G. and Katzir, Z. and Rosenfeld, L.",
TITLE = "Transfer Learning for User Action Identication in Mobile Apps via
Encrypted Traffic Analysis",
JOURNAL = IEEE_Int_Sys,
VOLUME = "33",
YEAR = "2018",
NUMBER = "2",
MONTH = "March",
PAGES = "40-53",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362310"}
@article{bb368154,
AUTHOR = "Li, B. and Yao, Y. and Chen, H. and Li, Y. and Huang, S.",
TITLE = "Wireless Information Surveillance and Intervention Over Multiple
Suspicious Links",
JOURNAL = SPLetters,
VOLUME = "25",
YEAR = "2018",
NUMBER = "8",
MONTH = "August",
PAGES = "1131-1135",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362311"}
@article{bb368155,
AUTHOR = "Meng, W.",
TITLE = "Intrusion Detection in the Era of IoT: Building Trust via Traffic
Filtering and Sampling",
JOURNAL = Computer,
VOLUME = "51",
YEAR = "2018",
NUMBER = "7",
MONTH = "July",
PAGES = "36-43",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362312"}
@article{bb368156,
AUTHOR = "Jimenez Tejero, C.E. and Sallares, V. and Ranero, C.R.",
TITLE = "Appraisal of Instantaneous Phase-Based Functions in Adjoint Waveform
Inversion",
JOURNAL = GeoRS,
VOLUME = "56",
YEAR = "2018",
NUMBER = "9",
MONTH = "September",
PAGES = "5185-5197",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362313"}
@article{bb368157,
AUTHOR = "Chen, C.H. and Lo, K.R.",
TITLE = "Applications of Internet of Things",
JOURNAL = IJGI,
VOLUME = "7",
YEAR = "2018",
NUMBER = "9",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362314"}
@article{bb368158,
AUTHOR = "Mousavinejad, E. and Yang, F. and Han, Q. and Vlacic, L.",
TITLE = "A Novel Cyber Attack Detection Method in Networked Control Systems",
JOURNAL = Cyber,
VOLUME = "48",
YEAR = "2018",
NUMBER = "11",
MONTH = "November",
PAGES = "3254-3264",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362315"}
@article{bb368159,
AUTHOR = "Shang, Y.",
TITLE = "Subgraph Robustness of Complex Networks Under Attacks",
JOURNAL = SMCS,
VOLUME = "49",
YEAR = "2019",
NUMBER = "4",
MONTH = "April",
PAGES = "821-832",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362316"}
@article{bb368160,
AUTHOR = "Phetlasy, S. and Ohzahata, S. and Wu, C. and Kato, T.",
TITLE = "A Sequential Classifiers Combination Method to Reduce False Negative
for Intrusion Detection System",
JOURNAL = IEICE,
VOLUME = "E102-D",
YEAR = "2019",
NUMBER = "5",
MONTH = "May",
PAGES = "888-897",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362317"}
@article{bb368161,
AUTHOR = "Gao, N. and Qin, Z. and Jing, X.",
TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless
Communications",
JOURNAL = SPLetters,
VOLUME = "26",
YEAR = "2019",
NUMBER = "6",
MONTH = "June",
PAGES = "938-942",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362318"}
@article{bb368162,
AUTHOR = "Cho, K. and Lee, S. and Khisti, A.",
TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable
Batteries",
JOURNAL = SPLetters,
VOLUME = "26",
YEAR = "2019",
NUMBER = "7",
MONTH = "July",
PAGES = "971-975",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362319"}
@article{bb368163,
AUTHOR = "Antal, M. and Egyed Zsigmond, E.",
TITLE = "Intrusion detection using mouse dynamics",
JOURNAL = IET-Bio,
VOLUME = "8",
YEAR = "2019",
NUMBER = "5",
MONTH = "September",
PAGES = "285-294",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362320"}
@article{bb368164,
AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.",
TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things
Data: A Review and Case Study",
JOURNAL = RS,
VOLUME = "11",
YEAR = "2019",
NUMBER = "19",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362321"}
@article{bb368165,
AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.",
TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm",
JOURNAL = JVCIR,
VOLUME = "65",
YEAR = "2019",
PAGES = "102646",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362322"}
@article{bb368166,
AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.",
TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile
fog computing",
JOURNAL = JVCIR,
VOLUME = "65",
YEAR = "2019",
PAGES = "102656",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362323"}
@article{bb368167,
AUTHOR = "Hwang, K.",
TITLE = "Blocking of operation of unauthorised software using MQTT",
JOURNAL = IJCVR,
VOLUME = "9",
YEAR = "2019",
NUMBER = "6",
PAGES = "609-620",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362324"}
@article{bb368168,
AUTHOR = "Chen, X.F. and Yu, S.Z.",
TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN",
JOURNAL = IEICE,
VOLUME = "E99-D",
YEAR = "2016",
NUMBER = "9",
MONTH = "September",
PAGES = "2395-2399",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362325"}
@inproceedings{bb368169,
AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.",
TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory
and Mechanism Design",
BOOKTITLE = MMMod20,
YEAR = "2020",
PAGES = "II:651-668",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362326"}
@article{bb368170,
AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.",
TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension
Approximate Entropy",
JOURNAL = SPLetters,
VOLUME = "27",
YEAR = "2020",
PAGES = "471-475",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362327"}
@article{bb368171,
AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.",
TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black
and White Binary Image",
JOURNAL = IEICE,
VOLUME = "E103-D",
YEAR = "2020",
NUMBER = "4",
MONTH = "April",
PAGES = "896-900",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362328"}
@article{bb368172,
AUTHOR = "Kim, K.",
TITLE = "Intrusion Detection System Using Deep Learning and Its Application to
Wi-Fi Network",
JOURNAL = IEICE,
VOLUME = "E103-D",
YEAR = "2020",
NUMBER = "7",
MONTH = "July",
PAGES = "1433-1447",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362329"}
@inproceedings{bb368173,
AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.",
TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams
in Azimuth Plane for WLAN Wireless System",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362330"}
@article{bb368174,
AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.",
TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio
Access in IoT Fog Networks",
JOURNAL = SPLetters,
VOLUME = "28",
YEAR = "2021",
PAGES = "728-732",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362331"}
@article{bb368175,
AUTHOR = "Park, S.H. and Jin, X.",
TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for
Multi-User Systems",
JOURNAL = SPLetters,
VOLUME = "28",
YEAR = "2021",
PAGES = "917-921",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362332"}
@article{bb368176,
AUTHOR = "Wang, Z. and Blum, R.S.",
TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks",
JOURNAL = SPLetters,
VOLUME = "28",
YEAR = "2021",
PAGES = "1002-1005",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362333"}
@article{bb368177,
AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.",
TITLE = "Multi-type relational clustering for enterprise cyber-security
networks",
JOURNAL = PRL,
VOLUME = "149",
YEAR = "2021",
PAGES = "172-178",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362334"}
@article{bb368178,
AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.",
TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes",
JOURNAL = IJCVR,
VOLUME = "11",
YEAR = "2021",
NUMBER = "4",
PAGES = "357-373",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362335"}
@inproceedings{bb368179,
AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.",
TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL
Databases",
BOOKTITLE = MCPR21,
YEAR = "2021",
PAGES = "23-32",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362336"}
@article{bb368180,
AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.",
TITLE = "CAN-Bus Attack Detection With Deep Learning",
JOURNAL = ITS,
VOLUME = "22",
YEAR = "2021",
NUMBER = "8",
MONTH = "August",
PAGES = "5081-5090",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362337"}
@article{bb368181,
AUTHOR = "Cho, Y.B.",
TITLE = "Malware classifier for dynamic deep learning algorithm",
JOURNAL = IJCVR,
VOLUME = "11",
YEAR = "2021",
NUMBER = "5",
PAGES = "486-496",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362338"}
@article{bb368182,
AUTHOR = "Chou, D. and Jiang, M.",
TITLE = "A Survey on Data-Driven Network Intrusion Detection",
JOURNAL = Surveys,
VOLUME = "54",
YEAR = "2021",
NUMBER = "9",
MONTH = "October",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362339"}
@article{bb368183,
AUTHOR = "Arulananth, T.S. and Baskar, M. and Anbarasu, V. and Thiagarajan, R. and Rajendran, T. and Balaji, A.",
TITLE = "Multi party secure data access management in cloud using user centric
block chain data encryption",
JOURNAL = PRL,
VOLUME = "152",
YEAR = "2021",
PAGES = "295-301",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362340"}
@article{bb368184,
AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.",
TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive
Model Resolving the Security Issues in IoT Based Models",
JOURNAL = PRL,
VOLUME = "152",
YEAR = "2021",
PAGES = "428-435",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362341"}
@article{bb368185,
AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.",
TITLE = "Protection motivation theory using multi-factor authentication for
providing security over social networking sites",
JOURNAL = PRL,
VOLUME = "152",
YEAR = "2021",
PAGES = "218-224",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362342"}
@article{bb368186,
AUTHOR = "Wei, S.M. and Pan, J.H.",
TITLE = "Resilience of Urban Network Structure in China:
The Perspective of Disruption",
JOURNAL = IJGI,
VOLUME = "10",
YEAR = "2021",
NUMBER = "12",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362343"}
@article{bb368187,
AUTHOR = "Saveetha, D. and Maragatham, G.",
TITLE = "Design of Blockchain enabled intrusion detection model for detecting
security attacks using deep learning",
JOURNAL = PRL,
VOLUME = "153",
YEAR = "2022",
PAGES = "24-28",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362344"}
@article{bb368188,
AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.",
TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature
Selection",
JOURNAL = IEICE,
VOLUME = "E105-D",
YEAR = "2022",
NUMBER = "5",
MONTH = "May",
PAGES = "1024-1038",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362345"}
@article{bb368189,
AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.",
TITLE = "Cloud security based attack detection using transductive learning
integrated with Hidden Markov Model",
JOURNAL = PRL,
VOLUME = "157",
YEAR = "2022",
PAGES = "16-26",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362346"}
@article{bb368190,
AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.",
TITLE = "Network optimization using defender system in cloud computing
security based intrusion detection system withgame theory deep neural
network (IDSGT-DNN)",
JOURNAL = PRL,
VOLUME = "156",
YEAR = "2022",
PAGES = "142-151",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362347"}
@article{bb368191,
AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.",
TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to
Denial-of-Service Attacks",
JOURNAL = SMCS,
VOLUME = "52",
YEAR = "2022",
NUMBER = "5",
MONTH = "May",
PAGES = "3326-3336",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362348"}
@article{bb368192,
AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.T.",
TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification",
JOURNAL = RS,
VOLUME = "14",
YEAR = "2022",
NUMBER = "9",
PAGES = "xx-yy",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362349"}
@article{bb368193,
AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.",
TITLE = "Task adaptive siamese neural networks for open-set recognition of
encrypted network traffic with bidirectional dropout",
JOURNAL = PRL,
VOLUME = "159",
YEAR = "2022",
PAGES = "132-139",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362350"}
@article{bb368194,
AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.",
TITLE = "Automated Software Defect Detection and Identification in Vehicular
Embedded Systems",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "7",
MONTH = "July",
PAGES = "6963-6973",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362351"}
@article{bb368195,
AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.",
TITLE = "An Intrusion Detection Method Based on Machine Learning and State
Observer for Train-Ground Communication Systems",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "7",
MONTH = "July",
PAGES = "6608-6620",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362352"}
@article{bb368196,
AUTHOR = "Kye, H. and Kim, M. and Kwon, M.",
TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised
Learning Approach",
JOURNAL = SPLetters,
VOLUME = "29",
YEAR = "2022",
PAGES = "1908-1912",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362353"}
@article{bb368197,
AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.",
TITLE = "Wrapper feature selection method based differential evolution and
extreme learning machine for intrusion detection system",
JOURNAL = PR,
VOLUME = "132",
YEAR = "2022",
PAGES = "108912",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362354"}
@article{bb368198,
AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.",
TITLE = "Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus",
JOURNAL = ITS,
VOLUME = "23",
YEAR = "2022",
NUMBER = "10",
MONTH = "October",
PAGES = "17425-17439",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362355"}
@article{bb368199,
AUTHOR = "Sathish, N. and Valarmathi, N.",
TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's
chi-squared distribution and decision tree classifiers",
JOURNAL = PRL,
VOLUME = "162",
YEAR = "2022",
PAGES = "15-21",
BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT362356"}
Last update:Nov 26, 2025 at 20:24:09