@article{bb333400,
        AUTHOR = "Utkovski, Z. and Simeone, O. and Dimitrova, T. and Popovski, P.",
        TITLE = "Random Access in C-RAN for User Activity Detection With
Limited-Capacity Fronthaul",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "17-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327702"}

@article{bb333401,
        AUTHOR = "Yu, N.Y.",
        TITLE = "Indistinguishability of Compressed Encryption With Circulant Matrices
for Wireless Security",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "181-185",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327703"}

@article{bb333402,
        AUTHOR = "Chen, Q. and Kang, D. and He, Y. and Chang, T.H. and Liu, Y.F.",
        TITLE = "Joint Power and Admission Control Based on Channel Distribution
Information: A Novel Two-Timescale Approach",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "196-200",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327704"}

@article{bb333403,
        AUTHOR = "Li, W. and Wang, X. and Moran, B.",
        TITLE = "Wireless Signal Travel Distance Estimation Using Non-Coprime
Wavelengths",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "27-31",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327705"}

@article{bb333404,
        AUTHOR = "Kwon, M. and Park, H.",
        TITLE = "Distributed Network Formation Strategy for Network Coding Based
Wireless Networks",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "432-436",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327706"}

@article{bb333405,
        AUTHOR = "Sedjelmaci, H. and Senouci, S.M. and Ansari, N.",
        TITLE = "Intrusion Detection and Ejection Framework Against Lethal Attacks in
UAV-Aided Networks: A Bayesian Game-Theoretic Methodology",
        JOURNAL = ITS,
        VOLUME = "18",
        YEAR = "2017",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1143-1153",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327707"}

@inproceedings{bb333406,
        AUTHOR = "Larhlimi, A. and Mestari, M. and El Khaili, M.",
        TITLE = "GPU parallel neural hierarchical multi objective solver for burst
routing and wavelength assignment",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327708"}

@article{bb333407,
        AUTHOR = "Yin, H. and Zhang, X. and Zhao, S. and Luo, Y. and Tian, C. and Sekar, V.",
        TITLE = "Tradeoffs Between Cost and Performance for CDN Provisioning Based on
Coordinate Transformation",
        JOURNAL = MultMed,
        VOLUME = "19",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2583-2596",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327709"}

@article{bb333408,
        AUTHOR = "Guerreiro, P. and Xavier, J.",
        TITLE = "Distributed Learning With Time Correlated Information",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "1636-1640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327710"}

@article{bb333409,
        AUTHOR = "Hu, D. and Zhang, Q. and Yang, P. and Qin, J.",
        TITLE = "Proactive Monitoring via Jamming in Amplify-and-Forward Relay
Networks",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "1714-1718",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327711"}

@article{bb333410,
        AUTHOR = "AlEroud, A.F. and Karabatis, G.",
        TITLE = "Queryable Semantics to Detect Cyber-Attacks:
A Flow-Based Detection Approach",
        JOURNAL = SMCS,
        VOLUME = "48",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "207-223",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327712"}

@article{bb333411,
        AUTHOR = "Kozik, R.",
        TITLE = "Distributing extreme learning machines with Apache Spark for
NetFlow-based malware activity detection",
        JOURNAL = PRL,
        VOLUME = "101",
        YEAR = "2018",
        NUMBER = "1",
        PAGES = "14-20",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327713"}

@article{bb333412,
        AUTHOR = "Ghofrani, F. and Keshavarz Haddad, A. and Jamshidi, A.",
        TITLE = "A new probabilistic classifier based on decomposable models with
application to internet traffic",
        JOURNAL = PR,
        VOLUME = "77",
        YEAR = "2018",
        PAGES = "1-11",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327714"}

@article{bb333413,
        AUTHOR = "Japkowicz, N. and Elovici, Y.",
        TITLE = "Introduction to the Special Issue on Data Mining for Cybersecurity",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "3-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327715"}

@article{bb333414,
        AUTHOR = "Noble, J. and Adams, N.",
        TITLE = "Real-Time Dynamic Network Anomaly Detection",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "5-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327716"}

@article{bb333415,
        AUTHOR = "Grolman, E. and Finkelshtein, A. and Puzis, R. and Shabtai, A. and Celniker, G. and Katzir, Z. and Rosenfeld, L.",
        TITLE = "Transfer Learning for User Action Identication in Mobile Apps via
Encrypted Traffic Analysis",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "40-53",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327717"}

@article{bb333416,
        AUTHOR = "Li, B. and Yao, Y. and Chen, H. and Li, Y. and Huang, S.",
        TITLE = "Wireless Information Surveillance and Intervention Over Multiple
Suspicious Links",
        JOURNAL = SPLetters,
        VOLUME = "25",
        YEAR = "2018",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1131-1135",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327718"}

@article{bb333417,
        AUTHOR = "Meng, W.",
        TITLE = "Intrusion Detection in the Era of IoT: Building Trust via Traffic
Filtering and Sampling",
        JOURNAL = Computer,
        VOLUME = "51",
        YEAR = "2018",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "36-43",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327719"}

@article{bb333418,
        AUTHOR = "Jimenez Tejero, C.E. and Sallares, V. and Ranero, C.R.",
        TITLE = "Appraisal of Instantaneous Phase-Based Functions in Adjoint Waveform
Inversion",
        JOURNAL = GeoRS,
        VOLUME = "56",
        YEAR = "2018",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "5185-5197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327720"}

@article{bb333419,
        AUTHOR = "Chen, C.H. and Lo, K.R.",
        TITLE = "Applications of Internet of Things",
        JOURNAL = IJGI,
        VOLUME = "7",
        YEAR = "2018",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327721"}

@article{bb333420,
        AUTHOR = "Mousavinejad, E. and Yang, F. and Han, Q. and Vlacic, L.",
        TITLE = "A Novel Cyber Attack Detection Method in Networked Control Systems",
        JOURNAL = Cyber,
        VOLUME = "48",
        YEAR = "2018",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "3254-3264",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327722"}

@article{bb333421,
        AUTHOR = "Garg, S. and Kaur, K. and Kumar, N. and Rodrigues, J.J.P.C.",
        TITLE = "Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious
Flow Detection in SDN: A Social Multimedia Perspective",
        JOURNAL = MultMed,
        VOLUME = "21",
        YEAR = "2019",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "566-578",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327723"}

@article{bb333422,
        AUTHOR = "Shang, Y.",
        TITLE = "Subgraph Robustness of Complex Networks Under Attacks",
        JOURNAL = SMCS,
        VOLUME = "49",
        YEAR = "2019",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "821-832",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327724"}

@article{bb333423,
        AUTHOR = "Phetlasy, S. and Ohzahata, S. and Wu, C. and Kato, T.",
        TITLE = "A Sequential Classifiers Combination Method to Reduce False Negative
for Intrusion Detection System",
        JOURNAL = IEICE,
        VOLUME = "E102-D",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327725"}

@article{bb333424,
        AUTHOR = "Gao, N. and Qin, Z. and Jing, X.",
        TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless
Communications",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "938-942",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327726"}

@article{bb333425,
        AUTHOR = "Cho, K. and Lee, S. and Khisti, A.",
        TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable
Batteries",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "971-975",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327727"}

@article{bb333426,
        AUTHOR = "Antal, M. and Egyed Zsigmond, E.",
        TITLE = "Intrusion detection using mouse dynamics",
        JOURNAL = IET-Bio,
        VOLUME = "8",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "285-294",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327728"}

@article{bb333427,
        AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.",
        TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things
Data: A Review and Case Study",
        JOURNAL = RS,
        VOLUME = "11",
        YEAR = "2019",
        NUMBER = "19",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327729"}

@article{bb333428,
        AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.",
        TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327730"}

@article{bb333429,
        AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.",
        TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile
fog computing",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327731"}

@article{bb333430,
        AUTHOR = "Hwang, K.",
        TITLE = "Blocking of operation of unauthorised software using MQTT",
        JOURNAL = IJCVR,
        VOLUME = "9",
        YEAR = "2019",
        NUMBER = "6",
        PAGES = "609-620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327732"}

@article{bb333431,
        AUTHOR = "Chen, X.F. and Yu, S.Z.",
        TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN",
        JOURNAL = IEICE,
        VOLUME = "E99-D",
        YEAR = "2016",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "2395-2399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327733"}

@article{bb333432,
        AUTHOR = "Wu, W. and Li, R. and Xie, G. and An, J. and Bai, Y. and Zhou, J. and Li, K.",
        TITLE = "A Survey of Intrusion Detection for In-Vehicle Networks",
        JOURNAL = ITS,
        VOLUME = "21",
        YEAR = "2020",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "919-933",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327734"}

@inproceedings{bb333433,
        AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.",
        TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory
and Mechanism Design",
        BOOKTITLE = MMMod20,
        YEAR = "2020",
        PAGES = "II:651-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327735"}

@article{bb333434,
        AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.",
        TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension
Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "27",
        YEAR = "2020",
        PAGES = "471-475",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327736"}

@article{bb333435,
        AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.",
        TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black
and White Binary Image",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "896-900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327737"}

@article{bb333436,
        AUTHOR = "Ye, Z. and Ni, H.J. and Xu, Z.H. and Zhang, D.",
        TITLE = "Sensor fault estimation of networked vehicle suspension system with
deny-of-service attack",
        JOURNAL = IET-ITS,
        VOLUME = "14",
        YEAR = "2020",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "455-462",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327738"}

@article{bb333437,
        AUTHOR = "Kim, K.",
        TITLE = "Intrusion Detection System Using Deep Learning and Its Application to
Wi-Fi Network",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "1433-1447",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327739"}

@article{bb333438,
        AUTHOR = "Liang, J. and Lin, Q. and Chen, J. and Zhu, Y.",
        TITLE = "A Filter Model Based on Hidden Generalized Mixture Transition
Distribution Model for Intrusion Detection System in Vehicle Ad Hoc
Networks",
        JOURNAL = ITS,
        VOLUME = "21",
        YEAR = "2020",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "2707-2722",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327740"}

@inproceedings{bb333439,
        AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.",
        TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams
in Azimuth Plane for WLAN Wireless System",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327741"}

@article{bb333440,
        AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.",
        TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio
Access in IoT Fog Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "728-732",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327742"}

@article{bb333441,
        AUTHOR = "Park, S.H. and Jin, X.",
        TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for
Multi-User Systems",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "917-921",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327743"}

@article{bb333442,
        AUTHOR = "Wang, Z. and Blum, R.S.",
        TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "1002-1005",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327744"}

@article{bb333443,
        AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.",
        TITLE = "Multi-type relational clustering for enterprise cyber-security
networks",
        JOURNAL = PRL,
        VOLUME = "149",
        YEAR = "2021",
        PAGES = "172-178",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327745"}

@article{bb333444,
        AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.",
        TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "4",
        PAGES = "357-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327746"}

@inproceedings{bb333445,
        AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.",
        TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL
Databases",
        BOOKTITLE = MCPR21,
        YEAR = "2021",
        PAGES = "23-32",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327747"}

@article{bb333446,
        AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.",
        TITLE = "CAN-Bus Attack Detection With Deep Learning",
        JOURNAL = ITS,
        VOLUME = "22",
        YEAR = "2021",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5081-5090",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327748"}

@article{bb333447,
        AUTHOR = "Cho, Y.B.",
        TITLE = "Malware classifier for dynamic deep learning algorithm",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "5",
        PAGES = "486-496",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327749"}

@article{bb333448,
        AUTHOR = "Chou, D. and Jiang, M.",
        TITLE = "A Survey on Data-Driven Network Intrusion Detection",
        JOURNAL = Surveys,
        VOLUME = "54",
        YEAR = "2021",
        NUMBER = "9",
        MONTH = "October",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327750"}

@article{bb333449,
        AUTHOR = "Arulananth, T.S. and Baskar, M. and Anbarasu, V. and Thiagarajan, R. and Rajendran, T. and Balaji, A.",
        TITLE = "Multi party secure data access management in cloud using user centric
block chain data encryption",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "295-301",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327751"}

@article{bb333450,
        AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.",
        TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive
Model Resolving the Security Issues in IoT Based Models",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "428-435",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327752"}

@article{bb333451,
        AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.",
        TITLE = "Protection motivation theory using multi-factor authentication for
providing security over social networking sites",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "218-224",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327753"}

@article{bb333452,
        AUTHOR = "Wei, S.M. and Pan, J.H.",
        TITLE = "Resilience of Urban Network Structure in China:
The Perspective of Disruption",
        JOURNAL = IJGI,
        VOLUME = "10",
        YEAR = "2021",
        NUMBER = "12",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327754"}

@article{bb333453,
        AUTHOR = "Saveetha, D. and Maragatham, G.",
        TITLE = "Design of Blockchain enabled intrusion detection model for detecting
security attacks using deep learning",
        JOURNAL = PRL,
        VOLUME = "153",
        YEAR = "2022",
        PAGES = "24-28",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327755"}

@article{bb333454,
        AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.",
        TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature
Selection",
        JOURNAL = IEICE,
        VOLUME = "E105-D",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1024-1038",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327756"}

@article{bb333455,
        AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.",
        TITLE = "Cloud security based attack detection using transductive learning
integrated with Hidden Markov Model",
        JOURNAL = PRL,
        VOLUME = "157",
        YEAR = "2022",
        PAGES = "16-26",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327757"}

@article{bb333456,
        AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.",
        TITLE = "Network optimization using defender system in cloud computing
security based intrusion detection system withgame theory deep neural
network (IDSGT-DNN)",
        JOURNAL = PRL,
        VOLUME = "156",
        YEAR = "2022",
        PAGES = "142-151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327758"}

@article{bb333457,
        AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.",
        TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to
Denial-of-Service Attacks",
        JOURNAL = SMCS,
        VOLUME = "52",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "3326-3336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327759"}

@article{bb333458,
        AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.",
        TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327760"}

@article{bb333459,
        AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.",
        TITLE = "Task adaptive siamese neural networks for open-set recognition of
encrypted network traffic with bidirectional dropout",
        JOURNAL = PRL,
        VOLUME = "159",
        YEAR = "2022",
        PAGES = "132-139",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327761"}

@article{bb333460,
        AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.",
        TITLE = "Automated Software Defect Detection and Identification in Vehicular
Embedded Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6963-6973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327762"}

@article{bb333461,
        AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.",
        TITLE = "An Intrusion Detection Method Based on Machine Learning and State
Observer for Train-Ground Communication Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6608-6620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327763"}

@article{bb333462,
        AUTHOR = "dos Santos Roque, A. and Jazdi, N. and de Freitas, E.P. and Pereira, C.E.",
        TITLE = "A Fault Modeling Based Runtime Diagnostic Mechanism for Vehicular
Distributed Control Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7220-7232",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327764"}

@article{bb333463,
        AUTHOR = "Taguchi, S. and Yoshimura, T.",
        TITLE = "Online Estimation and Prediction of Large-Scale Network Traffic From
Sparse Probe Vehicle Data",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7233-7243",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327765"}

@article{bb333464,
        AUTHOR = "Cai, X.Q. and Wu, C. and Sheng, J. and Wang, Y.M. and Ai, B.",
        TITLE = "Spectrum Situation Awareness Based on Time-Series Depth Networks for
LTE-R Communication System",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "8629-8640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327766"}

@article{bb333465,
        AUTHOR = "Kye, H. and Kim, M. and Kwon, M.",
        TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised
Learning Approach",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "1908-1912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327767"}

@article{bb333466,
        AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.",
        TITLE = "Wrapper feature selection method based differential evolution and
extreme learning machine for intrusion detection system",
        JOURNAL = PR,
        VOLUME = "132",
        YEAR = "2022",
        PAGES = "108912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327768"}

@article{bb333467,
        AUTHOR = "He, Y.C. and Jia, Z.J. and Hu, M.S. and Cui, C. and Cheng, Y. and Yang, Y.Y.",
        TITLE = "The Hybrid Similar Neighborhood Robust Factorization Machine Model
for Can Bus Intrusion Detection in the In-Vehicle Network",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "16833-16841",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327769"}

@article{bb333468,
        AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.",
        TITLE = "Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "17425-17439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327770"}

@article{bb333469,
        AUTHOR = "Sathish, N. and Valarmathi, N.",
        TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's
chi-squared distribution and decision tree classifiers",
        JOURNAL = PRL,
        VOLUME = "162",
        YEAR = "2022",
        PAGES = "15-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327771"}

@article{bb333470,
        AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.",
        TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular
Networks",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "22596-22606",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327772"}

@inproceedings{bb333471,
        AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.",
        TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior
Profiling",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "1865-1870",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327773"}

@article{bb333472,
        AUTHOR = "Koroniotis, N. and Moustafa, N. and Schiliro, F. and Gauravaram, P. and Janicke, H.",
        TITLE = "The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins
Architecture in IIoT-Based Smart Airports",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "2368-2381",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327774"}

@article{bb333473,
        AUTHOR = "Duan, X. and Yan, H. and Tian, D.X. and Zhou, J. and Su, J. and Hao, W.",
        TITLE = "In-Vehicle CAN Bus Tampering Attacks Detection for Connected and
Autonomous Vehicles Using an Improved Isolation Forest Method",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "2122-2134",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327775"}

@article{bb333474,
        AUTHOR = "Wang, K. and Zhang, A. and Sun, H.R. and Wang, B.L.",
        TITLE = "Analysis of Recent Deep-Learning-Based Intrusion Detection Methods
for In-Vehicle Network",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "1843-1854",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327776"}

@article{bb333475,
        AUTHOR = "Rajapaksha, S. and Kalutarage, H. and Al Kadri, M.O. and Petrovski, A. and Madzudzo, G. and Cheah, M.",
        TITLE = "AI-Based Intrusion Detection Systems for In-Vehicle Networks:
A Survey",
        JOURNAL = Surveys,
        VOLUME = "55",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "February",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327777"}

@article{bb333476,
        AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Otaibi, S.A. and Tian, Z.H.",
        TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and
Weight Self-Learning",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7642-7652",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327778"}

@article{bb333477,
        AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.",
        TITLE = "Detecting Android Malware With Pre-Existing Image Classification
Neural Networks",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "858-862",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327779"}

@article{bb333478,
        AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.",
        TITLE = "Distributed edge-event-triggered consensus of multi-agent system
under DoS attack",
        JOURNAL = PRL,
        VOLUME = "174",
        YEAR = "2023",
        PAGES = "118-123",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327780"}

@article{bb333479,
        AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z. and Deng, Z.Y. and Ling, X. and Xiang, W.",
        TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet
traffic data",
        JOURNAL = PR,
        VOLUME = "146",
        YEAR = "2024",
        PAGES = "109999",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327781"}

@article{bb333480,
        AUTHOR = "Lee, S. and Choi, W. and Jo, H.J. and Lee, D.H.",
        TITLE = "ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive
Intrusion Detection System",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12406-12421",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327782"}

@article{bb333481,
        AUTHOR = "Zhou, J. and Xie, G.Q. and Zeng, H.B. and Zhang, W.Z. and Yang, L.T. and Alazab, M. and Li, R.",
        TITLE = "A Model-Based Method for Enabling Source Mapping and Intrusion
Detection on Proprietary Can Bus",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12922-12932",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327783"}

@article{bb333482,
        AUTHOR = "Chougule, A. and Kohli, V. and Chamola, V. and Yu, F.R.",
        TITLE = "Multibranch Reconstruction Error (MbRE) Intrusion Detection
Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc
Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "13068-13077",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327784"}

@article{bb333483,
        AUTHOR = "Almutlaq, S. and Derhab, A. and Hassan, M.M. and Kaur, K.",
        TITLE = "Two-Stage Intrusion Detection System in Intelligent Transportation
Systems Using Rule Extraction Methods From Deep Neural Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15687-15701",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327785"}

@article{bb333484,
        AUTHOR = "Zhang, J. and Gong, B. and Waqas, M. and Tu, S.S. and Chen, S.",
        TITLE = "Many-Objective Optimization Based Intrusion Detection for in-Vehicle
Network Security",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15051-15065",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327786"}

@article{bb333485,
        AUTHOR = "Anbalagan, S. and Raja, G. and Gurumoorthy, S. and Suresh, R.D. and Dev, K.",
        TITLE = "IIDS: Intelligent Intrusion Detection System for Sustainable
Development in Autonomous Vehicles",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15866-15875",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327787"}

@article{bb333486,
        AUTHOR = "Qian, Z.J. and Zhong, S. and Sun, G.F. and Xing, X.S. and Jin, Y.",
        TITLE = "A Formal Approach to Design and Security Verification of Operating
Systems for Intelligent Transportation Systems Based on Object Model",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15459-15467",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327788"}

@article{bb333487,
        AUTHOR = "da Cruz, M.A.A. and Abbade, L.R. and Lorenz, P. and Mafra, S.B. and Rodrigues, J.J.P.C.",
        TITLE = "Detecting Compromised IoT Devices Through XGBoost",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15392-15399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327789"}

@article{bb333488,
        AUTHOR = "Li, Y. and Zhu, L. and Wang, H.W. and Yu, F.R. and Tang, T. and Zhang, D.J.",
        TITLE = "Joint Security and Resources Allocation Scheme Design in Edge
Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "13948-13961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327790"}

@article{bb333489,
        AUTHOR = "Zahid, M.U. and Nisar, M.D. and Shah, M.H. and Hussain, S.A.",
        TITLE = "Specific Emitter Identification Based on Multi-Scale
Multi-Dimensional Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "850-854",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327791"}

@article{bb333490,
        AUTHOR = "Yang, H. and Li, T.C. and Yan, J. and Elvira, V.",
        TITLE = "Hierarchical Average Fusion With GM-PHD Filters Against FDI and DoS
Attacks",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "934-938",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327792"}

@inproceedings{bb333491,
        AUTHOR = "Hsu, T.C. and Lu, H.S.",
        TITLE = "Designing a Secure and Scalable Service Model Using Blockchain and
MQTT for IoT Devices",
        BOOKTITLE = IoTDesign24,
        YEAR = "2024",
        PAGES = "645-653",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327793"}

@inproceedings{bb333492,
        AUTHOR = "Kannan, B.B. and Sriramulu, S.",
        TITLE = "Hybrid Convolutional Neural Networks To Create An Attack Detection
Framework For A Wireless Sensor Network Based Health Care Application",
        BOOKTITLE = ICCVMI23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327794"}

@inproceedings{bb333493,
        AUTHOR = "Tang, F. and Yu, B.Y. and Zhao, S.X. and Xu, M.",
        TITLE = "Towards Fraudulent URL Classification with Large Language Model based
on Deep Learning",
        BOOKTITLE = CVIDL23,
        YEAR = "2023",
        PAGES = "503-507",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327795"}

@inproceedings{bb333494,
        AUTHOR = "Benchadi, D.Y.M. and Batalo, B. and Fukui, K.",
        TITLE = "Malware Detection Using Kernel Constrained Subspace Method",
        BOOKTITLE = MVA23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327796"}

@inproceedings{bb333495,
        AUTHOR = "Dong, Q. and Sun, T.T. and Li, T.W. and Lu, X.Q. and Yan, K.",
        TITLE = "Anomaly Intrusion Detection in Online Learning Space Based on XGBoost",
        BOOKTITLE = ICIVC22,
        YEAR = "2022",
        PAGES = "968-973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327797"}

@inproceedings{bb333496,
        AUTHOR = "Li, S.S. and Chen, D. and Zhang, J. and Wang, H.Y. and Li, L. and Qian, Y.Y. and Liu, H.",
        TITLE = "Software Vulnerability Detection Based on Anomaly-Attention",
        BOOKTITLE = ICRVC22,
        YEAR = "2022",
        PAGES = "261-265",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327798"}

@inproceedings{bb333497,
        AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z.W. and Wang, X. and Jing, R.Q.",
        TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative
Adversarial Networks for Malware Classification",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "3775-3782",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327799"}

@inproceedings{bb333498,
        AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.",
        TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "9068-9075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327800"}

@inproceedings{bb333499,
        AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.",
        TITLE = "Large Scale Graph Based Network Forensics Analysis",
        BOOKTITLE = IWBDAF20,
        YEAR = "2020",
        PAGES = "457-469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT327801"}

Last update:May 2, 2024 at 20:14:39