@article{bb375700,
        AUTHOR = "Ding, Z.X. and Zhong, G.Q. and Qin, X.P. and Li, Q.Y. and Fan, Z.L. and Deng, Z.Y. and Ling, X. and Xiang, W.",
        TITLE = "MF-Net: Multi-frequency intrusion detection network for Internet
traffic data",
        JOURNAL = PR,
        VOLUME = "146",
        YEAR = "2024",
        PAGES = "109999",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369800"}

@article{bb375701,
        AUTHOR = "Lee, S. and Choi, W. and Jo, H.J. and Lee, D.H.",
        TITLE = "ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive
Intrusion Detection System",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12406-12421",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369801"}

@article{bb375702,
        AUTHOR = "Zhou, J. and Xie, G.Q. and Zeng, H.B. and Zhang, W.Z. and Yang, L.T. and Alazab, M. and Li, R.",
        TITLE = "A Model-Based Method for Enabling Source Mapping and Intrusion
Detection on Proprietary Can Bus",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "12922-12932",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369802"}

@article{bb375703,
        AUTHOR = "Chougule, A. and Kohli, V. and Chamola, V. and Yu, F.R.",
        TITLE = "Multibranch Reconstruction Error (MbRE) Intrusion Detection
Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc
Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "13068-13077",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369803"}

@article{bb375704,
        AUTHOR = "Almutlaq, S. and Derhab, A. and Hassan, M.M. and Kaur, K.",
        TITLE = "Two-Stage Intrusion Detection System in Intelligent Transportation
Systems Using Rule Extraction Methods From Deep Neural Networks",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15687-15701",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369804"}

@article{bb375705,
        AUTHOR = "Qian, Z.J. and Zhong, S. and Sun, G.F. and Xing, X.S. and Jin, Y.",
        TITLE = "A Formal Approach to Design and Security Verification of Operating
Systems for Intelligent Transportation Systems Based on Object Model",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15459-15467",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369805"}

@article{bb375706,
        AUTHOR = "da Cruz, M.A.A. and Abbade, L.R. and Lorenz, P. and Mafra, S.B. and Rodrigues, J.J.P.C.",
        TITLE = "Detecting Compromised IoT Devices Through XGBoost",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "15392-15399",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369806"}

@article{bb375707,
        AUTHOR = "Li, Y. and Zhu, L. and Wang, H.W. and Yu, F.R. and Tang, T. and Zhang, D.J.",
        TITLE = "Joint Security and Resources Allocation Scheme Design in Edge
Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "13948-13961",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369807"}

@article{bb375708,
        AUTHOR = "Zahid, M.U. and Nisar, M.D. and Shah, M.H. and Hussain, S.A.",
        TITLE = "Specific Emitter Identification Based on Multi-Scale
Multi-Dimensional Approximate Entropy",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "850-854",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369808"}

@article{bb375709,
        AUTHOR = "Prashanthi, M. and Mohan, M.C.",
        TITLE = "Hybrid Optimization-Based Neural Network Classifier for Software Defect
Prediction",
        JOURNAL = IJIG,
        VOLUME = "24",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "July",
        PAGES = "2450045",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369809"}

@article{bb375710,
        AUTHOR = "Shumovskaia, V. and Kayaalp, M. and Sayed, A.H.",
        TITLE = "Detection of Malicious Agents in Social Learning",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "1745-1749",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369810"}

@article{bb375711,
        AUTHOR = "Lavanya, V. and Sekhar, P.C.",
        TITLE = "Efficient Cybersecurity Model Using Wavelet Deep CNN and Enhanced Rain
Optimization Algorithm",
        JOURNAL = IJIG,
        VOLUME = "24",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "July",
        PAGES = "2450048",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369811"}

@article{bb375712,
        AUTHOR = "Darabi, B. and Bag Mohammadi, M. and Karami, M.",
        TITLE = "A micro Reinforcement Learning architecture for Intrusion Detection
Systems",
        JOURNAL = PRL,
        VOLUME = "185",
        YEAR = "2024",
        PAGES = "81-86",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369812"}

@article{bb375713,
        AUTHOR = "Yan, P. and Tan, S.Q. and Wang, M. and Huang, J.W.",
        TITLE = "Enhanced Dynamic Analysis for Malware Detection With Gradient Attack",
        JOURNAL = SPLetters,
        VOLUME = "31",
        YEAR = "2024",
        PAGES = "2825-2829",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369813"}

@article{bb375714,
        AUTHOR = "He, X.F. and Li, L.X. and Peng, H.P. and Tong, F.H.",
        TITLE = "An Efficient Image Privacy Preservation Scheme for Smart City
Applications Using Compressive Sensing and Multi-Level Encryption",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "14958-14972",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369814"}

@article{bb375715,
        AUTHOR = "Prathibha, L. and Fatima, K.",
        TITLE = "A Novel High-Speed Data Encryption Scheme for Internet of Medical
Things Using Modified Elliptic Curve Diffie-Hellman and Advance
Encryption Standard",
        JOURNAL = IJIG,
        VOLUME = "24",
        YEAR = "2024",
        NUMBER = "5",
        MONTH = "September",
        PAGES = "2340004",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369815"}

@article{bb375716,
        AUTHOR = "Cai, X. and Shi, K. and Sun, Y.B. and Cao, J.D. and Kwon, O.M. and Qiao, C. and Tian, Z.H.",
        TITLE = "Design of Intelligent Control Under Machine Learning Supervision and
Signal Compression Mechanism Design for NCSs Under DoS Attacks",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "15116-15121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369816"}

@article{bb375717,
        AUTHOR = "Qi, W.H. and Yin, H. and Park, J.H. and Wu, Z.G. and Yan, H.C.",
        TITLE = "Intelligent Finite-Time Protocol-Based Stabilization for Networked
UMV Systems With DoS Attacks",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "16734-16744",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369817"}

@article{bb375718,
        AUTHOR = "Gao, D. and Ou, L.Y. and Liu, Y. and Yang, Q. and Wang, H.G.",
        TITLE = "DeepSpoof: Deep Reinforcement Learning-Based Spoofing Attack in
Cross-Technology Multimedia Communication",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "10879-10891",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369818"}

@article{bb375719,
        AUTHOR = "Yu, W. and Huang, D.Q. and Wang, X.L. and Xu, K.",
        TITLE = "Recovery-Based Distributed Adaptive ILC With Fading Compensation for
MHSTs Under DoS Attacks: A Model-Free Approach",
        JOURNAL = ITS,
        VOLUME = "25",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "20535-20546",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369819"}

@article{bb375720,
        AUTHOR = "Rege, A. and Obradovic, Z. and Asadi, N. and Parker, E. and Pandit, R. and Masceri, N. and Singer, B.",
        TITLE = "Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive
Neural Networks",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "29-39",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369820"}

@article{bb375721,
        AUTHOR = "Liu, G. and Tian, E. and Zhao, X. and Chen, H.",
        TITLE = "Critical-Area-Based Stochastic DoS Attack Strategy Design Against
Remote State Estimation in Multi-Area Power Systems",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "291-295",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369821"}

@article{bb375722,
        AUTHOR = "Jin, Z.W. and Ma, M. and Wang, Z. and Sun, C.Y.",
        TITLE = "Optimal Transmission Schedule With Privacy Preservation for
Cyber-Physical System Against Eavesdropping Attack",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "436-440",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369822"}

@article{bb375723,
        AUTHOR = "Pan, X.D. and Zhang, M. and Yan, Y.F. and Zhang, S.Y. and Yang, M.",
        TITLE = "Matryoshka: Exploiting the Over-Parametrization of Deep Learning
Models for Covert Data Transmission",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "663-678",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369823"}

@article{bb375724,
        AUTHOR = "Carletti, V. and Foggia, P. and Rosa, F. and Vento, M.",
        TITLE = "Detecting malicious IoT network communication through Graph Neural
Networks in real-world conditions",
        JOURNAL = PRL,
        VOLUME = "189",
        YEAR = "2025",
        PAGES = "92-98",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369824"}

@article{bb375725,
        AUTHOR = "Adelipour, S. and Razgahi, E.A.D. and Haeri, M.",
        TITLE = "Vulnerability Mitigation of Urban Traffic Control Against
Cyberattacks Using Secure Multi-Party Computation",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "4568-4578",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369825"}

@article{bb375726,
        AUTHOR = "Kayyidavazhiyil, A.",
        TITLE = "Combined Tri-Classifiers for IoT Botnet Detection with Tuned Training
Weights",
        JOURNAL = IJIG,
        VOLUME = "25",
        YEAR = "2025",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "2550007",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369826"}

@article{bb375727,
        AUTHOR = "Wazid, M. and Singh, J. and Pandey, C. and Sherratt, R.S. and Das, A.K. and Giri, D. and Park, Y.",
        TITLE = "Explainable Deep Learning-Enabled Malware Attack Detection for
IoT-Enabled Intelligent Transportation Systems",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "5",
        MONTH = "May",
        PAGES = "7231-7244",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369827"}

@article{bb375728,
        AUTHOR = "Whig, P. and Sharma, R.",
        TITLE = "Synergising machine learning and blockchain for enhanced fraud
detection",
        JOURNAL = IJCVR,
        VOLUME = "15",
        YEAR = "2025",
        NUMBER = "3",
        PAGES = "269-285",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369828"}

@article{bb375729,
        AUTHOR = "Chandan, M. and Santhi, S.G. and Rao, T.S.",
        TITLE = "Combined Shallow and Deep Learning Models for Malware Detection in Wsn",
        JOURNAL = IJIG,
        VOLUME = "25",
        YEAR = "2025",
        NUMBER = "4",
        MONTH = "July",
        PAGES = "2550034",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369829"}

@article{bb375730,
        AUTHOR = "Wei, L. and Yang, J. and Jin, H. and Cui, J. and Li, J.X. and He, D.",
        TITLE = "Sustainable Learning-Based Intrusion Detection System for VANETs",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "10080-10091",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369830"}

@article{bb375731,
        AUTHOR = "Liu, Y.Y. and Xue, L. and Wang, S. and Luo, X. and Zhao, K. and Jing, P.F. and Ma, X.B. and Tang, Y. and Zhou, H.Y.",
        TITLE = "Vehicular Intrusion Detection System for Controller Area Network:
A Comprehensive Survey and Evaluation",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "10979-11009",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369831"}

@article{bb375732,
        AUTHOR = "Zhang, R. and Liu, L. and Park, J.H. and Zeng, D.Q. and Xie, X.P.",
        TITLE = "Secure Consensus for Multi-Agent Systems With Euler-Lagrange Dynamics
and Multiple DoS Attacks",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "10008-10018",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369832"}

@article{bb375733,
        AUTHOR = "Ma, J.H. and Du, Y.F. and Liu, M.L. and Luo, X.Y. and Li, J.",
        TITLE = "AIBW: Average Interval-Based Watermarking for Tracking Down Network
Attacks",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "2977-2981",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369833"}

@article{bb375734,
        AUTHOR = "Mehdi, S.A. and Hussain, S.Z.",
        TITLE = "Experimentative analysis of artificial immune system algorithms for
intrusion detection in IoT networks",
        JOURNAL = IJCVR,
        VOLUME = "15",
        YEAR = "2025",
        NUMBER = "5",
        PAGES = "577-587",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369834"}

@article{bb375735,
        AUTHOR = "Wang, X. and Ma, L. and Das, S.K. and Liu, Z.H.",
        TITLE = "ReMeNet: A Memory-Enhanced GAN Model for Intrusion Detection in
Transportation Cyber-Physical Systems",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "14264-14276",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369835"}

@article{bb375736,
        AUTHOR = "Qiu, C.Y. and Nan, G. and Xia, H.R. and Weng, Z. and Wang, X.T. and Shen, M. and Tao, X.F. and Liu, J.",
        TITLE = "Disentangled Dynamic Intrusion Detection",
        JOURNAL = PAMI,
        VOLUME = "47",
        YEAR = "2025",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "10528-10545",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369836"}

@article{bb375737,
        AUTHOR = "Li, Y. and Zhang, J.X. and Wang, X.L. and Guan, X.P.",
        TITLE = "An Optimal Hybrid Fake-Acknowledgment Attack Strategy on State
Estimation With Energy Constraint",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "3804-3808",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369837"}

@article{bb375738,
        AUTHOR = "Ullah, I. and Khalil, I. and Bai, X.S. and Garg, S. and Kaddoum, G. and Hossain, M.S.",
        TITLE = "An Ensemble-Based Hybrid Model for the Detection of Attacks in the
Internet of Vehicular Things",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "17914-17927",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369838"}

@article{bb375739,
        AUTHOR = "Satheesh, K.K.S.V.A. and Sree, T.K.",
        TITLE = "Enhancing cloud security with authentication for securing sensitive
information",
        JOURNAL = PR,
        VOLUME = "171",
        YEAR = "2026",
        PAGES = "112345",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369839"}

@article{bb375740,
        AUTHOR = "Chen, M. and Zhang, R. and Liu, L. and Zeng, D.Q. and Zhang, L. and Xiao, J.",
        TITLE = "Secure Consensus of MASs Subject to DoS Attacks: A New
Dynamic-Memory-Weight-Dependent Security Control Protocol",
        JOURNAL = SMCS,
        VOLUME = "55",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "9722-9737",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369840"}

@article{bb375741,
        AUTHOR = "Guo, C. and Gong, B. and Li, Z. and Gong, M. and Zhu, H.T.",
        TITLE = "FORT: A Forward Secure and Threshold Authorized Multi-Authority
Attribute-Based Signature Scheme for Multimedia IoT",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "8859-8874",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369841"}

@article{bb375742,
        AUTHOR = "Xu, J.J. and Li, Y. and Wang, Z. and Li, Y.C. and Guan, X.P.",
        TITLE = "An Optimal Periodic Attack Schedule Against Estimation Over
Infinite-Time Horizon",
        JOURNAL = SPLetters,
        VOLUME = "32",
        YEAR = "2025",
        PAGES = "4099-4103",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369842"}

@article{bb375743,
        AUTHOR = "Zhang, A. and Sun, Z. and Jiang, Q.G. and Wang, K. and Li, M. and Wang, B.L.",
        TITLE = "LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle
Network Intrusion Detection",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "23358-23373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369843"}

@article{bb375744,
        AUTHOR = "Benghename, Y. and Lounis, A. and Sallak, M. and Schon, W.",
        TITLE = "Cybersecurity Standards Across Industries: A Critical Analysis of
Current Practices and Future Directions in the Railway Sector",
        JOURNAL = ITS,
        VOLUME = "26",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "21371-21392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369844"}

@article{bb375745,
        AUTHOR = "Razzaq, H.H. and Al Rammahi, L.F.M.H. and Mahdi, A.M.",
        TITLE = "Modified Whale Algorithm and Morley PSO-ML-Based Hyperparameter
Optimization for Intrusion Detection",
        JOURNAL = IJIG,
        VOLUME = "26",
        YEAR = "2026",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "2650009",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369845"}

@article{bb375746,
        AUTHOR = "Shao, Z. and Ding, W.R. and Zhang, D. and Xiao, J. and Zhang, H. and Zheng, Y.K.",
        TITLE = "Cross-attention relation network based on metric learning for
few-shot specific emitter identification",
        JOURNAL = PR,
        VOLUME = "172",
        YEAR = "2026",
        PAGES = "112699",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369846"}

@article{bb375747,
        AUTHOR = "Sharma, A. and Saxena, P.",
        TITLE = "Distributed Denial of Service Attack Detection and Prevention Using
Pipit Fox-Attentional Deep Learning in Software-Defined Networking",
        JOURNAL = IJIG,
        VOLUME = "26",
        YEAR = "2026",
        NUMBER = "4",
        MONTH = "June",
        PAGES = "2650029",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369847"}

@article{bb375748,
        AUTHOR = "Nagaraja, N. and Zhang, L. and Wang, Z.L.",
        TITLE = "From Pixels to Prompts: A Systematic Study and Introduction to Image
Prompt Injection Attacks",
        JOURNAL = Computer,
        VOLUME = "59",
        YEAR = "2026",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "105-110",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369848"}

@inproceedings{bb375749,
        AUTHOR = "Berqia, A. and Bouijij, H. and Merimi, A. and Ouaggane, A.",
        TITLE = "Detecting DDoS Attacks using Machine Learning in IoT Environment",
        BOOKTITLE = ISCV24,
        YEAR = "2024",
        PAGES = "1-8",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369849"}

@inproceedings{bb375750,
        AUTHOR = "Hsu, T.C. and Lu, H.S.",
        TITLE = "Designing a Secure and Scalable Service Model Using Blockchain and
MQTT for IoT Devices",
        BOOKTITLE = IoTDesign24,
        YEAR = "2024",
        PAGES = "645-653",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369850"}

@inproceedings{bb375751,
        AUTHOR = "Kannan, B.B. and Sriramulu, S.",
        TITLE = "Hybrid Convolutional Neural Networks To Create An Attack Detection
Framework For A Wireless Sensor Network Based Health Care Application",
        BOOKTITLE = ICCVMI23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369851"}

@inproceedings{bb375752,
        AUTHOR = "Tang, F. and Yu, B.Y. and Zhao, S.X. and Xu, M.",
        TITLE = "Towards Fraudulent URL Classification with Large Language Model based
on Deep Learning",
        BOOKTITLE = CVIDL23,
        YEAR = "2023",
        PAGES = "503-507",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369852"}

@inproceedings{bb375753,
        AUTHOR = "Benchadi, D.Y.M. and Batalo, B. and Fukui, K.",
        TITLE = "Malware Detection Using Kernel Constrained Subspace Method",
        BOOKTITLE = MVA23,
        YEAR = "2023",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369853"}

@inproceedings{bb375754,
        AUTHOR = "Dong, Q. and Sun, T.T. and Li, T.W. and Lu, X.Q. and Yan, K.",
        TITLE = "Anomaly Intrusion Detection in Online Learning Space Based on XGBoost",
        BOOKTITLE = ICIVC22,
        YEAR = "2022",
        PAGES = "968-973",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369854"}

@inproceedings{bb375755,
        AUTHOR = "Li, S.S. and Chen, D. and Zhang, J. and Wang, H.Y. and Li, L. and Qian, Y.Y. and Liu, H.",
        TITLE = "Software Vulnerability Detection Based on Anomaly-Attention",
        BOOKTITLE = ICRVC22,
        YEAR = "2022",
        PAGES = "261-265",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369855"}

@inproceedings{bb375756,
        AUTHOR = "Wang, S.W. and Wang, Q.Y. and Jiang, Z.W. and Wang, X. and Jing, R.Q.",
        TITLE = "A Weak Coupling of Semi-Supervised Learning with Generative
Adversarial Networks for Malware Classification",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "3775-3782",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369856"}

@inproceedings{bb375757,
        AUTHOR = "Qi, P.P. and Zhang, Z.Q. and Wang, W. and Yao, C.",
        TITLE = "Malware Detection by Exploiting Deep Learning over Binary Programs",
        BOOKTITLE = ICPR21,
        YEAR = "2021",
        PAGES = "9068-9075",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369857"}

@inproceedings{bb375758,
        AUTHOR = "di Rocco, L. and Petrillo, U.F. and Palini, F.",
        TITLE = "Large Scale Graph Based Network Forensics Analysis",
        BOOKTITLE = IWBDAF20,
        YEAR = "2020",
        PAGES = "457-469",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369858"}

@inproceedings{bb375759,
        AUTHOR = "Scalas, M. and Rieck, K. and Giacinto, G.",
        TITLE = "Explanation-driven Characterization of Android Ransomware",
        BOOKTITLE = EDL-AI20,
        YEAR = "2020",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369859"}

@inproceedings{bb375760,
        AUTHOR = "Chen, L. and Qiu, H.J. and Kuang, X.Y. and Xu, A.D. and Yang, Y.W.",
        TITLE = "Intelligent Data Security Threat Discovery Model Based on Grid Data",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "458-463",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369860"}

@inproceedings{bb375761,
        AUTHOR = "Ikrissi, G. and Mazri, T.",
        TITLE = "IoT-based Smart Environments: State of the Art, Security Threats and
Solutions",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "279-286",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369861"}

@inproceedings{bb375762,
        AUTHOR = "Niu, L. and Song, Y. and Chu, J. and Li, S.",
        TITLE = "Analysis of the Attacker and Defender GAN Models for the Indoor
Navigation Network",
        BOOKTITLE = ISPRS21,
        YEAR = "2021",
        PAGES = "B4-2021: 237-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369862"}

@inproceedings{bb375763,
        AUTHOR = "Toka, K.O. and Dikilitas, Y. and Oktay, T. and Sayar, A.",
        TITLE = "Securing Iot With Blockchain",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "529-532",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369863"}

@inproceedings{bb375764,
        AUTHOR = "Ozarpa, C. and Avci, I. and Kinaci, B.F. and Arapoglu, S. and Kara, S.A.",
        TITLE = "Cyber Attacks on Scada Based Traffic Light Control Systems in the Smart
Cities",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "411-415",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369864"}

@inproceedings{bb375765,
        AUTHOR = "Moulad, L. and Chaabita, R. and Balar, K.",
        TITLE = "Wireless Sensor Network: Towards An Improvement of Security Policy",
        BOOKTITLE = SmartCityApp21,
        YEAR = "2021",
        PAGES = "379-383",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369865"}

@inproceedings{bb375766,
        AUTHOR = "Miryahyaie, S. and Ebrahimpour komleh, H. and Nickfarjam, A.M.",
        TITLE = "ACO-based Intrusion Detection Method in Computer Networks using Fuzzy
Association Rules",
        BOOKTITLE = IPRIA21,
        YEAR = "2021",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369866"}

@inproceedings{bb375767,
        AUTHOR = "Mohseni, M. and Tanha, J.",
        TITLE = "A Density-based Undersampling Approach to Intrusion Detection",
        BOOKTITLE = IPRIA21,
        YEAR = "2021",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369867"}

@inproceedings{bb375768,
        AUTHOR = "Liu, Y.G. and Ning, Z.H. and Zhang, J.J. and Wang, X.P.",
        TITLE = "Monitory Consensus Mechanism of Blockchain for Internet of Things",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "425-430",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369868"}

@inproceedings{bb375769,
        AUTHOR = "Chen, L. and Xian, M. and Liu, J.",
        TITLE = "Monitoring System of OpenStack Cloud Platform Based on Prometheus",
        BOOKTITLE = CVIDL20,
        YEAR = "2020",
        PAGES = "206-209",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369869"}

@inproceedings{bb375770,
        AUTHOR = "Prima, B. and Bouhorma, M.",
        TITLE = "Using Transfer Learning for Malware Classification",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "343-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369870"}

@inproceedings{bb375771,
        AUTHOR = "El Bakkouri, N. and Mazri, T.",
        TITLE = "Security Threats In Smart Healthcare",
        BOOKTITLE = SmartCityApp20,
        YEAR = "2020",
        PAGES = "209-214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369871"}

@inproceedings{bb375772,
        AUTHOR = "Maryem, M. and Abdelghani, E.O. and Belkassem, T.",
        TITLE = "Routing in Wireless Sensor Networks using Fuzzy Logic: A survey",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369872"}

@inproceedings{bb375773,
        AUTHOR = "Mennour, H. and Mostefai, S.",
        TITLE = "A hybrid Deep Learning Strategy for an Anomaly Based N-IDS",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369873"}

@inproceedings{bb375774,
        AUTHOR = "Sebbah, A. and Kadri, B.",
        TITLE = "A Privacy and Authentication Scheme for IoT Environments Using ECC
and Fuzzy Extractor",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369874"}

@inproceedings{bb375775,
        AUTHOR = "Bouzoubaa, K. and Taher, Y. and Nsiri, B.",
        TITLE = "DOS attack forecasting: A comparative study on wrapper feature
selection",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369875"}

@inproceedings{bb375776,
        AUTHOR = "Yang, Z.L. and Hu, Y.T. and Huang, Y.F. and Zhang, Y.J.",
        TITLE = "Behavioral Security in Covert Communication Systems",
        BOOKTITLE = IWDW19,
        YEAR = "2019",
        PAGES = "377-392",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369876"}

@inproceedings{bb375777,
        AUTHOR = "Varenne, R. and Delorme, J.M. and Plebani, E. and Pau, D. and Tomaselli, V.",
        TITLE = "Intelligent Recognition of TCP Intrusions for Embedded
Micro-controllers",
        BOOKTITLE = NTIAP19,
        YEAR = "2019",
        PAGES = "361-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369877"}

@inproceedings{bb375778,
        AUTHOR = "Zhang, H. and Wu, C.Q. and Gao, S. and Wang, Z. and Xu, Y. and Liu, Y.",
        TITLE = "An Effective Deep Learning Based Scheme for Network Intrusion
Detection",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "682-687",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369878"}

@inproceedings{bb375779,
        AUTHOR = "Lu, J. and Lv, F. and Liu, Q. and Zhang, M. and Zhang, X.",
        TITLE = "Botnet Detection based on Fuzzy Association Rules",
        BOOKTITLE = ICPR18,
        YEAR = "2018",
        PAGES = "578-584",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369879"}

@inproceedings{bb375780,
        AUTHOR = "Lyons, J.B. and Roebke, M.A. and Bobko, P. and Cox, C.A.",
        TITLE = "Cyber Vulnerability: An Attentional Dilemma",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 331-340",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369880"}

@inproceedings{bb375781,
        AUTHOR = "Matthews, G. and Panganiban, A.R. and Bailey, R. and Lin, J.C.",
        TITLE = "Trust in Autonomous Systems for Threat Analysis:
A Simulation Methodology",
        BOOKTITLE = VAMR18,
        YEAR = "2018",
        PAGES = "II: 341-353",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369881"}

@article{bb375782,
        AUTHOR = "Samtani, S. and Yu, S. and Zhu, H. and Patton, M. and Matherly, J. and Chen, H.",
        TITLE = "Identifying SCADA Systems and Their Vulnerabilities on the Internet
of Things: A Text-Mining Approach",
        JOURNAL = IEEE_Int_Sys,
        VOLUME = "33",
        YEAR = "2018",
        NUMBER = "2",
        MONTH = "March",
        PAGES = "63-73",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369882"}

@inproceedings{bb375783,
        AUTHOR = "Menemencioglu, O. and Orak, I.M.",
        TITLE = "Geographical Assesment of Results From Preventing the Parameter
Tampering in A Web Application",
        BOOKTITLE = GeoAdvances17,
        YEAR = "2017",
        PAGES = "69-71",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369883"}

@inproceedings{bb375784,
        AUTHOR = "Herrera Semenets, V. and Perez Garcia, O.A. and Gago Alonso, A. and Hernandez Leon, R.",
        TITLE = "A Novel Hybrid Data Reduction Strategy and Its Application to Intrusion
Detection",
        BOOKTITLE = CIARP17,
        YEAR = "2017",
        PAGES = "289-297",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369884"}

@inproceedings{bb375785,
        AUTHOR = "Mohan, R. and Chaudhury, S. and Lall, B.",
        TITLE = "Incremental Learning of Non-stationary Temporal Causal Networks for
Telecommunication Domain",
        BOOKTITLE = PReMI17,
        YEAR = "2017",
        PAGES = "501-508",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369885"}

@inproceedings{bb375786,
        AUTHOR = "Elejla, O.E. and Belaton, B. and Anbar, M. and Alijla, B.O.",
        TITLE = "IPv6 OS Fingerprinting Methods: Review",
        BOOKTITLE = IVIC17,
        YEAR = "2017",
        PAGES = "661-668",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369886"}

@inproceedings{bb375787,
        AUTHOR = "Zabri, Z. and Nohuddin, P.N.E.",
        TITLE = "Analyzing and Detecting Network Intrusion Behavior Using Packet Capture",
        BOOKTITLE = IVIC17,
        YEAR = "2017",
        PAGES = "750-761",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369887"}

@inproceedings{bb375788,
        AUTHOR = "Zyad, E. and Khalid, C. and Mohammed, B.",
        TITLE = "Combination of R1-PCA and median LDA for anomaly network detection",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369888"}

@inproceedings{bb375789,
        AUTHOR = "Alaoui, E.A.A. and Lamhamdi, M.",
        TITLE = "Study of the energy performance of DTN protocols",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369889"}

@inproceedings{bb375790,
        AUTHOR = "Sadek, B.A. and Houssaine, T.E. and Noreddine, C.",
        TITLE = "A robust PID controller for active queue management framework in
congested routers",
        BOOKTITLE = ISCV17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369890"}

@inproceedings{bb375791,
        AUTHOR = "Kempa, W.M.",
        TITLE = "On buffer overflow duration in WSN with a vacation-type power saving
mechanism",
        BOOKTITLE = WSSIP17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369891"}

@inproceedings{bb375792,
        AUTHOR = "Korona, M. and Skowron, K. and Trzepinski, M. and Rawski, M.",
        TITLE = "FPGA implementation of IPsec protocol suite for multigigabit networks",
        BOOKTITLE = WSSIP17,
        YEAR = "2017",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369892"}

@inproceedings{bb375793,
        AUTHOR = "Geller, B.",
        TITLE = "Advanced synchronization techniques for the Internet of Things",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "180-184",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369893"}

@inproceedings{bb375794,
        AUTHOR = "Yang, J. and Geller, B. and Arbi, T.",
        TITLE = "Proposal of a multi-standard transceiver for the WBAN Internet of
Things",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "369-373",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369894"}

@inproceedings{bb375795,
        AUTHOR = "Massaoudi, A. and Sellami, N. and Siala, M.",
        TITLE = "On the impact of pdf-matched quantization for heterogeneous cognitive
radio networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "259-263",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369895"}

@inproceedings{bb375796,
        AUTHOR = "NasrLeila, I. and Atallah, N. and Cherif, S. and Geller, B.",
        TITLE = "Time synchronization in IoT networks:
Case of a wireless body area network",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "297-301",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369896"}

@inproceedings{bb375797,
        AUTHOR = "Rihani, M.A. and Prevotet, J.C. and Nouvel, F. and Mroue, M. and Mohanna, Y.",
        TITLE = "ARM-FPGA based platform for automated adaptive wireless communication
systems using partial reconfiguration technique",
        BOOKTITLE = DASIP16,
        YEAR = "2016",
        PAGES = "113-120",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369897"}

@inproceedings{bb375798,
        AUTHOR = "Moreac, E. and Rossi, A. and Laurent, J. and Bomel, P.",
        TITLE = "Crosstalk-aware link power model for Networks-on-Chip",
        BOOKTITLE = DASIP16,
        YEAR = "2016",
        PAGES = "121-128",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369898"}

@inproceedings{bb375799,
        AUTHOR = "Abbes, Y. and Najeh, S. and Besbes, H.",
        TITLE = "Tractable framework for modeling and analyzing Joint CoMP
Transmission and eICIC technology in two-tier heterogeneous cellular
networks",
        BOOKTITLE = ISIVC16,
        YEAR = "2016",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/other1020net.html#TT369899"}

Last update:Apr 6, 2026 at 11:28:57