@article{bb365800, AUTHOR = "Gao, N. and Qin, Z. and Jing, X.", TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless Communications", JOURNAL = SPLetters, VOLUME = "26", YEAR = "2019", NUMBER = "6", MONTH = "June", PAGES = "938-942", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359970"} @article{bb365801, AUTHOR = "Cho, K. and Lee, S. and Khisti, A.", TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable Batteries", JOURNAL = SPLetters, VOLUME = "26", YEAR = "2019", NUMBER = "7", MONTH = "July", PAGES = "971-975", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359971"} @article{bb365802, AUTHOR = "Antal, M. and Egyed Zsigmond, E.", TITLE = "Intrusion detection using mouse dynamics", JOURNAL = IET-Bio, VOLUME = "8", YEAR = "2019", NUMBER = "5", MONTH = "September", PAGES = "285-294", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359972"} @article{bb365803, AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.", TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things Data: A Review and Case Study", JOURNAL = RS, VOLUME = "11", YEAR = "2019", NUMBER = "19", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359973"} @article{bb365804, AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.", TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm", JOURNAL = JVCIR, VOLUME = "65", YEAR = "2019", PAGES = "102646", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359974"} @article{bb365805, AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.", TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile fog computing", JOURNAL = JVCIR, VOLUME = "65", YEAR = "2019", PAGES = "102656", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359975"} @article{bb365806, AUTHOR = "Hwang, K.", TITLE = "Blocking of operation of unauthorised software using MQTT", JOURNAL = IJCVR, VOLUME = "9", YEAR = "2019", NUMBER = "6", PAGES = "609-620", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359976"} @article{bb365807, AUTHOR = "Chen, X.F. and Yu, S.Z.", TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN", JOURNAL = IEICE, VOLUME = "E99-D", YEAR = "2016", NUMBER = "9", MONTH = "September", PAGES = "2395-2399", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359977"} @article{bb365808, AUTHOR = "Wu, W. and Li, R. and Xie, G. and An, J. and Bai, Y. and Zhou, J. and Li, K.", TITLE = "A Survey of Intrusion Detection for In-Vehicle Networks", JOURNAL = ITS, VOLUME = "21", YEAR = "2020", NUMBER = "3", MONTH = "March", PAGES = "919-933", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359978"} @inproceedings{bb365809, AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.", TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory and Mechanism Design", BOOKTITLE = MMMod20, YEAR = "2020", PAGES = "II:651-668", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359979"} @article{bb365810, AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.", TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension Approximate Entropy", JOURNAL = SPLetters, VOLUME = "27", YEAR = "2020", PAGES = "471-475", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359980"} @article{bb365811, AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.", TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image", JOURNAL = IEICE, VOLUME = "E103-D", YEAR = "2020", NUMBER = "4", MONTH = "April", PAGES = "896-900", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359981"} @article{bb365812, AUTHOR = "Kim, K.", TITLE = "Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network", JOURNAL = IEICE, VOLUME = "E103-D", YEAR = "2020", NUMBER = "7", MONTH = "July", PAGES = "1433-1447", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359982"} @article{bb365813, AUTHOR = "Liang, J. and Lin, Q. and Chen, J. and Zhu, Y.", TITLE = "A Filter Model Based on Hidden Generalized Mixture Transition Distribution Model for Intrusion Detection System in Vehicle Ad Hoc Networks", JOURNAL = ITS, VOLUME = "21", YEAR = "2020", NUMBER = "7", MONTH = "July", PAGES = "2707-2722", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359983"} @inproceedings{bb365814, AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.", TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams in Azimuth Plane for WLAN Wireless System", BOOKTITLE = ISCV20, YEAR = "2020", PAGES = "1-7", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359984"} @article{bb365815, AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.", TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio Access in IoT Fog Networks", JOURNAL = SPLetters, VOLUME = "28", YEAR = "2021", PAGES = "728-732", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359985"} @article{bb365816, AUTHOR = "Park, S.H. and Jin, X.", TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for Multi-User Systems", JOURNAL = SPLetters, VOLUME = "28", YEAR = "2021", PAGES = "917-921", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359986"} @article{bb365817, AUTHOR = "Wang, Z. and Blum, R.S.", TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks", JOURNAL = SPLetters, VOLUME = "28", YEAR = "2021", PAGES = "1002-1005", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359987"} @article{bb365818, AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.", TITLE = "Multi-type relational clustering for enterprise cyber-security networks", JOURNAL = PRL, VOLUME = "149", YEAR = "2021", PAGES = "172-178", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359988"} @article{bb365819, AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.", TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes", JOURNAL = IJCVR, VOLUME = "11", YEAR = "2021", NUMBER = "4", PAGES = "357-373", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359989"} @inproceedings{bb365820, AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.", TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL Databases", BOOKTITLE = MCPR21, YEAR = "2021", PAGES = "23-32", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359990"} @article{bb365821, AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.", TITLE = "CAN-Bus Attack Detection With Deep Learning", JOURNAL = ITS, VOLUME = "22", YEAR = "2021", NUMBER = "8", MONTH = "August", PAGES = "5081-5090", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359991"} @article{bb365822, AUTHOR = "Cho, Y.B.", TITLE = "Malware classifier for dynamic deep learning algorithm", JOURNAL = IJCVR, VOLUME = "11", YEAR = "2021", NUMBER = "5", PAGES = "486-496", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359992"} @article{bb365823, AUTHOR = "Chou, D. and Jiang, M.", TITLE = "A Survey on Data-Driven Network Intrusion Detection", JOURNAL = Surveys, VOLUME = "54", YEAR = "2021", NUMBER = "9", MONTH = "October", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359993"} @article{bb365824, AUTHOR = "Arulananth, T.S. and Baskar, M. and Anbarasu, V. and Thiagarajan, R. and Rajendran, T. and Balaji, A.", TITLE = "Multi party secure data access management in cloud using user centric block chain data encryption", JOURNAL = PRL, VOLUME = "152", YEAR = "2021", PAGES = "295-301", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359994"} @article{bb365825, AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.", TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models", JOURNAL = PRL, VOLUME = "152", YEAR = "2021", PAGES = "428-435", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359995"} @article{bb365826, AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.", TITLE = "Protection motivation theory using multi-factor authentication for providing security over social networking sites", JOURNAL = PRL, VOLUME = "152", YEAR = "2021", PAGES = "218-224", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359996"} @article{bb365827, AUTHOR = "Wei, S.M. and Pan, J.H.", TITLE = "Resilience of Urban Network Structure in China: The Perspective of Disruption", JOURNAL = IJGI, VOLUME = "10", YEAR = "2021", NUMBER = "12", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359997"} @article{bb365828, AUTHOR = "Saveetha, D. and Maragatham, G.", TITLE = "Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning", JOURNAL = PRL, VOLUME = "153", YEAR = "2022", PAGES = "24-28", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359998"} @article{bb365829, AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.", TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection", JOURNAL = IEICE, VOLUME = "E105-D", YEAR = "2022", NUMBER = "5", MONTH = "May", PAGES = "1024-1038", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT359999"} @article{bb365830, AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.", TITLE = "Cloud security based attack detection using transductive learning integrated with Hidden Markov Model", JOURNAL = PRL, VOLUME = "157", YEAR = "2022", PAGES = "16-26", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360000"} @article{bb365831, AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.", TITLE = "Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)", JOURNAL = PRL, VOLUME = "156", YEAR = "2022", PAGES = "142-151", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360001"} @article{bb365832, AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.", TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service Attacks", JOURNAL = SMCS, VOLUME = "52", YEAR = "2022", NUMBER = "5", MONTH = "May", PAGES = "3326-3336", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360002"} @article{bb365833, AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.T.", TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification", JOURNAL = RS, VOLUME = "14", YEAR = "2022", NUMBER = "9", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360003"} @article{bb365834, AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.", TITLE = "Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout", JOURNAL = PRL, VOLUME = "159", YEAR = "2022", PAGES = "132-139", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360004"} @article{bb365835, AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.", TITLE = "Automated Software Defect Detection and Identification in Vehicular Embedded Systems", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "6963-6973", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360005"} @article{bb365836, AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.", TITLE = "An Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "6608-6620", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360006"} @article{bb365837, AUTHOR = "dos Santos Roque, A. and Jazdi, N. and de Freitas, E.P. and Pereira, C.E.", TITLE = "A Fault Modeling Based Runtime Diagnostic Mechanism for Vehicular Distributed Control Systems", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "7220-7232", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360007"} @article{bb365838, AUTHOR = "Taguchi, S. and Yoshimura, T.", TITLE = "Online Estimation and Prediction of Large-Scale Network Traffic From Sparse Probe Vehicle Data", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "7233-7243", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360008"} @article{bb365839, AUTHOR = "Cai, X.Q. and Wu, C. and Sheng, J. and Wang, Y.M. and Ai, B.", TITLE = "Spectrum Situation Awareness Based on Time-Series Depth Networks for LTE-R Communication System", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "7", MONTH = "July", PAGES = "8629-8640", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360009"} @article{bb365840, AUTHOR = "Kye, H. and Kim, M. and Kwon, M.", TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised Learning Approach", JOURNAL = SPLetters, VOLUME = "29", YEAR = "2022", PAGES = "1908-1912", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360010"} @article{bb365841, AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.", TITLE = "Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system", JOURNAL = PR, VOLUME = "132", YEAR = "2022", PAGES = "108912", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360011"} @article{bb365842, AUTHOR = "He, Y.C. and Jia, Z.J. and Hu, M.S. and Cui, C. and Cheng, Y. and Yang, Y.Y.", TITLE = "The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "9", MONTH = "September", PAGES = "16833-16841", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360012"} @article{bb365843, AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.", TITLE = "Effective Intrusion Detection and Prevention for the Commercial Vehicle SAE J1939 CAN Bus", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "10", MONTH = "October", PAGES = "17425-17439", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360013"} @article{bb365844, AUTHOR = "Sathish, N. and Valarmathi, N.", TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's chi-squared distribution and decision tree classifiers", JOURNAL = PRL, VOLUME = "162", YEAR = "2022", PAGES = "15-21", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360014"} @article{bb365845, AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.", TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks", JOURNAL = ITS, VOLUME = "23", YEAR = "2022", NUMBER = "11", MONTH = "November", PAGES = "22596-22606", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360015"} @inproceedings{bb365846, AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.", TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior Profiling", BOOKTITLE = "ICPR22", YEAR = "2022", PAGES = "1865-1870", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360016"} @article{bb365847, AUTHOR = "Wang, K. and Zhang, A. and Sun, H.R. and Wang, B.L.", TITLE = "Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "2", MONTH = "February", PAGES = "1843-1854", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360017"} @article{bb365848, AUTHOR = "Rajapaksha, S. and Kalutarage, H. and Al Kadri, M.O. and Petrovski, A. and Madzudzo, G. and Cheah, M.", TITLE = "AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey", JOURNAL = Surveys, VOLUME = "55", YEAR = "2023", NUMBER = "11", MONTH = "February", PAGES = "xx-yy", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360018"} @article{bb365849, AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Al Otaibi, S. and Tian, Z.H.", TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "7", MONTH = "July", PAGES = "7642-7652", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360019"} @article{bb365850, AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.", TITLE = "Detecting Android Malware With Pre-Existing Image Classification Neural Networks", JOURNAL = SPLetters, VOLUME = "30", YEAR = "2023", PAGES = "858-862", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360020"} @article{bb365851, AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.", TITLE = "Distributed edge-event-triggered consensus of multi-agent system under DoS attack", JOURNAL = PRL, VOLUME = "174", YEAR = "2023", PAGES = "118-123", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360021"} @article{bb365852, AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z.L. and Deng, Z.Y. and Ling, X. and Xiang, W.", TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet traffic data", JOURNAL = PR, VOLUME = "146", YEAR = "2024", PAGES = "109999", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360022"} @article{bb365853, AUTHOR = "Lee, S. and Choi, W. and Jo, H.J. and Lee, D.H.", TITLE = "ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "12406-12421", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360023"} @article{bb365854, AUTHOR = "Zhou, J. and Xie, G.Q. and Zeng, H.B. and Zhang, W.Z. and Yang, L.T. and Alazab, M. and Li, R.", TITLE = "A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "12922-12932", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360024"} @article{bb365855, AUTHOR = "Chougule, A. and Kohli, V. and Chamola, V. and Yu, F.R.", TITLE = "Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "11", MONTH = "November", PAGES = "13068-13077", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360025"} @article{bb365856, AUTHOR = "Almutlaq, S. and Derhab, A. and Hassan, M.M. and Kaur, K.", TITLE = "Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15687-15701", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360026"} @article{bb365857, AUTHOR = "Zhang, J. and Gong, B. and Waqas, M. and Tu, S.S. and Chen, S.", TITLE = "Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15051-15065", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360027"} @article{bb365858, AUTHOR = "Anbalagan, S. and Raja, G. and Gurumoorthy, S. and Suresh, R.D. and Dev, K.", TITLE = "IIDS: Intelligent Intrusion Detection System for Sustainable Development in Autonomous Vehicles", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15866-15875", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360028"} @article{bb365859, AUTHOR = "Qian, Z.J. and Zhong, S. and Sun, G.F. and Xing, X.S. and Jin, Y.", TITLE = "A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15459-15467", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360029"} @article{bb365860, AUTHOR = "da Cruz, M.A.A. and Abbade, L.R. and Lorenz, P. and Mafra, S.B. and Rodrigues, J.J.P.C.", TITLE = "Detecting Compromised IoT Devices Through XGBoost", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "15392-15399", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360030"} @article{bb365861, AUTHOR = "Li, Y. and Zhu, L. and Wang, H.W. and Yu, F.R. and Tang, T. and Zhang, D.J.", TITLE = "Joint Security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "12", MONTH = "December", PAGES = "13948-13961", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360031"} @article{bb365862, AUTHOR = "Zahid, M.U. and Nisar, M.D. and Shah, M.H. and Hussain, S.A.", TITLE = "Specific Emitter Identification Based on Multi-Scale Multi-Dimensional Approximate Entropy", JOURNAL = SPLetters, VOLUME = "31", YEAR = "2024", PAGES = "850-854", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360032"} @article{bb365863, AUTHOR = "Cao, J.H. and Di, X.Q. and Liu, X. and Li, J.Q. and Li, Z. and Zhao, L. and Hawbani, A. and Guizani, M.", TITLE = "Anomaly Detection for In-Vehicle Network Using Self-Supervised Learning With Vehicle-Cloud Collaboration Update", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "7", MONTH = "July", PAGES = "7454-7466", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360033"} @article{bb365864, AUTHOR = "Prashanthi, M. and Mohan, M.C.", TITLE = "Hybrid Optimization-Based Neural Network Classifier for Software Defect Prediction", JOURNAL = IJIG, VOLUME = "24", YEAR = "2024", NUMBER = "4", MONTH = "July", PAGES = "2450045", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360034"} @article{bb365865, AUTHOR = "Shumovskaia, V. and Kayaalp, M. and Sayed, A.H.", TITLE = "Detection of Malicious Agents in Social Learning", JOURNAL = SPLetters, VOLUME = "31", YEAR = "2024", PAGES = "1745-1749", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360035"} @article{bb365866, AUTHOR = "Lavanya, V. and Sekhar, P.C.", TITLE = "Efficient Cybersecurity Model Using Wavelet Deep CNN and Enhanced Rain Optimization Algorithm", JOURNAL = IJIG, VOLUME = "24", YEAR = "2024", NUMBER = "4", MONTH = "July", PAGES = "2450048", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360036"} @article{bb365867, AUTHOR = "Kong, X.Y. and Yang, G.H.", TITLE = "Anti-Watermarking Stealthy Deception Attacks Against Networked Unmanned Surface Vehicles", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "9", MONTH = "September", PAGES = "12835-12840", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360037"} @article{bb365868, AUTHOR = "Darabi, B. and Bag Mohammadi, M. and Karami, M.", TITLE = "A micro Reinforcement Learning architecture for Intrusion Detection Systems", JOURNAL = PRL, VOLUME = "185", YEAR = "2024", PAGES = "81-86", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360038"} @article{bb365869, AUTHOR = "Yan, P. and Tan, S.Q. and Wang, M. and Huang, J.W.", TITLE = "Enhanced Dynamic Analysis for Malware Detection With Gradient Attack", JOURNAL = SPLetters, VOLUME = "31", YEAR = "2024", PAGES = "2825-2829", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360039"} @article{bb365870, AUTHOR = "He, X.F. and Li, L.X. and Peng, H.P. and Tong, F.H.", TITLE = "An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "10", MONTH = "October", PAGES = "14958-14972", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360040"} @article{bb365871, AUTHOR = "Prathibha, L. and Fatima, K.", TITLE = "A Novel High-Speed Data Encryption Scheme for Internet of Medical Things Using Modified Elliptic Curve Diffie-Hellman and Advance Encryption Standard", JOURNAL = IJIG, VOLUME = "24", YEAR = "2024", NUMBER = "5", MONTH = "September", PAGES = "2340004", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360041"} @article{bb365872, AUTHOR = "Cai, X. and Shi, K. and Sun, Y.B. and Cao, J.D. and Kwon, O.M. and Qiao, C. and Tian, Z.H.", TITLE = "Design of Intelligent Control Under Machine Learning Supervision and Signal Compression Mechanism Design for NCSs Under DoS Attacks", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "10", MONTH = "October", PAGES = "15116-15121", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360042"} @article{bb365873, AUTHOR = "Qi, W.H. and Yin, H. and Park, J.H. and Wu, Z.G. and Yan, H.C.", TITLE = "Intelligent Finite-Time Protocol-Based Stabilization for Networked UMV Systems With DoS Attacks", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "11", MONTH = "November", PAGES = "16734-16744", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360043"} @article{bb365874, AUTHOR = "Gao, D. and Ou, L.Y. and Liu, Y. and Yang, Q. and Wang, H.G.", TITLE = "DeepSpoof: Deep Reinforcement Learning-Based Spoofing Attack in Cross-Technology Multimedia Communication", JOURNAL = MultMed, VOLUME = "26", YEAR = "2024", PAGES = "10879-10891", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360044"} @article{bb365875, AUTHOR = "Yu, W. and Huang, D.Q. and Wang, X.L. and Xu, K.", TITLE = "Recovery-Based Distributed Adaptive ILC With Fading Compensation for MHSTs Under DoS Attacks: A Model-Free Approach", JOURNAL = ITS, VOLUME = "25", YEAR = "2024", NUMBER = "12", MONTH = "December", PAGES = "20535-20546", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360045"} @article{bb365876, AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.", TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks", JOURNAL = IEEE_Int_Sys, VOLUME = "33", YEAR = "2018", NUMBER = "2", MONTH = "March", PAGES = "29-39", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360046"} @article{bb365877, AUTHOR = "Liu, G. and Tian, E. and Zhao, X. and Chen, H.", TITLE = "Critical-Area-Based Stochastic DoS Attack Strategy Design Against Remote State Estimation in Multi-Area Power Systems", JOURNAL = SPLetters, VOLUME = "32", YEAR = "2025", PAGES = "291-295", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360047"} @article{bb365878, AUTHOR = "Jin, Z.W. and Ma, M. and Wang, Z. and Sun, C.Y.", TITLE = "Optimal Transmission Schedule With Privacy Preservation for Cyber-Physical System Against Eavesdropping Attack", JOURNAL = SPLetters, VOLUME = "32", YEAR = "2025", PAGES = "436-440", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360048"} @article{bb365879, AUTHOR = "Pan, X.D. and Zhang, M. and Yan, Y.F. and Zhang, S.Y. and Yang, M.", TITLE = "Matryoshka: Exploiting the Over-Parametrization of Deep Learning Models for Covert Data Transmission", JOURNAL = PAMI, VOLUME = "47", YEAR = "2025", NUMBER = "2", MONTH = "February", PAGES = "663-678", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360049"} @article{bb365880, AUTHOR = "Huang, Y.F. and Ma, M.", TITLE = "AILL-IDS: An Automatic Incremental Lifetime Learning Intrusion Detection System for Vehicular Ad Hoc Networks", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "2", MONTH = "February", PAGES = "2669-2678", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360050"} @article{bb365881, AUTHOR = "Carletti, V. and Foggia, P. and Rosa, F. and Vento, M.", TITLE = "Detecting malicious IoT network communication through Graph Neural Networks in real-world conditions", JOURNAL = PRL, VOLUME = "189", YEAR = "2025", PAGES = "92-98", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360051"} @article{bb365882, AUTHOR = "Sun, H. and Wang, J.Z. and Weng, J. and Tan, W.H.", TITLE = "KG-ID: Knowledge Graph-Based Intrusion Detection on In-Vehicle Network", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "4", MONTH = "April", PAGES = "4988-5000", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360052"} @article{bb365883, AUTHOR = "Adelipour, S. and Razgahi, E.A.D. and Haeri, M.", TITLE = "Vulnerability Mitigation of Urban Traffic Control Against Cyberattacks Using Secure Multi-Party Computation", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "4", MONTH = "April", PAGES = "4568-4578", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360053"} @article{bb365884, AUTHOR = "Kayyidavazhiyil, A.", TITLE = "Combined Tri-Classifiers for IoT Botnet Detection with Tuned Training Weights", JOURNAL = IJIG, VOLUME = "25", YEAR = "2025", NUMBER = "2", MONTH = "March", PAGES = "2550007", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360054"} @article{bb365885, AUTHOR = "Wazid, M. and Singh, J. and Pandey, C. and Sherratt, R.S. and Das, A.K. and Giri, D. and Park, Y.", TITLE = "Explainable Deep Learning-Enabled Malware Attack Detection for IoT-Enabled Intelligent Transportation Systems", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "5", MONTH = "May", PAGES = "7231-7244", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360055"} @article{bb365886, AUTHOR = "Whig, P. and Sharma, R.", TITLE = "Synergising machine learning and blockchain for enhanced fraud detection", JOURNAL = IJCVR, VOLUME = "15", YEAR = "2025", NUMBER = "3", PAGES = "269-285", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360056"} @article{bb365887, AUTHOR = "Chandan, M. and Santhi, S.G. and Rao, T.S.", TITLE = "Combined Shallow and Deep Learning Models for Malware Detection in Wsn", JOURNAL = IJIG, VOLUME = "25", YEAR = "2025", NUMBER = "4", MONTH = "July", PAGES = "2550034", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360057"} @article{bb365888, AUTHOR = "Wei, L. and Yang, J. and Jin, H. and Cui, J. and Li, J.X. and He, D.", TITLE = "Sustainable Learning-Based Intrusion Detection System for VANETs", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "7", MONTH = "July", PAGES = "10080-10091", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360058"} @article{bb365889, AUTHOR = "Liu, Y.Y. and Xue, L. and Wang, S. and Luo, X. and Zhao, K. and Jing, P.F. and Ma, X.B. and Tang, Y. and Zhou, H.Y.", TITLE = "Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "7", MONTH = "July", PAGES = "10979-11009", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360059"} @article{bb365890, AUTHOR = "Zhang, R. and Liu, L. and Park, J.H. and Zeng, D.Q. and Xie, X.P.", TITLE = "Secure Consensus for Multi-Agent Systems With Euler-Lagrange Dynamics and Multiple DoS Attacks", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "7", MONTH = "July", PAGES = "10008-10018", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360060"} @article{bb365891, AUTHOR = "Ahmed, S. and Anisi, M.H.", TITLE = "AIDAS: AI-Enhanced Intrusion Detection and Authentication for Autonomous Vehicles", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "8", MONTH = "August", PAGES = "12548-12557", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360061"} @article{bb365892, AUTHOR = "Hakeem, S.A.A. and Kim, H.", TITLE = "Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "8", MONTH = "August", PAGES = "11137-11205", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360062"} @article{bb365893, AUTHOR = "Gupta, N. and Malladi, R. and Naganjaneyulu, S. and Balhara, S.", TITLE = "Optimized Attention Induced Multi Head Convolutional Neural Network for Intrusion Detection Systems in Vehicular Ad Hoc Networks", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "8", MONTH = "August", PAGES = "11957-11966", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360063"} @article{bb365894, AUTHOR = "Ma, J.H. and Du, Y.F. and Liu, M.L. and Luo, X.Y. and Li, J.", TITLE = "AIBW: Average Interval-Based Watermarking for Tracking Down Network Attacks", JOURNAL = SPLetters, VOLUME = "32", YEAR = "2025", PAGES = "2977-2981", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360064"} @article{bb365895, AUTHOR = "Mehdi, S.A. and Hussain, S.Z.", TITLE = "Experimentative analysis of artificial immune system algorithms for intrusion detection in IoT networks", JOURNAL = IJCVR, VOLUME = "15", YEAR = "2025", NUMBER = "5", PAGES = "577-587", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360065"} @article{bb365896, AUTHOR = "Wang, X. and Ma, L. and Das, S.K. and Liu, Z.H.", TITLE = "ReMeNet: A Memory-Enhanced GAN Model for Intrusion Detection in Transportation Cyber-Physical Systems", JOURNAL = ITS, VOLUME = "26", YEAR = "2025", NUMBER = "9", MONTH = "September", PAGES = "14264-14276", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360066"} @inproceedings{bb365897, AUTHOR = "Berqia, A. and Bouijij, H. and Merimi, A. and Ouaggane, A.", TITLE = "Detecting DDoS Attacks using Machine Learning in IoT Environment", BOOKTITLE = ISCV24, YEAR = "2024", PAGES = "1-8", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360067"} @inproceedings{bb365898, AUTHOR = "Hsu, T.C. and Lu, H.S.", TITLE = "Designing a Secure and Scalable Service Model Using Blockchain and MQTT for IoT Devices", BOOKTITLE = IoTDesign24, YEAR = "2024", PAGES = "645-653", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360068"} @inproceedings{bb365899, AUTHOR = "Kannan, B.B. and Sriramulu, S.", TITLE = "Hybrid Convolutional Neural Networks To Create An Attack Detection Framework For A Wireless Sensor Network Based Health Care Application", BOOKTITLE = ICCVMI23, YEAR = "2023", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT360069"}