26.1.6 Network Analysis, Wireless, Network Intrusion

Chapter Contents (Back)
Networks. Intrusion Detection.
See also Sensor Networks. Vehicle Networks:
See also Security in Vehicle Networks, VANET.

Xing, D.S.[Dong-Shan], Girolami, M.A.[Mark A.],
Employing Latent Dirichlet Allocation for fraud detection in telecommunications,
PRL(28), No. 13, 1 October 2007, pp. 1727-1734.
Elsevier DOI 0709
Fraud detection; Telecommunications; User modelling; Data mining; Latent Dirichlet Allocation BibRef

Celikoglu, H.B., Gedizlioglu, E., Dell'Orco, M.,
A Node-Based Modeling Approach for the Continuous Dynamic Network Loading Problem,
ITS(10), No. 1, March 2009, pp. 165-174.
IEEE DOI 0903
BibRef

Beghdad, R.[Rachid],
Modelling intrusion detection as an allocation problem,
PRL(30), No. 8, 1 June 2009, pp. 774-779.
Elsevier DOI 0905
Allocation problem; Attacks database; Modelling attack classes; Misuse detection; Simulation tool BibRef

Thinh, T.N.[Tran Ngoc], Kittitornkun, S.[Surin], Tomiyama, S.[Shigenori],
PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS,
IEICE(E92-D), No. 5, May 2009, pp. 1049-1061.
WWW Link. 0907
Network intrusion detection, intrusion prevention. BibRef

Tavallaee, M., Stakhanova, N., Ghorbani, A.A.,
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods,
SMC-C(40), No. 5, September 2010, pp. 516-524.
IEEE DOI 1008
BibRef

Kim, K.J., Tsiftsis, T.A.,
Performance Analysis of Cyclically Prefixed Single-Carrier Transmissions With Outdated Opportunistic User Selection,
SPLetters(17), No. 10, October 2010, pp. 847-850.
IEEE DOI 1008
Transmission issues. BibRef

Taysi, Z.C., Yavuz, A.G.,
Routing Protocols for GeoNet: A Survey,
ITS(13), No. 2, June 2012, pp. 939-954.
IEEE DOI 1206
BibRef

Huang, Y.C.[Yi-Chao], Rao, B.D.,
Sum Rate Analysis of One-Pico-Inside OFDMA Network With Opportunistic Scheduling and Selective Feedback,
SPLetters(19), No. 7, July 2012, pp. 383-386.
IEEE DOI 1206
BibRef

Nguyen, H.X., Roughan, M.,
Improving Hidden Markov Model Inferences With Private Data From Multiple Observers,
SPLetters(19), No. 10, October 2012, pp. 696-699.
IEEE DOI 1209
BibRef

Krishnamurthy, V., Hoiles, W.,
Afriat's Test for Detecting Malicious Agents,
SPLetters(19), No. 12, December 2012, pp. 801-804.
IEEE DOI 1212
BibRef

Li, Y., Jin, D., Wang, Z., Zeng, L., Chen, S.,
Exponential and Power Law Distribution of Contact Duration in Urban Vehicular Ad Hoc Networks,
SPLetters(20), No. 1, January 2013, pp. 110-113.
IEEE DOI 1212
BibRef

Li, Y.[Yong], Jin, D.[Depeng], Hui, P.[Pan], Wang, Z.C.[Zhao-Cheng], Chen, S.[Sheng],
Limits of Predictability for Large-Scale Urban Vehicular Mobility,
ITS(15), No. 6, December 2014, pp. 2671-2682.
IEEE DOI 1412
mobility management (mobile radio) BibRef

Wang, C., Li, Y.[Yong], Jin, D.[Depeng], Chen, S.[Sheng],
On the Serviceability of Mobile Vehicular Cloudlets in a Large-Scale Urban Environment,
ITS(17), No. 10, October 2016, pp. 2960-2970.
IEEE DOI 1610
Cloud computing BibRef

Romero-Zurita, N., McLernon, D., Ghogho, M., Swami, A.,
PHY Layer Security Based on Protected Zone and Artificial Noise,
SPLetters(20), No. 5, May 2013, pp. 487-490.
IEEE DOI 1304
BibRef

Chandrasekaran, S.[Srimathi], Vaideeswaran, J.,
Meta-scheduler using agents for fault tolerance in computational grid,
IJCVR(4), No. 4, 2014, pp. 294-329.
DOI Link 1411
BibRef

Shen, Y.[Yun], Liu, Y.T.[Yi-Tong], Liu, J.[Jing], Yang, H.W.[Hong-Wen], Yang, D.C.[Da-Cheng],
A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code,
IEICE(E97-D), No. 11, November 2014, pp. 2903-2911.
WWW Link. 1412
BibRef

Bhuyan, M.H.[Monowar H.], Bhattacharyya, D.K., Kalita, J.K.,
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection,
PRL(51), No. 1, 2015, pp. 1-7.
Elsevier DOI 1412
DDoS attack BibRef

Fu, B.[Bo], Xiao, Y.[Yang], Liang, X.N.[Xian-Nuan], Chen, C.L.P.,
Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks,
Cyber(45), No. 1, January 2015, pp. 103-115.
IEEE DOI 1502
mobile robots BibRef

Hui, H.[Hui], Swindlehurst, A.L., Li, G.B.[Guo-Bing], Liang, J.L.[Jun-Li],
Secure Relay and Jammer Selection for Physical Layer Security,
SPLetters(22), No. 8, August 2015, pp. 1147-1151.
IEEE DOI 1502
error statistics BibRef

Meng, X.M.[Xiang-Ming], Wu, S.[Sheng], Kuang, L.L.[Lin-Ling], Lu, J.H.[Jian-Hua],
An Expectation Propagation Perspective on Approximate Message Passing,
SPLetters(22), No. 8, August 2015, pp. 1194-1197.
IEEE DOI 1502
approximation theory BibRef

Rawat, D.B., Bajracharya, C.,
Detection of False Data Injection Attacks in Smart Grid Communication Systems,
SPLetters(22), No. 10, October 2015, pp. 1652-1656.
IEEE DOI 1506
Kalman filters BibRef

Rastegarnia, A.[Amir], Khalili, A.[Azam], Bazzi, W.M.[Wael M.], Sanei, S.[Saeid],
An incremental LMS network with reduced communication delay,
SIViP(10), No. 4, April 2016, pp. 769-775.
Springer DOI 1604
BibRef

Brandt, R., Mochaourab, R., Bengtsson, M.,
Globally Optimal Base Station Clustering in Interference Alignment-Based Multicell Networks,
SPLetters(23), No. 4, April 2016, pp. 512-516.
IEEE DOI 1604
Base stations BibRef

Jo, H.G.[Hyeong Gon], Son, T.Y.[Tae Yong], Jeong, S.Y.[Seol Young], Kang, S.J.[Soon Ju],
Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service,
IJGI(5), No. 7, 2016, pp. 116.
DOI Link 1608
BibRef

Utkovski, Z., Simeone, O., Dimitrova, T., Popovski, P.,
Random Access in C-RAN for User Activity Detection With Limited-Capacity Fronthaul,
SPLetters(24), No. 1, January 2017, pp. 17-21.
IEEE DOI 1702
cloud computing BibRef

Yu, N.Y.,
Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless Security,
SPLetters(24), No. 2, February 2017, pp. 181-185.
IEEE DOI 1702
compressed sensing BibRef

Chen, Q., Kang, D., He, Y., Chang, T.H., Liu, Y.F.,
Joint Power and Admission Control Based on Channel Distribution Information: A Novel Two-Timescale Approach,
SPLetters(24), No. 2, February 2017, pp. 196-200.
IEEE DOI 1702
approximation theory BibRef

Li, W., Wang, X., Moran, B.,
Wireless Signal Travel Distance Estimation Using Non-Coprime Wavelengths,
SPLetters(24), No. 1, January 2017, pp. 27-31.
IEEE DOI 1702
signal processing BibRef

Kwon, M., Park, H.,
Distributed Network Formation Strategy for Network Coding Based Wireless Networks,
SPLetters(24), No. 4, April 2017, pp. 432-436.
IEEE DOI 1704
decision making BibRef

Sedjelmaci, H., Senouci, S.M., Ansari, N.,
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology,
ITS(18), No. 5, May 2017, pp. 1143-1153.
IEEE DOI 1705
Bayes methods, Games, Intrusion detection, Monitoring, Unmanned aerial vehicles, Bayesian game, intrusion detection system (IDS), intrusion ejection system (IES), unmanned aerial vehicles (UAVs), vehicular, networks BibRef

Larhlimi, A., Mestari, M., El Khaili, M.,
GPU parallel neural hierarchical multi objective solver for burst routing and wavelength assignment,
ISCV17(1-6)
IEEE DOI 1710
Burst Routing and Wavelength Assignment, Compute Unified Device Architecture, Graphics Processing Unit, BibRef

Yin, H., Zhang, X., Zhao, S., Luo, Y., Tian, C., Sekar, V.,
Tradeoffs Between Cost and Performance for CDN Provisioning Based on Coordinate Transformation,
MultMed(19), No. 11, November 2017, pp. 2583-2596.
IEEE DOI 1710
Decision support systems, Clustering, server provisioning, transform BibRef

Guerreiro, P., Xavier, J.,
Distributed Learning With Time Correlated Information,
SPLetters(24), No. 11, November 2017, pp. 1636-1640.
IEEE DOI 1710
Communication networks, Correlation, Diseases, Indexes, Markov processes, Time measurement, Distributed learning, Markov chains, Perron-Frobenius theorem, multiple hypotheses testing, networks BibRef

Hu, D., Zhang, Q., Yang, P., Qin, J.,
Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks,
SPLetters(24), No. 11, November 2017, pp. 1714-1718.
IEEE DOI 1710
Jamming, Monitoring, Relay networks (telecommunications), Search methods, Wireless communication, Amplify-and-forward (AF), BibRef

AlEroud, A.F., Karabatis, G.,
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach,
SMCS(48), No. 2, February 2018, pp. 207-223.
IEEE DOI 1801
Context, Data mining, Feature extraction, Force, Intrusion detection, Semantics, Context, information security, intrusion detection, semantic link network (SLN) BibRef

Kozik, R.[Rafal],
Distributing extreme learning machines with Apache Spark for NetFlow-based malware activity detection,
PRL(101), No. 1, 2018, pp. 14-20.
Elsevier DOI 1801
Netflow BibRef

Ghofrani, F.[Fatemeh], Keshavarz-Haddad, A.[Alireza], Jamshidi, A.[Ali],
A new probabilistic classifier based on decomposable models with application to internet traffic,
PR(77), 2018, pp. 1-11.
Elsevier DOI 1802
Decomposable models, Over-fitting, TAN based on Chow-Liu algorithm, Averaged TAN, Internet traffic classification BibRef

Japkowicz, N., Elovici, Y.,
Introduction to the Special Issue on Data Mining for Cybersecurity,
IEEE_Int_Sys(33), No. 2, March 2018, pp. 3-4.
IEEE DOI 1806
Anomaly detection, Authentication, Biometrics (access control), Computer security, Data mining, Intrusion detection, SCADA systems, vulnerability assessment BibRef

Noble, J., Adams, N.,
Real-Time Dynamic Network Anomaly Detection,
IEEE_Int_Sys(33), No. 2, March 2018, pp. 5-18.
IEEE DOI 1806
Adaptation models, Adaptive estimation, Anomaly detection, Computer security, Image edge detection, ReTiNA, streaming data BibRef

Grolman, E.[Edita], Finkelshtein, A.[Andrey], Puzis, R.[Rami], Shabtai, A.[Asaf], Celniker, G.[Gershon], Katzir, Z.[Ziv], Rosenfeld, L.[Liron],
Transfer Learning for User Action Identication in Mobile Apps via Encrypted Traffic Analysis,
IEEE_Int_Sys(33), No. 2, March 2018, pp. 40-53.
IEEE DOI 1806
What action in mobile app from network traffic. Cryptography, Feature extraction, Intelligent systems, Mobile communication, Object recognition, transfer learning BibRef

Li, B., Yao, Y., Chen, H., Li, Y., Huang, S.,
Wireless Information Surveillance and Intervention Over Multiple Suspicious Links,
SPLetters(25), No. 8, August 2018, pp. 1131-1135.
IEEE DOI 1808
computational complexity, concave programming, integer programming, jamming, nonlinear programming, proactive intervening BibRef

Meng, W.,
Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling,
Computer(51), No. 7, July 2018, pp. 36-43.
IEEE DOI 1808
Intrusion detection, Computer security, Internet of Things, Trust management, Privacy, Bayes methods, Internet of Things, IoT, Cybertrust in the IoT Age BibRef

Jiménez Tejero, C.E., Sallares, V., Ranero, C.R.,
Appraisal of Instantaneous Phase-Based Functions in Adjoint Waveform Inversion,
GeoRS(56), No. 9, September 2018, pp. 5185-5197.
IEEE DOI 1809
IP networks, Robustness, Receivers, Signal analysis, Acoustics, Tools, Computational modeling, Acoustic propagation, phase estimation BibRef

Chen, C.H.[Chi-Hua], Lo, K.R.[Kuen-Rong],
Applications of Internet of Things,
IJGI(7), No. 9, 2018, pp. xx-yy.
DOI Link 1810
BibRef

Mousavinejad, E., Yang, F., Han, Q., Vlacic, L.,
A Novel Cyber Attack Detection Method in Networked Control Systems,
Cyber(48), No. 11, November 2018, pp. 3254-3264.
IEEE DOI 1810
Cyberattack, Ellipsoids, Estimation, Actuators, Detectors, Kalman filters, Current measurement, Bias injection attacks, set-membership filtering BibRef

Garg, S., Kaur, K., Kumar, N., Rodrigues, J.J.P.C.[J. J. P. C.],
Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective,
MultMed(21), No. 3, March 2019, pp. 566-578.
IEEE DOI 1903
Boltzmann machines, computer network security, gradient methods, learning (artificial intelligence), multimedia computing, social multimedia BibRef

Shang, Y.,
Subgraph Robustness of Complex Networks Under Attacks,
SMCS(49), No. 4, April 2019, pp. 821-832.
IEEE DOI 1903
Robustness, Complex networks, Social network services, Complex systems, Sampling methods, Attack robustness, sampling BibRef

Phetlasy, S.[Sornxayya], Ohzahata, S.[Satoshi], Wu, C.[Celimuge], Kato, T.[Toshihito],
A Sequential Classifiers Combination Method to Reduce False Negative for Intrusion Detection System,
IEICE(E102-D), No. 5, May 2019, pp. 888-897.
WWW Link. 1906
BibRef

Gao, N., Qin, Z., Jing, X.,
Pilot Contamination Attack Detection and Defense Strategy in Wireless Communications,
SPLetters(26), No. 6, June 2019, pp. 938-942.
IEEE DOI 1906
Contamination, Training, Covariance matrices, Receivers, Eigenvalues and eigenfunctions, Wireless communication, wireless communications BibRef

Cho, K., Lee, S., Khisti, A.,
Effect of User Cooperation on Smart Meter Privacy With Rechargeable Batteries,
SPLetters(26), No. 7, July 2019, pp. 971-975.
IEEE DOI 1906
data privacy, power engineering computing, secondary cells, smart meters, smart power grids, user cooperation, user privacy, information leakage BibRef

Antal, M.[Margit], Egyed-Zsigmond, E.[Elöd],
Intrusion detection using mouse dynamics,
IET-Bio(8), No. 5, September 2019, pp. 285-294.
DOI Link 1908
BibRef

Castańo, F.[Fernando], Strzelczak, S.[Stanislaw], Villalonga, A.[Alberto], Haber, R.E.[Rodolfo E.], Kossakowska, J.[Joanna],
Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things Data: A Review and Case Study,
RS(11), No. 19, 2019, pp. xx-yy.
DOI Link 1910
BibRef

Ma, W.[Wen], Zhang, X.Y.[Xin-Yang], Xin, Y.[Yong], Li, S.Z.[Shen-Zhang],
Study on short-term network forecasting based on SVM-MFA algorithm,
JVCIR(65), 2019, pp. 102646.
Elsevier DOI 1912
Support vector machine, Improved firefly algorithm, Load forecasting, Nonlinear regression, Evaluation criteria BibRef

Meng, Y.[Yuan], Tu, S.S.[Shan-Shan], Yu, J.L.[Jin-Liang], Huang, F.M.[Feng-Ming],
Intelligent attack defense scheme based on DQL algorithm in mobile fog computing,
JVCIR(65), 2019, pp. 102656.
Elsevier DOI 1912
Computing on the network edge plus cloud. Moving fog computing, Intelligent attack, Physical layer security, Prospect theory, Reinforcement learning BibRef

Hwang, K.,
Blocking of operation of unauthorised software using MQTT,
IJCVR(9), No. 6, 2019, pp. 609-620.
DOI Link 1912
BibRef

Chen, X.F.[Xiao-Fan], Yu, S.Z.[Shun-Zheng],
A Collaborative Intrusion Detection System against DDoS for SDN,
IEICE(E99-D), No. 9, September 2016, pp. 2395-2399.
WWW Link. 1609
BibRef

Wu, W., Li, R., Xie, G., An, J., Bai, Y., Zhou, J., Li, K.,
A Survey of Intrusion Detection for In-Vehicle Networks,
ITS(21), No. 3, March 2020, pp. 919-933.
IEEE DOI 2003
Controller area network (CAN), cybersecurity, in-vehicle network (IVN), intrusion detection system (IDS), machine learning BibRef

Liu, C.B.[Chuan-Bin], Tian, Y.[Youliang], Xie, H.T.[Hong-Tao],
Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design,
MMMod20(II:651-668).
Springer DOI 2003
BibRef

Sun, L., Wang, X., Yang, A., Huang, Z.,
Radio Frequency Fingerprint Extraction Based on Multi-Dimension Approximate Entropy,
SPLetters(27), 2020, pp. 471-475.
IEEE DOI 2004
Entropy, Feature extraction, Wireless networks, Security, Steady-state, Nonlinear dynamical systems, Silicon, wireless network security BibRef

Cho, M.K.[Min-Kyoung], Kim, J.S.[Jik-Soo], Shin, J.[Jongho], Shin, I.[Incheol],
Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image,
IEICE(E103-D), No. 4, April 2020, pp. 896-900.
WWW Link. 2004
BibRef

Ye, Z.[Zehua], Ni, H.J.[Hong-Jie], Xu, Z.H.[Zhen-Hua], Zhang, D.[Dan],
Sensor fault estimation of networked vehicle suspension system with deny-of-service attack,
IET-ITS(14), No. 5, May 2020, pp. 455-462.
DOI Link 2005
BibRef

Kim, K.[Kwangjo],
Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network,
IEICE(E103-D), No. 7, July 2020, pp. 1433-1447.
WWW Link. 2007
BibRef

Liang, J., Lin, Q., Chen, J., Zhu, Y.,
A Filter Model Based on Hidden Generalized Mixture Transition Distribution Model for Intrusion Detection System in Vehicle Ad Hoc Networks,
ITS(21), No. 7, July 2020, pp. 2707-2722.
IEEE DOI 2007
Hidden Markov models, Vehicular ad hoc networks, Reliability, Intrusion detection, Safety, Computational modeling, filter model based on HgMTD model (FM-HgMTD) BibRef

Rahmani, F., Touhami, N.A., Taher, N., Kchairi, A.B.,
Reconfigurable Radiation Pattern Antenna with eight Switchable Beams in Azimuth Plane for WLAN Wireless System,
ISCV20(1-7)
IEEE DOI 2011
antenna feeds, antenna radiation patterns, coaxial cables, p-i-n diodes, wireless LAN, circular planar ground, star patch, radiation pattern. BibRef

Dommel, J.[Johannes], Utkovski, Z.[Zoran], Simeone, O.[Osvaldo], Stanczak, S.[Slawomir],
Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio Access in IoT Fog Networks,
SPLetters(28), 2021, pp. 728-732.
IEEE DOI 2105
Encoding, Sensors, Message passing, Decoding, Wireless sensor networks, Wireless communication, Bayes methods, semantic communications BibRef

Park, S.H.[Seok-Hwan], Jin, X.[Xianglan],
Joint Secure Design of Downlink and D2D Cooperation Strategies for Multi-User Systems,
SPLetters(28), 2021, pp. 917-921.
IEEE DOI 2106
Device-to-device communication, Downlink, Precoding, Covariance matrices, Eavesdropping, Optimization, Additive noise, matrix fractional programming BibRef

Wang, Z.[Zisheng], Blum, R.S.[Rick S.],
Elimination of Undetectable Attacks on Natural Gas Networks,
SPLetters(28), 2021, pp. 1002-1005.
IEEE DOI 2106
Natural gas, Mathematical model, Pipelines, Analytical models, Topology, Noise measurement, SCADA systems, Cybersecurity, undetectable attacks BibRef

Riddle-Workman, E.[Elizabeth], Evangelou, M.[Marina], Adams, N.M.[Niall M.],
Multi-type relational clustering for enterprise cyber-security networks,
PRL(149), 2021, pp. 172-178.
Elsevier DOI 2108
Non-negative matrix factorization, Multi-type relational clustering, Cyber-security, Network clustering BibRef

Bhardwaj, J.[Jayati], Yadav, V.K.[Virendra Kumar], Trivedi, M.C.[Munesh Chandra], Sen, A.K.[Anurag Kumar],
ARP cache poisoning: detection, mitigation and prevention schemes,
IJCVR(11), No. 4, 2021, pp. 357-373.
DOI Link 2108
BibRef

Mejia-Cabrera, H.I.[Heber I.], Paico-Chileno, D.[Daniel], Valdera-Contreras, J.H.[Jhon H.], Tuesta-Monteza, V.A.[Victor A.], Forero, M.G.[Manuel G.],
Automatic Detection of Injection Attacks by Machine Learning in NoSQL Databases,
MCPR21(23-32).
Springer DOI 2108
BibRef

Amato, F.[Flora], Coppolino, L.[Luigi], Mercaldo, F.[Francesco], Moscato, F.[Francesco], Nardone, R.[Roberto], Santone, A.[Antonella],
CAN-Bus Attack Detection With Deep Learning,
ITS(22), No. 8, August 2021, pp. 5081-5090.
IEEE DOI 2108
Standards, Deep learning, Automobiles, Protocols, Biological neural networks, Wireless communication, Automotive, security BibRef

Cho, Y.B.[Young-Bok],
Malware classifier for dynamic deep learning algorithm,
IJCVR(11), No. 5, 2021, pp. 486-496.
DOI Link 2109
BibRef

Chou, D.[Dylan], Jiang, M.[Meng],
A Survey on Data-Driven Network Intrusion Detection,
Surveys(54), No. 9, October 2021, pp. xx-yy.
DOI Link 2112
data mining, machine learning, Network intrusion detection BibRef

Arulananth, T.S., Baskar, M., Anbarasu, V., Thiagarajan, R., Rajendran, T., Balaji, A.,
Multi party secure data access management in cloud using user centric block chain data encryption,
PRL(152), 2021, pp. 295-301.
Elsevier DOI 2112
Cloud, Data security, Data encryption, UCBE, MSDAM, Distancing scheme, QoS BibRef

Vijayakumar, M., Shiny Angel, T.S.,
Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models,
PRL(152), 2021, pp. 428-435.
Elsevier DOI 2112
PDoS attack, RNN algorithm, IoT models, Cyber-attack BibRef

Mehraj, H.[Haider], Jayadevappa, D., Haleem, S.L.A.[Sulaima Lebbe Abdul], Parveen, R.[Rehana], Madduri, A.[Abhishek], Ayyagari, M.R.[Maruthi Rohit], Dhabliya, D.[Dharmesh],
Protection motivation theory using multi-factor authentication for providing security over social networking sites,
PRL(152), 2021, pp. 218-224.
Elsevier DOI 2112
Trusted authentication, Security vulnerabilities, Social media, Protective motivation theory, Multi-factor authentication, Prevention strategy BibRef

Wei, S.M.[Shi-Mei], Pan, J.H.[Jing-Hu],
Resilience of Urban Network Structure in China: The Perspective of Disruption,
IJGI(10), No. 12, 2021, pp. xx-yy.
DOI Link 2112
BibRef

Saveetha, D., Maragatham, G.,
Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning,
PRL(153), 2022, pp. 24-28.
Elsevier DOI 2201
Attack, Blockchain, Deep learning, Intrusion detection, Machine learning BibRef

Zhang, F.[Fei], Zhen, P.N.[Pei-Ning], Jing, D.S.[Di-Shan], Tang, X.T.[Xiao-Tang], Chen, H.B.[Hai-Bao], Yan, J.[Jie],
SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection,
IEICE(E105-D), No. 5, May 2022, pp. 1024-1038.
WWW Link. 2205
BibRef

Aoudni, Y.[Yassine], Donald, C.[Cecil], Farouk, A.[Ahmed], Sahay, K.B.[Kishan Bhushan], Babu, D.V.[D. Vijendra], Tripathi, V.[Vikas], Dhabliya, D.[Dharmesh],
Cloud security based attack detection using transductive learning integrated with Hidden Markov Model,
PRL(157), 2022, pp. 16-26.
Elsevier DOI 2205
Zero-day attack security, Transductive deep learning, Hidden Markov Model (HMM), Soft labels, K-medoids clustering BibRef

Balamurugan, E., Mehbodniya, A.[Abolfazl], Kariri, E.[Elham], Yadav, K.[Kusum], Kumar, A.[Anil], Anul Haq, M.[Mohd],
Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN),
PRL(156), 2022, pp. 142-151.
Elsevier DOI 2205
Cloud Computing, Game theory, Optimization, CICIDS - 2017 dataset, Deep Neural Network BibRef

Fei, Z.Y.[Zhong-Yang], Wang, X.D.[Xu-Dong], Wang, Z.H.[Zhen-Hua],
Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service Attacks,
SMCS(52), No. 5, May 2022, pp. 3326-3336.
IEEE DOI 2205
Fault detection, Jamming, Denial-of-service attack, Communication networks, Wireless communication, unmanned surface vehicles (USVs) BibRef

Zhao, Y.R.[Yu-Rui], Wang, X.[Xiang], Lin, Z.Y.[Zi-Yu], Huang, Z.[Zhitao],
Multi-Classifier Fusion for Open-Set Specific Emitter Identification,
RS(14), No. 9, 2022, pp. xx-yy.
DOI Link 2205
BibRef

Huang, Y.[Yi], Li, Y.[Ying], Heyes, T.[Timothy], Jourjon, G.[Guillaume], Cheng, A.[Adriel], Seneviratne, S.[Suranga], Thilakarathna, K.[Kanchana], Webb, D.[Darren], Xu, R.Y.D.[Richard Yi Da],
Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout,
PRL(159), 2022, pp. 132-139.
Elsevier DOI 2206
DPGMM, Bidirectional dropout, Siamese, Open-set recognition BibRef

Foss, K.[Kyle], Couckuyt, I.[Ivo], Baruta, A.[Adrian], Mossoux, C.[Corentin],
Automated Software Defect Detection and Identification in Vehicular Embedded Systems,
ITS(23), No. 7, July 2022, pp. 6963-6973.
IEEE DOI 2207
Testing, Software, Automotive engineering, Electronic countermeasures, Complexity theory, Europe, system verification BibRef

Gao, B.[Bing], Bu, B.[Bing], Zhang, W.[Wei], Li, X.[Xiang],
An Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems,
ITS(23), No. 7, July 2022, pp. 6608-6620.
IEEE DOI 2207
Intrusion detection, Protocols, Observers, Anomaly detection, Machine learning algorithms, Communication systems, denial of service BibRef

dos Santos-Roque, A.[Alexandre], Jazdi, N.[Nasser], de Freitas, E.P.[Edison Pignaton], Pereira, C.E.[Carlos Eduardo],
A Fault Modeling Based Runtime Diagnostic Mechanism for Vehicular Distributed Control Systems,
ITS(23), No. 7, July 2022, pp. 7220-7232.
IEEE DOI 2207
Protocols, Degradation, Runtime, Automotive engineering, Decentralized control, Data models, Task analysis, vehicular control systems BibRef

Taguchi, S.[Shun], Yoshimura, T.[Takayoshi],
Online Estimation and Prediction of Large-Scale Network Traffic From Sparse Probe Vehicle Data,
ITS(23), No. 7, July 2022, pp. 7233-7243.
IEEE DOI 2207
Roads, Probes, Data models, Data assimilation, Predictive models, Neural networks, Network topology, Data assimilation, traffic speed prediction BibRef

Cai, X.Q.[Xing-Qiang], Wu, C.[Cheng], Sheng, J.[Jie], Wang, Y.M.[Yi-Ming], Ai, B.[Bo],
Spectrum Situation Awareness Based on Time-Series Depth Networks for LTE-R Communication System,
ITS(23), No. 7, July 2022, pp. 8629-8640.
IEEE DOI 2207
Rail transportation, Hidden Markov models, Predictive models, Cognitive radio, Wireless sensor networks, Resource management, spectrum situation awareness BibRef

Kye, H.[Hyoseon], Kim, M.[Miru], Kwon, M.[Minhae],
Hierarchical Detection of Network Anomalies: A Self-Supervised Learning Approach,
SPLetters(29), 2022, pp. 1908-1912.
IEEE DOI 2209
Decoding, Training, Network intrusion detection, Simulation, Training data, Standards, Self-supervised learning, autoencoder BibRef

Al-Yaseen, W.L.[Wathiq Laftah], Idrees, A.K.[Ali Kadhum], Almasoudy, F.H.[Faezah Hamad],
Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system,
PR(132), 2022, pp. 108912.
Elsevier DOI 2209
Intrusion detection system (IDS), Feature selection, Differential evolution (DE), Extreme learning machine (ELM), NSL-KDD BibRef

He, Y.C.[Yu-Chu], Jia, Z.J.[Zhi-Juan], Hu, M.S.[Ming-Sheng], Cui, C.[Chi], Cheng, Y.[Yage], Yang, Y.Y.[Yan-Yan],
The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network,
ITS(23), No. 9, September 2022, pp. 16833-16841.
IEEE DOI 2209
Mathematical models, Data models, Intrusion detection, Predictive models, Robustness, Computational modeling, factorization machine BibRef

Jichici, C.[Camil], Groza, B.[Bogdan], Ragobete, R.[Radu], Murvay, P.S.[Pal-Stefan], Andreica, T.[Tudor],
Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus,
ITS(23), No. 10, October 2022, pp. 17425-17439.
IEEE DOI 2210
Intrusion detection, Standards, Protocols, Real-time systems, Payloads, Logic gates, Bit rate, CAN bus, J1939 BibRef

Sathish, N., Valarmathi, N.,
Detection of Intrusion behavior in cloud applications using Pearson's chi-squared distribution and decision tree classifiers,
PRL(162), 2022, pp. 15-21.
Elsevier DOI 2210
Intrusion behavior, Machinelearning, Optimalfeatures, Decision tree, Security, Fog BibRef

Agrawal, K.[Kushagra], Alladi, T.[Tejasvi], Agrawal, A.[Ayush], Chamola, V.[Vinay], Benslimane, A.[Abderrahim],
NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks,
ITS(23), No. 11, November 2022, pp. 22596-22606.
IEEE DOI 2212
Feature extraction, Protocols, Anomaly detection, Deep learning, Intrusion detection, Computational modeling, Convolution, network security BibRef

Shi, Z.X.[Zhi-Xin], Wang, X.Y.[Xiang-Yu], Liu, P.C.[Peng-Cheng],
NBP-MS: Malware Signature Generation Based on Network Behavior Profiling,
ICPR22(1865-1870)
IEEE DOI 2212
Telecommunication traffic, Malware, Behavioral sciences, Computer crime BibRef

Koroniotis, N.[Nickolaos], Moustafa, N.[Nour], Schiliro, F.[Francesco], Gauravaram, P.[Praveen], Janicke, H.[Helge],
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports,
ITS(24), No. 2, February 2023, pp. 2368-2381.
IEEE DOI 2302
Industrial Internet of Things, Airports, Computer crime, Security, Testing, Australia, Protocols, Smart airport, testbed, cybertwins, cyber defences BibRef

Duan, X.[Xuting], Yan, H.[Huiwen], Tian, D.X.[Da-Xin], Zhou, J.[Jianshan], Su, J.[Jian], Hao, W.[Wei],
In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method,
ITS(24), No. 2, February 2023, pp. 2122-2134.
IEEE DOI 2302
Anomaly detection, Computer hacking, Support vector machines, Safety, Encryption, Autonomous vehicles, Authentication, data mass BibRef

Wang, K.[Kai], Zhang, A.[Aiheng], Sun, H.R.[Hao-Ran], Wang, B.L.[Bai-Ling],
Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network,
ITS(24), No. 2, February 2023, pp. 1843-1854.
IEEE DOI 2302
Intrusion detection, Biological system modeling, Periodic structures, Deep learning, Adaptation models, Security, vehicular networks BibRef

Rajapaksha, S.[Sampath], Kalutarage, H.[Harsha], Al-Kadri, M.O.[M. Omar], Petrovski, A.[Andrei], Madzudzo, G.[Garikayi], Cheah, M.[Madeline],
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey,
Surveys(55), No. 11, February 2023, pp. xx-yy.
DOI Link 2303
machine learning, Controller Area Network (CAN), Intrusion Detection System (IDS), automotive cybersecurity, in-vehicle network BibRef

Li, S.D.[Shu-Dong], Li, Y.[Yuan], Wu, X.B.[Xiao-Bo], Otaibi, S.A.[Sattam Al], Tian, Z.H.[Zhi-Hong],
Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning,
ITS(24), No. 7, July 2023, pp. 7642-7652.
IEEE DOI 2307
Malware, Feature extraction, Histograms, Machine learning, Codes, Task analysis, Semantics, Malware family classification, imbalanced data BibRef

Zhang, C.H.[Chen-Hao], Yin, S.[Shuijun], Li, H.[Heng], Cai, M.H.[Ming-Hui], Yuan, W.[Wei],
Detecting Android Malware With Pre-Existing Image Classification Neural Networks,
SPLetters(30), 2023, pp. 858-862.
IEEE DOI 2307
Perturbation methods, Feature extraction, Malware, Operating systems, Neural networks, Task analysis, malware detection BibRef

Xue, S.S.[Shuang-Si], Li, H.[Huan], Cao, H.[Hui], Tan, J.K.[Jun-Kai],
Distributed edge-event-triggered consensus of multi-agent system under DoS attack,
PRL(174), 2023, pp. 118-123.
Elsevier DOI 2310
Multi-agent systems, Consensus control, Edge-event-triggered, DoS attacks BibRef

Ding, Z.X.[Zhao-Xu], Zhong, G.Q.[Guo-Qiang], Qin, X.P.[Xian-Ping], Li, Q.Y.[Qing-Yang], Fan, Z.[Zhenlin], Deng, Z.Y.[Zhao-Yang], Ling, X.[Xiao], Xiang, W.[Wei],
MF-Net: Multi-frequency intrusion detection network for Internet traffic data,
PR(146), 2024, pp. 109999.
Elsevier DOI 2311
Cyber security, Intrusion detection, Deep learning, Multi-frequency transformer, Multi-frequency LSTM BibRef

Lee, S.[Seyoung], Choi, W.[Wonsuk], Jo, H.J.[Hyo Jin], Lee, D.H.[Dong Hoon],
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System,
ITS(24), No. 11, November 2023, pp. 12406-12421.
IEEE DOI 2311
BibRef

Zhou, J.[Jia], Xie, G.Q.[Guo-Qi], Zeng, H.B.[Hai-Bo], Zhang, W.Z.[Wei-Zhe], Yang, L.T.[Laurence T.], Alazab, M.[Mamoun], Li, R.[Renfa],
A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus,
ITS(24), No. 11, November 2023, pp. 12922-12932.
IEEE DOI 2311
BibRef

Chougule, A.[Amit], Kohli, V.[Varun], Chamola, V.[Vinay], Yu, F.R.[Fei Richard],
Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks,
ITS(24), No. 11, November 2023, pp. 13068-13077.
IEEE DOI 2311
BibRef

Almutlaq, S.[Samah], Derhab, A.[Abdelouahid], Hassan, M.M.[Mohammad Mehedi], Kaur, K.[Kuljeet],
Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks,
ITS(24), No. 12, December 2023, pp. 15687-15701.
IEEE DOI 2312
BibRef

Zhang, J.[Jiangjiang], Gong, B.[Bei], Waqas, M.[Muhammad], Tu, S.S.[Shan-Shan], Chen, S.[Sheng],
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security,
ITS(24), No. 12, December 2023, pp. 15051-15065.
IEEE DOI 2312
BibRef

Anbalagan, S.[Sudha], Raja, G.[Gunasekaran], Gurumoorthy, S.[Sugeerthi], Suresh, R.D.[R. Deepak], Dev, K.[Kapal],
IIDS: Intelligent Intrusion Detection System for Sustainable Development in Autonomous Vehicles,
ITS(24), No. 12, December 2023, pp. 15866-15875.
IEEE DOI 2312
BibRef

Qian, Z.J.[Zhen-Jiang], Zhong, S.[Shan], Sun, G.F.[Gao-Fei], Xing, X.S.[Xiao-Shuang], Jin, Y.[Yong],
A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model,
ITS(24), No. 12, December 2023, pp. 15459-15467.
IEEE DOI 2312
BibRef

da Cruz, M.A.A.[Mauro A. A.], Abbade, L.R.[Lucas R.], Lorenz, P.[Pascal], Mafra, S.B.[Samuel B.], Rodrigues, J.J.P.C.[Joel J. P. C.],
Detecting Compromised IoT Devices Through XGBoost,
ITS(24), No. 12, December 2023, pp. 15392-15399.
IEEE DOI 2312
BibRef

Li, Y.[Yang], Zhu, L.[Li], Wang, H.W.[Hong-Wei], Yu, F.R.[F. Richard], Tang, T.[Tao], Zhang, D.J.[Da-Jun],
Joint Security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach,
ITS(24), No. 12, December 2023, pp. 13948-13961.
IEEE DOI 2312
communication-based train control. Secruity for control systems. BibRef

Alam, M.S.[Md Shah], Oluoch, J.[Jared], Kim, J.[Junghwan],
A Mechanism to Localize, Detect, and Prevent Jamming in Connected and Autonomous Vehicles (CAVs),
ITS(25), No. 2, February 2024, pp. 1215-1224.
IEEE DOI 2402
Jamming, Servers, Vehicular ad hoc networks, Safety, Real-time systems, Protocols, Physical layer, CAVs, DSRC, jamming, WAVE BibRef


Dong, Q.[Qian], Sun, T.T.[Ting-Ting], Li, T.W.[Ting-Wei], Lu, X.Q.[Xiao-Qian], Yan, K.[Kai],
Anomaly Intrusion Detection in Online Learning Space Based on XGBoost,
ICIVC22(968-973)
IEEE DOI 2301
Machine learning algorithms, Supervised learning, Neural networks, Intrusion detection, Telecommunication traffic, anomaly intrusion detection BibRef

Li, S.S.[Shan-Shan], Chen, D.[Deng], Zhang, J.[Jun], Wang, H.Y.[Hao-Yu], Li, L.[Lei], Qian, Y.Y.[Yu-Yang], Liu, H.[Hailun],
Software Vulnerability Detection Based on Anomaly-Attention,
ICRVC22(261-265)
IEEE DOI 2301
Source coding, Computational modeling, Transformers, Dynamic scheduling, Software, Data models, Timing, correlation differences BibRef

Wang, S.W.[Shu-Wei], Wang, Q.Y.[Qiu-Yun], Jiang, Z.W.[Zheng-Wei], Wang, X.[Xuren], Jing, R.Q.[Rong-Qi],
A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification,
ICPR21(3775-3782)
IEEE DOI 2105
Couplings, Technological innovation, Neural networks, Semisupervised learning, Generative adversarial networks, Classification BibRef

Qi, P.P.[Pan-Pan], Zhang, Z.Q.[Zhao-Qi], Wang, W.[Wei], Yao, C.[Chang],
Malware Detection by Exploiting Deep Learning over Binary Programs,
ICPR21(9068-9075)
IEEE DOI 2105
Deep learning, Analytical models, Computer hacking, Feature extraction, Malware, Data models, Pattern recognition BibRef

di Rocco, L.[Lorenzo], Petrillo, U.F.[Umberto Ferraro], Palini, F.[Francesco],
Large Scale Graph Based Network Forensics Analysis,
IWBDAF20(457-469).
Springer DOI 2103
BibRef

Scalas, M.[Michele], Rieck, K.[Konrad], Giacinto, G.[Giorgio],
Explanation-driven Characterization of Android Ransomware,
EDL-AI20(228-242).
Springer DOI 2103
BibRef

Chen, L.[Lin], Qiu, H.J.[Hui-Jun], Kuang, X.Y.[Xiao-Yun], Xu, A.D.[Ai-Dong], Yang, Y.W.[Yi-Wei],
Intelligent Data Security Threat Discovery Model Based on Grid Data,
ICIVC21(458-463)
IEEE DOI 2112
Training, Data analysis, Data security, Transfer learning, Process control, Reinforcement learning, Data models, smart grid BibRef

Ikrissi, G., Mazri, T.,
IoT-based Smart Environments: State of the Art, Security Threats and Solutions,
SmartCityApp21(279-286).
DOI Link 2201
BibRef

Niu, L., Song, Y., Chu, J., Li, S.,
Analysis of the Attacker and Defender GAN Models for the Indoor Navigation Network,
ISPRS21(B4-2021: 237-242).
DOI Link 2201
BibRef

Toka, K.O., Dikilitas, Y., Oktay, T., Sayar, A.,
Securing Iot With Blockchain,
SmartCityApp21(529-532).
DOI Link 2201
BibRef

Özarpa, C., Avci, I., Kinaci, B.F., Arapoglu, S., Kara, S.A.,
Cyber Attacks on Scada Based Traffic Light Control Systems in the Smart Cities,
SmartCityApp21(411-415).
DOI Link 2201
BibRef

Moulad, L., Chaabita, R., Balar, K.,
Wireless Sensor Network: Towards An Improvement of Security Policy,
SmartCityApp21(379-383).
DOI Link 2201
BibRef

Miryahyaie, S., Ebrahimpour-komleh, H., Nickfarjam, A.M.,
ACO-based Intrusion Detection Method in Computer Networks using Fuzzy Association Rules,
IPRIA21(1-5)
IEEE DOI 2201
Ant colony optimization, Image analysis, Urban areas, Intrusion detection, Computer networks, Pattern recognition, Computer Network BibRef

Mohseni, M.[Mahsa], Tanha, J.[Jafar],
A Density-based Undersampling Approach to Intrusion Detection,
IPRIA21(1-7)
IEEE DOI 2201
Radio frequency, Machine learning algorithms, Intrusion detection, Clustering algorithms, undersampling BibRef

Liu, Y.G.[Ying-Gang], Ning, Z.[Zhenhu], Zhang, J.J.[Jiang-Jiang], Wang, X.P.[Xiao-Ping],
Monitory Consensus Mechanism of Blockchain for Internet of Things,
ICIVC21(425-430)
IEEE DOI 2112
Fault tolerance, Scalability, Fault tolerant systems, Stability analysis, Computer crashes, Blockchains BibRef

Chen, L., Xian, M., Liu, J.,
Monitoring System of OpenStack Cloud Platform Based on Prometheus,
CVIDL20(206-209)
IEEE DOI 2102
cloud computing, public domain software, Prometheus, open source cloud platform, grafana BibRef

Prima, B., Bouhorma, M.,
Using Transfer Learning for Malware Classification,
SmartCityApp20(343-349).
DOI Link 2012
BibRef

El-Bakkouri, N., Mazri, T.,
Security Threats In Smart Healthcare,
SmartCityApp20(209-214).
DOI Link 2012
BibRef

Maryem, M., Abdelghani, E.O., Belkassem, T.,
Routing in Wireless Sensor Networks using Fuzzy Logic: A survey,
ISCV20(1-6)
IEEE DOI 2011
energy conservation, energy consumption, fuzzy logic, routing protocols, telecommunication power management, Fuzzy Logic BibRef

Mennour, H.[Hanene], Mostefai, S.[Sihem],
A hybrid Deep Learning Strategy for an Anomaly Based N-IDS,
ISCV20(1-6)
IEEE DOI 2011
Network traffic data. computer network security, feedforward neural nets, optimisation, pattern classification, supervised learning, Anomaly-based IDS BibRef

Sebbah, A., Kadri, B.,
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor,
ISCV20(1-5)
IEEE DOI 2011
cryptography, data privacy, Internet of Things, message authentication, smart cards, smart card, Privacy. BibRef

Bouzoubaa, K., Taher, Y., Nsiri, B.,
DOS attack forecasting: A comparative study on wrapper feature selection,
ISCV20(1-7)
IEEE DOI 2011
computer network security, feature selection, genetic algorithms, Internet, learning (artificial intelligence), Feature Selection BibRef

Yang, Z.L.[Zhong-Liang], Hu, Y.T.[Yu-Ting], Huang, Y.F.[Yong-Feng], Zhang, Y.J.[Yu-Jin],
Behavioral Security in Covert Communication Systems,
IWDW19(377-392).
Springer DOI 2003
BibRef

Varenne, R.[Remi], Delorme, J.M.[Jean Michel], Plebani, E.[Emanuele], Pau, D.[Danilo], Tomaselli, V.[Valeria],
Intelligent Recognition of TCP Intrusions for Embedded Micro-controllers,
NTIAP19(361-373).
Springer DOI 1909
BibRef

Zhang, H., Wu, C.Q., Gao, S., Wang, Z., Xu, Y., Liu, Y.,
An Effective Deep Learning Based Scheme for Network Intrusion Detection,
ICPR18(682-687)
IEEE DOI 1812
Feature extraction, Intrusion detection, Engines, Training, Noise reduction, Hidden Markov models, deep learning BibRef

Lu, J., Lv, F., Liu, Q., Zhang, M., Zhang, X.,
Botnet Detection based on Fuzzy Association Rules,
ICPR18(578-584)
IEEE DOI 1812
Botnet, Feature extraction, Protocols, Servers, Pattern recognition, Security, Computers, Network security, botnet detection, fuzzy association BibRef

Lyons, J.B.[Joseph B.], Roebke, M.A.[Mark A.], Bobko, P.[Philip], Cox, C.A.[Craig A.],
Cyber Vulnerability: An Attentional Dilemma,
VAMR18(II: 331-340).
Springer DOI 1807
BibRef

Matthews, G.[Gerald], Panganiban, A.R.[April Rose], Bailey, R.[Rachel], Lin, J.C.[Jin-Chao],
Trust in Autonomous Systems for Threat Analysis: A Simulation Methodology,
VAMR18(II: 341-353).
Springer DOI 1807
BibRef

Rege, A., Obradovic, Z., Asadi, N., Parker, E., Pandit, R., Masceri, N., Singer, B.,
Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks,
IEEE_Int_Sys(33), No. 2, March 2018, pp. 29-39.
IEEE DOI 1806
Biological neural networks, Computer crime, Mathematical model, Predictive models, Time series analysis, Training, ARIMA, NARX, time series analysis BibRef

Taylor, A., Leblanc, S., Japkowicz, N.,
Probing the Limits of Anomaly Detectors for Automobiles with a Cyberattack Framework,
IEEE_Int_Sys(33), No. 2, March 2018, pp. 54-62.
IEEE DOI 1806
Anomaly detection, Automobiles, Automotive engineering, Detectors, Intelligent systems, Intelligent vehicles, Security, vehicle controller computer BibRef

Samtani, S., Yu, S., Zhu, H., Patton, M., Matherly, J., Chen, H.,
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach,
IEEE_Int_Sys(33), No. 2, March 2018, pp. 63-73.
IEEE DOI 1806
Anomaly detection, Automation, Computer security, Data mining, Object recognition, Ports (Computers), SCADA systems, vulnerability assessment BibRef

Menemencioglu, O., Orak, I.M.,
Geographical Assesment of Results From Preventing the Parameter Tampering in A Web Application,
GeoAdvances17(69-71).
DOI Link 1805
Malicious inputs to web resources. BibRef

Herrera-Semenets, V.[Vitali], Pérez-García, O.A.[Osvaldo Andrés], Gago-Alonso, A.[Andrés], Hernández-León, R.[Raudel],
A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion Detection,
CIARP17(289-297).
Springer DOI 1802
BibRef

Mohan, R.[Ram], Chaudhury, S.[Santanu], Lall, B.[Brejesh],
Incremental Learning of Non-stationary Temporal Causal Networks for Telecommunication Domain,
PReMI17(501-508).
Springer DOI 1711
BibRef

Elejla, O.E.[Omar E.], Belaton, B.[Bahari], Anbar, M.[Mohammed], Alijla, B.O.[Basem O.],
IPv6 OS Fingerprinting Methods: Review,
IVIC17(661-668).
Springer DOI 1711
BibRef

Zabri, Z.[Zahidan], Nohuddin, P.N.E.[Puteri N. E.],
Analyzing and Detecting Network Intrusion Behavior Using Packet Capture,
IVIC17(750-761).
Springer DOI 1711
BibRef

Zyad, E., Khalid, C., Mohammed, B.,
Combination of R1-PCA and median LDA for anomaly network detection,
ISCV17(1-5)
IEEE DOI 1710
reduction dimension algorithms, zero day attacks, Anomaly detection, Computer crime, Intrusion detection, Principal component analysis, Robustness, Training, KDDcup99, LDA, BibRef

Alaoui, E.A.A., Lamhamdi, M.,
Study of the energy performance of DTN protocols,
ISCV17(1-7)
IEEE DOI 1710
DTN routing, Delay Tolerant Networks (DTN), Energy efficient, ONE, simulator BibRef

Sadek, B.A., Houssaine, T.E., Noreddine, C.,
A robust PID controller for active queue management framework in congested routers,
ISCV17(1-6)
IEEE DOI 1710
control system synthesis, linear matrix inequalities, BibRef

Kempa, W.M.,
On buffer overflow duration in WSN with a vacation-type power saving mechanism,
WSSIP17(1-5)
IEEE DOI 1707
Batteries, Image processing, Mathematical model, Wireless sensor networks, buffer overflow, packet losses, BibRef

Korona, M., Skowron, K., Trzepinski, M., Rawski, M.,
FPGA implementation of IPsec protocol suite for multigigabit networks,
WSSIP17(1-5)
IEEE DOI 1707
Field programmable gate arrays, Hardware, IP networks, Logic gates, Prototypes, Security, Throughput, FPGA, IPsec, hardware, implementation BibRef

Geller, B.,
Advanced synchronization techniques for the Internet of Things,
ISIVC16(180-184)
IEEE DOI 1704
Bayes methods BibRef

Yang, J., Geller, B., Arbi, T.,
Proposal of a multi-standard transceiver for the WBAN Internet of Things,
ISIVC16(369-373)
IEEE DOI 1704
Frequency synchronization BibRef

Massaoudi, A., Sellami, N., Siala, M.,
On the impact of pdf-matched quantization for heterogeneous cognitive radio networks,
ISIVC16(259-263)
IEEE DOI 1704
Base stations BibRef

NasrLeila, I., Atallah, N., Cherif, S., Geller, B.,
Time synchronization in IoT networks: Case of a wireless body area network,
ISIVC16(297-301)
IEEE DOI 1704
ML estimation;Time synchronization;WBAN;non-coherent detector BibRef

Rihani, M.A., Prévotet, J.C., Nouvel, F., Mroue, M., Mohanna, Y.,
ARM-FPGA based platform for automated adaptive wireless communication systems using partial reconfiguration technique,
DASIP16(113-120)
IEEE DOI 1704
field programmable gate arrays BibRef

Moréac, E., Rossi, A., Laurent, J., Bomel, P.,
Crosstalk-aware link power model for Networks-on-Chip,
DASIP16(121-128)
IEEE DOI 1704
crosstalk BibRef

Abbes, Y., Najeh, S., Besbes, H.,
Tractable framework for modeling and analyzing Joint CoMP Transmission and eICIC technology in two-tier heterogeneous cellular networks,
ISIVC16(1-6)
IEEE DOI 1704
Analytical models BibRef

Essassi, S., Hamila, R., Cherif, S., Siala, M., Hasna, M.O.,
Power control and RB allocation in cloud radio access networks,
ISIVC16(148-152)
IEEE DOI 1704
Biological cells BibRef

Mashhadi, F., Asaduzzaman, A., Mridha, M.F.,
A novel resource scheduling approach to improve the reliability of Shuffle-exchange networks,
IVPR17(1-6)
IEEE DOI 1704
Monte Carlo methods BibRef

Xie, J.L.[Jian-Li], Dang, J.W.[Jian-Wu], Li, C.[Cuiran], Lian, X.P.[Xiao-Ping], Lin, J.[Junting],
Ecology-inspired Admission Control scheme in heterogeneous wireless Networks,
ICIVC16(140-144)
IEEE DOI 1610
radio access networks BibRef

Isikdag, U., Pilouk, M.,
Integration Of Geo-sensor Feeds And Event Consumer Services For Real-time Representation of IOT Nodes,
ISPRS16(B4: 267-274).
DOI Link 1610
BibRef

Al-Shamisi, A., Louvieris, P., Al-Mualla, M., Mihajlov, M.,
Towards a theoretical framework for an active cyber situational awareness model,
WSSIP16(1-6)
IEEE DOI 1608
security of data BibRef

Peter, T., Pavol, H., Lukáš, D.,
Implementation and evaluation of IPv6 to IPv4 transition mechanisms in network simulator 3,
WSSIP16(1-4)
IEEE DOI 1608
IP networks BibRef

Al-Jumeily, D., Hussain, A., MacDermott, Á., Seeckts, G., Lunn, J.,
Methods and techniques to support the development of fraud detection system,
WSSIP15(224-227)
IEEE DOI 1603
security of data BibRef

Safiulin, I., Schwarz, S., Rupp, M.,
System level simulation of LTE MBSFN networks with high mobility users,
WSSIP15(21-24)
IEEE DOI 1603
Gaussian noise BibRef

Berisha, T., Midoglu, C., Homayouni, S., Svoboda, P., Rupp, M.,
Measurement setup for automatized baselining of WLAN network performance,
WSSIP15(25-28)
IEEE DOI 1603
radio links BibRef

Marah, H.M., Elrajubi, O.M., Abouda, A.A.,
Fraud detection in international calls using fuzzy logic,
ICCVIA15(1-6)
IEEE DOI 1603
decision making BibRef

Lu, C.L.[Chun-Lin], Zhai, L.[Lidong], Liu, T.[Tao], Li, N.[Na],
Network Intrusion Detection Based on Neural Networks and D-S Evidence,
VSWS15(332-343).
Springer DOI 1603
BibRef

Wei, Z.[Zhuo], Deng, R.H.[Robert H.], Shen, J.[Jialie], Zhu, J.X.[Ji-Xiang], Ouyang, K.[Kun], Wu, Y.D.[Yong-Dong],
Multidimensional Context Awareness in Mobile Devices,
MMMod15(II: 38-49).
Springer DOI 1501
BibRef

Ju, X.Y.[Xiang-Yu],
Android malware detection through permission and package,
ICWAPR14(61-65)
IEEE DOI 1402
Accuracy BibRef

Kuri-Morales, A.[Angel], Cortés-Arce, I.[Iván],
Improved Performance of Computer Networks by Embedded Pattern Detection,
MCPR14(21-30).
Springer DOI 1407
BibRef

Vegh, L.[Laura], Miclea, L.[Liviu],
A new approach towards increased security in cyber-physical systems,
WSSIP14(175-178) 1406
Communities BibRef

Dziurzanski, P.[Piotr], Maka, T.[Tomasz],
Network on chips link bandwidth minimization of deadlock-free multi-path routing,
WSSIP14(131-134) 1406
Clocks BibRef

Serrano, J.M.B.[José Manuel Bande], Palancar, J.H.[José Hernández], Cumplido, R.[René],
High Throughput Signature Based Platform for Network Intrusion Detection,
CIARP13(II:544-551).
Springer DOI 1311
BibRef

Saxena, S.[Sanklan], Kumar, A.[Anugrah], Roy, S.S.[Sanjiban Sekhar],
Determination of network vulnerability factor using rough set,
ICSIPR13(263-268).
IEEE DOI 1304
BibRef

Tran, T.[Tri], Ha, Q.P.,
Parameterised quadratic constraints for network systems subject to multiple communication topologies,
ICARCV12(221-228).
IEEE DOI 1304
BibRef

Xin, K.[Kefei], Cao, X.H.[Xiang-Hui], Cheng, P.[Peng], Chen, J.M.[Ji-Ming],
Optimal controller location in wireless sensor and actuator networks,
ICARCV12(560-565).
IEEE DOI 1304
BibRef

Wu, M.Q.[Meng-Qi], Xia, Y.Q.[Yuan-Qing], Fu, M.Y.[Meng-Yin],
Application of NPC in wireless networked control systems,
ICARCV12(584-589).
IEEE DOI 1304
BibRef

Xu, J.[Jun], Xie, L.H.[Li-Hua], Khanna, N.[Nitish], Chee, W.H.[Wei Hong],
Cooperative control in HNMSim: A 3D hybrid networked MAS simulator,
ICARCV12(626-631).
IEEE DOI 1304
BibRef

Yuan, X.D.[Xiao-Dan], Yu, M.[Mei], Xiao, W.D.[Wen-Dong],
Robust stabilization of multiple coupled networked control system via jump linear system approach,
ICARCV12(690-694).
IEEE DOI 1304
BibRef

Cheng, H.[Hui], Chen, Y.[Yi], Wong, W.S.[Wing Shing], Yang, Q.[Qiong], Shen, L.F.[Lian-Feng],
Protocol sequence based wireless media access control in networked control systems,
ICARCV12(707-712).
IEEE DOI 1304
BibRef

Corona, I.[Igino], Tronci, R.[Roberto], Giacinto, G.[Giorgio],
SuStorID: A multiple classifier system for the protection of web services,
ICPR12(2375-2378).
WWW Link. 1302
BibRef

Gao, Y.Q.[Ya-Qi], Zheng, S.J.[Shi-Jue],
A metadata access strategy of learning resources based on HDFS,
IASP11(620-622).
IEEE DOI 1112
File system access BibRef

Yang, F.Y.[Feng-Ying], Liu, H.C.[Hui-Chao],
Research in HDFS based on the campus network environment,
IASP11(648-652).
IEEE DOI 1112
BibRef

Zhang, R.Z.[Ren-Zhi], Li, L.Q.[Liu-Qing], Zhang, C.J.[Cai-Jun],
The application of middleware technology to communication network real-time monitoring system,
IASP11(488-491).
IEEE DOI 1112
BibRef

Huang, W.[Wenhu], Zheng, S.J.[Shi-Jue], Zhang, P.[Ping],
Research of data packet transmission based on SMS services,
IASP11(557-560).
IEEE DOI 1112
BibRef

Zhao, F.Z.[Fu-Zhe], Li, R.[Ru], Kang, Y.B.[Yuan-Bing],
Stability analysis of FAST TCP using PI transfer function,
IASP11(52-55).
IEEE DOI 1112
BibRef

Atila, Ü.[Ümit], Karas, I.R.[Ismail Rakip],
Genetic Algorithm-Aided Routing on 3D Dynamic Networks,
GeoInfo10(xx-yy).
PDF File. 1011
BibRef

Nguyen, H.T.[Hai Thanh], Franke, K.[Katrin], Petrovic, S.[Slobodan],
Towards a Generic Feature-Selection Measure for Intrusion Detection,
ICPR101(1529-1532).
IEEE DOI 1008
BibRef

Gargiulo, F.[Francesco], Sansone, C.[Carlo],
Improving Performance of Network Traffic Classification Systems by Cleaning Training Data,
ICPR10(2768-2771).
IEEE DOI 1008
BibRef

Blauensteiner, P.[Philipp], Kampel, M.[Martin], Musik, C.[Christoph], Vogtenhuber, S.[Stefan],
A socio-technical approach for event detection in security critical infrastructure,
SISM10(23-30).
IEEE DOI 1006
BibRef

Guo, W.P.[Wen-Ping], Li, Z.L.[Zhen-Long], Chen, Y.[Ying], Zhao, X.M.[Xiao-Ming],
Security design for Instant Messaging system based on RSA and triple DES,
IASP09(415-418).
IEEE DOI 0904
BibRef

Mazzariello, C.[Claudio], Sansone, C.[Carlo],
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers,
CIAP09(883-892).
Springer DOI 0909
BibRef

Li, M.[Muhai], Li, M.[Ming],
A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis,
CISP09(1-5).
IEEE DOI 0910
BibRef

Subhan, F.[Fazli], Hasbullah, H.B.[Halabi B.],
Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems,
IVIC09(759-769).
Springer DOI 0911
BibRef

Benkic, K., Malajner, M., Planinsic, P., Cucej, Z.,
On Line Measurements and Visualization of Distances in WSN with RSSI Parameter,
WSSIP09(1-4).
IEEE DOI 0906
Wireless networks. BibRef

Ribeiro, F.N., Zorzo, S.D.,
A Quantitative Evaluation of Privacy in Location Based Services,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Khan, I., Karras, D.A.,
An Efficient Cross Layer Intra and Inter Domain Mobility Solution for IEEE 802.16e Mobile WiMAX,
WSSIP09(1-7).
IEEE DOI 0906
BibRef

Mach, P., Bestak, R.,
Analysis and Performance Evaluation of IEEE 802.16 Enhanced with Decentrally Controlled Relays,
WSSIP09(1-6).
IEEE DOI 0906
BibRef

Malajner, M., Benkic, K., Planinsic, P., Cucej, Z.,
The Accuracy of Propagation Models for Distance Measurement between WSN Nodes,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Kovacik, T., Kotuliak, I.,
Traffic Characterization in IP Multimedia Subsystem,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Christou, P., Kyriakoulakos, K., Sotiriadis, E., Papadopoulos, K., Mplemenos, G.G., Papaefstathiou, I.,
Low-Power Security Modules Optimized for WSNs,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Kapetanovic, T., Kapetanovic, A.,
Modeling and Implementation of the Complex Telecommunication Systems Using the High Performance Computing Resources,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Ulvan, M., Bestak, R.,
Delay Performance of Session Establishment Signaling in IP Multimedia Subsystem,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Kantzavelou, I., Katsikas, S.K.,
Playing Games with Internal Attackers Repeatedly,
WSSIP09(1-6).
IEEE DOI 0906
BibRef

Spathoulas, G.P., Katsikas, S.K.,
Using a Fuzzy Inference System to Reduce False Positives in Intrusion Detection,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Ulvan, A., Bestak, R.,
The Analysis of Scanning Time in IEEE802.16m's Handover Procedure,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Neruda, M., Vrana, J., Bestak, R.,
Femtocells in 3G Mobile Networks,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Geneiatakis, D., Vrakas, N., Lambrinoudakis, C.,
Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Akbari, A.[Abolfazle], Soruri, M.[Mahdi], Jalali, S.V.[Seyed Vahid],
Survey of Stable Clustering for Mobile Ad Hoc Networks,
ICMV09(3-7).
IEEE DOI 0912
Network connectivity itself. BibRef

Zhong, N.[Ning], He, Z.W.[Zun-Wen], Kuang, J.M.[Jing-Ming], Fang, J.[Jun],
Research on the Performance Evaluation Technique for Communication Network,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, Y.Q., Yu, X.F., Zhang, Y.J.,
The Design of a Wireless Node of Strain Data Acquisition,
CISP09(1-3).
IEEE DOI 0910
BibRef

Papazoglou, P.M., Karras, D.A., Papademetriou, R.C.,
An Efficient Distributed Event Scheduling Algorithm for Large Scale Wireless Communications Simulation Modelling,
WSSIP09(1-7).
IEEE DOI 0906
BibRef

Charilas, D.E., Markaki, O.I., Vlacheas, P.T.,
Admission Control as a Non-Cooperative Multi-Stage Game between Wireless Networks,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Tatsiopoulos, C., Ktena, A.,
A Smart ZIGBEE Based Wireless Sensor Meter System,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Besson, L., Leleu, P.,
A Distributed Intrusion Detection System for Ad-Hoc Wireless Sensor Networks: The AWISSENET Distributed Intrusion Detection System,
WSSIP09(1-3).
IEEE DOI 0906
BibRef

di Gesu, V.[Vito], Lo Bosco, G.[Giosue], Friedman, J.H.[Jerome H.],
Intruders pattern identification,
ICPR08(1-4).
IEEE DOI 0812
BibRef

Yang, D.[Dayu], Qi, H.R.[Hai-Rong],
A network intrusion detection method using independent component analysis,
ICPR08(1-4).
IEEE DOI 0812
BibRef

Este, A.[Alice], Gargiulo, F.[Francesco], Gringoli, F.[Francesco], Salgarelli, L.[Luca], Sansone, C.[Carlo],
Pattern Recognition Approaches for Classifying IP Flows,
SSPR08(885-895).
Springer DOI 0812
BibRef

Rao, D.S., Kumar, G.N., Mallick, D.K.[Dheeresh K.], Jana, P.K.[Prasanta K.],
Parallel Construction of Conflict Graph for Phylogenetic Network Problem,
PReMI07(398-405).
Springer DOI 0712
BibRef

Morin, B.[Benjamin], Debar, H.[Hervé],
Conceptual Analysis of Intrusion Alarms,
CIAP05(91-98).
Springer DOI 0509
BibRef

Zanero, S.[Stefano],
Analyzing TCP Traffic Patterns Using Self Organizing Maps,
CIAP05(83-90).
Springer DOI 0509
BibRef

Chapter on New Unsorted Entries, and Other Miscellaneous Papers continues in
Source Localization, Direction of Arrival, DoA, Analysis .


Last update:Mar 16, 2024 at 20:36:19