@inproceedings{bb375600,
        AUTHOR = "Takahashi, T. and Ide, T.",
        TITLE = "Predicting battery life from usage trajectory patterns",
        BOOKTITLE = ICPR12,
        YEAR = "2012",
        PAGES = "2946-2949",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369700"}

@inproceedings{bb375601,
        AUTHOR = "Hido, S. and Morimura, T.",
        TITLE = "Temporal feature selection for time-series prediction",
        BOOKTITLE = ICPR12,
        YEAR = "2012",
        PAGES = "3557-3560",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369701"}

@inproceedings{bb375602,
        AUTHOR = "Liu, S. and Yamada, M. and Collier, N. and Sugiyama, M.",
        TITLE = "Change-Point Detection in Time-Series Data by Relative Density-Ratio
Estimation",
        BOOKTITLE = SSSPR12,
        YEAR = "2012",
        PAGES = "363-372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369702"}

@inproceedings{bb375603,
        AUTHOR = "Deng, J.Q. and Chen, D.R.",
        TITLE = "Hooke and jeeves algorithm for linear least-square problems in sparse
signal reconstruction",
        BOOKTITLE = IASP11,
        YEAR = "2011",
        PAGES = "16-20",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369703"}

@inproceedings{bb375604,
        AUTHOR = "Rodriguez, N. and Rubio, J. and Yanez, E.",
        TITLE = "Wavelet Autoregressive Model for Monthly Sardines Catches Forecasting
Off Central Southern Chile",
        BOOKTITLE = CIARP11,
        YEAR = "2011",
        PAGES = "654-663",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369704"}

@inproceedings{bb375605,
        AUTHOR = "Jibia, A.U. and Salami, M.J.E. and Khalifa, O.O. and Elfaki, F.",
        TITLE = "Cramer-Rao Lower Bound for Parameter Estimation of Multiexponential
Signals",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369705"}

@inproceedings{bb375606,
        AUTHOR = "Wen, F. and Wan, Q.",
        TITLE = "Time Delay Estimation Based on Mutual Information Estimation",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369706"}

@inproceedings{bb375607,
        AUTHOR = "Li, X.M. and Tao, R. and Wang, Y.",
        TITLE = "Time Delay Estimation Based on the Fractional Fourier Transform in the
Passive System",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369707"}

@inproceedings{bb375608,
        AUTHOR = "Wang, T. and Wan, Q.",
        TITLE = "Sparse Signal Recovery via Multi-Residual Based Greedy Method",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369708"}

@inproceedings{bb375609,
        AUTHOR = "Li, Z.L. and Chen, H. and Yao, C. and Li, J. and Yang, N.",
        TITLE = "Sparse Signal Recovery via Optimized Orthogonal Matching Pursuit",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369709"}

@inproceedings{bb375610,
        AUTHOR = "Hanias, M.P. and Karras, D.A. and Mobarak, M.",
        TITLE = "Non-Linear Analysis and Time Series Prediction of an Electrical
Analogue of the Mechanical Double Pendulum",
        BOOKTITLE = WSSIP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369710"}

@inproceedings{bb375611,
        AUTHOR = "Nelson, D. and Loughlin, P.J. and Cristobal, G. and Cohen, L.",
        TITLE = "Time-frequency methods for biological signal estimation",
        BOOKTITLE = ICPR00,
        YEAR = "2000",
        PAGES = "Vol III: 110-114",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020rre2.html#TT369711"}

@article{bb375612,
        AUTHOR = "Xing, D.S. and Girolami, M.A.",
        TITLE = "Employing Latent Dirichlet Allocation for fraud detection in
telecommunications",
        JOURNAL = PRL,
        VOLUME = "28",
        YEAR = "2007",
        NUMBER = "13",
        MONTH = "October",
        PAGES = "1727-1734",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369712"}

@article{bb375613,
        AUTHOR = "Celikoglu, H.B. and Gedizlioglu, E. and Dell'Orco, M.",
        TITLE = "A Node-Based Modeling Approach for the Continuous Dynamic Network
Loading Problem",
        JOURNAL = ITS,
        VOLUME = "10",
        YEAR = "2009",
        NUMBER = "1",
        MONTH = "March",
        PAGES = "165-174",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369713"}

@article{bb375614,
        AUTHOR = "Beghdad, R.",
        TITLE = "Modelling intrusion detection as an allocation problem",
        JOURNAL = PRL,
        VOLUME = "30",
        YEAR = "2009",
        NUMBER = "8",
        MONTH = "June",
        PAGES = "774-779",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369714"}

@article{bb375615,
        AUTHOR = "Thinh, T.N. and Kittitornkun, S. and Tomiyama, S.",
        TITLE = "PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS",
        JOURNAL = IEICE,
        VOLUME = "E92-D",
        YEAR = "2009",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1049-1061",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369715"}

@article{bb375616,
        AUTHOR = "Kim, K.J. and Tsiftsis, T.A.",
        TITLE = "Performance Analysis of Cyclically Prefixed Single-Carrier
Transmissions With Outdated Opportunistic User Selection",
        JOURNAL = SPLetters,
        VOLUME = "17",
        YEAR = "2010",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "847-850",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369716"}

@article{bb375617,
        AUTHOR = "Taysi, Z.C. and Yavuz, A.G.",
        TITLE = "Routing Protocols for GeoNet: A Survey",
        JOURNAL = ITS,
        VOLUME = "13",
        YEAR = "2012",
        NUMBER = "2",
        MONTH = "June",
        PAGES = "939-954",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369717"}

@article{bb375618,
        AUTHOR = "Huang, Y.C. and Rao, B.D.",
        TITLE = "Sum Rate Analysis of One-Pico-Inside OFDMA Network With Opportunistic
Scheduling and Selective Feedback",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "383-386",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369718"}

@article{bb375619,
        AUTHOR = "Nguyen, H.X. and Roughan, M.",
        TITLE = "Improving Hidden Markov Model Inferences With Private Data From
Multiple Observers",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "696-699",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369719"}

@article{bb375620,
        AUTHOR = "Krishnamurthy, V. and Hoiles, W.",
        TITLE = "Afriat's Test for Detecting Malicious Agents",
        JOURNAL = SPLetters,
        VOLUME = "19",
        YEAR = "2012",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "801-804",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369720"}

@article{bb375621,
        AUTHOR = "Wang, C. and Li, Y. and Jin, D.P. and Chen, S.",
        TITLE = "On the Serviceability of Mobile Vehicular Cloudlets in a Large-Scale
Urban Environment",
        JOURNAL = ITS,
        VOLUME = "17",
        YEAR = "2016",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "2960-2970",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369721"}

@article{bb375622,
        AUTHOR = "Romero Zurita, N. and McLernon, D. and Ghogho, M. and Swami, A.",
        TITLE = "PHY Layer Security Based on Protected Zone and Artificial Noise",
        JOURNAL = SPLetters,
        VOLUME = "20",
        YEAR = "2013",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "487-490",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369722"}

@article{bb375623,
        AUTHOR = "Chandrasekaran, S. and Vaideeswaran, J.",
        TITLE = "Meta-scheduler using agents for fault tolerance in computational grid",
        JOURNAL = IJCVR,
        VOLUME = "4",
        YEAR = "2014",
        NUMBER = "4",
        PAGES = "294-329",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369723"}

@article{bb375624,
        AUTHOR = "Shen, Y. and Liu, Y.T. and Liu, J. and Yang, H.W. and Yang, D.C.",
        TITLE = "A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error
Protection Rateless Code",
        JOURNAL = IEICE,
        VOLUME = "E97-D",
        YEAR = "2014",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2903-2911",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369724"}

@article{bb375625,
        AUTHOR = "Bhuyan, M.H. and Bhattacharyya, D.K. and Kalita, J.K.",
        TITLE = "An empirical evaluation of information metrics for low-rate and
high-rate DDoS attack detection",
        JOURNAL = PRL,
        VOLUME = "51",
        YEAR = "2015",
        NUMBER = "1",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369725"}

@article{bb375626,
        AUTHOR = "Fu, B. and Xiao, Y. and Liang, X.N. and Chen, C.L.P.",
        TITLE = "Bio-inspired Group Modeling and Analysis for Intruder Detection in
Mobile Sensor/Robotic Networks",
        JOURNAL = Cyber,
        VOLUME = "45",
        YEAR = "2015",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "103-115",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369726"}

@article{bb375627,
        AUTHOR = "Hui, H. and Swindlehurst, A.L. and Li, G.B. and Liang, J.L.",
        TITLE = "Secure Relay and Jammer Selection for Physical Layer Security",
        JOURNAL = SPLetters,
        VOLUME = "22",
        YEAR = "2015",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1147-1151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369727"}

@article{bb375628,
        AUTHOR = "Meng, X.M. and Wu, S. and Kuang, L.L. and Lu, J.H.",
        TITLE = "An Expectation Propagation Perspective on Approximate Message Passing",
        JOURNAL = SPLetters,
        VOLUME = "22",
        YEAR = "2015",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1194-1197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369728"}

@article{bb375629,
        AUTHOR = "Rawat, D.B. and Bajracharya, C.",
        TITLE = "Detection of False Data Injection Attacks in Smart Grid Communication
Systems",
        JOURNAL = SPLetters,
        VOLUME = "22",
        YEAR = "2015",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "1652-1656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369729"}

@article{bb375630,
        AUTHOR = "Rastegarnia, A. and Khalili, A. and Bazzi, W.M. and Sanei, S.",
        TITLE = "An incremental LMS network with reduced communication delay",
        JOURNAL = SIViP,
        VOLUME = "10",
        YEAR = "2016",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "769-775",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369730"}

@article{bb375631,
        AUTHOR = "Brandt, R. and Mochaourab, R. and Bengtsson, M.",
        TITLE = "Globally Optimal Base Station Clustering in Interference
Alignment-Based Multicell Networks",
        JOURNAL = SPLetters,
        VOLUME = "23",
        YEAR = "2016",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "512-516",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369731"}

@article{bb375632,
        AUTHOR = "Jo, H.G. and Son, T.Y. and Jeong, S.Y. and Kang, S.J.",
        TITLE = "Proximity-Based Asynchronous Messaging Platform for Location-Based
Internet of Things Service",
        JOURNAL = IJGI,
        VOLUME = "5",
        YEAR = "2016",
        NUMBER = "7",
        PAGES = "116",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369732"}

@article{bb375633,
        AUTHOR = "Utkovski, Z. and Simeone, O. and Dimitrova, T. and Popovski, P.",
        TITLE = "Random Access in C-RAN for User Activity Detection With
Limited-Capacity Fronthaul",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "17-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369733"}

@article{bb375634,
        AUTHOR = "Yu, N.Y.",
        TITLE = "Indistinguishability of Compressed Encryption With Circulant Matrices
for Wireless Security",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "181-185",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369734"}

@article{bb375635,
        AUTHOR = "Chen, Q. and Kang, D. and He, Y. and Chang, T.H. and Liu, Y.F.",
        TITLE = "Joint Power and Admission Control Based on Channel Distribution
Information: A Novel Two-Timescale Approach",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "196-200",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369735"}

@article{bb375636,
        AUTHOR = "Li, W. and Wang, X. and Moran, B.",
        TITLE = "Wireless Signal Travel Distance Estimation Using Non-Coprime
Wavelengths",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "27-31",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369736"}

@article{bb375637,
        AUTHOR = "Kwon, M. and Park, H.",
        TITLE = "Distributed Network Formation Strategy for Network Coding Based
Wireless Networks",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "432-436",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369737"}

@inproceedings{bb375638,
        AUTHOR = "Larhlimi, A. and Mestari, M. and El Khaili, M.",
        TITLE = "GPU parallel neural hierarchical multi objective solver for burst
routing and wavelength assignment",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369738"}

@article{bb375639,
        AUTHOR = "Yin, H. and Zhang, X. and Zhao, S. and Luo, Y. and Tian, C. and Sekar, V.",
        TITLE = "Tradeoffs Between Cost and Performance for CDN Provisioning Based on
Coordinate Transformation",
        JOURNAL = MultMed,
        VOLUME = "19",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2583-2596",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369739"}

@article{bb375640,
        AUTHOR = "Guerreiro, P. and Xavier, J.",
        TITLE = "Distributed Learning With Time Correlated Information",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "1636-1640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369740"}

@article{bb375641,
        AUTHOR = "Hu, D. and Zhang, Q. and Yang, P. and Qin, J.",
        TITLE = "Proactive Monitoring via Jamming in Amplify-and-Forward Relay
Networks",
        JOURNAL = SPLetters,
        VOLUME = "24",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "1714-1718",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369741"}

@article{bb375642,
        AUTHOR = "AlEroud, A.F. and Karabatis, G.",
        TITLE = "Queryable Semantics to Detect Cyber-Attacks:
A Flow-Based Detection Approach",
        JOURNAL = SMCS,
        VOLUME = "48",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "207-223",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369742"}

@article{bb375643,
        AUTHOR = "Kozik, R.",
        TITLE = "Distributing extreme learning machines with Apache Spark for
NetFlow-based malware activity detection",
        JOURNAL = PRL,
        VOLUME = "101",
        YEAR = "2018",
        NUMBER = "1",
        PAGES = "14-20",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369743"}

@article{bb375644,
        AUTHOR = "Ghofrani, F. and Keshavarz Haddad, A. and Jamshidi, A.",
        TITLE = "A new probabilistic classifier based on decomposable models with
application to internet traffic",
        JOURNAL = PR,
        VOLUME = "77",
        YEAR = "2018",
        PAGES = "1-11",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369744"}

@article{bb375645,
        AUTHOR = "Japkowicz, N. and Elovici, Y.",
        TITLE = "Introduction to the Special Issue on Data Mining for Cybersecurity",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "3-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369745"}

@article{bb375646,
        AUTHOR = "Noble, J. and Adams, N.",
        TITLE = "Real-Time Dynamic Network Anomaly Detection",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "5-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369746"}

@article{bb375647,
        AUTHOR = "Grolman, E. and Finkelshtein, A. and Puzis, R. and Shabtai, A. and Celniker, G. and Katzir, Z. and Rosenfeld, L.",
        TITLE = "Transfer Learning for User Action Identication in Mobile Apps via
Encrypted Traffic Analysis",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "40-53",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369747"}

@article{bb375648,
        AUTHOR = "Li, B. and Yao, Y. and Chen, H. and Li, Y. and Huang, S.",
        TITLE = "Wireless Information Surveillance and Intervention Over Multiple
Suspicious Links",
        JOURNAL = SPLetters,
        VOLUME = "25",
        YEAR = "2018",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "1131-1135",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369748"}

@article{bb375649,
        AUTHOR = "Meng, W.",
        TITLE = "Intrusion Detection in the Era of IoT: Building Trust via Traffic
Filtering and Sampling",
        JOURNAL = Computer,
        VOLUME = "51",
        YEAR = "2018",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "36-43",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369749"}

@article{bb375650,
        AUTHOR = "Jimenez Tejero, C.E. and Sallares, V. and Ranero, C.R.",
        TITLE = "Appraisal of Instantaneous Phase-Based Functions in Adjoint Waveform
Inversion",
        JOURNAL = GeoRS,
        VOLUME = "56",
        YEAR = "2018",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "5185-5197",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369750"}

@article{bb375651,
        AUTHOR = "Chen, C.H. and Lo, K.R.",
        TITLE = "Applications of Internet of Things",
        JOURNAL = IJGI,
        VOLUME = "7",
        YEAR = "2018",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369751"}

@article{bb375652,
        AUTHOR = "Mousavinejad, E. and Yang, F. and Han, Q. and Vlacic, L.",
        TITLE = "A Novel Cyber Attack Detection Method in Networked Control Systems",
        JOURNAL = Cyber,
        VOLUME = "48",
        YEAR = "2018",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "3254-3264",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369752"}

@article{bb375653,
        AUTHOR = "Shang, Y.",
        TITLE = "Subgraph Robustness of Complex Networks Under Attacks",
        JOURNAL = SMCS,
        VOLUME = "49",
        YEAR = "2019",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "821-832",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369753"}

@article{bb375654,
        AUTHOR = "Phetlasy, S. and Ohzahata, S. and Wu, C. and Kato, T.",
        TITLE = "A Sequential Classifiers Combination Method to Reduce False Negative
for Intrusion Detection System",
        JOURNAL = IEICE,
        VOLUME = "E102-D",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369754"}

@article{bb375655,
        AUTHOR = "Gao, N. and Qin, Z. and Jing, X.",
        TITLE = "Pilot Contamination Attack Detection and Defense Strategy in Wireless
Communications",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "938-942",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369755"}

@article{bb375656,
        AUTHOR = "Cho, K. and Lee, S. and Khisti, A.",
        TITLE = "Effect of User Cooperation on Smart Meter Privacy With Rechargeable
Batteries",
        JOURNAL = SPLetters,
        VOLUME = "26",
        YEAR = "2019",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "971-975",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369756"}

@article{bb375657,
        AUTHOR = "Antal, M. and Egyed Zsigmond, E.",
        TITLE = "Intrusion detection using mouse dynamics",
        JOURNAL = IET-Bio,
        VOLUME = "8",
        YEAR = "2019",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "285-294",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369757"}

@article{bb375658,
        AUTHOR = "Castano, F. and Strzelczak, S. and Villalonga, A. and Haber, R.E. and Kossakowska, J.",
        TITLE = "Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things
Data: A Review and Case Study",
        JOURNAL = RS,
        VOLUME = "11",
        YEAR = "2019",
        NUMBER = "19",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369758"}

@article{bb375659,
        AUTHOR = "Ma, W. and Zhang, X.Y. and Xin, Y. and Li, S.Z.",
        TITLE = "Study on short-term network forecasting based on SVM-MFA algorithm",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102646",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369759"}

@article{bb375660,
        AUTHOR = "Meng, Y. and Tu, S.S. and Yu, J.L. and Huang, F.M.",
        TITLE = "Intelligent attack defense scheme based on DQL algorithm in mobile
fog computing",
        JOURNAL = JVCIR,
        VOLUME = "65",
        YEAR = "2019",
        PAGES = "102656",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369760"}

@article{bb375661,
        AUTHOR = "Hwang, K.",
        TITLE = "Blocking of operation of unauthorised software using MQTT",
        JOURNAL = IJCVR,
        VOLUME = "9",
        YEAR = "2019",
        NUMBER = "6",
        PAGES = "609-620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369761"}

@article{bb375662,
        AUTHOR = "Chen, X.F. and Yu, S.Z.",
        TITLE = "A Collaborative Intrusion Detection System against DDoS for SDN",
        JOURNAL = IEICE,
        VOLUME = "E99-D",
        YEAR = "2016",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "2395-2399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369762"}

@inproceedings{bb375663,
        AUTHOR = "Liu, C.B. and Tian, Y. and Xie, H.T.",
        TITLE = "Law Is Order: Protecting Multimedia Network Transmission by Game Theory
and Mechanism Design",
        BOOKTITLE = MMMod20,
        YEAR = "2020",
        PAGES = "II:651-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369763"}

@article{bb375664,
        AUTHOR = "Sun, L. and Wang, X. and Yang, A. and Huang, Z.",
        TITLE = "Radio Frequency Fingerprint Extraction Based on Multi-Dimension
Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "27",
        YEAR = "2020",
        PAGES = "471-475",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369764"}

@article{bb375665,
        AUTHOR = "Cho, M.K. and Kim, J.S. and Shin, J. and Shin, I.",
        TITLE = "Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black
and White Binary Image",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "896-900",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369765"}

@article{bb375666,
        AUTHOR = "Kim, K.",
        TITLE = "Intrusion Detection System Using Deep Learning and Its Application to
Wi-Fi Network",
        JOURNAL = IEICE,
        VOLUME = "E103-D",
        YEAR = "2020",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "1433-1447",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369766"}

@inproceedings{bb375667,
        AUTHOR = "Rahmani, F. and Touhami, N.A. and Taher, N. and Kchairi, A.B.",
        TITLE = "Reconfigurable Radiation Pattern Antenna with eight Switchable Beams
in Azimuth Plane for WLAN Wireless System",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369767"}

@article{bb375668,
        AUTHOR = "Dommel, J. and Utkovski, Z. and Simeone, O. and Stanczak, S.",
        TITLE = "Joint Source-Channel Coding for Semantics-Aware Grant-Free Radio
Access in IoT Fog Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "728-732",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369768"}

@article{bb375669,
        AUTHOR = "Park, S.H. and Jin, X.",
        TITLE = "Joint Secure Design of Downlink and D2D Cooperation Strategies for
Multi-User Systems",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "917-921",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369769"}

@article{bb375670,
        AUTHOR = "Wang, Z. and Blum, R.S.",
        TITLE = "Elimination of Undetectable Attacks on Natural Gas Networks",
        JOURNAL = SPLetters,
        VOLUME = "28",
        YEAR = "2021",
        PAGES = "1002-1005",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369770"}

@article{bb375671,
        AUTHOR = "Riddle Workman, E. and Evangelou, M. and Adams, N.M.",
        TITLE = "Multi-type relational clustering for enterprise cyber-security
networks",
        JOURNAL = PRL,
        VOLUME = "149",
        YEAR = "2021",
        PAGES = "172-178",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369771"}

@article{bb375672,
        AUTHOR = "Bhardwaj, J. and Yadav, V.K. and Trivedi, M.C. and Sen, A.K.",
        TITLE = "ARP cache poisoning: detection, mitigation and prevention schemes",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "4",
        PAGES = "357-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369772"}

@inproceedings{bb375673,
        AUTHOR = "Mejia Cabrera, H.I. and Paico Chileno, D. and Valdera Contreras, J.H. and Tuesta Monteza, V.A. and Forero, M.G.",
        TITLE = "Automatic Detection of Injection Attacks by Machine Learning in NoSQL
Databases",
        BOOKTITLE = MCPR21,
        YEAR = "2021",
        PAGES = "23-32",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369773"}

@article{bb375674,
        AUTHOR = "Amato, F. and Coppolino, L. and Mercaldo, F. and Moscato, F. and Nardone, R. and Santone, A.",
        TITLE = "CAN-Bus Attack Detection With Deep Learning",
        JOURNAL = ITS,
        VOLUME = "22",
        YEAR = "2021",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "5081-5090",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369774"}

@article{bb375675,
        AUTHOR = "Cho, Y.B.",
        TITLE = "Malware classifier for dynamic deep learning algorithm",
        JOURNAL = IJCVR,
        VOLUME = "11",
        YEAR = "2021",
        NUMBER = "5",
        PAGES = "486-496",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369775"}

@article{bb375676,
        AUTHOR = "Chou, D. and Jiang, M.",
        TITLE = "A Survey on Data-Driven Network Intrusion Detection",
        JOURNAL = Surveys,
        VOLUME = "54",
        YEAR = "2021",
        NUMBER = "9",
        MONTH = "October",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369776"}

@article{bb375677,
        AUTHOR = "Arulananth, T.S. and Baskar, M. and Anbarasu, V. and Thiagarajan, R. and Rajendran, T. and Balaji, A.",
        TITLE = "Multi party secure data access management in cloud using user centric
block chain data encryption",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "295-301",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369777"}

@article{bb375678,
        AUTHOR = "Vijayakumar, M. and Shiny Angel, T.S.",
        TITLE = "Performing Attack Halting Process with Digital Pattern and Proactive
Model Resolving the Security Issues in IoT Based Models",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "428-435",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369778"}

@article{bb375679,
        AUTHOR = "Mehraj, H. and Jayadevappa, D. and Haleem, S.L.A. and Parveen, R. and Madduri, A. and Ayyagari, M.R. and Dhabliya, D.",
        TITLE = "Protection motivation theory using multi-factor authentication for
providing security over social networking sites",
        JOURNAL = PRL,
        VOLUME = "152",
        YEAR = "2021",
        PAGES = "218-224",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369779"}

@article{bb375680,
        AUTHOR = "Wei, S.M. and Pan, J.H.",
        TITLE = "Resilience of Urban Network Structure in China:
The Perspective of Disruption",
        JOURNAL = IJGI,
        VOLUME = "10",
        YEAR = "2021",
        NUMBER = "12",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369780"}

@article{bb375681,
        AUTHOR = "Saveetha, D. and Maragatham, G.",
        TITLE = "Design of Blockchain enabled intrusion detection model for detecting
security attacks using deep learning",
        JOURNAL = PRL,
        VOLUME = "153",
        YEAR = "2022",
        PAGES = "24-28",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369781"}

@article{bb375682,
        AUTHOR = "Zhang, F. and Zhen, P.N. and Jing, D.S. and Tang, X.T. and Chen, H.B. and Yan, J.",
        TITLE = "SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature
Selection",
        JOURNAL = IEICE,
        VOLUME = "E105-D",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "1024-1038",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369782"}

@article{bb375683,
        AUTHOR = "Aoudni, Y. and Donald, C. and Farouk, A. and Sahay, K.B. and Babu, D.V. and Tripathi, V. and Dhabliya, D.",
        TITLE = "Cloud security based attack detection using transductive learning
integrated with Hidden Markov Model",
        JOURNAL = PRL,
        VOLUME = "157",
        YEAR = "2022",
        PAGES = "16-26",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369783"}

@article{bb375684,
        AUTHOR = "Balamurugan, E. and Mehbodniya, A. and Kariri, E. and Yadav, K. and Kumar, A. and Anul Haq, M.",
        TITLE = "Network optimization using defender system in cloud computing
security based intrusion detection system withgame theory deep neural
network (IDSGT-DNN)",
        JOURNAL = PRL,
        VOLUME = "156",
        YEAR = "2022",
        PAGES = "142-151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369784"}

@article{bb375685,
        AUTHOR = "Fei, Z.Y. and Wang, X.D. and Wang, Z.H.",
        TITLE = "Event-Based Fault Detection for Unmanned Surface Vehicles Subject to
Denial-of-Service Attacks",
        JOURNAL = SMCS,
        VOLUME = "52",
        YEAR = "2022",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "3326-3336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369785"}

@article{bb375686,
        AUTHOR = "Zhao, Y.R. and Wang, X. and Lin, Z.Y. and Huang, Z.T.",
        TITLE = "Multi-Classifier Fusion for Open-Set Specific Emitter Identification",
        JOURNAL = RS,
        VOLUME = "14",
        YEAR = "2022",
        NUMBER = "9",
        PAGES = "xx-yy",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369786"}

@article{bb375687,
        AUTHOR = "Huang, Y. and Li, Y. and Heyes, T. and Jourjon, G. and Cheng, A. and Seneviratne, S. and Thilakarathna, K. and Webb, D. and Xu, R.Y.D.",
        TITLE = "Task adaptive siamese neural networks for open-set recognition of
encrypted network traffic with bidirectional dropout",
        JOURNAL = PRL,
        VOLUME = "159",
        YEAR = "2022",
        PAGES = "132-139",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369787"}

@article{bb375688,
        AUTHOR = "Foss, K. and Couckuyt, I. and Baruta, A. and Mossoux, C.",
        TITLE = "Automated Software Defect Detection and Identification in Vehicular
Embedded Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6963-6973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369788"}

@article{bb375689,
        AUTHOR = "Gao, B. and Bu, B. and Zhang, W. and Li, X.",
        TITLE = "An Intrusion Detection Method Based on Machine Learning and State
Observer for Train-Ground Communication Systems",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "6608-6620",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369789"}

@article{bb375690,
        AUTHOR = "Kye, H. and Kim, M. and Kwon, M.",
        TITLE = "Hierarchical Detection of Network Anomalies: A Self-Supervised
Learning Approach",
        JOURNAL = SPLetters,
        VOLUME = "29",
        YEAR = "2022",
        PAGES = "1908-1912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369790"}

@article{bb375691,
        AUTHOR = "Al Yaseen, W.L. and Idrees, A.K. and Almasoudy, F.H.",
        TITLE = "Wrapper feature selection method based differential evolution and
extreme learning machine for intrusion detection system",
        JOURNAL = PR,
        VOLUME = "132",
        YEAR = "2022",
        PAGES = "108912",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369791"}

@article{bb375692,
        AUTHOR = "Jichici, C. and Groza, B. and Ragobete, R. and Murvay, P.S. and Andreica, T.",
        TITLE = "Effective Intrusion Detection and Prevention for the Commercial
Vehicle SAE J1939 CAN Bus",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "17425-17439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369792"}

@article{bb375693,
        AUTHOR = "Sathish, N. and Valarmathi, N.",
        TITLE = "Detection of Intrusion behavior in cloud applications using Pearson's
chi-squared distribution and decision tree classifiers",
        JOURNAL = PRL,
        VOLUME = "162",
        YEAR = "2022",
        PAGES = "15-21",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369793"}

@article{bb375694,
        AUTHOR = "Agrawal, K. and Alladi, T. and Agrawal, A. and Chamola, V. and Benslimane, A.",
        TITLE = "NovelADS: A Novel Anomaly Detection System for Intra-Vehicular
Networks",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "22596-22606",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369794"}

@inproceedings{bb375695,
        AUTHOR = "Shi, Z.X. and Wang, X.Y. and Liu, P.C.",
        TITLE = "NBP-MS: Malware Signature Generation Based on Network Behavior
Profiling",
        BOOKTITLE = "ICPR22",
        YEAR = "2022",
        PAGES = "1865-1870",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369795"}

@article{bb375696,
        AUTHOR = "Wang, Y.Z. and Liu, Q. and Mihankhah, E. and Lv, C. and Wang, D.",
        TITLE = "Detection and Isolation of Sensor Attacks for Autonomous Vehicles:
Framework, Algorithms, and Validation",
        JOURNAL = ITS,
        VOLUME = "23",
        YEAR = "2022",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "8247-8259",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369796"}

@article{bb375697,
        AUTHOR = "Li, S.D. and Li, Y. and Wu, X.B. and Al Otaibi, S. and Tian, Z.H.",
        TITLE = "Imbalanced Malware Family Classification Using Multimodal Fusion and
Weight Self-Learning",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7642-7652",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369797"}

@article{bb375698,
        AUTHOR = "Zhang, C.H. and Yin, S. and Li, H. and Cai, M.H. and Yuan, W.",
        TITLE = "Detecting Android Malware With Pre-Existing Image Classification
Neural Networks",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "858-862",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369798"}

@article{bb375699,
        AUTHOR = "Xue, S.S. and Li, H. and Cao, H. and Tan, J.K.",
        TITLE = "Distributed edge-event-triggered consensus of multi-agent system
under DoS attack",
        JOURNAL = PRL,
        VOLUME = "174",
        YEAR = "2023",
        PAGES = "118-123",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369799"}

Last update:Apr 6, 2026 at 11:28:57