default search action
Search dblp for Publications
export results for "network security"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/csi/JafarianGSA25, author = {Tohid Jafarian and Ali Ghaffari and Ali Seyfollahi and Bahman Arasteh}, title = {Detecting and mitigating security anomalies in Software-Defined Networking {(SDN)} using Gradient-Boosted Trees and Floodlight Controller characteristics}, journal = {Comput. Stand. Interfaces}, volume = {91}, pages = {103871}, year = {2025}, url = {https://doi.org/10.1016/j.csi.2024.103871}, doi = {10.1016/J.CSI.2024.103871}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/JafarianGSA25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SantosFMBPG25, author = {Jonathan G. P. dos Santos and Geraldo P. Rocha Filho and Rodolfo Ipolito Meneguette and Rodrigo Bonacin and Gustavo Pessin and Vin{\'{\i}}cius P. Gon{\c{c}}alves}, title = {Enhancing IoT device security in Kubernetes: An approach adopted for network policies and the {SARIK} framework}, journal = {Future Gener. Comput. Syst.}, volume = {162}, pages = {107485}, year = {2025}, url = {https://doi.org/10.1016/j.future.2024.107485}, doi = {10.1016/J.FUTURE.2024.107485}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/SantosFMBPG25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Nguyen24, author = {Huu Hoang Nguyen}, title = {Graph representation learning for security analytics in decentralized software systems and social networks}, school = {Gottfried Wilhelm Leibniz Universit{\"{a}}t, Hannover, Germany}, year = {2024}, url = {https://www.repo.uni-hannover.de/handle/123456789/17473}, urn = {urn:nbn:de:101:1-2405230211167.474293296096}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Nguyen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/txcs/Kizza24, author = {Joseph Migga Kizza}, title = {Guide to Computer Network Security, 6th Edition}, series = {Texts in Computer Science}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-47549-8}, doi = {10.1007/978-3-031-47549-8}, isbn = {978-3-031-47548-1}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/txcs/Kizza24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/wn/LiuS24, author = {Dongxiao Liu and Xuemin (Sherman) Shen}, title = {Blockchain-Based Data Security in Heterogeneous Communications Networks}, series = {Wireless Networks}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-52477-6}, doi = {10.1007/978-3-031-52477-6}, isbn = {978-3-031-52476-9}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wn/LiuS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aai/SA24, author = {Aravindan S and Rajaram A}, title = {Hybrid Secure Cluster-Based Routing Algorithm for Enhanced Security and Efficiency in Mobile Ad Hoc Networks}, journal = {Appl. Artif. Intell.}, volume = {38}, number = {1}, year = {2024}, url = {https://doi.org/10.1080/08839514.2024.2341357}, doi = {10.1080/08839514.2024.2341357}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aai/SA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AgnewAM24, author = {Dennis Agnew and Alvaro del Aguila and Janise McNair}, title = {Enhanced Network Metric Prediction for Machine Learning-Based Cyber Security of a Software-Defined {UAV} Relay Network}, journal = {{IEEE} Access}, volume = {12}, pages = {54202--54219}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3387728}, doi = {10.1109/ACCESS.2024.3387728}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AgnewAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlaroodA24, author = {Ala Abdulsalam Alarood and Ahmed Omar Alzahrani}, title = {Interoperable Defensive Strategies of Network Security Evaluation}, journal = {{IEEE} Access}, volume = {12}, pages = {33959--33971}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3373710}, doi = {10.1109/ACCESS.2024.3373710}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlaroodA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlkhalifaA24, author = {Ibrahim Alkhalifa and Ahmad S. Almogren}, title = {Enhancing Security and Scalability in Vehicular Networks: {A} Bayesian {DAG} Blockchain Approach With Edge-Assisted {RSU}}, journal = {{IEEE} Access}, volume = {12}, pages = {116558--116571}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3429184}, doi = {10.1109/ACCESS.2024.3429184}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlkhalifaA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlotaibiSEAAI24, author = {Saud S. Alotaibi and Ahmed Sayed and Elmouez Samir Abd Elhameed and Omar Alghushairy and Mohammed Assiri and Sara Saadeldeen Ibrahim}, title = {Enhancing Security in IoT-Assisted {UAV} Networks Using Adaptive Mongoose Optimization Algorithm With Deep Learning}, journal = {{IEEE} Access}, volume = {12}, pages = {63768--63776}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3392618}, doi = {10.1109/ACCESS.2024.3392618}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlotaibiSEAAI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlqahtaniAAIAA24, author = {Jarallah Alqahtani and Muhammad Akram and Ghassan Ahmed Ali and Nadeem Iqbal and Ali Alqahtani and Roobaea Alroobaea}, title = {Elevating Network Security: {A} Novel S-Box Algorithm for Robust Data Encryption}, journal = {{IEEE} Access}, volume = {12}, pages = {2123--2134}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2023.3348144}, doi = {10.1109/ACCESS.2023.3348144}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlqahtaniAAIAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AslamTASR24, author = {Muhammad Muzamil Aslam and Ali Tufail and Rosyzie Anna Awg Haji Mohd Apong and Liyanage Chandratilake De Silva and Muhammad Taqi Raza}, title = {Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective}, journal = {{IEEE} Access}, volume = {12}, pages = {67537--67573}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3394848}, doi = {10.1109/ACCESS.2024.3394848}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AslamTASR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BabuRGGI24, author = {S. Anantha Babu and Abadhan Ranganath and Manish M. Goswami and T. Gnanaprakasam and Mohamad Khairi Ishak}, title = {Modified Marine Predators Algorithm With Deep Learning-Driven Security Solution for IoT-Assisted {UAV} Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {54991--54998}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3386570}, doi = {10.1109/ACCESS.2024.3386570}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BabuRGGI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Cao24a, author = {Hui Cao}, title = {The Detection of Abnormal Behavior by Artificial Intelligence Algorithms Under Network Security}, journal = {{IEEE} Access}, volume = {12}, pages = {118605--118617}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3436541}, doi = {10.1109/ACCESS.2024.3436541}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Cao24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DansanaBPQLW24, author = {Debabrata Dansana and Prafulla Kumar Behera and S. Gopal Krishna Patro and Noorulhasan Naveed Quadri and Ayodele Lasisi and Anteneh Wogasso Wodajo}, title = {{BSMACRN:} Design of an Efficient Blockchain-Based Security Model for Improving Attack-Resilience of Cognitive Radio Ad-hoc Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {10047--10058}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3350739}, doi = {10.1109/ACCESS.2024.3350739}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DansanaBPQLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GabrDECPKA24, author = {Mohamed Gabr and Amr Diab and Huwaida T. I. Elshoush and Yen{-}Lin Chen and Lip Yee Por and Chin Soon Ku and Wassim Alexan}, title = {Data Security Utilizing a Memristive Coupled Neural Network in 3D Models}, journal = {{IEEE} Access}, volume = {12}, pages = {116457--116477}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3447075}, doi = {10.1109/ACCESS.2024.3447075}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GabrDECPKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhadiMSSSAH24, author = {Yazeed Yasin Ghadi and Tehseen Mazhar and Tamara Al Shloul and Tariq Shahzad and Umair Ahmad Salaria and Arfan Ahmed and Habib Hamam}, title = {Machine Learning Solutions for the Security of Wireless Sensor Networks: {A} Review}, journal = {{IEEE} Access}, volume = {12}, pages = {12699--12719}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3355312}, doi = {10.1109/ACCESS.2024.3355312}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GhadiMSSSAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GkonisNTSXMM24, author = {Panagiotis K. Gkonis and Nikolaos Nomikos and Panagiotis Trakadas and Lambros Sarakis and George Xylouris and Xavi Masip{-}Bruin and Josep Martrat}, title = {Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {21320--21336}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3359992}, doi = {10.1109/ACCESS.2024.3359992}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GkonisNTSXMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HabibSAKBA24, author = {Faiza Habib and Syed Hamad Shirazi and Khursheed Aurangzeb and Asfandyar Khan and Bharat Bhushan and Musaed A. Alhussein}, title = {Deep Neural Networks for Enhanced Security: Detecting Metamorphic Malware in IoT Devices}, journal = {{IEEE} Access}, volume = {12}, pages = {48570--48582}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3383831}, doi = {10.1109/ACCESS.2024.3383831}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HabibSAKBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KuriharaKT24, author = {Itaru Kurihara and Jun Kurihara and Toshiaki Tanaka}, title = {A New Security Measure in Secret Sharing Schemes and Secure Network Coding}, journal = {{IEEE} Access}, volume = {12}, pages = {69163--69171}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3401471}, doi = {10.1109/ACCESS.2024.3401471}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KuriharaKT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LavanyaHS24, author = {P. Lavanya and Anila Glory H. and V. S. Shankar Sriram}, title = {Mitigating Insider Threat: {A} Neural Network Approach for Enhanced Security}, journal = {{IEEE} Access}, volume = {12}, pages = {73752--73768}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3404814}, doi = {10.1109/ACCESS.2024.3404814}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LavanyaHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiFL24, author = {Jian Li and Meng Feng and Shuai Li}, title = {A Deep Learning Cache Framework for Privacy Security on Heterogeneous IoT Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {93261--93269}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3422487}, doi = {10.1109/ACCESS.2024.3422487}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LyuGS24, author = {Minzhao Lyu and Hassan Habibi Gharakheili and Vijay Sivaraman}, title = {A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection}, journal = {{IEEE} Access}, volume = {12}, pages = {89363--89383}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3419068}, doi = {10.1109/ACCESS.2024.3419068}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LyuGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PradhanDPH24, author = {Annapurna Pradhan and Susmita Das and Mohammad Jalil Piran and Zhu Han}, title = {A Survey on Physical Layer Security of Ultra/Hyper Reliable Low Latency Communication in 5G and 6G Networks: Recent Advancements, Challenges, and Future Directions}, journal = {{IEEE} Access}, volume = {12}, pages = {112320--112353}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3429285}, doi = {10.1109/ACCESS.2024.3429285}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PradhanDPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SheerazDTTSA24, author = {Muhammad Sheeraz and Muhammad Hanif Durad and Shahzaib Tahir and Hasan Tahir and Saqib Saeed and Abdullah Mohammed Almuhaideb}, title = {Advancing Snort {IPS} to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring}, journal = {{IEEE} Access}, volume = {12}, pages = {61848--61859}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3395123}, doi = {10.1109/ACCESS.2024.3395123}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SheerazDTTSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SinghSHG24, author = {Virendra Singh and Mahendra Pratap Singh and Saumya Hegde and Maanak Gupta}, title = {Security in 5G Network Slices: Concerns and Opportunities}, journal = {{IEEE} Access}, volume = {12}, pages = {52727--52743}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3386632}, doi = {10.1109/ACCESS.2024.3386632}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SinghSHG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AlrashdiSAAA24, author = {Ibrahim Alrashdi and Karam M. Sallam and Majed Abdullah Alrowaily and Omar Alruwaili and Bilal Arain}, title = {{FIDWATCH:} Federated incremental distillation for continuous monitoring of IoT security threats}, journal = {Ad Hoc Networks}, volume = {165}, pages = {103637}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103637}, doi = {10.1016/J.ADHOC.2024.103637}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AlrashdiSAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/FuHLCW24, author = {Yanming Fu and Bocheng Huang and Lin Li and Jiayuan Chen and Wei Wei}, title = {Privacy-security oriented chaotic compressed sensing data collection in edge-assisted mobile crowd sensing}, journal = {Ad Hoc Networks}, volume = {160}, pages = {103507}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103507}, doi = {10.1016/J.ADHOC.2024.103507}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/FuHLCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HaddajiAF24, author = {Achref Haddaji and Samiha Ayed and Lamia Chaari Fourati}, title = {A novel and efficient framework for in-vehicle security enforcement}, journal = {Ad Hoc Networks}, volume = {158}, pages = {103481}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103481}, doi = {10.1016/J.ADHOC.2024.103481}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/HaddajiAF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KampaMG24, author = {Thomas Kampa and Christian Klaus M{\"{u}}ller and Daniel Gro{\ss}mann}, title = {Interlocking {IT/OT} security for edge cloud-enabled manufacturing}, journal = {Ad Hoc Networks}, volume = {154}, pages = {103384}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2023.103384}, doi = {10.1016/J.ADHOC.2023.103384}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/KampaMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/LiLGXYZ24, author = {Baogang Li and Jia Liao and Xi Gong and Hongyin Xiang and Zhi Yang and Wei Zhao}, title = {UAV-assisted {ISAC} network physical layer security based on Stackelberg game}, journal = {Ad Hoc Networks}, volume = {152}, pages = {103304}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2023.103304}, doi = {10.1016/J.ADHOC.2023.103304}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/LiLGXYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MoundoungaS24, author = {Anselme Russel Affane Moundounga and Hassan Satori}, title = {Machine learning attack detection based-on stochastic classifier methods for enhancing of routing security in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {163}, pages = {103581}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103581}, doi = {10.1016/J.ADHOC.2024.103581}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/MoundoungaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/NasserMSO24, author = {Ruba Nasser and Rabeb Mizouni and Shakti Singh and Hadi Otrok}, title = {Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges}, journal = {Ad Hoc Networks}, volume = {164}, pages = {103634}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103634}, doi = {10.1016/J.ADHOC.2024.103634}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/NasserMSO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/NawshinUHS24, author = {Faria Nawshin and Devrim Unal and Mohammad Hammoudeh and Ponnuthurai N. Suganthan}, title = {AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks}, journal = {Ad Hoc Networks}, volume = {161}, pages = {103523}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103523}, doi = {10.1016/J.ADHOC.2024.103523}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/NawshinUHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SarikayaB24, author = {Burcu S{\"{o}}nmez Sarikaya and Serif Bahtiyar}, title = {A survey on security of {UAV} and deep reinforcement learning}, journal = {Ad Hoc Networks}, volume = {164}, pages = {103642}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103642}, doi = {10.1016/J.ADHOC.2024.103642}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/SarikayaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/WangZMQS24, author = {Dan Wang and Jincheng Zhou and Mohammad Masdari and Sultan Noman Qasem and Biju Theruvil Sayed}, title = {Security in wireless body area networks via anonymous authentication: Comprehensive literature review, scheme classification, and future challenges}, journal = {Ad Hoc Networks}, volume = {153}, pages = {103332}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2023.103332}, doi = {10.1016/J.ADHOC.2023.103332}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/WangZMQS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhangXGMX24, author = {Han Zhang and Jianbin Xue and Xiangrui Guan and Zerou Ma and Jialing Xu}, title = {An optimization scheme of data link security transmission based on mobile edge computing}, journal = {Ad Hoc Networks}, volume = {162}, pages = {103556}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103556}, doi = {10.1016/J.ADHOC.2024.103556}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhangXGMX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhaoHHLWF24, author = {Junhui Zhao and Fanwei Huang and Huanhuan Hu and Longxia Liao and Dongming Wang and Lisheng Fan}, title = {User security authentication protocol in multi gateway scenarios of the Internet of Things}, journal = {Ad Hoc Networks}, volume = {156}, pages = {103427}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103427}, doi = {10.1016/J.ADHOC.2024.103427}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhaoHHLWF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/MattosPF24, author = {Diogo Menezes Ferrazani Mattos and Marc{-}Oliver Pahl and Carol Fung}, title = {CSNet 2022 special issue - decentralized and data-driven security in networking}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {79}, number = {7-8}, pages = {455--456}, year = {2024}, url = {https://doi.org/10.1007/s12243-024-01049-x}, doi = {10.1007/S12243-024-01049-X}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/MattosPF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aei/ShahinMHC24, author = {Mohammad Shahin and Mazdak Maghanaki and Ali Hosseinzadeh and F. Frank Chen}, title = {Advancing Network Security in Industrial IoT: {A} Deep Dive into AI-Enabled Intrusion Detection Systems}, journal = {Adv. Eng. Informatics}, volume = {62}, pages = {102685}, year = {2024}, url = {https://doi.org/10.1016/j.aei.2024.102685}, doi = {10.1016/J.AEI.2024.102685}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aei/ShahinMHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/air/GuanZZC24, author = {Faqian Guan and Tianqing Zhu and Wanlei Zhou and Kim{-}Kwang Raymond Choo}, title = {Graph neural networks: a survey on the links between privacy and security}, journal = {Artif. Intell. Rev.}, volume = {57}, number = {2}, pages = {40}, year = {2024}, url = {https://doi.org/10.1007/s10462-023-10656-4}, doi = {10.1007/S10462-023-10656-4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/air/GuanZZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/AlkhamisiKB24, author = {Abrar Omar Alkhamisi and Iyad A. Katib and Seyed M. Buhari}, title = {Federated Learning-Based Security Attack Detection for Multi-Controller Software-Defined Networks}, journal = {Algorithms}, volume = {17}, number = {7}, pages = {290}, year = {2024}, url = {https://doi.org/10.3390/a17070290}, doi = {10.3390/A17070290}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/AlkhamisiKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/CuiLDJYW24, author = {Guanghai Cui and Jun{-}Li Li and Kun{-}Xiang Dong and Xing Jin and Hong{-}Yong Yang and Zhen Wang}, title = {Influence of subsidy policies against insurances on controlling the propagation of epidemic security risks in networks}, journal = {Appl. Math. Comput.}, volume = {476}, pages = {128797}, year = {2024}, url = {https://doi.org/10.1016/j.amc.2024.128797}, doi = {10.1016/J.AMC.2024.128797}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/CuiLDJYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/annals/Vagts24, author = {Brian K. Vagts}, title = {Telenet, the 1983 Hacking Incidents, and the Construction of Network Security in the United States}, journal = {{IEEE} Ann. Hist. Comput.}, volume = {46}, number = {1}, pages = {34--47}, year = {2024}, url = {https://doi.org/10.1109/MAHC.2023.3347632}, doi = {10.1109/MAHC.2023.3347632}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/annals/Vagts24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/HassanSVPM24, author = {Mujtaba Hassan and Arish Sateesan and Jo Vliegen and Stjepan Picek and Nele Mentens}, title = {A Genetic Programming approach for hardware-oriented hash functions for network security applications}, journal = {Appl. Soft Comput.}, volume = {165}, pages = {112078}, year = {2024}, url = {https://doi.org/10.1016/j.asoc.2024.112078}, doi = {10.1016/J.ASOC.2024.112078}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/HassanSVPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/SarveshwaranPBGS24, author = {Velliangiri Sarveshwaran and Shanthini Pandiaraj and Garikapati Bindu and Vithya Ganesan and Iwin Thanakumar Joseph Swamidason}, title = {Binarized Spiking Neural Network with blockchain based intrusion detection framework for enhancing privacy and security in cloud computing environment}, journal = {Appl. Soft Comput.}, volume = {154}, pages = {111218}, year = {2024}, url = {https://doi.org/10.1016/j.asoc.2023.111218}, doi = {10.1016/J.ASOC.2023.111218}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/SarveshwaranPBGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/SunLM24a, author = {Le Sun and Yuhang Li and Ghulam Muhammad}, title = {Soft computing-driven infrared and visible image fusion network for security application service}, journal = {Appl. Soft Comput.}, volume = {165}, pages = {112114}, year = {2024}, url = {https://doi.org/10.1016/j.asoc.2024.112114}, doi = {10.1016/J.ASOC.2024.112114}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/SunLM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KimOTU24, author = {Jiwon Kim and Hamed Okhravi and Dave (Jing) Tian and Benjamin E. Ujcich}, title = {Security Challenges of Intent-Based Networking}, journal = {Commun. {ACM}}, volume = {67}, number = {7}, pages = {56--65}, year = {2024}, url = {https://doi.org/10.1145/3639702}, doi = {10.1145/3639702}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/KimOTU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/DuanWZL24, author = {Ying Duan and Qingtao Wu and Xuezhuan Zhao and Xiaoyu Li}, title = {Mobile edge computing based cognitive network security analysis using multi agent machine learning techniques in {B5G}}, journal = {Comput. Electr. Eng.}, volume = {117}, pages = {109181}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109181}, doi = {10.1016/J.COMPELECENG.2024.109181}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/DuanWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Fei24, author = {Wang Fei}, title = {Research on optimization algorithms for artificial intelligence network security management based on All {IP} Internet of Things fusion technology}, journal = {Comput. Electr. Eng.}, volume = {115}, pages = {109105}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109105}, doi = {10.1016/J.COMPELECENG.2024.109105}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/Fei24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiuSCL24, author = {Ruixiao Liu and Jing Shi and Xingyu Chen and Cuiying Lu}, title = {Network anomaly detection and security defense technology based on machine learning: {A} review}, journal = {Comput. Electr. Eng.}, volume = {119}, pages = {109581}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109581}, doi = {10.1016/J.COMPELECENG.2024.109581}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LiuSCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ZhangYA24, author = {Shengcai Zhang and Huiju Yi and Dezhi An}, title = {VTion-PatchTST: Elevated PatchTST model for network security situation prediction}, journal = {Comput. Electr. Eng.}, volume = {118}, pages = {109393}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109393}, doi = {10.1016/J.COMPELECENG.2024.109393}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ZhangYA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/Jiang24, author = {Qingjian Jiang}, title = {Communication network security situation analysis based on time series data mining technology}, journal = {Open Comput. Sci.}, volume = {14}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/comp-2023-0104}, doi = {10.1515/COMP-2023-0104}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/Jiang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/LuWJ24, author = {Haifeng Lu and Haiwei Wu and Ru Jing}, title = {Evaluation of Internet of Things computer network security and remote control technology}, journal = {Open Comput. Sci.}, volume = {14}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/comp-2024-0004}, doi = {10.1515/COMP-2024-0004}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/LuWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/MohyEddineGBA24, author = {Mouaad Mohy{-}Eddine and Azidine Guezzaz and Said Benkirane and Mourade Azrour}, title = {Malicious detection model with artificial neural network in IoT-based smart farming security}, journal = {Clust. Comput.}, volume = {27}, number = {6}, pages = {7307--7322}, year = {2024}, url = {https://doi.org/10.1007/s10586-024-04334-5}, doi = {10.1007/S10586-024-04334-5}, timestamp = {Fri, 13 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/MohyEddineGBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/NazirHZAP24, author = {Ahsan Nazir and Jingsha He and Nafei Zhu and Muhammad Shahid Anwar and Muhammad Salman Pathan}, title = {Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain}, journal = {Clust. Comput.}, volume = {27}, number = {6}, pages = {8367--8392}, year = {2024}, url = {https://doi.org/10.1007/s10586-024-04436-0}, doi = {10.1007/S10586-024-04436-0}, timestamp = {Fri, 13 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/NazirHZAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AliGLD24, author = {Belal Ali and Mark A. Gregory and Shuo Li and Omar Amjad Dib}, title = {Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in Multi-access Edge Computing}, journal = {Comput. Networks}, volume = {241}, pages = {110197}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110197}, doi = {10.1016/J.COMNET.2024.110197}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AliGLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EspinLM24, author = {Jos{\'{e}} Antonio Parra Esp{\'{\i}}n and Rafael Mar{\'{\i}}n L{\'{o}}pez and Gabriel L{\'{o}}pez Mill{\'{a}}n}, title = {Establishment of IPsec Security Associations with Diffie-Hellman following a SDN-based framework: Analysis and practical validation}, journal = {Comput. Networks}, volume = {253}, pages = {110720}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110720}, doi = {10.1016/J.COMNET.2024.110720}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/EspinLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Haddad24, author = {Zaher Haddad}, title = {Enhancing privacy and security in 5G networks with an anonymous handover protocol based on Blockchain and Zero Knowledge Proof}, journal = {Comput. Networks}, volume = {250}, pages = {110544}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110544}, doi = {10.1016/J.COMNET.2024.110544}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Haddad24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HeWZXXW24, author = {Yunhua He and Shuang Wang and Zhihao Zhou and Ke Xiao and Anke Xie and Bin Wu}, title = {A Blockchain-based carbon emission security accounting scheme}, journal = {Comput. Networks}, volume = {243}, pages = {110304}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110304}, doi = {10.1016/J.COMNET.2024.110304}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HeWZXXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KazmiQHNA24, author = {Syed Hussain Ali Kazmi and Faizan Qamar and Rosilah Hassan and Kashif Nisar and Mohammed Azmi Al{-}Betar}, title = {Security of federated learning in 6G era: {A} review on conceptual techniques and software platforms used for research and analysis}, journal = {Comput. Networks}, volume = {245}, pages = {110358}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110358}, doi = {10.1016/J.COMNET.2024.110358}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KazmiQHNA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KimSLNYPGS24, author = {Jinwoo Kim and Minjae Seo and Seungsoo Lee and Jaehyun Nam and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu and Seungwon Shin}, title = {Enhancing security in {SDN:} Systematizing attacks and defenses from a penetration perspective}, journal = {Comput. Networks}, volume = {241}, pages = {110203}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110203}, doi = {10.1016/J.COMNET.2024.110203}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KimSLNYPGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KumarC24, author = {Naveen Kumar and Ankit Chaudhary}, title = {Surveying cybersecurity vulnerabilities and countermeasures for enhancing {UAV} security}, journal = {Comput. Networks}, volume = {252}, pages = {110695}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110695}, doi = {10.1016/J.COMNET.2024.110695}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KumarC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MohammedFF24, author = {Ahmed Burhan Mohammed and Lamia Chaari Fourati and Ahmed Fakhrudeen}, title = {Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security}, journal = {Comput. Networks}, volume = {239}, pages = {110140}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2023.110140}, doi = {10.1016/J.COMNET.2023.110140}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MohammedFF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PhamHTQTD24, author = {Van{-}Hau Pham and Hien Do Hoang and Phan Thanh Trung and Van Dinh Quoc and Trong{-}Nghia To and Phan The Duy}, title = {Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems}, journal = {Comput. Networks}, volume = {253}, pages = {110706}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110706}, doi = {10.1016/J.COMNET.2024.110706}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PhamHTQTD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PittalaRSDMPC24, author = {Gaetano Francesco Pittal{\`{a}} and Lorenzo Rinieri and Amir Al Sadi and Gianluca Davoli and Andrea Melis and Marco Prandini and Walter Cerroni}, title = {Leveraging Data Plane Programmability to enhance service orchestration at the edge: {A} focus on industrial security}, journal = {Comput. Networks}, volume = {246}, pages = {110397}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110397}, doi = {10.1016/J.COMNET.2024.110397}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PittalaRSDMPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RzepkaSCM24, author = {Karol Rzepka and Przemyslaw Szary and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Performance evaluation of Raspberry Pi 4 and {STM32} Nucleo boards for security-related operations in IoT environments}, journal = {Comput. Networks}, volume = {242}, pages = {110252}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110252}, doi = {10.1016/J.COMNET.2024.110252}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RzepkaSCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangZWWH24, author = {Jitao Wang and Bo Zhang and Kai Wang and Yuzhou Wang and Weili Han}, title = {BFTDiagnosis: An automated security testing framework with malicious behavior injection for {BFT} protocols}, journal = {Comput. Networks}, volume = {249}, pages = {110404}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110404}, doi = {10.1016/J.COMNET.2024.110404}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/WangZWWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XavierDMR24, author = {Bruno Missi Xavier and Merim Dzaferagic and Magnos Martinello and Marco Ruffini}, title = {Performance measurement dataset for open {RAN} with user mobility and security threats}, journal = {Comput. Networks}, volume = {253}, pages = {110710}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110710}, doi = {10.1016/J.COMNET.2024.110710}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/XavierDMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangZL24, author = {Shunliang Zhang and Dali Zhu and Yinlong Liu}, title = {Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities}, journal = {Comput. Networks}, volume = {242}, pages = {110255}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110255}, doi = {10.1016/J.COMNET.2024.110255}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhangZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/LiuL0KS24, author = {Zhengli Liu and Mengzhuo Luo and Jun Cheng and Iyad A. Katib and Kaibo Shi}, title = {Security synchronization problem for stochastic complex networks via event-triggered impulsive control with actuation delays}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {133}, pages = {107958}, year = {2024}, url = {https://doi.org/10.1016/j.cnsns.2024.107958}, doi = {10.1016/J.CNSNS.2024.107958}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/LiuL0KS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Abdallah24, author = {Walid Abdallah}, title = {A physical layer security scheme for 6G wireless networks using post-quantum cryptography}, journal = {Comput. Commun.}, volume = {218}, pages = {176--187}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2024.02.019}, doi = {10.1016/J.COMCOM.2024.02.019}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Abdallah24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IoannouNABKMV24, author = {Iacovos Ioannou and Prabagarane Nagaradjane and Pelin Angin and Palaniappan Balasubramanian and Karthick Jeyagopal Kavitha and Palani Murugan and Vasos Vassiliou}, title = {{GEMLIDS-MIOT:} {A} Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening}, journal = {Comput. Commun.}, volume = {218}, pages = {209--239}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2024.02.023}, doi = {10.1016/J.COMCOM.2024.02.023}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IoannouNABKMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangWL24, author = {Yubian Wang and Zhongsheng Wang and Xiang Liu}, title = {Key security measurement method of authentication based on mobile edge computing in urban rail transit communication network}, journal = {Comput. Commun.}, volume = {215}, pages = {140--149}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2023.12.020}, doi = {10.1016/J.COMCOM.2023.12.020}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/WangWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XuLL24, author = {Meng Xu and Shenghan Liu and Xuewu Li}, title = {Network security situation assessment and prediction method based on multimodal transformation in edge computing}, journal = {Comput. Commun.}, volume = {215}, pages = {103--111}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2023.12.014}, doi = {10.1016/J.COMCOM.2023.12.014}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/XuLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZengZTS24, author = {Yanyang Zeng and Dawei Zhang and Kai Tang and Jiangfeng Sun}, title = {Security analysis and prediction of multi-relay networks over Fisher-Snedecor {F} fading channels}, journal = {Comput. Commun.}, volume = {222}, pages = {150--160}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2024.04.032}, doi = {10.1016/J.COMCOM.2024.04.032}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZengZTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AllenMVG24, author = {Ashley Allen and Alexios Mylonas and Stilianos Vidalis and Dimitris Gritzalis}, title = {Smart homes under siege: Assessing the robustness of physical security against wireless network attacks}, journal = {Comput. Secur.}, volume = {139}, pages = {103687}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103687}, doi = {10.1016/J.COSE.2023.103687}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AllenMVG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaseriCH24, author = {Yaser Baseri and Vikas Chouhan and Abdelhakim Hafid}, title = {Navigating quantum security risks in networked environments: {A} comprehensive study of quantum-safe network protocols}, journal = {Comput. Secur.}, volume = {142}, pages = {103883}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103883}, doi = {10.1016/J.COSE.2024.103883}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaseriCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JethavaR24, author = {Gordhan Jethava and Udai Pratap Rao}, title = {Exploring security and trust mechanisms in online social networks: An extensive review}, journal = {Comput. Secur.}, volume = {140}, pages = {103790}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103790}, doi = {10.1016/J.COSE.2024.103790}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JethavaR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JoseGSC24, author = {G. Sahaya Stalin Jose and Sugitha G and Ayshwarya Lakshmi S and Preethi Bangalore Chaluvaraj}, title = {Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing}, journal = {Comput. Secur.}, volume = {140}, pages = {103773}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103773}, doi = {10.1016/J.COSE.2024.103773}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JoseGSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KuznetsovZFM24, author = {Oleksandr Kuznetsov and Dmytro Zakharov and Emanuele Frontoni and Andrea Maranesi}, title = {AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection}, journal = {Comput. Secur.}, volume = {141}, pages = {103828}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103828}, doi = {10.1016/J.COSE.2024.103828}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KuznetsovZFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LimYLT24, author = {Willone Lim and Kelvin Sheng Chek Yong and Bee Theng Lau and Colin Choon Lin Tan}, title = {Future of generative adversarial networks {(GAN)} for anomaly detection in network security: {A} review}, journal = {Comput. Secur.}, volume = {139}, pages = {103733}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103733}, doi = {10.1016/J.COSE.2024.103733}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LimYLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengKH24, author = {Yunfei Meng and Changbo Ke and Zhiqiu Huang}, title = {A model transformation based security policy automatic management framework for software-defined networking}, journal = {Comput. Secur.}, volume = {142}, pages = {103850}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103850}, doi = {10.1016/J.COSE.2024.103850}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengKH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RKAK24, author = {Uma Mageswari R and N. Zafar Ali Khan and M. M. Gowthul Alam and S. Jerald Nirmal Kumar}, title = {Addressing security challenges in industry 4.0: {AVA-MA} approach for strengthening SDN-IoT network security}, journal = {Comput. Secur.}, volume = {144}, pages = {103907}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103907}, doi = {10.1016/J.COSE.2024.103907}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RKAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SumanK24, author = {Suman and Raees Ahmad Khan}, title = {An optimized neural network for prediction of security threats on software testing}, journal = {Comput. Secur.}, volume = {137}, pages = {103626}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103626}, doi = {10.1016/J.COSE.2023.103626}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SumanK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuCZZ24, author = {Zhengwei Zhu and Miaojie Chen and Chenyang Zhu and Yanping Zhu}, title = {Effective defense strategies in network security using improved double dueling deep Q-network}, journal = {Comput. Secur.}, volume = {136}, pages = {103578}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103578}, doi = {10.1016/J.COSE.2023.103578}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhuCZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/Nedyalkov24, author = {Ivan Nedyalkov}, title = {Study the Level of Network Security and Penetration Tests on Power Electronic Device}, journal = {Comput.}, volume = {13}, number = {3}, pages = {81}, year = {2024}, url = {https://doi.org/10.3390/computers13030081}, doi = {10.3390/COMPUTERS13030081}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/Nedyalkov24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/DhanarajSN24, author = {Rajesh Kumar Dhanaraj and Anamika Singh and Anand Nayyar}, title = {Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning {(MMODPAD-DRL)} in zero trust security network}, journal = {Computing}, volume = {106}, number = {6}, pages = {1933--1962}, year = {2024}, url = {https://doi.org/10.1007/s00607-024-01269-y}, doi = {10.1007/S00607-024-01269-Y}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/DhanarajSN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/LiXLCZLK24, author = {Yanlu Li and Yufeng Xiao and Wei Liang and Jiahong Cai and Ronglin Zhang and Kuan{-}Ching Li and Muhammad Khurram Khan}, title = {The security and privacy challenges toward cybersecurity of 6G networks: {A} comprehensive review}, journal = {Comput. Sci. Inf. Syst.}, volume = {21}, number = {3}, pages = {851--897}, year = {2024}, url = {https://doi.org/10.2298/csis230804016l}, doi = {10.2298/CSIS230804016L}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/LiXLCZLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/AliNKH24, author = {Mansoor Ali and Faisal Naeem and Georges Kaddoum and Ekram Hossain}, title = {Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {26}, number = {2}, pages = {1238--1278}, year = {2024}, url = {https://doi.org/10.1109/COMST.2023.3347172}, doi = {10.1109/COMST.2023.3347172}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/AliNKH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/AlwisPDGL24, author = {Chamitha de Alwis and Pawani Porambage and Kapal Dev and Thippa Reddy Gadekallu and Madhusanka Liyanage}, title = {A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {26}, number = {1}, pages = {534--570}, year = {2024}, url = {https://doi.org/10.1109/COMST.2023.3312349}, doi = {10.1109/COMST.2023.3312349}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/AlwisPDGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ChaoXGZZZ24, author = {Daichong Chao and Dawei Xu and Feng Gao and Chuan Zhang and Weiting Zhang and Liehuang Zhu}, title = {A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {26}, number = {3}, pages = {1775--1829}, year = {2024}, url = {https://doi.org/10.1109/COMST.2024.3350006}, doi = {10.1109/COMST.2024.3350006}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ChaoXGZZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/IlliQAAARMRAA24, author = {Elmehdi Illi and Marwa K. Qaraqe and Saud Althunibat and Abdullah Al{-}Hasanat and Moath Alsafasfeh and Marcus de Ree and Georgios Mantas and Jonathan Rodriguez and Waqas Aman and Saif Al{-}Kuwari}, title = {Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: {A} Paradigm Shift in Securing IoT Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {26}, number = {1}, pages = {347--388}, year = {2024}, url = {https://doi.org/10.1109/COMST.2023.3327327}, doi = {10.1109/COMST.2023.3327327}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/IlliQAAARMRAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/AmirthabaiMSN24, author = {Subasini Chellathurai Amirthabai and Udita Malhotra and Thapasimuthu Rajeswari Saravanan and Sudhahar Thachankurichy Natesan}, title = {Healthcare security in cloud-based wireless sensor networks: Botnet attack detection via autoencoder-aided goal-based artificial intelligent agent}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {19}, year = {2024}, url = {https://doi.org/10.1002/cpe.8152}, doi = {10.1002/CPE.8152}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/AmirthabaiMSN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ShekhawatG24, author = {Hema Shekhawat and Daya Sagar Gupta}, title = {A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {14}, year = {2024}, url = {https://doi.org/10.1002/cpe.8080}, doi = {10.1002/CPE.8080}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ShekhawatG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/MeenakshiK24, author = {B. Meenakshi and D. Karunkuzhali}, title = {Enhancing cyber security in {WSN} using optimized self-attention-based provisional variational auto-encoder generative adversarial network}, journal = {Comput. Stand. Interfaces}, volume = {88}, pages = {103802}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103802}, doi = {10.1016/J.CSI.2023.103802}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/MeenakshiK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AlshammariSANAAAAAA24, author = {Nasser O. Alshammari and Shumaila Shahzadi and Saad Awadh Alanazi and Shahid Naseem and Muhammad Anwar and Maddalah Alruwaili and Muhammad Rizwan Abid and Omar Alruwali and Ahmed Alsayat and Fahad Ahmad}, title = {Security Monitoring and Management for the Network Services in the Orchestration of {SDN-NFV} Environment Using Machine Learning Techniques}, journal = {Comput. Syst. Sci. Eng.}, volume = {48}, number = {2}, pages = {363--394}, year = {2024}, url = {https://doi.org/10.32604/csse.2023.040721}, doi = {10.32604/CSSE.2023.040721}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/AlshammariSANAAAAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/GanguliSGB24, author = {Chirag Ganguli and Shishir Kumar Shandilya and Michal Gregus and Oleh Basystiuk}, title = {Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security}, journal = {Comput. Syst. Sci. Eng.}, volume = {48}, number = {3}, pages = {739--758}, year = {2024}, url = {https://doi.org/10.32604/csse.2024.042607}, doi = {10.32604/CSSE.2024.042607}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/GanguliSGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BringhentiMSV24, author = {Daniele Bringhenti and Guido Marchetto and Riccardo Sisto and Fulvio Valenza}, title = {Automation for Network Security Configuration: State of the Art and Research Trends}, journal = {{ACM} Comput. Surv.}, volume = {56}, number = {3}, pages = {57:1--57:37}, year = {2024}, url = {https://doi.org/10.1145/3616401}, doi = {10.1145/3616401}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BringhentiMSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/AchaalABIA24, author = {Batoul Achaal and Mehdi Adda and Maxime Berger and Hussein Ibrahim and Ali Awde}, title = {Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges}, journal = {Cybersecur.}, volume = {7}, number = {1}, pages = {10}, year = {2024}, url = {https://doi.org/10.1186/s42400-023-00200-w}, doi = {10.1186/S42400-023-00200-W}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/AchaalABIA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/Glisic24, author = {Savo Glisic}, title = {Quantum vs post-quantum security for future networks: Survey}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100039}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100039}, doi = {10.1016/J.CSA.2024.100039}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecapplications/Glisic24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/LiuYWS24, author = {Zhaowei Liu and Dong Yang and Shenqiang Wang and Hang Su}, title = {Adaptive multi-channel Bayesian graph attention network for IoT transaction security}, journal = {Digit. Commun. Networks}, volume = {10}, number = {3}, pages = {631--644}, year = {2024}, url = {https://doi.org/10.1016/j.dcan.2022.11.018}, doi = {10.1016/J.DCAN.2022.11.018}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/LiuYWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Chen24, title = {Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {18}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00167-2}, doi = {10.1186/S13635-024-00167-2}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Chen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lan24a, title = {Retraction Note: Network security threat detection technology based on {EPSO-BP} algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {11}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00161-8}, doi = {10.1186/S13635-024-00161-8}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lan24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ShiHZS24, author = {Chenhao Shi and Yulin Hu and Yao Zhu and Anke Schmeink}, title = {Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2024}, number = {1}, pages = {67}, year = {2024}, url = {https://doi.org/10.1186/s13638-024-02395-z}, doi = {10.1186/S13638-024-02395-Z}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ShiHZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ZhaiZTZSZBH24, title = {Retraction Note: Hybrid traffic security shaping scheme combining {TAS} and {CQSF} of time-sensitive networks in smart grid}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2024}, number = {1}, pages = {25}, year = {2024}, url = {https://doi.org/10.1186/s13638-024-02360-w}, doi = {10.1186/S13638-024-02360-W}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ZhaiZTZSZBH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/YangZLXY24, author = {Guozheng Yang and Yongheng Zhang and Yuliang Lu and Yi Xie and Jiayi Yu}, title = {Research on a Critical Link Discovery Method for Network Security Situational Awareness}, journal = {Entropy}, volume = {26}, number = {4}, pages = {315}, year = {2024}, url = {https://doi.org/10.3390/e26040315}, doi = {10.3390/E26040315}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/YangZLXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/NagurneyHNM24, author = {Anna Nagurney and Dana Hassani and Oleg Nivievskyi and Pavlo Martyshev}, title = {Multicommodity international agricultural trade network equilibrium: Competition for limited production and transportation capacity under disaster scenarios with implications for food security}, journal = {Eur. J. Oper. Res.}, volume = {314}, number = {3}, pages = {1127--1142}, year = {2024}, url = {https://doi.org/10.1016/j.ejor.2023.11.010}, doi = {10.1016/J.EJOR.2023.11.010}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eor/NagurneyHNM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/BezerraVS24, author = {Carlos Daniel de Sousa Bezerra and Fl{\'{a}}vio Henrique Teles Vieira and Anderson da Silva Soares}, title = {Deep-Q-Network hybridization with extended Kalman filter for accelerate learning in autonomous navigation with auxiliary security module}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/ett.4946}, doi = {10.1002/ETT.4946}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/BezerraVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/HuangZCH24, author = {Xueda Huang and Kuanlei Zheng and Sisi Chen and Zhaoren He}, title = {Construction of switch information security protection system based on software-defined networking}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {9}, year = {2024}, url = {https://doi.org/10.1002/ett.5033}, doi = {10.1002/ETT.5033}, timestamp = {Tue, 17 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/HuangZCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/RahmanKMIKHKNP24, author = {Anichur Rahman and Md. Saikat Islam Khan and Antonio Montieri and Md. Jahidul Islam and Md. Razaul Karim and Mahedi Hasan and Dipanjali Kundu and Mostofa Kamal Nasir and Antonio Pescap{\`{e}}}, title = {BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/ett.4965}, doi = {10.1002/ETT.4965}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/RahmanKMIKHKNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/WangYSS24, author = {Fei Wang and Nan Yang and Pethuraj Mohamed Shakeel and Vijayalakshmi Saravanan}, title = {Machine learning for mobile network payment security evaluation system}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/ett.4226}, doi = {10.1002/ETT.4226}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/WangYSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcomp/MoyleMA24, author = {Steve Moyle and Andrew P. Martin and Nicholas Allott}, title = {{XAI} Human-Machine collaboration applied to network security}, journal = {Frontiers Comput. Sci.}, volume = {6}, year = {2024}, url = {https://doi.org/10.3389/fcomp.2024.1321238}, doi = {10.3389/FCOMP.2024.1321238}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcomp/MoyleMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JaveedSAAKI24, author = {Danish Javeed and Muhammad Shahid Saeed and Ijaz Ahmad and Muhammad Adil and Prabhat Kumar and A. K. M. Najmul Islam}, title = {Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions}, journal = {Future Gener. Comput. Syst.}, volume = {160}, pages = {577--597}, year = {2024}, url = {https://doi.org/10.1016/j.future.2024.06.023}, doi = {10.1016/J.FUTURE.2024.06.023}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/JaveedSAAKI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/CunhaFCONNSS24, author = {Jos{\'{e}} Cunha and Pedro Ferreira and Eva M. Castro and Paula Cristina Oliveira and Maria Jo{\~{a}}o Nicolau and Iv{\'{a}}n N{\'{u}}{\~{n}}ez and Xos{\'{e}} Ram{\'{o}}n Sousa and Carlos Ser{\^{o}}dio}, title = {Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies}, journal = {Future Internet}, volume = {16}, number = {7}, pages = {226}, year = {2024}, url = {https://doi.org/10.3390/fi16070226}, doi = {10.3390/FI16070226}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/CunhaFCONNSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/GentileMGF24, author = {Antonio Francesco Gentile and Davide Macr{\`{\i}} and Emilio Greco and Peppino Fazio}, title = {Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment}, journal = {Future Internet}, volume = {16}, number = {8}, pages = {283}, year = {2024}, url = {https://doi.org/10.3390/fi16080283}, doi = {10.3390/FI16080283}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/GentileMGF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/TanDW24, author = {Wuzheng Tan and Shenglong Du and Jian Weng}, title = {Enhancing Efficiency and Security in Unbalanced {PSI-CA} Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks}, journal = {Future Internet}, volume = {16}, number = {6}, pages = {205}, year = {2024}, url = {https://doi.org/10.3390/fi16060205}, doi = {10.3390/FI16060205}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/TanDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/GaldiJ24, author = {Clemente Galdi and Stanislaw Jarecki}, title = {Special Issue on 13th International Conference on Security and Cryptography for Networks {(SCN} 2022)}, journal = {Inf. Comput.}, volume = {296}, pages = {105135}, year = {2024}, url = {https://doi.org/10.1016/j.ic.2023.105135}, doi = {10.1016/J.IC.2023.105135}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/GaldiJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiSSGJ24, author = {Hui Li and Wei Sun and Qingyang Song and Lei Guo and Abbas Jamalipour}, title = {Exploiting RIS's Role for Energy Efficiency and Security in Cell-Free Massive {MIMO} Networks}, journal = {{IEEE} Commun. Lett.}, volume = {28}, number = {5}, pages = {1087--1091}, year = {2024}, url = {https://doi.org/10.1109/LCOMM.2024.3369622}, doi = {10.1109/LCOMM.2024.3369622}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiSSGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiuLAL24, author = {Fangfang Liu and Yueyi Liu and Wei An and Xiaona Li}, title = {A DWT-Based {PHY} Key Generation Scheme for the Cross-Layer Security in IoT Networks}, journal = {{IEEE} Commun. Lett.}, volume = {28}, number = {6}, pages = {1258--1262}, year = {2024}, url = {https://doi.org/10.1109/LCOMM.2024.3381179}, doi = {10.1109/LCOMM.2024.3381179}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiuLAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/YuanCWWC24, author = {Jing Yuan and Gaojie Chen and Miaowen Wen and Dehuan Wan and Kanapathippillai Cumanan}, title = {Security-Reliability Tradeoff in UAV-Carried Active RIS-Assisted Cooperative Networks}, journal = {{IEEE} Commun. Lett.}, volume = {28}, number = {2}, pages = {437--441}, year = {2024}, url = {https://doi.org/10.1109/LCOMM.2023.3347294}, doi = {10.1109/LCOMM.2023.3347294}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/YuanCWWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icn/SheelaSMKSSF24, author = {M. Sahaya Sheela and A. Gnana Soundari and Aditya Mudigonda and C. Kalpana and K. Suresh and K. Somasundaram and Yousef Farhaoui}, title = {Adaptive Marine Predator Optimization Algorithm (AOMA)-Deep Supervised Learning Classification {(DSLC)} Based {IDS} Framework for {MANET} Security}, journal = {Intell. Converged Networks}, volume = {5}, number = {1}, pages = {1--18}, year = {2024}, url = {https://doi.org/10.23919/icn.2024.0001}, doi = {10.23919/ICN.2024.0001}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icn/SheelaSMKSSF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/StancoNFVB24, author = {Giovanni Stanco and Annalisa Navarro and Flavio Frattini and Giorgio Ventre and Alessio Botta}, title = {A comprehensive survey on the security of low power wide area networks for the Internet of Things}, journal = {{ICT} Express}, volume = {10}, number = {3}, pages = {519--552}, year = {2024}, url = {https://doi.org/10.1016/j.icte.2024.03.003}, doi = {10.1016/J.ICTE.2024.03.003}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ict-express/StancoNFVB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/idt/ZhengZ24, author = {Li Zheng and Yuntian Zheng}, title = {Analysis of multimedia network data security based on routing algorithm}, journal = {Intell. Decis. Technol.}, volume = {18}, number = {1}, pages = {23--32}, year = {2024}, url = {https://doi.org/10.3233/IDT-230410}, doi = {10.3233/IDT-230410}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/idt/ZhengZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/ZhangBWNG24, author = {Qingqi Zhang and Xiaoan Bao and Ren Wu and Mitsuru Nakata and Qi{-}Wei Ge}, title = {Prohibited Item Detection Within X-Ray Security Inspection Images Based on an Improved Cascade Network}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {107}, number = {5}, pages = {813--824}, year = {2024}, url = {https://doi.org/10.1587/transfun.2023map0007}, doi = {10.1587/TRANSFUN.2023MAP0007}, timestamp = {Sun, 02 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/ZhangBWNG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/TengZLYGG24, author = {Zhijun Teng and Sian Zhu and Mingzhe Li and Libo Yu and Jinliang Gu and Liwen Guo}, title = {Wireless sensor network security defense strategy based on Bayesian reputation evaluation model}, journal = {{IET} Commun.}, volume = {18}, number = {1}, pages = {55--62}, year = {2024}, url = {https://doi.org/10.1049/cmu2.12700}, doi = {10.1049/CMU2.12700}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-com/TengZLYGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/LuLCL24a, author = {Kuan{-}Chu Lu and I{-}Hsien Liu and Keng{-}Hao Chang and Jung{-}Shian Li}, title = {VoWi-Fi security threats: Address resolution protocol attack and countermeasures}, journal = {{IET} Networks}, volume = {13}, number = {2}, pages = {129--146}, year = {2024}, url = {https://doi.org/10.1049/ntw2.12113}, doi = {10.1049/NTW2.12113}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/LuLCL24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbic/KrishnasamyPNU24, author = {Bala Krishnasamy and Sathish Kumar Palani and Renjith Prabhavathi Neelakandan and S. Uma}, title = {Aggregate-attention network optimised and graph sample with arithmetic optimisation algorithm fostered IoT device type identification for enhancing IoT security}, journal = {Int. J. Bio Inspired Comput.}, volume = {24}, number = {1}, pages = {22--31}, year = {2024}, url = {https://doi.org/10.1504/IJBIC.2024.140139}, doi = {10.1504/IJBIC.2024.140139}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbic/KrishnasamyPNU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhuWZCZY24, author = {Tianci Zhu and Jun Wang and Yonghai Zhu and Haoran Chen and Hang Zhang and Shanshan Yin}, title = {Power grid network security: {A} lightweight detection model for composite false data injection attacks using spatiotemporal features}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {46}, pages = {100697}, year = {2024}, url = {https://doi.org/10.1016/j.ijcip.2024.100697}, doi = {10.1016/J.IJCIP.2024.100697}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ZhuWZCZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/LiOCY24, author = {Jing Li and Mohd Shahizan Othman and Hewan Chen and Lizawati Mi Yusuf}, title = {A critical review of feature selection methods for machine learning in IoT security}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {30}, number = {3}, pages = {264--312}, year = {2024}, url = {https://doi.org/10.1504/IJCNDS.2024.138214}, doi = {10.1504/IJCNDS.2024.138214}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/LiOCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/ZemoB24, author = {Flavien Donkeng Zemo and Sara Bakkali}, title = {A survey on security threats in cognitive radio networks based on cooperative spectrum sensing}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {30}, number = {4}, pages = {433--466}, year = {2024}, url = {https://doi.org/10.1504/IJCNDS.2024.139325}, doi = {10.1504/IJCNDS.2024.139325}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/ZemoB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KakadeRVS24, author = {Kiran Shrimant Kakade and C. Rajesh and T. Veena and P. Sivakumar}, title = {Security challenges for routing protocols in mobile ad hoc network}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {16}, number = {3}, pages = {344--356}, year = {2024}, url = {https://doi.org/10.1504/IJESDF.2024.138338}, doi = {10.1504/IJESDF.2024.138338}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KakadeRVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SivajothiDRLDJ24, author = {E. Sivajothi and S. Mary Diana and M. Rekha and R. Babitha Lincy and P. Damodharan and Jency Rubia J}, title = {A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {16}, number = {5}, pages = {648--661}, year = {2024}, url = {https://doi.org/10.1504/IJESDF.2024.140758}, doi = {10.1504/IJESDF.2024.140758}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SivajothiDRLDJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SivakumarRFP24, author = {K. Sivakumar and C. Rajesh and S. Julia Faith and S. Narasimha Prasad}, title = {An effective network security scrutinising method based on deep learning}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {16}, number = {4}, pages = {464--473}, year = {2024}, url = {https://doi.org/10.1504/IJESDF.2024.139656}, doi = {10.1504/IJESDF.2024.139656}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SivakumarRFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SrirangamABP24, author = {Durga Prasad Srirangam and Salina Adinarayana and B. R. Tapas Bapu and N. Partheeban}, title = {Network security intrusion target detection system in the cloud}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {16}, number = {5}, pages = {602--613}, year = {2024}, url = {https://doi.org/10.1504/IJESDF.2024.140752}, doi = {10.1504/IJESDF.2024.140752}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SrirangamABP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicc/XieZWC24, author = {Jialiang Xie and Shanli Zhang and Honghui Wang and Mingzhi Chen}, title = {Multiobjective network security dynamic assessment method based on Bayesian network attack graph}, journal = {Int. J. Intell. Comput. Cybern.}, volume = {17}, number = {1}, pages = {38--60}, year = {2024}, url = {https://doi.org/10.1108/IJICC-05-2023-0121}, doi = {10.1108/IJICC-05-2023-0121}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijicc/XieZWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JiangW24, author = {Jingfeng Jiang and Yongyi Wu}, title = {Analysis of competitive differences in the bilateral platforms of the digital economy using artificial intelligence and network data security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {98--116}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140213}, doi = {10.1504/IJICS.2024.140213}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JiangW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XiongW24, author = {Jianxin Xiong and Xianping Wang}, title = {Library data protection and threat detection system based on network security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {137--153}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140212}, doi = {10.1504/IJICS.2024.140212}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XiongW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijin/HangXZGL24, author = {Feilu Hang and Linjiang Xie and Zhenhong Zhang and Wei Guo and Hanruo Li}, title = {Research on the application of network security defence in database security services based on deep learning integrated with big data analytics}, journal = {Int. J. Intell. Networks}, volume = {5}, pages = {101--109}, year = {2024}, url = {https://doi.org/10.1016/j.ijin.2024.02.006}, doi = {10.1016/J.IJIN.2024.02.006}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijin/HangXZGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LagraaHSVSO24, author = {Sofiane Lagraa and Martin Hus{\'{a}}k and Hamida Seba and Satyanarayana Vuppala and Radu State and Moussa Ouedraogo}, title = {A review on graph-based approaches for network security monitoring and botnet detection}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {119--140}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00742-7}, doi = {10.1007/S10207-023-00742-7}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LagraaHSVSO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MvahTDATK24, author = {Fabrice Mvah and Vianney Kengne Tchendji and Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and Ahmed H. Anwar and Deepak K. Tosh and Charles A. Kamhoua}, title = {GaTeBaSep: game theory-based security protocol against {ARP} spoofing attacks in software-defined networks}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {373--387}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00749-0}, doi = {10.1007/S10207-023-00749-0}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/MvahTDATK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PayaGG24, author = {Antonio Paya and Vicente Garc{\'{\i}}a{-}D{\'{\i}}az and Alberto G{\'{o}}mez}, title = {Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {4}, pages = {2793--2808}, year = {2024}, url = {https://doi.org/10.1007/s10207-024-00863-7}, doi = {10.1007/S10207-024-00863-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PayaGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/FuLZL24, author = {Longfei Fu and Yibin Liu and Yanjun Zhang and Ming Li}, title = {Network Information Security Monitoring Under Artificial Intelligence Environment}, journal = {Int. J. Inf. Secur. Priv.}, volume = {18}, pages = {1--25}, year = {2024}, url = {https://doi.org/10.4018/ijisp.345038}, doi = {10.4018/IJISP.345038}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/FuLZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/LoneVS24, author = {Faisal Rasheed Lone and Harsh Kumar Verma and Krishna Pal Sharma}, title = {A systematic study on the challenges, characteristics and security issues in vehicular networks}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {20}, number = {1}, pages = {56--98}, year = {2024}, url = {https://doi.org/10.1108/IJPCC-04-2022-0164}, doi = {10.1108/IJPCC-04-2022-0164}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpcc/LoneVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijris/KongLX24, author = {Dehua Kong and Lin Lu and Nian Xiao}, title = {The computer network security situation awareness based on decision tree algorithm}, journal = {Int. J. Reason. based Intell. Syst.}, volume = {16}, number = {2}, pages = {125--136}, year = {2024}, url = {https://doi.org/10.1504/IJRIS.2024.138623}, doi = {10.1504/IJRIS.2024.138623}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijris/KongLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuJZ24, author = {Huajin Liu and Chunhua Ju and Houyuan Zhang}, title = {A social network security user recommendation algorithm based on community user emotions}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {10--19}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137332}, doi = {10.1504/IJSN.2024.137332}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/QianLHX24, author = {Jin Qian and Hui Li and Yan Huo and Xiaoshuang Xing}, title = {Empowering IoT security: an innovative handover-driven node selection approach to tackle conscious mobile eavesdropping}, journal = {Int. J. Sens. Networks}, volume = {44}, number = {2}, pages = {84--98}, year = {2024}, url = {https://doi.org/10.1504/IJSNET.2024.136692}, doi = {10.1504/IJSNET.2024.136692}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/QianLHX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/XueLZ24, author = {Qingshui Xue and Zixuan Lu and Tianhao Zhang}, title = {Attribute-based proxy signature scheme with dynamic strong forward security}, journal = {Int. J. Sens. Networks}, volume = {44}, number = {4}, pages = {214--225}, year = {2024}, url = {https://doi.org/10.1504/IJSNET.2024.138518}, doi = {10.1504/IJSNET.2024.138518}, timestamp = {Sun, 02 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/XueLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsysc/LvQGQL24, author = {Yanbo Lv and Yiwen Qi and Shitong Guo and Ziyu Qu and He Li}, title = {Enhancing network security in constrained switched systems: event-triggered {MPC} with a buffer-based anti-attack approach}, journal = {Int. J. Syst. Sci.}, volume = {55}, number = {14}, pages = {2963--2979}, year = {2024}, url = {https://doi.org/10.1080/00207721.2024.2364291}, doi = {10.1080/00207721.2024.2364291}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsysc/LvQGQL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/QaziKHA24, author = {Farheen Qazi and Sadiq Ali Khan and Fozia Hanif and Dur{-}e{-}Shawar Agha}, title = {Efficient Routing Algorithm Towards the Security of Vehicular Ad-Hoc Network and Its Applications}, journal = {Int. J. Wirel. Inf. Networks}, volume = {31}, number = {1}, pages = {12--28}, year = {2024}, url = {https://doi.org/10.1007/s10776-023-00613-x}, doi = {10.1007/S10776-023-00613-X}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwin/QaziKHA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/KhanRPKHLK24, author = {Izhar Ahmed Khan and Imran Razzak and Dechang Pi and Nasrullah Khan and Yasir Hussain and Bentian Li and Tanzeela Kousar}, title = {Fed-Inforce-Fusion: {A} federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks}, journal = {Inf. Fusion}, volume = {101}, pages = {102002}, year = {2024}, url = {https://doi.org/10.1016/j.inffus.2023.102002}, doi = {10.1016/J.INFFUS.2023.102002}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inffus/KhanRPKHLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/Yu24, author = {Gao{-}Feng Yu}, title = {A multi-objective decision method for the network security situation grade assessment under multi-source information}, journal = {Inf. Fusion}, volume = {102}, pages = {102066}, year = {2024}, url = {https://doi.org/10.1016/j.inffus.2023.102066}, doi = {10.1016/J.INFFUS.2023.102066}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/Yu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/AlsafwaniFA24, author = {Nadher Alsafwani and Yousef Fazea and Fuad Alnajjar}, title = {Strategic Approaches in Network Communication and Information Security Risk Assessment}, journal = {Inf.}, volume = {15}, number = {6}, pages = {353}, year = {2024}, url = {https://doi.org/10.3390/info15060353}, doi = {10.3390/INFO15060353}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/AlsafwaniFA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/GilaniAKSMS24, author = {Syeda Mahnoor Gilani and Adeel Anjum and Abid Khan and Madiha Haider Syed and Syed Atif Moqurrab and Gautam Srivastava}, title = {A robust Internet of Drones security surveillance communication network based on {IOTA}}, journal = {Internet Things}, volume = {25}, pages = {101066}, year = {2024}, url = {https://doi.org/10.1016/j.iot.2024.101066}, doi = {10.1016/J.IOT.2024.101066}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/GilaniAKSMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GharibI24, author = {Anastassia Gharib and Mohamed Ibnkahla}, title = {User Security-Oriented Information-Centric IoT Nodes Clustering With Graph Convolution Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {8311--8326}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3318123}, doi = {10.1109/JIOT.2023.3318123}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GharibI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/IslamARH24, author = {Kazi Yasin Islam and Iftekhar Ahmad and Yue Rong and Daryoush Habibi}, title = {Joint Energy and Security Optimization in Underwater Wireless Communication Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {14282--14295}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3340269}, doi = {10.1109/JIOT.2023.3340269}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/IslamARH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiZHHZZW24, author = {Xingwang Li and Junyao Zhang and Congzheng Han and Wanming Hao and Ming Zeng and Zhengyu Zhu and Han Wang}, title = {Reliability and Security of CR-STAR-RIS-NOMA-Assisted IoT Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {17}, pages = {27969--27980}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3340371}, doi = {10.1109/JIOT.2023.3340371}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiZHHZZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/PakravanCZLHD24, author = {Saeid Pakravan and Jean{-}Yves Chouinard and Ming Zeng and Xingwang Li and Wanming Hao and Octavia A. Dobre}, title = {Physical-Layer Security of RIS-Assisted Networks Over Correlated Fisher-Snedecor {F} Fading Channels}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {9}, pages = {15152--15165}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3343936}, doi = {10.1109/JIOT.2023.3343936}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PakravanCZLHD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WuLLHWYJJW24, author = {Yiming Wu and Gaoyun Lin and Lisong Liu and Zhen Hong and Yangyang Wang and Xing Yang and Zoe Lin Jiang and Shouling Ji and Zhenyu Wen}, title = {MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {14}, pages = {25136--25146}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3395629}, doi = {10.1109/JIOT.2024.3395629}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WuLLHWYJJW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XieX24, author = {Qingyun Xie and Qi Xie}, title = {Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {15038--15042}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3334708}, doi = {10.1109/JIOT.2023.3334708}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XieX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuWLLZYC24, author = {Zhiyu Xu and Liangliang Wang and Yiyuan Luo and Yu Long and Kai Zhang and Hailun Yan and Kefei Chen}, title = {A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {13482--13495}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3337136}, doi = {10.1109/JIOT.2023.3337136}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XuWLLZYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YanDSZZH24, author = {Peishun Yan and Wei Duan and Qiang Sun and Guoan Zhang and Jiayi Zhang and Pin{-}Han Ho}, title = {Improving Physical-Layer Security for Cognitive Networks via Artificial Noise-Aided Rate Splitting}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {10}, pages = {18932--18933}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3367889}, doi = {10.1109/JIOT.2024.3367889}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YanDSZZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangJZ24, author = {Yi Zhang and Chunxiao Jiang and Peiying Zhang}, title = {Security-Aware Resource Allocation Scheme Based on {DRL} in Cloud-Edge-Terminal Cooperative Vehicular Network}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {95--104}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3293497}, doi = {10.1109/JIOT.2023.3293497}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ir/KumarYY24, author = {Manish Kumar and Vibhash Yadav and Satya Prakash Yadav}, title = {Advance comprehensive analysis for Zigbee network-based IoT system security}, journal = {Discov. Comput.}, volume = {27}, number = {1}, pages = {22}, year = {2024}, url = {https://doi.org/10.1007/s10791-024-09456-3}, doi = {10.1007/S10791-024-09456-3}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ir/KumarYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YeZRHZPK24, author = {Pei{-}Gen Ye and Jun Zheng and Xiaojun Ren and Jinbin Huang and Zhenxin Zhang and Yan Pang and Guang Kou}, title = {Optimizing resource allocation in UAV-assisted ultra-dense networks for enhanced performance and security}, journal = {Inf. Sci.}, volume = {679}, pages = {120788}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2024.120788}, doi = {10.1016/J.INS.2024.120788}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YeZRHZPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/Geng24, author = {Jiali Geng}, title = {Improving network data security interaction methods under wireless communication}, journal = {Internet Technol. Lett.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/itl2.497}, doi = {10.1002/ITL2.497}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itl/Geng24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/YeLZ24, author = {Jianfeng Ye and Li Li and Kaiyan Zheng}, title = {Computer intelligent network security and preventive measures of internet of things devices}, journal = {Internet Technol. Lett.}, volume = {7}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/itl2.519}, doi = {10.1002/ITL2.519}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itl/YeLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KannaS24, author = {P. Rajesh Kanna and P. Santhi}, title = {Exploring the landscape of network security: a comparative analysis of attack detection strategies}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {15}, number = {8}, pages = {3211--3228}, year = {2024}, url = {https://doi.org/10.1007/s12652-024-04794-y}, doi = {10.1007/S12652-024-04794-Y}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/KannaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbcs/CoelhoSML24, author = {Roger William Co{\^{e}}lho and Ronan Assump{\c{c}}{\~{a}}o Silva and Luciana Andr{\'{e}}ia Fondazzi Martimiano and Elvio Joao Leonardo}, title = {IoT and 5G Networks: {A} Discussion of SDN, {NFV} and Information Security}, journal = {J. Braz. Comput. Soc.}, volume = {30}, number = {1}, pages = {212--227}, year = {2024}, url = {https://doi.org/10.5753/jbcs.2024.3021}, doi = {10.5753/JBCS.2024.3021}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbcs/CoelhoSML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/DongFS24, author = {Chunling Dong and Yu Feng and Wenqian Shang}, title = {A new method of dynamic network security analysis based on dynamic uncertain causality graph}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {24}, year = {2024}, url = {https://doi.org/10.1186/s13677-023-00568-7}, doi = {10.1186/S13677-023-00568-7}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/DongFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/LongYSZHC24, author = {Zhenyue Long and Huiru Yan and Guiquan Shen and Xiaolu Zhang and Haoyang He and Long Cheng}, title = {A Transformer-based network intrusion detection approach for cloud security}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {5}, year = {2024}, url = {https://doi.org/10.1186/s13677-023-00574-9}, doi = {10.1186/S13677-023-00574-9}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/LongYSZHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/HanL24, author = {Yanhai Han and Xu Lin}, title = {Multi-demand-side resource regulation capacity assessment for distribution network safety and security}, journal = {J. Comput. Methods Sci. Eng.}, volume = {24}, number = {4-5}, pages = {2267--2282}, year = {2024}, url = {https://doi.org/10.3233/JCM-247444}, doi = {10.3233/JCM-247444}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/HanL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/Huang24, author = {Furong Huang}, title = {Industrial technology network security measurement in international trade under discrete hopfield neural network}, journal = {J. Comput. Methods Sci. Eng.}, volume = {24}, number = {2}, pages = {657--674}, year = {2024}, url = {https://doi.org/10.3233/JCM-237128}, doi = {10.3233/JCM-237128}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/Huang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/SuG24, author = {Xuan Su and Han Gao}, title = {Intelligent fault diagnosis and security early warning method of new power system based on system network situation}, journal = {J. Comput. Methods Sci. Eng.}, volume = {24}, number = {2}, pages = {891--905}, year = {2024}, url = {https://doi.org/10.3233/JCM-247293}, doi = {10.3233/JCM-247293}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/SuG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/QureshiSM24, author = {Anam Qureshi and Jawwad Shamsi and Murk Marvi}, title = {An Efficient Framework for Security of Internet-of-Things Devices against Malicious Software Updates}, journal = {J. Comput. Networks Commun.}, volume = {2024}, year = {2024}, url = {https://doi.org/10.1155/2024/9915602}, doi = {10.1155/2024/9915602}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcnc/QureshiSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/QureshiSM24a, author = {Anam Qureshi and Jawwad Shamsi and Murk Marvi}, title = {An Efficient Framework for Security of Internet-of-Things Devices against Malicious Software Updates}, journal = {J. Comput. Networks Commun.}, volume = {2024}, year = {2024}, url = {https://doi.org/10.1155/2024/9915602}, doi = {10.1155/2024/9915602}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcnc/QureshiSM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jco/ShiT24, title = {Retraction Note: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment}, journal = {J. Comb. Optim.}, volume = {47}, number = {3}, pages = {51}, year = {2024}, url = {https://doi.org/10.1007/s10878-024-01161-7}, doi = {10.1007/S10878-024-01161-7}, timestamp = {Mon, 29 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jco/ShiT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/ShahraniRAASSZ24, author = {Ali M. Al Shahrani and Ali Rizwan and Abdullah Algarni and Khalid A. Alissa and Mohammad Shabaz and Bhupesh Kumar Singh and John Zaki}, title = {A Deep Learning Network-on-Chip (NoC)-Based Switch-Router to Enhance Information Security in Resource-Constrained Devices}, journal = {J. Circuits Syst. Comput.}, volume = {33}, number = {4}, pages = {2450064:1--2450064:30}, year = {2024}, url = {https://doi.org/10.1142/S0218126624500646}, doi = {10.1142/S0218126624500646}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/ShahraniRAASSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Deng24, author = {Yongsheng Deng}, title = {Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {327--348}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1327}, doi = {10.13052/JCSM2245-1439.1327}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Deng24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HanZZ24, author = {Guoying Han and Bin Zhou and Yazi Zhang}, title = {Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {941--962}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1356}, doi = {10.13052/JCSM2245-1439.1356}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HanZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HouLZGZ24, author = {Botao Hou and Zhefeng Li and Xiaojun Zuo and Yuling Guo and Jianchun Zhou}, title = {Application of Intelligent Cloud Computing Technology in Optical Communication Network Security of Smart Grid}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {605--632}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1342}, doi = {10.13052/JCSM2245-1439.1342}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HouLZGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li24, author = {Wentao Li}, title = {Construction and Analysis of {QPSO-LSTM} Model in Network Security Situation Prediction}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {417--438}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1334}, doi = {10.13052/JCSM2245-1439.1334}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li24b, author = {Xiaowu Li}, title = {Network Security Behavior Anomaly Detection Based on Improved Empirical Mode Decomposition}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {917--940}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1355}, doi = {10.13052/JCSM2245-1439.1355}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Luo24, author = {Xiaoyan Luo}, title = {Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1085--1104}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13512}, doi = {10.13052/JCSM2245-1439.13512}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Luo24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Song24, author = {Xiaobo Song}, title = {Analysis and Application of Chaotic Genetic Algorithm Based on Network Security in The Research of Resilience of Cluster Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {657--676}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1344}, doi = {10.13052/JCSM2245-1439.1344}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Song24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangL24, author = {Huan Wang and Xin Li}, title = {Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {461--488}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1336}, doi = {10.13052/JCSM2245-1439.1336}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WangL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Wu24, author = {Yubao Wu}, title = {Construction and Application of Internet of Things Network Security Situation Prediction Model Based on BiLSTM Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {843--862}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1352}, doi = {10.13052/JCSM2245-1439.1352}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Wu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YunhongG24, author = {Guo Yunhong and Tang Guoping}, title = {Intelligent Analysis and Dynamic Security of Network Traffic in Context of Big Data}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {823--842}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1351}, doi = {10.13052/JCSM2245-1439.1351}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/YunhongG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangXS24, author = {Yunfei Zhang and Xingzhi Xu and Yayuan Shi}, title = {Construction and Analysis of Network Cloud Security Situation Awareness System Based on {DBN-DE} Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {439--460}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1335}, doi = {10.13052/JCSM2245-1439.1335}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangXS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhengXLDSL24, author = {Lv Zheng and Fang Xi and Huang Lei and Jiang Dan and Ran Shuang and Liang Lei}, title = {Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on {RBAC} and Development of Visual Operation and Maintenance Platform}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1061--1084}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13511}, doi = {10.13052/JCSM2245-1439.13511}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhengXLDSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/DuLZPL24, author = {Xuyang Du and Guobao Liu and He Zhang and Ju H. Park and Xiaofeng Liu}, title = {Security load frequency control of networked power systems via Round-Robin protocol under denial of service attacks}, journal = {J. Frankl. Inst.}, volume = {361}, number = {17}, pages = {107155}, year = {2024}, url = {https://doi.org/10.1016/j.jfranklin.2024.107155}, doi = {10.1016/J.JFRANKLIN.2024.107155}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfi/DuLZPL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/WuWCYH24, author = {Di Wu and Yi Wang and Peng Cheng and Hu Ye and Shuping He}, title = {Enhancing security control in Markov jump networked systems against DoS attacks: {A} dynamic-memory based event-triggered mechanism}, journal = {J. Frankl. Inst.}, volume = {361}, number = {5}, pages = {106688}, year = {2024}, url = {https://doi.org/10.1016/j.jfranklin.2024.106688}, doi = {10.1016/J.JFRANKLIN.2024.106688}, timestamp = {Tue, 27 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfi/WuWCYH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/ChughtaiBKSLK24, author = {Muhammad Saad Chughtai and Irfana Bibi and Shahid Karim and Syed Wajid Ali Shah and Asif Ali Laghari and Abdullah Ayub Khan}, title = {Deep learning trends and future perspectives of web security and vulnerabilities}, journal = {J. High Speed Networks}, volume = {30}, number = {1}, pages = {115--146}, year = {2024}, url = {https://doi.org/10.3233/JHS-230037}, doi = {10.3233/JHS-230037}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/ChughtaiBKSLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/GranataMRCS24, author = {Daniele Granata and Michele Mastroianni and Massimiliano Rak and Pasquale Cantiello and Giovanni Salzillo}, title = {{GDPR} compliance through standard security controls: An automated approach}, journal = {J. High Speed Networks}, volume = {30}, number = {2}, pages = {147--174}, year = {2024}, url = {https://doi.org/10.3233/JHS-230080}, doi = {10.3233/JHS-230080}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/GranataMRCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/ShirleyKRKRHT24, author = {C. P. Shirley and Jaydip Kumar and Kantilal Pitambar Rane and Narendra Kumar and Deevi Radha Rani and Kuntamukkula Harshitha and Mohit Tiwari}, title = {IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security}, journal = {J. High Speed Networks}, volume = {30}, number = {2}, pages = {191--201}, year = {2024}, url = {https://doi.org/10.3233/JHS-230028}, doi = {10.3233/JHS-230028}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/ShirleyKRKRHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/Song24, author = {Can Song}, title = {Performance study of fuzzy C-mean clustering algorithm based on local density in network security}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {4}, pages = {10637--10651}, year = {2024}, url = {https://doi.org/10.3233/jifs-235082}, doi = {10.3233/JIFS-235082}, timestamp = {Fri, 03 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/Song24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/WangZL24, author = {Jia Wang and Ke Zhang and Jingyuan Li}, title = {Network awareness of security situation information security measurement method based on data mining}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {1}, pages = {209--219}, year = {2024}, url = {https://doi.org/10.3233/jifs-233390}, doi = {10.3233/JIFS-233390}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/WangZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ZhangZLWWHFW24, author = {Kun Zhang and Yu Zhou and Haixia Long and Shulei Wu and Chaoyang Wang and Haizhuang Hong and Xixi Fu and Haifeng Wang}, title = {Design and implementation of marine information management network security system based on artificial intelligence embedded technology}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {2}, pages = {4817--4827}, year = {2024}, url = {https://doi.org/10.3233/jifs-236018}, doi = {10.3233/JIFS-236018}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/ZhangZLWWHFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WuZ24, author = {Yaxing Wu and Dongmei Zhao}, title = {Build IPSO-ABiLSTM Model for Network Security Situation Prediction}, journal = {J. Inf. Sci. Eng.}, volume = {40}, number = {1}, pages = {71--88}, year = {2024}, url = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=196\_2645}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jise/WuZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/NandyNKIB24, author = {Tarak Nandy and Rafidah Md Noor and Raenu Kolandaisamy and Mohd Yamani Idna Bin Idris and Sananda Bhattacharyya}, title = {A review of security attacks and intrusion detection in the vehicular networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {36}, number = {2}, pages = {101945}, year = {2024}, url = {https://doi.org/10.1016/j.jksuci.2024.101945}, doi = {10.1016/J.JKSUCI.2024.101945}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/NandyNKIB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/WangGZ24, author = {Feng Wang and Yongjie Gai and Haitao Zhang}, title = {Blockchain user digital identity big data and information security process protection based on network trust}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {36}, number = {5}, pages = {102031}, year = {2024}, url = {https://doi.org/10.1016/j.jksuci.2024.102031}, doi = {10.1016/J.JKSUCI.2024.102031}, timestamp = {Tue, 09 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/WangGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AltaweelAK24, author = {Ala Altaweel and Sidra Aslam and Ibrahim Kamel}, title = {Security attacks in Opportunistic Mobile Networks: {A} systematic literature review}, journal = {J. Netw. Comput. Appl.}, volume = {221}, pages = {103782}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2023.103782}, doi = {10.1016/J.JNCA.2023.103782}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AltaweelAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IndrasonS24, author = {Ngangbam Indrason and Goutam Saha}, title = {Exploring Blockchain-driven security in SDN-based IoT networks}, journal = {J. Netw. Comput. Appl.}, volume = {224}, pages = {103838}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2024.103838}, doi = {10.1016/J.JNCA.2024.103838}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IndrasonS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/LemosCFFF24, author = {Filipe Augusto da Luz Lemos and Thiago dos Santos Cavali and Keiko Ver{\^{o}}nica Ono Fonseca and Mauro S{\'{e}}rgio Pereira Fonseca and Rubens Alexandre De Faria}, title = {Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis}, journal = {J. Netw. Syst. Manag.}, volume = {32}, number = {4}, pages = {82}, year = {2024}, url = {https://doi.org/10.1007/s10922-024-09862-4}, doi = {10.1007/S10922-024-09862-4}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/LemosCFFF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/RabahDRL24, author = {Mohamed Amine Ould Rabah and Hamza Drid and Mohamed Rahouti and Nadjib Lazaar}, title = {Empowering {UAV} Communications with AI-Assisted Software-Defined Networks: {A} Review on Performance, Security, and Efficiency}, journal = {J. Netw. Syst. Manag.}, volume = {32}, number = {4}, pages = {90}, year = {2024}, url = {https://doi.org/10.1007/s10922-024-09866-0}, doi = {10.1007/S10922-024-09866-0}, timestamp = {Tue, 17 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/RabahDRL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/Yan24, author = {Zhangmin Yan}, title = {Establishment of urban green corridor network based on neural network and landscape ecological security}, journal = {J. Comput. Sci.}, volume = {79}, pages = {102315}, year = {2024}, url = {https://doi.org/10.1016/j.jocs.2024.102315}, doi = {10.1016/J.JOCS.2024.102315}, timestamp = {Sun, 14 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocs/Yan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/WaniRHK24, author = {Mohamad Saalim Wani and Michael Rademacher and Thorsten Horstmann and Mathias Kretschmer}, title = {Security Vulnerabilities in 5G Non-Stand-Alone Networks: {A} Systematic Analysis and Attack Taxonomy}, journal = {J. Cybersecur. Priv.}, volume = {4}, number = {1}, pages = {23--40}, year = {2024}, url = {https://doi.org/10.3390/jcp4010002}, doi = {10.3390/JCP4010002}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/WaniRHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimS24, author = {Ha Rang Kim and Hyun Min Song}, title = {Lightweight {IDS} Framework Using Word Embeddings for In-Vehicle Network Security}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {1--13}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.001}, doi = {10.58346/JOWUA.2024.I2.001}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SreevidyaS24, author = {B. Sreevidya and M. Supriya}, title = {Trust based Routing - {A} Novel Approach for Data Security in {WSN} based Data Critical Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {27--41}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.003}, doi = {10.58346/JOWUA.2024.I1.003}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SreevidyaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jr/Robotics24g, title = {Retracted: Security Risk and Preventive Measures of Multimedia Database System under Remote Control of Network Robot}, journal = {J. Robotics}, volume = {2024}, pages = {1}, year = {2024}, url = {https://doi.org/10.1155/2024/9893014}, doi = {10.1155/2024/9893014}, timestamp = {Mon, 10 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jr/Robotics24g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/AhmedA24, author = {Huda A. Ahmed and Hamid Ali Abed Al{-}Asadi}, title = {An Optimized Link State Routing Protocol with a Blockchain Framework for Efficient Video-Packet Transmission and Security over Mobile Ad-Hoc Networks}, journal = {J. Sens. Actuator Networks}, volume = {13}, number = {2}, pages = {22}, year = {2024}, url = {https://doi.org/10.3390/jsan13020022}, doi = {10.3390/JSAN13020022}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/AhmedA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/Batalla24, author = {Jordi Mongay Batalla}, title = {Featured Papers on Network Security and Privacy}, journal = {J. Sens. Actuator Networks}, volume = {13}, number = {1}, pages = {11}, year = {2024}, url = {https://doi.org/10.3390/jsan13010011}, doi = {10.3390/JSAN13010011}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/Batalla24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/YiZAL24, author = {Huiju Yi and Shengcai Zhang and Dezhi An and Zhenyu Liu}, title = {PatchesNet: PatchTST-based multi-scale network security situation prediction}, journal = {Knowl. Based Syst.}, volume = {299}, pages = {112037}, year = {2024}, url = {https://doi.org/10.1016/j.knosys.2024.112037}, doi = {10.1016/J.KNOSYS.2024.112037}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/YiZAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/JiangW24, author = {Yan Jiang and Xiuting Wang}, title = {Projection measure-driven optimization of q-rung orthopair fuzzy {MAGDM} for computer network security evaluation}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {28}, number = {1}, pages = {31--44}, year = {2024}, url = {https://doi.org/10.3233/KES-230172}, doi = {10.3233/KES-230172}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/JiangW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/LeiCWW24, author = {Fan Lei and Qiang Cai and Guiwu Wei and Cun Wei}, title = {{PDHL-MARCOS} method based on cumulative prospect theory for {MAGDM} and its application in network security evaluation}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {28}, number = {2}, pages = {359--387}, year = {2024}, url = {https://doi.org/10.3233/KES-230120}, doi = {10.3233/KES-230120}, timestamp = {Sun, 14 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/LeiCWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mdpinetwork/ElHajjG24, author = {Mohammed El{-}Hajj and Teklit Haftu Gebremariam}, title = {Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0}, journal = {Network}, volume = {4}, number = {3}, pages = {260--294}, year = {2024}, url = {https://doi.org/10.3390/network4030013}, doi = {10.3390/NETWORK4030013}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mdpinetwork/ElHajjG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mdpinetwork/MaosaOG24, author = {Herbert Maosa and Karim Ouazzane and Mohamed Chahine Ghanem}, title = {A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response}, journal = {Network}, volume = {4}, number = {1}, pages = {68--90}, year = {2024}, url = {https://doi.org/10.3390/network4010004}, doi = {10.3390/NETWORK4010004}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mdpinetwork/MaosaOG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AhujaSC24, author = {Pooja Ahuja and Preeti Sethi and Naresh Chauhan}, title = {A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks}, journal = {Multim. Tools Appl.}, volume = {83}, number = {11}, pages = {32715--32738}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16642-w}, doi = {10.1007/S11042-023-16642-W}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/AhujaSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AntonyR24, author = {Blessy Antony and S. Revathy}, title = {Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection}, journal = {Multim. Tools Appl.}, volume = {83}, number = {14}, pages = {41911--41937}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16851-3}, doi = {10.1007/S11042-023-16851-3}, timestamp = {Sun, 14 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AntonyR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MeganathanBAM24, author = {R. Meganathan and Manjunath B and R. Anand and V. Murugesh}, title = {Security establishment using deep convolutional network model in cyber-physical systems}, journal = {Multim. Tools Appl.}, volume = {83}, number = {31}, pages = {76201--76221}, year = {2024}, url = {https://doi.org/10.1007/s11042-024-18535-y}, doi = {10.1007/S11042-024-18535-Y}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MeganathanBAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ChiranjeeviM24, author = {V. Rahul Chiranjeevi and D. Malathi}, title = {Anomaly graph: leveraging dynamic graph convolutional networks for enhanced video anomaly detection in surveillance and security applications}, journal = {Neural Comput. Appl.}, volume = {36}, number = {20}, pages = {12011--12028}, year = {2024}, url = {https://doi.org/10.1007/s00521-024-09738-3}, doi = {10.1007/S00521-024-09738-3}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ChiranjeeviM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/NguyenDTG24, author = {Giang T. Nguyen and Stefan Dlugolinsky and Viet D. Tran and {\'{A}}lvaro L{\'{o}}pez Garc{\'{\i}}a}, title = {Network security AIOps for online stream data monitoring}, journal = {Neural Comput. Appl.}, volume = {36}, number = {24}, pages = {14925--14949}, year = {2024}, url = {https://doi.org/10.1007/s00521-024-09863-z}, doi = {10.1007/S00521-024-09863-Z}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/NguyenDTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/SongFYMJG24, author = {Yanbo Song and Tao Feng and Chungang Yang and Xinru Mi and Shanqing Jiang and Mohsen Guizani}, title = {{IS2N:} Intent-Driven Security Software-Defined Network With Blockchain}, journal = {{IEEE} Netw.}, volume = {38}, number = {3}, pages = {118--127}, year = {2024}, url = {https://doi.org/10.1109/MNET.138.2200539}, doi = {10.1109/MNET.138.2200539}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/SongFYMJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ZengSXL24, author = {Hui Zeng and Zhou Su and Qichao Xu and Ruidong Li}, title = {Security and Privacy in Space-Air-Ocean Integrated Unmanned Surface Vehicle Networks}, journal = {{IEEE} Netw.}, volume = {38}, number = {3}, pages = {48--56}, year = {2024}, url = {https://doi.org/10.1109/MNET.2024.3369907}, doi = {10.1109/MNET.2024.3369907}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ZengSXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/LiHWZQ24, author = {Peihao Li and Jie Huang and Huaqing Wu and Zeping Zhang and Chunyang Qi}, title = {SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning}, journal = {Neural Networks}, volume = {174}, pages = {106199}, year = {2024}, url = {https://doi.org/10.1016/j.neunet.2024.106199}, doi = {10.1016/J.NEUNET.2024.106199}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/LiHWZQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/GhoshKIBAASCAY24, author = {Moloy Kumar Ghosh and Milton Kumar Kundu and Md. Ibrahim and A. S. M. Badrudduza and Md. Shamim Anower and Imran Shafique Ansari and Annie Solomon and Sumit Chakravarty and Imtiaz Ahmed and Heejung Yu}, title = {Physical-Layer Security in Mixed {UOWC-RF} Networks With Energy Harvesting Relay Against Multiple Eavesdroppers}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {5}, pages = {2884--2902}, year = {2024}, url = {https://doi.org/10.1109/OJCOMS.2024.3373476}, doi = {10.1109/OJCOMS.2024.3373476}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/GhoshKIBAASCAY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/HoseiniSBAH24, author = {Sayed Amir Hoseini and Parastoo Sadeghi and Faycal Bouhafs and Neda Aboutorab and Frank T. H. den Hartog}, title = {Experimental Evaluation of Network-Controlled Physical-Layer Security Through Friendly Jamming}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {5}, pages = {2968--2979}, year = {2024}, url = {https://doi.org/10.1109/OJCOMS.2024.3393023}, doi = {10.1109/OJCOMS.2024.3393023}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/HoseiniSBAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/ShahrakiMK24, author = {Elmira Shahraki and Mahtab Mirmohseni and Hengameh Keshavarz}, title = {Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {5}, pages = {3136--3150}, year = {2024}, url = {https://doi.org/10.1109/OJCOMS.2024.3391624}, doi = {10.1109/OJCOMS.2024.3391624}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/ShahrakiMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/ZhaoZHZS24, author = {Xiang Zhao and Yuqing Zhao and Ju Huang and Wenbo Zhao and Jinyong Sun}, title = {Physical-Layer Security for Indoor Hybrid {PLC/VLC} Networks With {NOMA}}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {5}, pages = {872--884}, year = {2024}, url = {https://doi.org/10.1109/OJCOMS.2024.3353385}, doi = {10.1109/OJCOMS.2024.3353385}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcs/ZhaoZHZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/AlsumaytAAAEAAAAA24, author = {Albandari Alsumayt and Majid Alshammari and Zeyad M. Alfawaer and Fahd N. Al{-}Wesabi and Nahla El{-}Haggar and Sumayh S. Aljameel and Sarah Albassam and Shahad AlGhareeb and Nouf Mohammed Alghamdi and Nawir Aldossary}, title = {Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT)}, journal = {PeerJ Comput. Sci.}, volume = {10}, pages = {e2091}, year = {2024}, url = {https://doi.org/10.7717/peerj-cs.2091}, doi = {10.7717/PEERJ-CS.2091}, timestamp = {Sun, 14 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/AlsumaytAAAEAAAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/Lu24, author = {Feng Lu}, title = {Online shopping consumer perception analysis and future network security service technology using logistic regression model}, journal = {PeerJ Comput. Sci.}, volume = {10}, pages = {e1777}, year = {2024}, url = {https://doi.org/10.7717/peerj-cs.1777}, doi = {10.7717/PEERJ-CS.1777}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/Lu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/Ding24, author = {Weixiang Ding}, title = {A GAN-based security strategy for {WSN} networks based on honeypot algorithm}, journal = {Phys. Commun.}, volume = {62}, pages = {102260}, year = {2024}, url = {https://doi.org/10.1016/j.phycom.2023.102260}, doi = {10.1016/J.PHYCOM.2023.102260}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/Ding24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/SchererWS24a, author = {Philip Scherer and Christiane Weis and Thorsten Strufe}, title = {Provable Security for the Onion Routing and Mix Network Packet Format Sphinx}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {4}, pages = {755--783}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0140}, doi = {10.56553/POPETS-2024-0140}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SchererWS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qmi/HdaibRP24, author = {Moe Hdaib and Sutharshan Rajasegarar and Lei Pan}, title = {Quantum deep learning-based anomaly detection for enhanced network security}, journal = {Quantum Mach. Intell.}, volume = {6}, number = {1}, pages = {26}, year = {2024}, url = {https://doi.org/10.1007/s42484-024-00163-2}, doi = {10.1007/S42484-024-00163-2}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qmi/HdaibRP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HemaB24, author = {P. P. Hema and Anchare V. Babu}, title = {Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.371}, doi = {10.1002/SPY2.371}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HemaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JavedAMK24, author = {Mubeen Javed and Muhammad Arslan Akram and Adnan Noor Mian and Saru Kumari}, title = {On the security of a novel privacy-preserving authentication scheme for {V2G} networks}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.357}, doi = {10.1002/SPY2.357}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/JavedAMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/QasemSE24, author = {Asmaa Amer Qasem and Mona Shokair and Fathi E. Abd El{-}Samie}, title = {Physical-layer security enhancement in wireless sensor networks through artificial noise optimization}, journal = {Secur. Priv.}, volume = {7}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/spy2.385}, doi = {10.1002/SPY2.385}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/QasemSE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scl/LiSZ24, author = {Xiaohang Li and Peng Shi and Weidong Zhang}, title = {Dynamic memory-based event-triggered security control for networked control systems subjected to false-injection-data attack}, journal = {Syst. Control. Lett.}, volume = {190}, pages = {105843}, year = {2024}, url = {https://doi.org/10.1016/j.sysconle.2024.105843}, doi = {10.1016/J.SYSCONLE.2024.105843}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scl/LiSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/BudatiISCN24, author = {Anil Kumar Budati and Shayla Islam and Mohammad Rafee Shaik and Chengamma Chitteti and T. Lakshmi Narayana}, title = {Security Enabled New Term Weight Measure Technique with Data Driven for Next Generation Mobile Computing Networks}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {2}, pages = {1191--1198}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i2.2624}, doi = {10.12694/SCPE.V25I2.2624}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/BudatiISCN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/HangXZH24a, author = {Feilu Hang and Linjiang Xie and Zhenhong Zhang and Jian Hu}, title = {Construction of Power System Network Security Defense Behavior Decision-making Model based on Artificial Intelligence Technology}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {4}, pages = {2614--2620}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i4.2913}, doi = {10.12694/SCPE.V25I4.2913}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/HangXZH24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Liao24, author = {Yan Liao}, title = {Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {1}, pages = {65--74}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i1.2254}, doi = {10.12694/SCPE.V25I1.2254}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/Liao24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/LiaoZY24, author = {Zhouyuan Liao and Zhenhong Zhang and Ying Yan}, title = {Verification and Optimization of Network Security Defense System from the Perspective of Blue Army in Actual Offensive and Defensive Exercises}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {4}, pages = {2596--2602}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i4.2901}, doi = {10.12694/SCPE.V25I4.2901}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/LiaoZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Long24, author = {Kaiyi Long}, title = {A Study of Blockchain and Machine Learning-Enabled IoT Security in Time-Delayed Neural Network Vocal Pattern Recognition to Improve Web-Based Vocal Teaching}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {2}, pages = {812--823}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i2.2645}, doi = {10.12694/SCPE.V25I2.2645}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/Long24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/LuKY24, author = {Yan Lu and Yunxin Kuang and Qiufen Yang}, title = {Intelligent Prediction of Network Security Situations based on Deep Reinforcement Learning Algorithm}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {1}, pages = {147--155}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i1.2329}, doi = {10.12694/SCPE.V25I1.2329}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/LuKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/SongCZ24, author = {Chunna Song and Jinfang Cheng and Guoqiu Zhang}, title = {Network Security with Virtual Reality based Antivirus Protection and Reduced Detection Delays}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {1}, pages = {35--44}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i1.2172}, doi = {10.12694/SCPE.V25I1.2172}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/SongCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/TianCZLLLP24, author = {Chongfeng Tian and Zhihao Chen and Yi Zhu and Hongfei Lu and Guoxiao Li and Rongquan Li and Wei Pan}, title = {Optimization of Computer Network Security System Based on Improved Neural Network Algorithm and Data Searching}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {5}, pages = {3979--3988}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i5.3150}, doi = {10.12694/SCPE.V25I5.3150}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/TianCZLLLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Yang24b, author = {Bingyu Yang}, title = {Research on Network Security Situation Awareness Technology Based on Security Intelligent Monitoring Technology}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {2}, pages = {1107--1116}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i2.2604}, doi = {10.12694/SCPE.V25I2.2604}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/Yang24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AzizB24, author = {Zagroz Aziz and Robert Bestak}, title = {Insight into Anomaly Detection and Prediction and Mobile Network Security Enhancement Leveraging K-Means Clustering on Call Detail Records}, journal = {Sensors}, volume = {24}, number = {6}, pages = {1716}, year = {2024}, url = {https://doi.org/10.3390/s24061716}, doi = {10.3390/S24061716}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AzizB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GaoDZ24, author = {Qingji Gao and Haozhi Deng and Gaowei Zhang}, title = {A Contraband Detection Scheme in X-ray Security Images Based on Improved YOLOv8s Network Model}, journal = {Sensors}, volume = {24}, number = {4}, pages = {1158}, year = {2024}, url = {https://doi.org/10.3390/s24041158}, doi = {10.3390/S24041158}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GaoDZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HanainehMGB24, author = {Wael Al Hanaineh and Jos{\'{e}} Matas and Josep M. Guerrero and Mostafa Bakkar}, title = {A Secure Dual-Layer Fault Protection Strategy for Distribution Network with DERs: Enhancing Security in the Face of Communication Challenges}, journal = {Sensors}, volume = {24}, number = {4}, pages = {1057}, year = {2024}, url = {https://doi.org/10.3390/s24041057}, doi = {10.3390/S24041057}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HanainehMGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuHWZO24, author = {Liyazhou Hu and Chao Han and Xiaojun Wang and Han Zhu and Jian Ouyang}, title = {Security Enhancement for Deep Reinforcement Learning-Based Strategy in Energy-Efficient Wireless Sensor Networks}, journal = {Sensors}, volume = {24}, number = {6}, pages = {1993}, year = {2024}, url = {https://doi.org/10.3390/s24061993}, doi = {10.3390/S24061993}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HuHWZO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KhanKA24, author = {Shafiullah Khan and Muhammad Altaf Khan and Noha Alnazzawi}, title = {Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks}, journal = {Sensors}, volume = {24}, number = {5}, pages = {1641}, year = {2024}, url = {https://doi.org/10.3390/s24051641}, doi = {10.3390/S24051641}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KhanKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiWLYYY24, author = {Guoxing Li and Yuhe Wang and Shiming Li and Chao Yang and Qingqing Yang and Yanbin Yuan}, title = {Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm}, journal = {Sensors}, volume = {24}, number = {14}, pages = {4716}, year = {2024}, url = {https://doi.org/10.3390/s24144716}, doi = {10.3390/S24144716}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiWLYYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MaZM24, author = {Ronghao Ma and Jianhong Zhou and Maode Ma}, title = {A Blockchain-Assisted Security Protocol for Group Handover of {MTC} Devices in 5G Wireless Networks}, journal = {Sensors}, volume = {24}, number = {7}, pages = {2331}, year = {2024}, url = {https://doi.org/10.3390/s24072331}, doi = {10.3390/S24072331}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/MaZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MengistuKL24, author = {Tesfahunegn Minwuyelet Mengistu and Taewoon Kim and Jenn{-}Wei Lin}, title = {A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation in the Integration of IoT, Wireless Sensor Networks and Federated Learning}, journal = {Sensors}, volume = {24}, number = {3}, pages = {968}, year = {2024}, url = {https://doi.org/10.3390/s24030968}, doi = {10.3390/S24030968}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/MengistuKL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TranTVNRL24, author = {Minh Tran and Lam{-}Thanh Tu and Minh Bui Vu and Sang Quang Nguyen and Lubos Rejfek and Byung Moo Lee}, title = {Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network}, journal = {Sensors}, volume = {24}, number = {4}, pages = {1300}, year = {2024}, url = {https://doi.org/10.3390/s24041300}, doi = {10.3390/S24041300}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/TranTVNRL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UllahTUCZ24, author = {Farhan Ullah and Ali Turab and Shamsher Ullah and Diletta Cacciagrano and Yue Zhao}, title = {Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory}, journal = {Sensors}, volume = {24}, number = {13}, pages = {4152}, year = {2024}, url = {https://doi.org/10.3390/s24134152}, doi = {10.3390/S24134152}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/UllahTUCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YingZW24, author = {Fei Ying and Shengjie Zhao and Jia Wang}, title = {A Security Information Transmission Method Based on {DHR} for Seafloor Observation Network}, journal = {Sensors}, volume = {24}, number = {4}, pages = {1147}, year = {2024}, url = {https://doi.org/10.3390/s24041147}, doi = {10.3390/S24041147}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/YingZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/Singh24, author = {Surendra Singh}, title = {Energy efficient Security Driven Scheduling for Real-Time Tasks through DVS-enabled Fog Networks}, journal = {Simul. Model. Pract. Theory}, volume = {134}, pages = {102941}, year = {2024}, url = {https://doi.org/10.1016/j.simpat.2024.102941}, doi = {10.1016/J.SIMPAT.2024.102941}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/Singh24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/Kumar00KJ24, author = {Rakesh Kumar and Sunil K. Singh and D. K. Lobiyal and Sudhakar Kumar and Shashi Jawla}, title = {Security Metrics and Authentication-based RouTing {(SMART)} Protocol for Vehicular IoT Networks}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {2}, pages = {236}, year = {2024}, url = {https://doi.org/10.1007/s42979-023-02566-7}, doi = {10.1007/S42979-023-02566-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/Kumar00KJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/SinghM24a, author = {Wangjam Niranjan Singh and Ningrinla Marchang}, title = {Mitigating Security Attacks in Spectrum Allocation in Cognitive Radio Networks}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {5}, pages = {451}, year = {2024}, url = {https://doi.org/10.1007/s42979-024-02819-z}, doi = {10.1007/S42979-024-02819-Z}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/SinghM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CuiCSDXF24, author = {Zhiwei Cui and Baojiang Cui and Li Su and Haitao Du and Jie Xu and Junsong Fu}, title = {A formal security analysis of the fast authentication procedure based on the security context in 5G networks}, journal = {Soft Comput.}, volume = {28}, number = {3}, pages = {1865--1881}, year = {2024}, url = {https://doi.org/10.1007/s00500-023-09486-x}, doi = {10.1007/S00500-023-09486-X}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/CuiCSDXF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/suscom/DeivakaniSPF24, author = {M. Deivakani and M. Sahaya Sheela and K. Priyadarsini and Yousef Farhaoui}, title = {An intelligent security mechanism in mobile Ad-Hoc networks using precision probability genetic algorithms {(PPGA)} and deep learning technique (Stacked {LSTM)}}, journal = {Sustain. Comput. Informatics Syst.}, volume = {43}, pages = {101021}, year = {2024}, url = {https://doi.org/10.1016/j.suscom.2024.101021}, doi = {10.1016/J.SUSCOM.2024.101021}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/suscom/DeivakaniSPF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talip/GaoWQ24, author = {Yuan Gao and Yani Wu and Jun Qian}, title = {Intelligent Multimedia Network Security and {PBL} Teaching Mode in the Basic Course Teaching of College Design Major}, journal = {{ACM} Trans. Asian Low Resour. Lang. Inf. Process.}, volume = {23}, number = {6}, pages = {83}, year = {2024}, url = {https://doi.org/10.1145/3597429}, doi = {10.1145/3597429}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/talip/GaoWQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/LiuXY24, author = {Bing{-}Xin Liu and Guang{-}Bao Xu and Yu{-}Guang Yang}, title = {Complete Security Solution for Practical Quantum Network Coding}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {43}, number = {9}, pages = {2692--2704}, year = {2024}, url = {https://doi.org/10.1109/TCAD.2024.3382827}, doi = {10.1109/TCAD.2024.3382827}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/LiuXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/DaiHWLXL24, author = {Penglin Dai and Yaorong Huang and Xiao Wu and Ke Li and Huanlai Xing and Kai Liu}, title = {Freshness and Security-Aware Cache Update in Blockchain-Based Vehicular Edge Networks}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {108--121}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3345861}, doi = {10.1109/TCE.2023.3345861}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/DaiHWLXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/WuNXSYN24, author = {Yixuan Wu and Laisen Nie and Xuanrui Xiong and Balqies Sadoun and Lin Yang and Zhaolong Ning}, title = {Incremental Update Intrusion Detection for Industry 5.0 Security: {A} Graph Attention Network-Enabled Approach}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {2004--2017}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3331907}, doi = {10.1109/TCE.2023.3331907}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/WuNXSYN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/XuWZLX24, author = {Bo Xu and Jinpeng Wang and Zhehuan Zhao and Hongfei Lin and Feng Xia}, title = {Unsupervised Anomaly Detection on Attributed Networks With Graph Contrastive Learning for Consumer Electronics Security}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {4062--4072}, year = {2024}, url = {https://doi.org/10.1109/TCE.2024.3355122}, doi = {10.1109/TCE.2024.3355122}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/XuWZLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/YangXLWL24, author = {Aimin Yang and Baoshan Xie and Yikai Liu and Liya Wang and Jie Li}, title = {A Network Security Situation Prediction for Consumer Data in the Internet of Things Using Variational Mode Decomposition {(VMD)} and Fused CNN-BiLSTM-Attention}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {1122--1133}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3323546}, doi = {10.1109/TCE.2023.3323546}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/YangXLWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/AghajanPM24, author = {Adel Aghajan and Keith Paarporn and Jason R. Marden}, title = {Extension Theorems for General Lotto Games With Applications to Network Security}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {11}, number = {1}, pages = {185--196}, year = {2024}, url = {https://doi.org/10.1109/TCNS.2023.3272823}, doi = {10.1109/TCNS.2023.3272823}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/AghajanPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/OrugantiNA24, author = {Pradeep Sharma Oruganti and Parinaz Naghizadeh and Qadeer Ahmed}, title = {The Impact of Network Design Interventions on the Security of Interdependent Systems}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {11}, number = {1}, pages = {173--184}, year = {2024}, url = {https://doi.org/10.1109/TCNS.2023.3272849}, doi = {10.1109/TCNS.2023.3272849}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/OrugantiNA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuCWW24, author = {Chuan Yu and Shuhui Chen and Ziling Wei and Fei Wang}, title = {Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial {LTE/IMS} Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3048--3064}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3322267}, doi = {10.1109/TDSC.2023.3322267}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuCWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WangYLH24, author = {Shiyu Wang and Ming Yin and Yiwen Liu and Guofeng He}, title = {Generative adversarial networks-based security and applications in cloud computing: a survey}, journal = {Telecommun. Syst.}, volume = {86}, number = {2}, pages = {305--331}, year = {2024}, url = {https://doi.org/10.1007/s11235-024-01166-x}, doi = {10.1007/S11235-024-01166-X}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/WangYLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/LiuWZ24a, author = {Siting Liu and Changlin Wang and Yong Zhou}, title = {Analysis of Financial Data Risk and Network Information Security by Blockchain Technology and Edge Computing}, journal = {{IEEE} Trans. Engineering Management}, volume = {71}, pages = {12579--12592}, year = {2024}, url = {https://doi.org/10.1109/TEM.2022.3224290}, doi = {10.1109/TEM.2022.3224290}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tem/LiuWZ24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/ZhuGJZ24, author = {Huifeng Zhu and Xiaolong Guo and Yier Jin and Xuan Zhang}, title = {PowerScout: Security-Oriented Power Delivery Network Modeling for Side-Channel Vulnerability Analysis}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {12}, number = {2}, pages = {532--545}, year = {2024}, url = {https://doi.org/10.1109/TETC.2023.3257826}, doi = {10.1109/TETC.2023.3257826}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/ZhuGJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/TanGPXW24, author = {Cheng Tan and Chengzhen Gao and Jinzhu Peng and Xiangpeng Xie and Yaonan Wang}, title = {Neural-Network-Based Security Control for {T-S} Fuzzy System With Cooperative Event-Triggered Mechanism}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {32}, number = {8}, pages = {4633--4645}, year = {2024}, url = {https://doi.org/10.1109/TFUZZ.2024.3407751}, doi = {10.1109/TFUZZ.2024.3407751}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/TanGPXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaiSSCWQT24, author = {Xiao Cai and Kaibo Shi and Yanbin Sun and Jinde Cao and Shiping Wen and Cheng Qiao and Zhihong Tian}, title = {Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3857--3865}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347889}, doi = {10.1109/TIFS.2023.3347889}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaiSSCWQT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SuoCCPXL24, author = {Yuhan Suo and Senchun Chai and Runqi Chai and Zhong{-}Hua Pang and Yuanqing Xia and Guo{-}Ping Liu}, title = {Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1908--1921}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340098}, doi = {10.1109/TIFS.2023.3340098}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/SuoCCPXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GuangBY24, author = {Xuan Guang and Yang Bai and Raymond W. Yeung}, title = {Secure Network Function Computation for Linear Functions - Part {I:} Source Security}, journal = {{IEEE} Trans. Inf. Theory}, volume = {70}, number = {1}, pages = {676--697}, year = {2024}, url = {https://doi.org/10.1109/TIT.2023.3328454}, doi = {10.1109/TIT.2023.3328454}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GuangBY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangZWKF24, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan and Pingzhi Fan}, title = {Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {1}, pages = {370--385}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3307453}, doi = {10.1109/TITS.2023.3307453}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZWKF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WeiAZZ24, author = {Hongqian Wei and Qiang Ai and Yong Zhai and Youtong Zhang}, title = {Automotive Security: Threat Forewarning and {ECU} Source Mapping Derived From Physical Features of Network Signals}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {3}, pages = {2479--2491}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3321896}, doi = {10.1109/TITS.2023.3321896}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/WeiAZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tiv/DongYZ24, author = {Jiahao Dong and Zehua Ye and Dan Zhang}, title = {Finite-Time Security Control of Networked Unmanned Marine Vehicle Systems Subject to DoS Attack}, journal = {{IEEE} Trans. Intell. Veh.}, volume = {9}, number = {2}, pages = {3464--3477}, year = {2024}, url = {https://doi.org/10.1109/TIV.2024.3350246}, doi = {10.1109/TIV.2024.3350246}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tiv/DongYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/Pu24, title = {Retraction Note: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction}, journal = {J. Supercomput.}, volume = {80}, number = {10}, pages = {15101}, year = {2024}, url = {https://doi.org/10.1007/s11227-024-05971-8}, doi = {10.1007/S11227-024-05971-8}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/Pu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/JebreelDBS24, author = {Najeeb Moharram Jebreel and Josep Domingo{-}Ferrer and Alberto Blanco{-}Justicia and David S{\'{a}}nchez}, title = {Enhanced Security and Privacy via Fragmented Federated Learning}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {5}, pages = {6703--6717}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2022.3212627}, doi = {10.1109/TNNLS.2022.3212627}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/JebreelDBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhuoSG24, author = {Yue Zhuo and Zhihuan Song and Zhiqiang Ge}, title = {Security Versus Accuracy: Trade-Off Data Modeling to Safe Fault Classification Systems}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {9}, pages = {12095--12106}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2023.3251999}, doi = {10.1109/TNNLS.2023.3251999}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/ZhuoSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/BozorgchenaniZCNGML24, author = {Arash Bozorgchenani and Charilaos C. Zarakovitis and Su Fong Chien and Qiang Ni and Antonios Gouglidis and Wissam Mallouli and Heng Siong Lim}, title = {Intrusion Response Systems for the 5G Networks and Beyond: {A} New Joint Security-vs-QoS Optimization Approach}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {11}, number = {3}, pages = {3039--3052}, year = {2024}, url = {https://doi.org/10.1109/TNSE.2024.3358170}, doi = {10.1109/TNSE.2024.3358170}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/BozorgchenaniZCNGML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/CaiYGWZG24, author = {Yunfei Cai and Haipeng Yao and Yongkang Gong and Fu Wang and Ni Zhang and Mohsen Guizani}, title = {Privacy-Driven Security-Aware Task Scheduling Mechanism for Space-Air-Ground Integrated Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {11}, number = {5}, pages = {4704--4718}, year = {2024}, url = {https://doi.org/10.1109/TNSE.2024.3392389}, doi = {10.1109/TNSE.2024.3392389}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/CaiYGWZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ZhuYZNZ24, author = {Qingcheng Zhu and Xiaosong Yu and Yongli Zhao and Avishek Nag and Jie Zhang}, title = {{QKD} Key Provisioning With Multi-Level Pool Slicing for End-to-End Security Services in Optical Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {11}, number = {2}, pages = {2153--2169}, year = {2024}, url = {https://doi.org/10.1109/TNSE.2023.3338734}, doi = {10.1109/TNSE.2023.3338734}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ZhuYZNZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/BringhentiBSV24, author = {Daniele Bringhenti and Simone Bussa and Riccardo Sisto and Fulvio Valenza}, title = {A Two-Fold Traffic Flow Model for Network Security Management}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {4}, pages = {3740--3758}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2024.3407159}, doi = {10.1109/TNSM.2024.3407159}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/BringhentiBSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SedjelmaciB24, author = {Hichem Sedjelmaci and Abdelwahab Boualouache}, title = {When Two-Layer Federated Learning and Mean-Field Game Meet 5G and Beyond Security: Cooperative Defense Systems for 5G and Beyond Network Slicing}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {1}, pages = {1178--1189}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2023.3294568}, doi = {10.1109/TNSM.2023.3294568}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SedjelmaciB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/YangRSM24, author = {Li Yang and Mirna El Rajab and Abdallah Shami and Sami Muhaidat}, title = {Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {3}, pages = {3555--3582}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2024.3376631}, doi = {10.1109/TNSM.2024.3376631}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/YangRSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ZhaoJZHZ24, author = {Dongmei Zhao and Guoqing Ji and Yiling Zhang and Xunzheng Han and Shuiguang Zeng}, title = {A Network Security Situation Prediction Method Based on SSA-GResNeSt}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {3}, pages = {3498--3510}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2024.3373663}, doi = {10.1109/TNSM.2024.3373663}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ZhaoJZHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LiLJWTC24, author = {Yixin Li and Liang Liang and Yunjian Jia and Wanli Wen and Chaowei Tang and Zhengchuan Chen}, title = {Blockchain for Data Sharing at the Network Edge: Trade-Off Between Capability and Security}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {32}, number = {3}, pages = {2616--2630}, year = {2024}, url = {https://doi.org/10.1109/TNET.2024.3364023}, doi = {10.1109/TNET.2024.3364023}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/LiLJWTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ChengZCCJX24, author = {Yushi Cheng and Boyang Zhou and Yanjiao Chen and Yi{-}Chao Chen and Xiaoyu Ji and Wenyuan Xu}, title = {Evaluating Compressive Sensing on the Security of Computer Vision Systems}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {3}, pages = {56:1--56:24}, year = {2024}, url = {https://doi.org/10.1145/3645093}, doi = {10.1145/3645093}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ChengZCCJX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/JuYCLPXY24, author = {Ying Ju and Mingjie Yang and Chinmay Chakraborty and Lei Liu and Qingqi Pei and Ming Xiao and Keping Yu}, title = {Reliability-Security Tradeoff Analysis in mmWave Ad Hoc-based {CPS}}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {2}, pages = {28:1--28:23}, year = {2024}, url = {https://doi.org/10.1145/3582556}, doi = {10.1145/3582556}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/JuYCLPXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LiSX24, author = {Fangyu Li and WenZhan Song and Xiaohua Xu}, title = {Editorial: Special Issue on Cyber-Physical Security and Zero Trust}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {2}, pages = {26:1--26:2}, year = {2024}, url = {https://doi.org/10.1145/3634700}, doi = {10.1145/3634700}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LiSX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LiuTZWLZ24, author = {Junyi Liu and Yifu Tang and Haimeng Zhao and Xieheng Wang and Fangyu Li and Jingyi Zhang}, title = {{CPS} Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-Node Multi-Class Classification Approach}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {2}, pages = {33:1--33:27}, year = {2024}, url = {https://doi.org/10.1145/3585520}, doi = {10.1145/3585520}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LiuTZWLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/WangLLZ24, author = {Di Wang and Fangyu Li and Kaibo Liu and Xi Zhang}, title = {Real-time Cyber-Physical Security Solution Leveraging an Integrated Learning-Based Approach}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {2}, pages = {27:1--27:22}, year = {2024}, url = {https://doi.org/10.1145/3582009}, doi = {10.1145/3582009}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/WangLLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/LeiBW024, author = {Chao Lei and Siqi Bu and Qianggang Wang and Liang Liang}, title = {Observability Defense-Constrained Distribution Network Reconfiguration for Cyber-Physical Security Enhancement}, journal = {{IEEE} Trans. Smart Grid}, volume = {15}, number = {2}, pages = {2379--2382}, year = {2024}, url = {https://doi.org/10.1109/TSG.2023.3334078}, doi = {10.1109/TSG.2023.3334078}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/LeiBW024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ZhangDY24a, author = {Zhijun Zhang and Zhao Yang Dong and Christine Yip}, title = {When Mobile Energy Meets Active Distribution Networks: {A} Security-Economic Coordination Perspective}, journal = {{IEEE} Trans. Smart Grid}, volume = {15}, number = {3}, pages = {3126--3140}, year = {2024}, url = {https://doi.org/10.1109/TSG.2023.3339617}, doi = {10.1109/TSG.2023.3339617}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/ZhangDY24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsipn/ZhaGLXT24, author = {Lijuan Zha and Yaping Guo and Jinliang Liu and Xiangpeng Xie and Engang Tian}, title = {Protocol-Based Distributed Security Fusion Estimation for Time-Varying Uncertain Systems Over Sensor Networks: Tackling DoS Attacks}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {10}, pages = {119--130}, year = {2024}, url = {https://doi.org/10.1109/TSIPN.2024.3356789}, doi = {10.1109/TSIPN.2024.3356789}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsipn/ZhaGLXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LiuKLXT24, author = {Jian Liu and Jiachen Ke and Jinliang Liu and Xiangpeng Xie and Engang Tian}, title = {Stochastic Communication Protocol-Based Security Control for Discrete-Time Networked Systems Using State Observer}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {54}, number = {9}, pages = {5501--5512}, year = {2024}, url = {https://doi.org/10.1109/TSMC.2024.3406563}, doi = {10.1109/TSMC.2024.3406563}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/LiuKLXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/MarabissiMM24, author = {Dania Marabissi and Simone Morosi and Lorenzo Mucchi}, title = {Green Security in Ultra-Dense Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {6}, pages = {8736--8749}, year = {2024}, url = {https://doi.org/10.1109/TVT.2024.3356908}, doi = {10.1109/TVT.2024.3356908}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/MarabissiMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhouHJNLL24, author = {Tianqing Zhou and Haiqin Hu and Nan Jiang and Xuefang Nie and Xuan Li and Chunguo Li}, title = {Joint Security Service Assignment, Power Control and Multi-Step Computation Offloading in Ultra-Dense Multi-Task NOMA-Enabled Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {7}, pages = {10211--10227}, year = {2024}, url = {https://doi.org/10.1109/TVT.2024.3368019}, doi = {10.1109/TVT.2024.3368019}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ZhouHJNLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/AliAHC24, author = {Konpal Shaukat Ali and Arafat Al{-}Dweik and Ekram Hossain and Marwa Chafii}, title = {Physical Layer Security of Partial-NOMA and {NOMA} in Poisson Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {23}, number = {6}, pages = {6562--6579}, year = {2024}, url = {https://doi.org/10.1109/TWC.2023.3334020}, doi = {10.1109/TWC.2023.3334020}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/AliAHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/FengLZNW24, author = {Shaohan Feng and Xiao Lu and Kun Zhu and Dusit Niyato and Ping Wang}, title = {Covert {D2D} Communication Underlaying Cellular Network: {A} System-Level Security Perspective}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {23}, number = {8}, pages = {9518--9533}, year = {2024}, url = {https://doi.org/10.1109/TWC.2024.3363186}, doi = {10.1109/TWC.2024.3363186}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/FengLZNW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/AlthunayyanJR24, author = {Muzun Althunayyan and Amir Javed and Omer Rana}, title = {A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning}, journal = {Veh. Commun.}, volume = {49}, pages = {100837}, year = {2024}, url = {https://doi.org/10.1016/j.vehcom.2024.100837}, doi = {10.1016/J.VEHCOM.2024.100837}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/AlthunayyanJR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/FanWBLGW24, author = {Na Fan and Chase Wu and Slimane Benabdallah and Jialong Li and Yuxin Gao and Qinglong Wang}, title = {On a security scheme against collusive attacks in vehicular ad hoc networks}, journal = {Veh. Commun.}, volume = {49}, pages = {100821}, year = {2024}, url = {https://doi.org/10.1016/j.vehcom.2024.100821}, doi = {10.1016/J.VEHCOM.2024.100821}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/FanWBLGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/OdongEAA24, author = {Patrick Odong and Ahmed H. Abd El{-}Malek and Ahmed Allam and Adel B. Abdel{-}Rahman}, title = {Physical layer security in SWIPT-based cooperative vehicular relaying networks}, journal = {Veh. Commun.}, volume = {49}, pages = {100835}, year = {2024}, url = {https://doi.org/10.1016/j.vehcom.2024.100835}, doi = {10.1016/J.VEHCOM.2024.100835}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/OdongEAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/ZhaoSHZ24, author = {Dongmei Zhao and Pengcheng Shen and Xunzheng Han and Shuiguang Zeng}, title = {Security situation assessment in {UAV} swarm networks using TransReSE: {A} Transformer-ResNeXt-SE based approach}, journal = {Veh. Commun.}, volume = {50}, pages = {100842}, year = {2024}, url = {https://doi.org/10.1016/j.vehcom.2024.100842}, doi = {10.1016/J.VEHCOM.2024.100842}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/ZhaoSHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/ZhangDXRLLH24, author = {Xuemin Zhang and Haitao Deng and Zenggang Xiong and Ying Rao and Yanchao Liu and Yuan Li and Delin Hou}, title = {Self-Organizing Key Security Management Algorithm in Socially Aware Networking}, journal = {J. Signal Process. Syst.}, volume = {96}, number = {6-7}, pages = {369--383}, year = {2024}, url = {https://doi.org/10.1007/s11265-024-01918-7}, doi = {10.1007/S11265-024-01918-7}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/ZhangDXRLLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/AbdallaMAM24, author = {Aly Sabri Abdalla and Joshua Moore and Nisha Adhikari and Vuk Marojevic}, title = {{ZTRAN:} Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {2}, pages = {66--73}, year = {2024}, url = {https://doi.org/10.1109/MWC.001.2300419}, doi = {10.1109/MWC.001.2300419}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/AbdallaMAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/AloqailyPLTH24, author = {Moayad Aloqaily and Helen Paik and Willian T. Lunardi and Cihan Tunc and Fang He}, title = {Guest Editorial: Zero Trust Security Methods for Wireless Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {2}, pages = {12--13}, year = {2024}, url = {https://doi.org/10.1109/MWC.2024.10495912}, doi = {10.1109/MWC.2024.10495912}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/AloqailyPLTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/Ansari24, author = {Nirwan Ansari}, title = {Advancements in Wireless Network Security and Next-Generation Technologies}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {2}, pages = {2--3}, year = {2024}, url = {https://doi.org/10.1109/MWC.2024.10495917}, doi = {10.1109/MWC.2024.10495917}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/Ansari24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/CaoYGAG24, author = {Haotong Cao and Longxiang Yang and Sahil Garg and Mubarak Alrashoud and Mohsen Guizani}, title = {Softwarized Resource Allocation of Tailored Services with Zero Security Trust in 6G Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {2}, pages = {58--65}, year = {2024}, url = {https://doi.org/10.1109/MWC.001.2300383}, doi = {10.1109/MWC.001.2300383}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/CaoYGAG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/LiuSPXWL24, author = {Yiliang Liu and Zhou Su and Haixia Peng and Yushan Xiang and Wei Wang and Ruidong Li}, title = {Zero Trust-Based Mobile Network Security Architecture}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {2}, pages = {82--88}, year = {2024}, url = {https://doi.org/10.1109/MWC.001.2300375}, doi = {10.1109/MWC.001.2300375}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/LiuSPXWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/WangLLK24, author = {Jiadai Wang and Yuanhao Li and Jiajia Liu and Nei Kato}, title = {Intelligent Network Slicing for {B5G} and 6G: Resource Allocation, Service Provisioning, and Security}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {3}, pages = {271--277}, year = {2024}, url = {https://doi.org/10.1109/MWC.021.2200589}, doi = {10.1109/MWC.021.2200589}, timestamp = {Wed, 03 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/WangLLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/WangYKNHG24, author = {Weizheng Wang and Yaoqi Yang and Latif U. Khan and Dusit Niyato and Zhu Han and Mohsen Guizani}, title = {Digital Twin for Wireless Networks: Security Attacks and Solutions}, journal = {{IEEE} Wirel. Commun.}, volume = {31}, number = {3}, pages = {278--285}, year = {2024}, url = {https://doi.org/10.1109/MWC.020.2200609}, doi = {10.1109/MWC.020.2200609}, timestamp = {Wed, 03 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/WangYKNHG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AlghamdiSAKSDRV24, author = {Abdullah Alghamdi and Ali M. Al Shahrani and Sultan Sughair AlYami and Ihtiram Raza Khan and P. S. G. Aruna Sri and Papiya Dutta and Ali Rizwan and Prashanth Venkatareddy}, title = {Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network}, journal = {Wirel. Networks}, volume = {30}, number = {6}, pages = {5851--5866}, year = {2024}, url = {https://doi.org/10.1007/s11276-023-03345-1}, doi = {10.1007/S11276-023-03345-1}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AlghamdiSAKSDRV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/DingW24, author = {Zhenguo Ding and Yuejin Wang}, title = {Multi-step attack threat recognition algorithm based on attribute association in internet of things security}, journal = {Wirel. Networks}, volume = {30}, number = {5}, pages = {4275--4286}, year = {2024}, url = {https://doi.org/10.1007/s11276-022-02940-y}, doi = {10.1007/S11276-022-02940-Y}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/DingW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/FusterSPVPAL24, author = {Jaime F{\'{u}}ster and Sonia Solera{-}Cotanilla and Jaime P{\'{e}}rez and Mario Vega{-}Barbas and Rafael Palacios and Manuel Alvarez{-}Campana and Gregorio L{\'{o}}pez}, title = {Analysis of security and privacy issues in wearables for minors}, journal = {Wirel. Networks}, volume = {30}, number = {6}, pages = {5437--5453}, year = {2024}, url = {https://doi.org/10.1007/s11276-022-03211-6}, doi = {10.1007/S11276-022-03211-6}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/FusterSPVPAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/JegatheesanA24, author = {Divya Jegatheesan and Chandrasekar Arumugam}, title = {SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles}, journal = {Wirel. Networks}, volume = {30}, number = {4}, pages = {2061--2080}, year = {2024}, url = {https://doi.org/10.1007/s11276-023-03626-9}, doi = {10.1007/S11276-023-03626-9}, timestamp = {Mon, 10 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/JegatheesanA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/MohanrajK24, author = {P. Mohanraj and S. Anbu Karuppusamy}, title = {Efficient security framework against sybil attack in mobile adhoc network using {EE-OLSR} protocol scheme}, journal = {Wirel. Networks}, volume = {30}, number = {2}, pages = {661--669}, year = {2024}, url = {https://doi.org/10.1007/s11276-023-03502-6}, doi = {10.1007/S11276-023-03502-6}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/MohanrajK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/PandeyB24, author = {Shraiyash Pandey and Bharat Bhushan}, title = {Recent Lightweight cryptography {(LWC)} based security advances for resource-constrained IoT networks}, journal = {Wirel. Networks}, volume = {30}, number = {4}, pages = {2987--3026}, year = {2024}, url = {https://doi.org/10.1007/s11276-024-03714-4}, doi = {10.1007/S11276-024-03714-4}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/PandeyB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/PorkodiK24, author = {S. Porkodi and D. Kesavaraja}, title = {Scammer identification using CatBoost in smart contract for enhancing security in blockchain network}, journal = {Wirel. Networks}, volume = {30}, number = {3}, pages = {1165--1186}, year = {2024}, url = {https://doi.org/10.1007/s11276-023-03552-w}, doi = {10.1007/S11276-023-03552-W}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/PorkodiK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/PorkodiK24a, author = {S. Porkodi and D. Kesavaraja}, title = {Smart contract: a survey towards extortionate vulnerability detection and security enhancement}, journal = {Wirel. Networks}, volume = {30}, number = {3}, pages = {1285--1304}, year = {2024}, url = {https://doi.org/10.1007/s11276-023-03587-z}, doi = {10.1007/S11276-023-03587-Z}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/PorkodiK24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/SoundararajanNNV24, author = {S. Soundararajan and B. Nithya and N. Nithya and T. Vignesh}, title = {Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network}, journal = {Wirel. Networks}, volume = {30}, number = {4}, pages = {2439--2455}, year = {2024}, url = {https://doi.org/10.1007/s11276-024-03674-9}, doi = {10.1007/S11276-024-03674-9}, timestamp = {Mon, 10 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/SoundararajanNNV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/TamizshelvanV24, author = {C. Tamizshelvan and V. Vijayalakshmi}, title = {Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures}, journal = {Wirel. Networks}, volume = {30}, number = {4}, pages = {2099--2114}, year = {2024}, url = {https://doi.org/10.1007/s11276-024-03658-9}, doi = {10.1007/S11276-024-03658-9}, timestamp = {Mon, 10 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/TamizshelvanV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/DeviS24a, author = {V. Anusuya Devi and T. Sampradeepraj}, title = {End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid {(AES-RSA)} Cryptography}, journal = {Wirel. Pers. Commun.}, volume = {136}, number = {3}, pages = {1675--1703}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11353-3}, doi = {10.1007/S11277-024-11353-3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/DeviS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/FatimaAMKC24, author = {Sumbal Fatima and Muhammad Arslan Akram and Adnan Noor Mian and Saru Kumari and Chien{-}Ming Chen}, title = {On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {136}, number = {2}, pages = {1079--1106}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11318-6}, doi = {10.1007/S11277-024-11318-6}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/FatimaAMKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MoundoungaSBES24, author = {Anselme Russel Affane Moundounga and Hassan Satori and Youssef Boutazart and Abderahim Ezzine and Khalid Satori}, title = {Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models}, journal = {Wirel. Pers. Commun.}, volume = {135}, number = {4}, pages = {1965--1992}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-10999-3}, doi = {10.1007/S11277-024-10999-3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MoundoungaSBES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/RanaCP24, author = {Pragati Rana and Sanjeev Chauhan and B. P. Patil}, title = {Cyber Security Threats Detection in IoT Using Krill Based Deep Neural Network Stacked Auto Encoders}, journal = {Wirel. Pers. Commun.}, volume = {135}, number = {1}, pages = {299--322}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11002-9}, doi = {10.1007/S11277-024-11002-9}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/RanaCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SekharM24, author = {P. Chandra Sekhar and T. S. N. Murthy}, title = {{RSMO:} Rider Spider Monkey Optimization-Based Artificial Noise Precoding Technique for Physical Layer Security in 5G Networks}, journal = {Wirel. Pers. Commun.}, volume = {135}, number = {4}, pages = {2355--2377}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11166-4}, doi = {10.1007/S11277-024-11166-4}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SekharM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SelviGMYR24, author = {M. Selvi and Kalaiarasi Governor and Suja Cherukullapurath Mana and R. Yogitha and Padmavathy Ramanujam}, title = {Energy and Security Aware Hybrid Optimal Cluster-based Routing in Wireless Sensor Network}, journal = {Wirel. Pers. Commun.}, volume = {137}, number = {3}, pages = {1395--1422}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11288-9}, doi = {10.1007/S11277-024-11288-9}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SelviGMYR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SharmaPC24, author = {Rishi Sharma and Anjali Potnis and Vijayshri Chaurasia}, title = {Enhancing Smart Home Security Using Deep Convolutional Neural Networks and Multiple Cameras}, journal = {Wirel. Pers. Commun.}, volume = {136}, number = {4}, pages = {2185--2200}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11371-1}, doi = {10.1007/S11277-024-11371-1}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SharmaPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BhosaleKS24, author = {Pushparaj Bhosale and Wolfgang Kastner and Thilo Sauter}, title = {Modeling Human Error Factors with Security Incidents in Industrial Control Systems: {A} Bayesian Belief Network Approach}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {53:1--53:9}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3670875}, doi = {10.1145/3664476.3670875}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BhosaleKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KomisarekPDKPC24, author = {Mikolaj Komisarek and Marek Pawlicki and Salvatore D'Antonio and Rafal Kozik and Aleksandra Pawlicka and Michal Choras}, title = {Enhancing Network Security Through Granular Computing: {A} Clustering-by-Time Approach to NetFlow Traffic Analysis}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {93:1--93:8}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3670882}, doi = {10.1145/3664476.3670882}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KomisarekPDKPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VoudourisFPPX24, author = {Anastassios Voudouris and Aristeidis Farao and Aggeliki Panou and John Polley and Christos Xenakis}, title = {Integrating Hyperledger Fabric with Satellite Communications: {A} Revolutionary Approach for Enhanced Security and Decentralization in Space Networks}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {134:1--134:8}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3669921}, doi = {10.1145/3664476.3669921}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/VoudourisFPPX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aicconf/FenjanAAFSSV24, author = {Ali Fenjan and Mohammed Thakir Mahmood Almashhadany and Saadaldeen Rashid Ahmed and Hala Adnan Fadel and Ravi Sekhar and Pritesh Shah and B. S. Veena}, title = {Adaptive Intrusion Detection System Using Deep Learning for Network Security}, booktitle = {Proceedings of the Cognitive Models and Artificial Intelligence Conference, {AICCONF} 2024, {\.{I}}stanbul, Turkiye, May 25-26, 2024}, pages = {279--284}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3660853.3660928}, doi = {10.1145/3660853.3660928}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aicconf/FenjanAAFSSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aicconf/HammadAAAMA24, author = {Atheer Alaa Hammad and Saadaldeen Rashid Ahmed and Mohammad K. Abdul{-}Hussein and Mohammed R. Ahmed and Duaa A. Majeed and Sameer Algburi}, title = {Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security}, booktitle = {Proceedings of the Cognitive Models and Artificial Intelligence Conference, {AICCONF} 2024, {\.{I}}stanbul, Turkiye, May 25-26, 2024}, pages = {292--297}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3660853.3660930}, doi = {10.1145/3660853.3660930}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aicconf/HammadAAAMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aicconf/HarbiMAH24, author = {Yasmine Harbi and Salsabyl Merat and Zibouda Aliouat and Saad Harous}, title = {Bio-inspired Intrusion Detection System for Internet of Things Networks Security}, booktitle = {Proceedings of the Cognitive Models and Artificial Intelligence Conference, {AICCONF} 2024, {\.{I}}stanbul, Turkiye, May 25-26, 2024}, pages = {14--19}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3660853.3660856}, doi = {10.1145/3660853.3660856}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aicconf/HarbiMAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/MalhotraWG24, author = {Akul Malhotra and Chunguang Wang and Sumeet Kumar Gupta}, title = {BNN-Flip: Enhancing the Fault Tolerance and Security of Compute-in-Memory Enabled Binary Neural Network Accelerators}, booktitle = {Proceedings of the 29th Asia and South Pacific Design Automation Conference, {ASPDAC} 2024, Incheon, Korea, January 22-25, 2024}, pages = {146--152}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ASP-DAC58780.2024.10473947}, doi = {10.1109/ASP-DAC58780.2024.10473947}, timestamp = {Thu, 22 Aug 2024 15:31:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/MalhotraWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balt/KamparsMG24, author = {Janis Kampars and Guntis Mosans and Janis Grabis}, editor = {Audrone Lupeikiene and Jolita Ralyt{\'{e}} and Gintautas Dzemyda}, title = {Network Topology Based Identification and Analysis of Security Threats in Data Centres}, booktitle = {Digital Business and Intelligent Systems - 16th International Baltic Conference, Baltic DB{\&}IS 2024, Vilnius, Lithuania, June 30 - July 3, 2024, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2157}, pages = {161--176}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-63543-4\_11}, doi = {10.1007/978-3-031-63543-4\_11}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/balt/KamparsMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/XuYHPZZ24, author = {Ranyue Xu and Wei Yu and Hao Huang and Yongchun Pan and Chen Zhou and Gang Zheng}, title = {Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence Platform}, booktitle = {10th {IEEE} Conference on Big Data Security on Cloud, BigDataSecurity 2024, New York City, NY, USA, May 10-12, 2024}, pages = {173--178}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/BigDataSecurity62737.2024.00038}, doi = {10.1109/BIGDATASECURITY62737.2024.00038}, timestamp = {Mon, 01 Jul 2024 17:15:07 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/XuYHPZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/YuQXJFS24, author = {Wei Yu and Jianguo Qian and Ranyue Xu and Chenxing Jin and Haina Fang and Xianhai Shi}, title = {Improving Substation Network Security with DevSecOps and AIOps}, booktitle = {10th {IEEE} Conference on Big Data Security on Cloud, BigDataSecurity 2024, New York City, NY, USA, May 10-12, 2024}, pages = {113--118}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/BigDataSecurity62737.2024.00027}, doi = {10.1109/BIGDATASECURITY62737.2024.00027}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/YuQXJFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/XuYWF24, author = {Lei Xu and Xiaoyu Ye and Cuicui Wang and Yu Fu}, title = {A Blockchain{\_}based Security Protection Scheme of Computing Force Network}, booktitle = {{IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2024, Toronto, ON, Canada, June 19-21, 2024}, pages = {1--2}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/BMSB62888.2024.10608329}, doi = {10.1109/BMSB62888.2024.10608329}, timestamp = {Thu, 15 Aug 2024 10:49:00 +0200}, biburl = {https://dblp.org/rec/conf/bmsb/XuYWF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/AhmedA24, author = {Sabrina Ahmed and Mohammed Zamshed Ali}, title = {Application-Specific Security in IoT Network}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {636--637}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454649}, doi = {10.1109/CCNC51664.2024.10454649}, timestamp = {Tue, 26 Mar 2024 22:14:36 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/AhmedA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colins/SachenkoWR24, author = {Anatoliy Sachenko and Jacek Woloszyn and Serhii Rimashevskyi}, editor = {Victoria Vysotska and Yevhen Burov}, title = {Enhancing Network Security Through Wavelet Analysis}, booktitle = {Proceedings of the 8th International Conference on Computational Linguistics and Intelligent Systems. Volume {III:} Intelligent Systems Workshop, Lviv, Ukraine, April 12-13, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3688}, pages = {415--424}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3688/paper27.pdf}, timestamp = {Tue, 28 May 2024 17:18:47 +0200}, biburl = {https://dblp.org/rec/conf/colins/SachenkoWR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/DixitVF24, author = {Unnati Dixit and Shwetha Vittal and A. Antony Franklin}, title = {A Systematic Study for Understanding the Security Risks in 5G Core Network}, booktitle = {16th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024}, pages = {43--48}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/COMSNETS59351.2024.10427440}, doi = {10.1109/COMSNETS59351.2024.10427440}, timestamp = {Fri, 01 Mar 2024 14:04:41 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/DixitVF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/KotenkoL24, author = {Igor V. Kotenko and Diana Levshun}, title = {Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation}, booktitle = {16th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024}, pages = {816--824}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/COMSNETS59351.2024.10426939}, doi = {10.1109/COMSNETS59351.2024.10426939}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/KotenkoL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/RaoK24, author = {DTV Ramakrishna Rao and Manjul Khandelwal}, title = {On Running Disabled Networking Features: {A} Taxonomy with Security Implications}, booktitle = {16th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024}, pages = {582--585}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/COMSNETS59351.2024.10427438}, doi = {10.1109/COMSNETS59351.2024.10427438}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/RaoK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csaide/GaoPLJYL24, author = {Xiaoping Gao and Yue Pan and Jinjin Li and Tao Ji and Yin Yuan and Zhengnan Liu}, title = {Design of network security protection network architecture for intelligent networked vehicles}, booktitle = {Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy, {CSAIDE} 2024, Nanjing, China, March 1-3, 2024}, pages = {26--33}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3672919.3672925}, doi = {10.1145/3672919.3672925}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csaide/GaoPLJYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csaide/LiYZW24, author = {Ting Li and Jinjiang Yang and Yin Zhou and Shaojun Wei}, title = {Research on Performance Optimization of Encryption Algorithms for Network Security Framework}, booktitle = {Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy, {CSAIDE} 2024, Nanjing, China, March 1-3, 2024}, pages = {650--653}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3672919.3673034}, doi = {10.1145/3672919.3673034}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csaide/LiYZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/ZhouYLZGZ24, author = {Feng Zhou and Ming Yuan and Yu Liu and Hongbing Zhang and Mingyu Gu and Tongming Zhou}, title = {Niect: {A} Model for Intrusion Security Detection Applied to Campus Video Surveillance Edge Networks}, booktitle = {11th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2024, Shanghai, China, June 28-30, 2024}, pages = {24--29}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CSCloud62866.2024.00012}, doi = {10.1109/CSCLOUD62866.2024.00012}, timestamp = {Fri, 16 Aug 2024 11:44:15 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/ZhouYLZGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/YanYZ0H24, author = {Zeqing Yan and Guangxi Yu and Mengqi Zhan and Yan Zhang and Jiaxi Hu}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Tie Qiu and Xiaobo Zhou and Jinghui Zhang and Haibin Zhu and Kunkun Peng and Tianyi Xu and Ning Chen}, title = {5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust}, booktitle = {27th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024}, pages = {1597--1602}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CSCWD61410.2024.10580371}, doi = {10.1109/CSCWD61410.2024.10580371}, timestamp = {Mon, 29 Jul 2024 16:18:15 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/YanYZ0H24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/Zhao0HZG24, author = {Angxiao Zhao and Wenying Feng and Ning Hu and Dawei Zhao and Zhaoquan Gu}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Tie Qiu and Xiaobo Zhou and Jinghui Zhang and Haibin Zhu and Kunkun Peng and Tianyi Xu and Ning Chen}, title = {Knowledge Embedding Enabled Cyber Security Defense for Networked System: {A} Novel Risk Detection Method based on Knowledge Graph}, booktitle = {27th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024}, pages = {3146--3151}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CSCWD61410.2024.10580583}, doi = {10.1109/CSCWD61410.2024.10580583}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/Zhao0HZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/HamoucheKMS24, author = {Djameleddine Hamouche and Reda Kadri and Mohamed{-}Lamine Messai and Hamida Seba}, title = {{(POSTER)} {A} Graph Dataset for Security Enforcement in IoT Networks : GRASEC-IoT}, booktitle = {20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2024, Abu Dhabi, United Arab Emirates, April 29 - May 1, 2024}, pages = {765--767}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DCOSS-IoT61029.2024.00118}, doi = {10.1109/DCOSS-IOT61029.2024.00118}, timestamp = {Mon, 19 Aug 2024 20:57:13 +0200}, biburl = {https://dblp.org/rec/conf/dcoss/HamoucheKMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GaltierANOCK24, author = {Florent Galtier and Guillaume Auriol and Vincent Nicomette and Paul L. R. Olivier and Romain Cayre and Mohamed Ka{\^{a}}niche}, editor = {Federico Maggi and Manuel Egele and Mathias Payer and Michele Carminati}, title = {Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14828}, pages = {525--544}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64171-8\_27}, doi = {10.1007/978-3-031-64171-8\_27}, timestamp = {Sat, 20 Jul 2024 14:18:50 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GaltierANOCK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ease/GambaIRGFNP24, author = {Davide La Gamba and Gerardo Iuliano and Gilberto Recupito and Giammaria Giordano and Filomena Ferrucci and Dario Di Nucci and Fabio Palomba}, title = {Toward a Search-Based Approach to Support the Design of Security Tests for Malicious Network Traffic}, booktitle = {Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, {EASE} 2024, Salerno, Italy, June 18-21, 2024}, pages = {624--628}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3661167.3661288}, doi = {10.1145/3661167.3661288}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ease/GambaIRGFNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/educon/Al-OmarTQP24, author = {Ban Al{-}Omar and Zouheir Trabelsi and Tariq Qayyum and Medha Mohan Ambali Parambil}, title = {{AI} and Network Security Curricula: Minding the Gap}, booktitle = {{IEEE} Global Engineering Education Conference, {EDUCON} 2024, Kos Island, Greece, May 8-11, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EDUCON60312.2024.10578588}, doi = {10.1109/EDUCON60312.2024.10578588}, timestamp = {Thu, 18 Jul 2024 16:56:13 +0200}, biburl = {https://dblp.org/rec/conf/educon/Al-OmarTQP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/UccelloPDKC24, author = {Federica Uccello and Marek Pawlicki and Salvatore D'Antonio and Rafal Kozik and Michal Choras}, editor = {Leonard Barolli}, title = {An Innovative Approach to Real-Time Concept Drift Detection in Network Security}, booktitle = {Advances in Internet, Data {\&} Web Technologies - The 12th International Conference on Emerging Internet, Data {\&} Web Technologies, {EIDWT} 2024, Naples, Italy, 21-23 February 2024}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {193}, pages = {130--139}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-53555-0\_13}, doi = {10.1007/978-3-031-53555-0\_13}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/UccelloPDKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/LiyanagePZSSYS24, author = {Madhusanka Liyanage and Pawani Porambage and Engin Zeydan and Thulitha Senavirathne and Yushan Siriwardhana and Awaneesh Kumar Yadav and Bartlomiej Siniarski}, title = {Advancing Security for 6G Smart Networks and Services}, booktitle = {Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2024, Antwerp, Belgium, June 3-6, 2024}, pages = {1169--1174}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuCNC/6GSummit60053.2024.10597131}, doi = {10.1109/EUCNC/6GSUMMIT60053.2024.10597131}, timestamp = {Mon, 29 Jul 2024 21:17:00 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/LiyanagePZSSYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/SuomalainenASKMAJR24, author = {Jani Suomalainen and Kimmo Ahola and Mirko Sailio and Gabor Kiss and Gabor Megyaszai and Rizwan Asif and Petri Jehkonen and Jonathan Rivalan}, title = {Tactical Orchestration : Network, Security, and Drone Intelligence for Mission-Critical Operations}, booktitle = {Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2024, Antwerp, Belgium, June 3-6, 2024}, pages = {1061--1066}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuCNC/6GSummit60053.2024.10597035}, doi = {10.1109/EUCNC/6GSUMMIT60053.2024.10597035}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/SuomalainenASKMAJR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/MonjurY24, author = {Mohammad Mezanur Rahman Monjur and Qiaoyan Yu}, editor = {Inna Partin{-}Vaisband and Srinivas Katkoori and Lu Peng and Boris Vaisband and Tooraj Nikoubin}, title = {Advanced Continuous-Time Convolution Framework for Security Assurance in Wireless Sensor Networks}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2024, {GLSVLSI} 2024, Clearwater, FL, USA, June 12-14, 2024}, pages = {319--322}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3649476.3658785}, doi = {10.1145/3649476.3658785}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/MonjurY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/RakotondravonyPPH24, author = {No{\"{e}}lle Rakotondravony and Henrich C. P{\"{o}}hls and Jan Pfeifer and Lane Harrison}, editor = {Abbas Moallem}, title = {Viz\({}^{\mbox{4}}\)NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - 6th International Conference, {HCI-CPT} 2024, Held as Part of the 26th {HCI} International Conference, {HCII} 2024, Washington, DC, USA, June 29 - July 4, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14729}, pages = {164--185}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61382-1\_11}, doi = {10.1007/978-3-031-61382-1\_11}, timestamp = {Wed, 12 Jun 2024 15:08:27 +0200}, biburl = {https://dblp.org/rec/conf/hci/RakotondravonyPPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/heart/HaaseVG24, author = {Julian Haase and Nico Volkens and Diana Goehringer}, editor = {Lana Josipovic and Peipei Zhou and Shreejith Shanker and Jo{\~{a}}o M. P. Cardoso and Jason Anderson and Shibata Yuichiro}, title = {Embedded Security Accelerators within Network-on-Chip Environments}, booktitle = {Proceedings of the 14th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies, {HEART} 2024, Porto, Portugal, June 19-21, 2024}, pages = {37--43}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3665283.3665290}, doi = {10.1145/3665283.3665290}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/heart/HaaseVG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/FerraroGP24, author = {Antonino Ferraro and Valerio La Gatta and Marco Postiglione}, title = {Empowering Network Security with Autoencoders}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2024 - Workshops, Seoul, Republic of Korea, April 14-19, 2024}, pages = {346--350}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSPW62465.2024.10627534}, doi = {10.1109/ICASSPW62465.2024.10627534}, timestamp = {Wed, 04 Sep 2024 08:54:35 +0200}, biburl = {https://dblp.org/rec/conf/icassp/FerraroGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChatterjeeR24, author = {Pushpita Chatterjee and Danda B. Rawat}, title = {Security Enhanced Framework for Network Access Control in Distributed Software-Defined Networks}, booktitle = {{IEEE} International Conference on Communications Workshops, {ICC} 2024 Workshops, Denver, CO, USA, June 9-13, 2024}, pages = {1816--1821}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCWorkshops59551.2024.10615557}, doi = {10.1109/ICCWORKSHOPS59551.2024.10615557}, timestamp = {Wed, 21 Aug 2024 14:57:07 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChatterjeeR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GhoshNDL24, author = {Uttam Ghosh and Laurent Njilla and Debashis Das and Eugene Levin}, title = {{FLAS:} {A} Federated Learning Framework for Adaptive Security in Edge-Driven {UAV} Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {1298--1303}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622352}, doi = {10.1109/ICC51166.2024.10622352}, timestamp = {Mon, 02 Sep 2024 15:04:36 +0200}, biburl = {https://dblp.org/rec/conf/icc/GhoshNDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HossainO24, author = {Khondoker Murad Hossain and Tim Oates}, title = {Advancing Security in {AI} Systems: {A} Novel Approach to Detecting Backdoors in Deep Neural Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {740--745}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622312}, doi = {10.1109/ICC51166.2024.10622312}, timestamp = {Mon, 09 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/HossainO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PatelRJ0TA24, author = {Nemi Patel and Fenil Ramoliya and Nilesh Kumar Jadav and Rajesh Gupta and Sudeep Tanwar and Gagangeet Singh Aujla}, title = {{X-NET:} Explainable AI-Based Network Data Security Framework for Healthcare 4.0}, booktitle = {{IEEE} International Conference on Communications Workshops, {ICC} 2024 Workshops, Denver, CO, USA, June 9-13, 2024}, pages = {481--486}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCWorkshops59551.2024.10615382}, doi = {10.1109/ICCWORKSHOPS59551.2024.10615382}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/PatelRJ0TA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PereraAFE24, author = {Tharaka Perera and Saman Atapattu and Yuting Fang and Jamie S. Evans}, title = {Graph Neural Networks for Physical-Layer Security in Multi-User Flexible-Duplex Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {2294--2299}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622731}, doi = {10.1109/ICC51166.2024.10622731}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/PereraAFE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TamimSR24, author = {Ibrahim Tamim and Abdallah Shami and Ahmed Refaey}, title = {Security and High-Availability While Upholding Network Defense Patterns: The Advantages of {A2C} in {O-RAN} {VNF} Placement}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {1072--1077}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622252}, doi = {10.1109/ICC51166.2024.10622252}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/TamimSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/TashmanCH24, author = {Deemah H. Tashman and Soumaya Cherkaoui and Walaa Hamouda}, title = {Federated Learning-based {MARL} for Strengthening Physical-Layer Security in {B5G} Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {293--298}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622458}, doi = {10.1109/ICC51166.2024.10622458}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/TashmanCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad2/JablaouiL24a, author = {Rahma Jablaoui and Noureddine Liouane}, title = {An effective deep {CNN-LSTM} based intrusion detection system for network security}, booktitle = {International Conference on Control, Automation and Diagnosis, {ICCAD} 2024, Paris, France, May 15-17, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCAD60883.2024.10553826}, doi = {10.1109/ICCAD60883.2024.10553826}, timestamp = {Thu, 27 Jun 2024 16:32:22 +0200}, biburl = {https://dblp.org/rec/conf/iccad2/JablaouiL24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/MaoXSW24, author = {Jianzhou Mao and Guobin Xu and Eric Sakk and Shuangbao Wang}, title = {Advancing Network Security with Quantum-Safe System Integration}, booktitle = {33rd International Conference on Computer Communications and Networks, {ICCCN} 2024, Kailua-Kona, HI, USA, July 29-31, 2024}, pages = {1--9}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCCN61486.2024.10637630}, doi = {10.1109/ICCCN61486.2024.10637630}, timestamp = {Tue, 10 Sep 2024 15:34:17 +0200}, biburl = {https://dblp.org/rec/conf/icccn/MaoXSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccde/AnsariIA24, author = {Jawad Ahmad Ansari and Mohamad Khairi Ishak and Khalid Ammar}, title = {Enhancing Network Security and Efficiency in Smart Cities: SDN-Based Hashing Authentication}, booktitle = {Proceedings of the 2024 10th International Conference on Computing and Data Engineering, {ICCDE} 2024, Bangkok, Thailand, January 15-17, 2024}, pages = {118--123}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3641181.3641202}, doi = {10.1145/3641181.3641202}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccde/AnsariIA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccr/FakhouriAAND24, author = {Hussam N. Fakhouri and Basim Alhadidi and Mohammad A. Alsharaiah and Heba Al Naddaf and Ashraf Saleh Alomoush Data}, title = {Critical Evaluation of the Role of Cloud Systems and Networking in the Security and Growth of the Business Market}, booktitle = {2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, February 26-28, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCR61006.2024.10533145}, doi = {10.1109/ICCR61006.2024.10533145}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccr/FakhouriAAND24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccr/SaeedIAAMG24, author = {Nouf Majid Sultan Eid Saeed and Amer Ibrahim and Liaqat Ali and Nidal A. Al{-}Dmour and Abdul Salam Mohammed and Taher M. Ghazal}, title = {Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: {A} Comprehensive Literature Review}, booktitle = {2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, February 26-28, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCR61006.2024.10533066}, doi = {10.1109/ICCR61006.2024.10533066}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccr/SaeedIAAMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/Tripathi24, author = {Arpit Tripathi}, title = {Security Framework for Non-public 5G Network Deployments}, booktitle = {Proceedings of the 25th International Conference on Distributed Computing and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024}, pages = {248--249}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3631461.3632513}, doi = {10.1145/3631461.3632513}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/Tripathi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BusnelL24, author = {Yann Busnel and L{\'{e}}o Lavaur}, title = {Tutorial: Federated Learning {\texttimes} Security for Network Monitoring}, booktitle = {44th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2024 - Workshops, Jersey City, NJ, USA, July 23, 2024}, pages = {13--16}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICDCSW63686.2024.00008}, doi = {10.1109/ICDCSW63686.2024.00008}, timestamp = {Sat, 21 Sep 2024 14:04:19 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/BusnelL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/YouNSSKCS24, author = {Myoungsung You and Jaehyun Nam and Hyunmin Seo and Minjae Seo and Jaehan Kim and Dongmin Choi and Seungwon Shin}, title = {HardWhale: {A} Hardware-Isolated Network Security Enforcement System for Cloud Environments}, booktitle = {44th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2024, Jersey City, NJ, USA, July 23-26, 2024}, pages = {496--507}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICDCS60910.2024.00053}, doi = {10.1109/ICDCS60910.2024.00053}, timestamp = {Wed, 11 Sep 2024 11:31:56 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/YouNSSKCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ZhangSCC24, author = {Yu Zhang and Yanqing Song and Jianguo Chen and Long Chen}, editor = {De{-}Shuang Huang and Wei Chen and Yijie Pan}, title = {Generative Adversarial Network for Enhancement Network Security Log Detection}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14869}, pages = {381--390}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5603-2\_31}, doi = {10.1007/978-981-97-5603-2\_31}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/ZhangSCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icict2/PapeM24a, author = {Nathan Pape and Christopher Mansour}, title = {{PASTA} Threat Modeling for Vehicular Networks Security}, booktitle = {7th International Conference on Information and Computer Technologies, {ICICT} 2024, Honolulu, HI, USA, March 15-17, 2024}, pages = {474--478}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICICT62343.2024.00083}, doi = {10.1109/ICICT62343.2024.00083}, timestamp = {Wed, 26 Jun 2024 08:34:38 +0200}, biburl = {https://dblp.org/rec/conf/icict2/PapeM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icict2/Tateiwa24a, author = {Yuichiro Tateiwa}, title = {Development of Dialogue Feature between Participants and ChatGPT in Network Security Exercise System}, booktitle = {7th International Conference on Information and Computer Technologies, {ICICT} 2024, Honolulu, HI, USA, March 15-17, 2024}, pages = {479--484}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICICT62343.2024.00084}, doi = {10.1109/ICICT62343.2024.00084}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icict2/Tateiwa24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icin/KalafatidisAGLV24, author = {Sarantis Kalafatidis and George Agrafiotis and Konstantinos Giapantzis and Antonios Lalas and Konstantinos Votis}, editor = {Prosper Chemouil and Barbara Martini and Carmen Mas Machuca and Panagiotis Papadimitriou and Davide Borsatti and St{\'{e}}phane Rovedakis}, title = {Experiments with Digital Security Processes over SDN-Based Cloud-Native 5G Core Networks}, booktitle = {27th Conference on Innovation in Clouds, Internet and Networks, {ICIN} 2024, Paris, France, March 11-14, 2024}, pages = {97--99}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICIN60470.2024.10494481}, doi = {10.1109/ICIN60470.2024.10494481}, timestamp = {Tue, 07 May 2024 20:10:51 +0200}, biburl = {https://dblp.org/rec/conf/icin/KalafatidisAGLV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icin/SantosTBTBJ24, author = {Jos{\'{e}} Santos and Eddy Truyen and Christoph Baumann and Filip De Turck and Gerald Budigiri and Wouter Joosen}, editor = {Prosper Chemouil and Barbara Martini and Carmen Mas Machuca and Panagiotis Papadimitriou and Davide Borsatti and St{\'{e}}phane Rovedakis}, title = {Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks}, booktitle = {27th Conference on Innovation in Clouds, Internet and Networks, {ICIN} 2024, Paris, France, March 11-14, 2024}, pages = {222--227}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICIN60470.2024.10494432}, doi = {10.1109/ICIN60470.2024.10494432}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icin/SantosTBTBJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsa/BabuKVSP24, author = {Chitra Babu and Akil Karthikeyan and Nandakishor Velu and Kaarthik Sivakumar and Abhishek Pathak}, title = {A Novel Approach for Security Analysis in Microservices Using Graph Neural Networks}, booktitle = {21st {IEEE} International Conference on Software Architecture, {ICSA} 2024 - Companion, Hyderabad, India, June 4-8, 2024}, pages = {65--68}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICSA-C63560.2024.00017}, doi = {10.1109/ICSA-C63560.2024.00017}, timestamp = {Wed, 04 Sep 2024 21:11:41 +0200}, biburl = {https://dblp.org/rec/conf/icsa/BabuKVSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenLZWSL24, author = {Xuanbang Chen and Ziqi Liu and Xun Zhang and Yuhao Wang and Dayu Shi and Xiaodong Liu}, title = {Optic Fingerprint: Enhancing Security in Visible Light Communication Networks}, booktitle = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications Workshops, Vancouver, BC, Canada, May 20, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620698}, doi = {10.1109/INFOCOMWKSHPS61880.2024.10620698}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenLZWSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/IhekoronyeINL024, author = {Vivian Ukamaka Ihekoronye and Urslla Uchechi Izuazu and Cosmas Ifeanyi Nwakanma and Jae Min Lee and Dong{-}Seong Kim}, title = {{ASR-FED:} Agnostic Straggler Resilient Federated Algorithm for Drone Networks Security}, booktitle = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications Workshops, Vancouver, BC, Canada, May 20, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620729}, doi = {10.1109/INFOCOMWKSHPS61880.2024.10620729}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/IhekoronyeINL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/AliWLA24, author = {Sijjad Ali and Jia Wang and Victor Chung Ming Leung and Asad Ali}, editor = {Anna Kobusinska and Andreas Jacobsson and Victor Chang}, title = {Decentralized Ransomware Recovery Network: Enhancing Resilience and Security Through Secret Sharing Schemes}, booktitle = {Proceedings of the 9th International Conference on Internet of Things, Big Data and Security, IoTBDS 2024, Angers, France, April 28-30, 2024}, pages = {294--301}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012713500003705}, doi = {10.5220/0012713500003705}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/AliWLA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdfs/CaoZ24, author = {Kunpeng Cao and Leyi Zhang}, title = {Research on Network Security Measurement on the Basis of Defense-In-Depth}, booktitle = {12th International Symposium on Digital Forensics and Security, {ISDFS} 2024, San Antonio, TX, USA, April 29-30, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISDFS60797.2024.10527238}, doi = {10.1109/ISDFS60797.2024.10527238}, timestamp = {Mon, 03 Jun 2024 20:37:05 +0200}, biburl = {https://dblp.org/rec/conf/isdfs/CaoZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdfs/KshetriMRS24, author = {Naresh Kshetri and Rahul Mishra and Mir Mehedi Rahman and Tanja Steigner}, title = {HNMblock: Blockchain Technology Powered Healthcare Network Model for Epidemiological Monitoring, Medical Systems Security, and Wellness}, booktitle = {12th International Symposium on Digital Forensics and Security, {ISDFS} 2024, San Antonio, TX, USA, April 29-30, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISDFS60797.2024.10527226}, doi = {10.1109/ISDFS60797.2024.10527226}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isdfs/KshetriMRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdfs/VijayanJS24, author = {Vismaya Vijayan and Kurunandan Jain and Narayanan Subramanian}, title = {Chaos-Based Stream Ciphers for 5G Inter-Slice Network Security}, booktitle = {12th International Symposium on Digital Forensics and Security, {ISDFS} 2024, San Antonio, TX, USA, April 29-30, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISDFS60797.2024.10527324}, doi = {10.1109/ISDFS60797.2024.10527324}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isdfs/VijayanJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CiravegnaBL24, author = {Flavio Ciravegna and Giacomo Bruno and Antonio Lioy}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {IKE-less IPsec: Enhancing Security for IoT Device Networks}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper35.pdf}, timestamp = {Fri, 26 Jul 2024 13:58:33 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CiravegnaBL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RivittiT024, author = {Alessandro Rivitti and Angelo Tulumello and Giuseppe Bianchi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {The Case for Ultra High Speed Portable Network Security Filters}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper11.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/RivittiT024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medcomnet/IoannouSRCV24, author = {Iacovos Ioannou and Michael Savva and Marios Raspopoulos and Christophoros Christophorou and Vasos Vassiliou}, title = {Revolutionising IoT Network Security By Assessing {ML} Localisation Techniques Against Jamming Attacks}, booktitle = {22nd Mediterranean Communication and Computer Networking Conference, MedComNet 2024, Nice, France, June 11-13, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/MedComNet62012.2024.10578201}, doi = {10.1109/MEDCOMNET62012.2024.10578201}, timestamp = {Thu, 18 Jul 2024 21:16:16 +0200}, biburl = {https://dblp.org/rec/conf/medcomnet/IoannouSRCV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meditcom/BattaggiaCDACR24, author = {Matteo Battaggia and Alessandro Cammarano and Juan Manuel Villarreal D'Angelo and Jose Avila and Maxime Compasti{\'{e}} and Hossein Rouzegar}, title = {A security threat analysis for unified network orchestration across terrestrial and non-terrestrial resources}, booktitle = {{IEEE} International Mediterranean Conference on Communications and Networking, MeditCom 2024, Madrid, Spain, July 8-11, 2024}, pages = {547--552}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/MeditCom61057.2024.10621163}, doi = {10.1109/MEDITCOM61057.2024.10621163}, timestamp = {Tue, 20 Aug 2024 14:42:17 +0200}, biburl = {https://dblp.org/rec/conf/meditcom/BattaggiaCDACR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metroi/MarabissiSM24, author = {Dania Marabissi and Andrea Stomaci and Lorenzo Mucchi}, title = {Adaptive Security in Mobile Wireless Networks: Machine Learning-Enhanced Continuous Physical Layer Authentication for Dynamic Environments}, booktitle = {{IEEE} International Workshop on Metrology for Industry 4.0 and IoT, MetroInd4.0 {\&} IoT 2024, Firenze, Italy, May 29-31, 2024}, pages = {310--315}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/MetroInd4.0IoT61288.2024.10584234}, doi = {10.1109/METROIND4.0IOT61288.2024.10584234}, timestamp = {Mon, 15 Jul 2024 15:28:30 +0200}, biburl = {https://dblp.org/rec/conf/metroi/MarabissiSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/AyoughiNSS24, author = {Negin Ayoughi and Shiva Nejati and Mehrdad Sabetzadeh and Patricio Saavedra}, editor = {Alexander Egyed and Manuel Wimmer and Marsha Chechik and Beno{\^{\i}}t Combemale}, title = {Enhancing Automata Learning with Statistical Machine Learning: {A} Network Security Case Study}, booktitle = {Proceedings of the {ACM/IEEE} 27th International Conference on Model Driven Engineering Languages and Systems, {MODELS} 2024, Linz, Austria, September 22-27, 2024}, pages = {172--182}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3640310.3674087}, doi = {10.1145/3640310.3674087}, timestamp = {Mon, 23 Sep 2024 11:58:23 +0200}, biburl = {https://dblp.org/rec/conf/models/AyoughiNSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/MatencioEscolarBAWS24, author = {Antonio Matencio{-}Escolar and Jorge Bernal Bernab{\'{e}} and Jos{\'{e}} M. Alcaraz and Qi Wang and Antonio F. Skarmeta}, title = {Network slicing as 6G security mechanism to mitigate cyber-attacks: the {RIGOUROUS} approach}, booktitle = {10th {IEEE} International Conference on Network Softwarization, NetSoft 2024, Saint Louis, MO, USA, June 24-28, 2024}, pages = {387--392}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NetSoft60951.2024.10588887}, doi = {10.1109/NETSOFT60951.2024.10588887}, timestamp = {Thu, 18 Jul 2024 21:28:05 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/MatencioEscolarBAWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/QuinnSBH24, author = {Travis Quinn and Syed Danial Ali Shah and Faycal Bouhafs and Frank T. H. den Hartog}, title = {Towards trust-based routing for data plane security in heterogeneous Software-Defined Wireless Networks}, booktitle = {10th {IEEE} International Conference on Network Softwarization, NetSoft 2024, Saint Louis, MO, USA, June 24-28, 2024}, pages = {37--42}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NetSoft60951.2024.10588898}, doi = {10.1109/NETSOFT60951.2024.10588898}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/QuinnSBH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/SunkaraAMC24, author = {Uday Kiran Sunkara and Abdulquadri Abiru and Kyle Morman and Aaron Costin}, title = {Poster: Hardware Security for IoT Wireless Network}, booktitle = {10th {IEEE} International Conference on Network Softwarization, NetSoft 2024, Saint Louis, MO, USA, June 24-28, 2024}, pages = {324--325}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NetSoft60951.2024.10588947}, doi = {10.1109/NETSOFT60951.2024.10588947}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/SunkaraAMC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/PizzatoBSV24a, author = {Francesco Pizzato and Daniele Bringhenti and Riccardo Sisto and Fulvio Valenza}, title = {Security Automation in next-generation Networks and Cloud environments}, booktitle = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul, Republic of Korea, May 6-10, 2024}, pages = {1--4}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NOMS59830.2024.10575650}, doi = {10.1109/NOMS59830.2024.10575650}, timestamp = {Tue, 16 Jul 2024 15:37:36 +0200}, biburl = {https://dblp.org/rec/conf/noms/PizzatoBSV24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/TovarnakCDHRT24, author = {Daniel Tovarn{\'{a}}k and Michal Cech and Vojtech Dohnal and Martin Hamern{\'{\i}}k and Mat{\'{u}}s Racek and Dusan Tich{\'{y}}}, title = {The True Cost of Network Security Automation: Demo Playbook for Posture Assessment}, booktitle = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul, Republic of Korea, May 6-10, 2024}, pages = {1--3}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NOMS59830.2024.10575557}, doi = {10.1109/NOMS59830.2024.10575557}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/TovarnakCDHRT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/Abdo0A24, author = {Ahmed Abdo and Guoyuan Wu and Nael B. Abu{-}Ghazaleh}, editor = {Margaret Loper and Alessandro Pellegrini}, title = {VEhicular Secure Network Open Simulator {(VESNOS):} {A} Cyber-security oriented co-simulation platform for connected and automated driving}, booktitle = {Proceedings of the 38th {ACM} {SIGSIM} Conference on Principles of Advanced Discrete Simulation, {SIGSIM-PADS} 2024, Atlanta, GA, USA, June 24-26, 2024}, pages = {108--118}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3615979.3656054}, doi = {10.1145/3615979.3656054}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pads/Abdo0A24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/HuWQJ24, author = {Zheng Hu and Luke Waind and Yanfeng Qu and Dong Jin}, editor = {Margaret Loper and Alessandro Pellegrini}, title = {Synchronized Power Simulation and Programmable Network Emulation Testbed for {SCADA} System Security Evaluation}, booktitle = {Proceedings of the 38th {ACM} {SIGSIM} Conference on Principles of Advanced Discrete Simulation, {SIGSIM-PADS} 2024, Atlanta, GA, USA, June 24-26, 2024}, pages = {69--70}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3615979.3662153}, doi = {10.1145/3615979.3662153}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pads/HuWQJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siu/AydinAG24, author = {Burak Aydin and Hakan Aydin and Sedat G{\"{o}}rm{\"{u}}s}, title = {A Security Mechanism Against Man in the Middle Attack in 6TiSCH Networks}, booktitle = {32nd Signal Processing and Communications Applications Conference, {SIU} 2024, Mersin, Turkiye, May 15-18, 2024}, pages = {1--4}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SIU61531.2024.10600741}, doi = {10.1109/SIU61531.2024.10600741}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/siu/AydinAG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnets/Asefi-GhamariHM24, author = {Hamidreza Asefi{-}Ghamari and Murtadha Hassani and Imad Mahgoub}, title = {Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security}, booktitle = {International Conference on Smart Applications, Communications and Networking, SmartNets 2024, Harrisonburg, VA, USA, May 28-30, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SmartNets61466.2024.10577718}, doi = {10.1109/SMARTNETS61466.2024.10577718}, timestamp = {Tue, 23 Jul 2024 14:13:06 +0200}, biburl = {https://dblp.org/rec/conf/smartnets/Asefi-GhamariHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnets/GhubaishYJ24, author = {Ali Ghubaish and Zebo Yang and Raj Jain}, title = {{HDRL-IDS:} {A} Hybrid Deep Reinforcement Learning Intrusion Detection System for Enhancing the Security of Medical Applications in 5G Networks}, booktitle = {International Conference on Smart Applications, Communications and Networking, SmartNets 2024, Harrisonburg, VA, USA, May 28-30, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SmartNets61466.2024.10577692}, doi = {10.1109/SMARTNETS61466.2024.10577692}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartnets/GhubaishYJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XuSL24, author = {Jiacen Xu and Xiaokui Shu and Zhou Li}, title = {Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco, CA, USA, May 19-23, 2024}, pages = {3590--3608}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SP54263.2024.00012}, doi = {10.1109/SP54263.2024.00012}, timestamp = {Sat, 21 Sep 2024 14:24:56 +0200}, biburl = {https://dblp.org/rec/conf/sp/XuSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/syscon/CalloM24, author = {Anthony Callo and Mo Mansouri}, title = {Food Security in Global Food Distribution Networks: {A} Systems Thinking Approach}, booktitle = {{IEEE} International Systems Conference, SysCon 2024, Montreal, QC, Canada, April 15-18, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SysCon61195.2024.10553516}, doi = {10.1109/SYSCON61195.2024.10553516}, timestamp = {Mon, 24 Jun 2024 15:01:05 +0200}, biburl = {https://dblp.org/rec/conf/syscon/CalloM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tfm/BruckerM24, author = {Achim D. Brucker and Diego Marmsoler}, editor = {Emil Sekerinski and Leila Ribeiro}, title = {Teaching Formal Methods in Application Domains - {A} Case Study in Computer and Network Security}, booktitle = {Formal Methods Teaching - 6th Formal Methods Teaching Workshop, FMTea 2024, Milan, Italy, September 10, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14939}, pages = {124--140}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71379-8\_8}, doi = {10.1007/978-3-031-71379-8\_8}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tfm/BruckerM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/BabusiakS24, author = {Branko Babusiak and Maros Smondrk}, title = {Building a Wireless Sensor Network with nRF24 Module for Home Security: Design and Implementation}, booktitle = {47th International Conference on Telecommunications and Signal Processing, {TSP} 2024, Prague, Czech Republic, July 10-12, 2024}, pages = {315--319}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TSP63128.2024.10605919}, doi = {10.1109/TSP63128.2024.10605919}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsp/BabusiakS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DiaaFHDEK0LMOAK24, author = {Abdulrahman Diaa and Lucas Fenaux and Thomas Humphries and Marian Dietz and Faezeh Ebrahimianghazani and Bailey Kacsmar and Xinda Li and Nils Lukas and Rasoul Akhavan Mahdavi and Simon Oya and Ehsan Amjadian and Florian Kerschbaum}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/diaa}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/DiaaFHDEK0LMOAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GastCJRFG24, author = {Stefan Gast and Roland Czerny and Jonas Juffinger and Fabian Rauscher and Simone Franza and Daniel Gruss}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/gast}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GastCJRFG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Ge0H000Z0FZ24, author = {Yunjie Ge and Qian Wang and Huayang Huang and Qi Li and Cong Wang and Chao Shen and Lingchen Zhao and Peipei Jiang and Zheng Fang and Shenyi Zhang}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Hijacking Attacks against Neural Network by Analyzing Training Data}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/ge-hijacking}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Ge0H000Z0FZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HorvathL0B24, author = {P{\'{e}}ter Horv{\'{a}}th and Dirk Lauret and Zhuoran Liu and Lejla Batina}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {SoK: Neural Network Extraction Through Physical Side Channels}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/horvath}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HorvathL0B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuangXCAZLGS24, author = {Xuanbo Huang and Kaiping Xue and Lutong Chen and Mingrui Ai and Huancheng Zhou and Bo Luo and Guofei Gu and Qibin Sun}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/huang-xuanbo}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HuangXCAZLGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/IshtiaqDRRTWSWA24, author = {Abdullah Al Ishtiaq and Sarkar Snigdha Sarathi Das and Syed Md. Mukit Rashid and Ali Ranjbar and Kai Tu and Tianwei Wu and Zhezheng Song and Weixuan Wang and Mujtahid Akon and Rui Zhang and Syed Rafiul Hussain}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/al-ishtiaq}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/IshtiaqDRRTWSWA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KoisserMYVS24, author = {David Koisser and Richard Mitev and Nikita Yadav and Franziska Vollmer and Ahmad{-}Reza Sadeghi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Orbital Trust and Privacy: SoK on {PKI} and Location Privacy Challenges in Space Networks}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/koisser}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KoisserMYVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MankaliSP24, author = {Lakshmi Likhitha Mankali and Ozgur Sinanoglu and Satwik Patnaik}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {{INSIGHT:} Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/mankali}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MankaliSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MazzoccaAUM24, author = {Carlo Mazzocca and Abbas Acar and A. Selcuk Uluagac and Rebecca Montanari}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {{EVOKE:} Efficient Revocation of Verifiable Credentials in IoT Networks}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/mazzocca}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MazzoccaAUM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MirnajafizadehS24, author = {Seyed Mohammad Mehdi Mirnajafizadeh and Ashwin Raam Sethuram and David Mohaisen and DaeHun Nyang and Rhongho Jang}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Enhancing Network Attack Detection with Distributed and In-Network Data Collection System}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/mirnajafizadeh}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MirnajafizadehS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OygenblikYZM0S24, author = {David Oygenblik and Carter Yagemann and Joseph Zhang and Arianna Mastali and Jeman Park and Brendan Saltaformaggio}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {{AI} Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/oygenblik}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OygenblikYZM0S24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PoissonCF24, author = {Manuel Poisson and Rodrigo Matos Carnier and Kensuke Fukuda}, title = {GothX: a generator of customizable, legitimate and malicious IoT network traffic}, booktitle = {Proceedings of the 17th Cyber Security Experimentation and Test Workshop, {CSET} 2024, Philadelphia, PA, USA, 13 August 2024}, pages = {65--73}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3675741.3675753}, doi = {10.1145/3675741.3675753}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PoissonCF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RahmanKB24, author = {Mirza Masfiqur Rahman and Imtiaz Karim and Elisa Bertino}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {CellularLint: {A} Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/rahman}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RahmanKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RameshWKE24, author = {Reethika Ramesh and Philipp Winter and Sam Korman and Roya Ensafi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/ramesh}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RameshWKE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SabziVGSLM24, author = {Amir Sabzi and Rut Vora and Swati Goswami and Margo I. Seltzer and Mathias L{\'{e}}cuyer and Aastha Mehta}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {NetShaper: {A} Differentially Private Network Side-Channel Mitigation System}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/sabzi}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SabziVGSLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Sun0KS24, author = {Bing Sun and Jun Sun and Wayne Koh and Jie Shi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Neural Network Semantic Backdoor Detection and Mitigation: {A} Causality-Based Approach}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/sun-bing}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Sun0KS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UetzHHSH24, author = {Rafael Uetz and Marco Herzog and Louis Hackl{\"{a}}nder and Simon Schwarz and Martin Henze}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {You Cannot Escape Me: Detecting Evasions of {SIEM} Rules in Enterprise Networks}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/uetz}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/UetzHHSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangT0HG024, author = {Zihao Wang and Di Tang and XiaoFeng Wang and Wei He and Zhaoyang Geng and Wenhao Wang}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/wang-zihao-tossing}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangT0HG024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XingYFKR24, author = {Jiarong Xing and Sophia Yoo and Xenofon Foukas and Daehyeok Kim and Michael K. Reiter}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {On the Criticality of Integrity Protection in 5G Fronthaul Networks}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/xing-jiarong}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XingYFKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuL0AYY24, author = {Zhibo Xu and Shangqi Lai and Xiaoning Liu and Alsharif Abuadbba and Xingliang Yuan and Xun Yi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {OblivGNN: Oblivious Inference on Transductive and Inductive Graph Neural Network}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/xu-zhibo}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XuL0AYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yang0WZBCAWKI024, author = {Limin Yang and Zhi Chen and Chenkai Wang and Zhenning Zhang and Sushruth Booma and Phuong Cao and Constantin Adam and Alexander Withers and Zbigniew Kalbarczyk and Ravishankar K. Iyer and Gang Wang}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/yang-limin}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Yang0WZBCAWKI024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuLXBGLABDDNS024, author = {Chang Zhu and Ziyang Li and Anton Xue and Ati Priya Bajaj and Wil Gibbs and Yibo Liu and Rajeev Alur and Tiffany Bao and Hanjun Dai and Adam Doup{\'{e}} and Mayur Naik and Yan Shoshitaishvili and Ruoyu Wang and Aravind Machiry}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {{TYGR:} Type Inference on Stripped Binaries using Graph Neural Networks}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/zhu-chang}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhuLXBGLABDDNS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuangSZCLZ024, author = {Yuanxin Zhuang and Chuan Shi and Mengmei Zhang and Jinghui Chen and Lingjuan Lyu and Pan Zhou and Lichao Sun}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks?}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/zhuang}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhuangSZCLZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/VembuCS24, author = {Swathi Kumar Vembu and Anupam Chattopadhyay and Sayandeep Saha}, title = {Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management}, booktitle = {37th International Conference on {VLSI} Design and 23rd International Conference on Embedded Systems, {VLSID} 2024, Kolkata, India, January 6-10, 2024}, pages = {318--323}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/VLSID60093.2024.00059}, doi = {10.1109/VLSID60093.2024.00059}, timestamp = {Mon, 08 Apr 2024 20:48:39 +0200}, biburl = {https://dblp.org/rec/conf/vlsid/VembuCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/DhonthiEHH24, author = {Akshay Dhonthi and Marcello Eiermann and Ernst Moritz Hahn and Vahid Hashemi}, editor = {Rayna Dimitrova and Ori Lahav and Sebastian Wolff}, title = {{AGNES:} Abstraction-Guided Framework for Deep Neural Networks Security}, booktitle = {Verification, Model Checking, and Abstract Interpretation - 25th International Conference, {VMCAI} 2024, London, United Kingdom, January 15-16, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14500}, pages = {124--138}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-50521-8\_6}, doi = {10.1007/978-3-031-50521-8\_6}, timestamp = {Mon, 15 Jan 2024 09:04:26 +0100}, biburl = {https://dblp.org/rec/conf/vmcai/DhonthiEHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ShafiqueRCJ24, author = {Rahman Shafique and Furqan Rustam and Gyu Sang Choi and Anca Delia Jurcut}, title = {Enhancing In-Vehicle Network Security Against AI-Generated Cyberattacks Using Machine Learning}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2024, Dubai, United Arab Emirates, April 21-24, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/WCNC57260.2024.10571300}, doi = {10.1109/WCNC57260.2024.10571300}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ShafiqueRCJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PacherkarY24, author = {Harsh Sanjay Pacherkar and Guanhua Yan}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {{PROV5GC:} Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {254--264}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656129}, doi = {10.1145/3643833.3656129}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PacherkarY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/UnniBB24, author = {Pranav Unni and Saumya Banerjee and Samia Bouzefrane}, editor = {Samia Bouzefrane and Damien Sauveron}, title = {Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions}, booktitle = {Information Security Theory and Practice - 14th {IFIP} {WG} 11.2 International Conference, {WISTP} 2024, Paris, France, February 29 - March 1, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14625}, pages = {96--110}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-60391-4\_7}, doi = {10.1007/978-3-031-60391-4\_7}, timestamp = {Wed, 26 Jun 2024 11:16:11 +0200}, biburl = {https://dblp.org/rec/conf/wistp/UnniBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wons/PaciCB24, author = {Andrea Paci and Matteo Chiacchia and Giuseppe Bianchi}, title = {5GMap: User-Driven Audit of Access Security Configurations in Cellular Networks}, booktitle = {19th Wireless On-Demand Network Systems and Services Conference, {WONS} 2024, Chamonix, France, January 29-31, 2024}, pages = {97--104}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/WONS60642.2024.10449586}, doi = {10.23919/WONS60642.2024.10449586}, timestamp = {Wed, 13 Mar 2024 19:10:53 +0100}, biburl = {https://dblp.org/rec/conf/wons/PaciCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/AnwarQ24, author = {Raja Waseem Anwar and Kashif Naseer Qureshi}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Attack Detection Mechanisms for Internet of Everything (IoE) Networks}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {41--55}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_3}, doi = {10.1007/978-3-031-45162-1\_3}, timestamp = {Thu, 04 Jan 2024 17:09:15 +0100}, biburl = {https://dblp.org/rec/books/sp/24/AnwarQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/IftikharQ24, author = {Abeer Iftikhar and Kashif Naseer Qureshi}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Future Privacy and Trust Challenges for IoE Networks}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {193--218}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_12}, doi = {10.1007/978-3-031-45162-1\_12}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/24/IftikharQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/IqbalMS24, author = {Saleem Iqbal and Saqib Majeed and Syed Amad Hussain Shah}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Future Cybersecurity Challenges for IoE Networks}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {75--86}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_5}, doi = {10.1007/978-3-031-45162-1\_5}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/24/IqbalMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/PahlevanzadehA24, author = {Bahareh Pahlevanzadeh and Sima Ahmadpour}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Cybersecurity Threats and Attacks in IoE Networks}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {21--39}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_2}, doi = {10.1007/978-3-031-45162-1\_2}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/24/PahlevanzadehA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/RehmanSAR24, author = {Faisal Rehman and Hanan Sharif and Muhammad Anwar and Naveed Riaz}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Big Data Analytics for Cybersecurity in IoE Networks}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {163--176}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_10}, doi = {10.1007/978-3-031-45162-1\_10}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/24/RehmanSAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/24/UllahU24, author = {Fasee Ullah and Asad Ullah}, editor = {Kashif Naseer Qureshi and Thomas Newe and Gwanggil Jeon and Abdellah Chehri}, title = {Networking and Security Architectures for IoE Networks}, booktitle = {Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing}, pages = {89--107}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-45162-1\_6}, doi = {10.1007/978-3-031-45162-1\_6}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/24/UllahU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-1, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6}, doi = {10.1007/978-3-031-54770-6}, isbn = {978-3-031-54769-0}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-2, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7}, doi = {10.1007/978-3-031-54773-7}, isbn = {978-3-031-54772-0}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-3, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8}, doi = {10.1007/978-3-031-54776-8}, isbn = {978-3-031-54775-1}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024w1, editor = {Martin Andreoni}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14586}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61486-6}, doi = {10.1007/978-3-031-61486-6}, isbn = {978-3-031-61485-9}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2024w1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024w2, editor = {Martin Andreoni}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14587}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61489-7}, doi = {10.1007/978-3-031-61489-7}, isbn = {978-3-031-61488-0}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2024w2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2024-1, editor = {Clemente Galdi and Duong Hieu Phan}, title = {Security and Cryptography for Networks - 14th International Conference, {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14973}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71070-4}, doi = {10.1007/978-3-031-71070-4}, isbn = {978-3-031-71069-8}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2024-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2024-2, editor = {Clemente Galdi and Duong Hieu Phan}, title = {Security and Cryptography for Networks - 14th International Conference, {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14974}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71073-5}, doi = {10.1007/978-3-031-71073-5}, isbn = {978-3-031-71072-8}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2024, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833}, doi = {10.1145/3643833}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-00192, author = {Abuzar B. M. Adam and Mohamed Amine Ouamri and Mohammed Saleh Ali Muthanna and Xingwang Li and Mohammed A. M. Elhassan and Ammar Muthanna}, title = {Real-Time and Security-Aware Precoding in RIS-Empowered Multi-User Wireless Networks}, journal = {CoRR}, volume = {abs/2401.00192}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.00192}, doi = {10.48550/ARXIV.2401.00192}, eprinttype = {arXiv}, eprint = {2401.00192}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-00192.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-08135, author = {Thanh Nguyen Canh and Xiem HoangVan}, title = {Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network {(VANET)} Communications}, journal = {CoRR}, volume = {abs/2401.08135}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.08135}, doi = {10.48550/ARXIV.2401.08135}, eprinttype = {arXiv}, eprint = {2401.08135}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-08135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-13630, author = {Emanuel Vieira and Jo{\~{a}}o Almeida and Joaquim Ferreira and Paulo C. Bartolomeu}, title = {Enabling Seamless Data Security, Consensus, and Trading in Vehicular Networks}, journal = {CoRR}, volume = {abs/2401.13630}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.13630}, doi = {10.48550/ARXIV.2401.13630}, eprinttype = {arXiv}, eprint = {2401.13630}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-13630.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-14350, author = {Fatema Bannat Wala and Mariam Kiran}, title = {5G Network Security Practices: An Overview and Survey}, journal = {CoRR}, volume = {abs/2401.14350}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.14350}, doi = {10.48550/ARXIV.2401.14350}, eprinttype = {arXiv}, eprint = {2401.14350}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-14350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-00002, author = {Zhongfu Guo and Xinsheng Ji and Wei You and Mingyan Xu and Yu Zhao and Zhimo Cheng and Deqiang Zhou}, title = {Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in {B5G} Edge Network}, journal = {CoRR}, volume = {abs/2402.00002}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.00002}, doi = {10.48550/ARXIV.2402.00002}, eprinttype = {arXiv}, eprint = {2402.00002}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-00002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03769, author = {Oleksandr Kuznetsov and Dmytro Zakharov and Emanuele Frontoni and Andrea Maranesi}, title = {AttackNet: Enhancing Biometric Security via Tailored Convolutional Neural Network Architectures for Liveness Detection}, journal = {CoRR}, volume = {abs/2402.03769}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03769}, doi = {10.48550/ARXIV.2402.03769}, eprinttype = {arXiv}, eprint = {2402.03769}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-05378, author = {Tharaka Perera and Saman Atapattu and Yuting Fang and Jamie S. Evans}, title = {Graph Neural Networks for Physical-Layer Security in Multi-User Flexible-Duplex Networks}, journal = {CoRR}, volume = {abs/2402.05378}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.05378}, doi = {10.48550/ARXIV.2402.05378}, eprinttype = {arXiv}, eprint = {2402.05378}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-05378.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-07054, author = {Naresh Kshetri and Rahul Mishra and Mir Mehedi Rahman and Tanja Steigner}, title = {HNMblock: Blockchain technology powered Healthcare Network Model for epidemiological monitoring, medical systems security, and wellness}, journal = {CoRR}, volume = {abs/2402.07054}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.07054}, doi = {10.48550/ARXIV.2402.07054}, eprinttype = {arXiv}, eprint = {2402.07054}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-07054.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-09108, author = {Yew Kee Wong and Yifan Zhou and Xinlin Zhou and Yan Shing Liang and Zi Yan Li}, title = {Web 3.0 and Quantum Security: Long-Distance Free-Space {QSDC} for Global Web 3.0 Networks}, journal = {CoRR}, volume = {abs/2402.09108}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.09108}, doi = {10.48550/ARXIV.2402.09108}, eprinttype = {arXiv}, eprint = {2402.09108}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-09108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-10389, author = {Maha Ali Allouzi and Javed Khan}, title = {Enabling Zero Trust Security in IoMT Edge Network}, journal = {CoRR}, volume = {abs/2402.10389}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.10389}, doi = {10.48550/ARXIV.2402.10389}, eprinttype = {arXiv}, eprint = {2402.10389}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-10389.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-11231, author = {J{\"{o}}rg Osterrieder and Stephen Chan and Jeffrey Chu and Yuanyuan Zhang and Branka Hadji Misheva and Codruta Mare}, title = {Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques}, journal = {CoRR}, volume = {abs/2402.11231}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.11231}, doi = {10.48550/ARXIV.2402.11231}, eprinttype = {arXiv}, eprint = {2402.11231}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-11231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-04113, author = {Aly Sabri Abdalla and Joshua Moore and Nisha Adhikari and Vuk Marojevic}, title = {{ZTRAN:} Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments}, journal = {CoRR}, volume = {abs/2403.04113}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.04113}, doi = {10.48550/ARXIV.2403.04113}, eprinttype = {arXiv}, eprint = {2403.04113}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-04113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-08208, author = {Khondoker Murad Hossain and Tim Oates}, title = {Advancing Security in {AI} Systems: {A} Novel Approach to Detecting Backdoors in Deep Neural Networks}, journal = {CoRR}, volume = {abs/2403.08208}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.08208}, doi = {10.48550/ARXIV.2403.08208}, eprinttype = {arXiv}, eprint = {2403.08208}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-08208.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-08507, author = {Gabriel Karl Gegenhuber and Wilfried Mayer and Edgar R. Weippl and Adrian Dabrowski}, title = {MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research}, journal = {CoRR}, volume = {abs/2403.08507}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.08507}, doi = {10.48550/ARXIV.2403.08507}, eprinttype = {arXiv}, eprint = {2403.08507}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-08507.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-11303, author = {Tulasi Udupa A and Sushma Jayaram and Shreya Ganesh Hegde}, title = {A Brief Study of Computer Network Security Technologies}, journal = {CoRR}, volume = {abs/2403.11303}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.11303}, doi = {10.48550/ARXIV.2403.11303}, eprinttype = {arXiv}, eprint = {2403.11303}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-11303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-13266, author = {Ziqi Yang and Roberto Tron}, title = {Enhancing Security in Multi-Robot Systems through Co-Observation Planning, Reachability Analysis, and Network Flow}, journal = {CoRR}, volume = {abs/2403.13266}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.13266}, doi = {10.48550/ARXIV.2403.13266}, eprinttype = {arXiv}, eprint = {2403.13266}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-13266.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-20120, author = {Ayush Rastogi and Harsh Rastogi and Yash Rastogi and Divyansh Dubey}, title = {Privacy-Preserving Data Aggregation Techniques for Enhanced Efficiency and Security in Wireless Sensor Networks: {A} Comprehensive Analysis and Evaluation}, journal = {CoRR}, volume = {abs/2403.20120}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.20120}, doi = {10.48550/ARXIV.2403.20120}, eprinttype = {arXiv}, eprint = {2403.20120}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-20120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-20136, author = {Jiani Fan and Lwin Khin Shar and Jiale Guo and Wenzhuo Yang and Dusit Niyato and Kwok{-}Yan Lam}, title = {Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks}, journal = {CoRR}, volume = {abs/2403.20136}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.20136}, doi = {10.48550/ARXIV.2403.20136}, eprinttype = {arXiv}, eprint = {2403.20136}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-20136.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-08232, author = {Yaser Baseri and Vikas Chouhan and Abdelhakim Hafid}, title = {Navigating Quantum Security Risks in Networked Environments: {A} Comprehensive Study of Quantum-Safe Network Protocols}, journal = {CoRR}, volume = {abs/2404.08232}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.08232}, doi = {10.48550/ARXIV.2404.08232}, eprinttype = {arXiv}, eprint = {2404.08232}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-08232.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-08643, author = {Navneet Kaur and Naresh Kshetri and Purnendu Shekhar Pandey}, title = {6AInets: Harnessing artificial intelligence for the 6G network security: Impacts and Challenges}, journal = {CoRR}, volume = {abs/2404.08643}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.08643}, doi = {10.48550/ARXIV.2404.08643}, eprinttype = {arXiv}, eprint = {2404.08643}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-08643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-10012, author = {Sreenitha Kasarapu and Sanket Shukla and Sai Manoj Pudukotai Dinakarrao}, title = {Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security}, journal = {CoRR}, volume = {abs/2404.10012}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.10012}, doi = {10.48550/ARXIV.2404.10012}, eprinttype = {arXiv}, eprint = {2404.10012}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-10012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-11388, author = {Akinsola Ahmed and Ejiofor Oluomachi and Akinde Abdullah and Njoku Tochukwu}, title = {Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks In Critical Applications Of Healthcare And National Security}, journal = {CoRR}, volume = {abs/2404.11388}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.11388}, doi = {10.48550/ARXIV.2404.11388}, eprinttype = {arXiv}, eprint = {2404.11388}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-11388.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-15278, author = {Wenjun Lan and Kongyang Chen and Jiannong Cao and Yikai Li and Ning Li and Qi Chen and Yuvraj Sahni}, title = {Security-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks}, journal = {CoRR}, volume = {abs/2404.15278}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.15278}, doi = {10.48550/ARXIV.2404.15278}, eprinttype = {arXiv}, eprint = {2404.15278}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-15278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-00793, author = {Karwan Mustafa Kareem}, title = {The Impact of {IMSI} Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks}, journal = {CoRR}, volume = {abs/2405.00793}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.00793}, doi = {10.48550/ARXIV.2405.00793}, eprinttype = {arXiv}, eprint = {2405.00793}, timestamp = {Sun, 09 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-00793.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-01221, author = {Shaolong Guo and Yuntao Wang and Ning Zhang and Zhou Su and Tom H. Luan and Zhiyi Tian and Xuemin Shen}, title = {A Survey on Semantic Communication Networks: Architecture, Security, and Privacy}, journal = {CoRR}, volume = {abs/2405.01221}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.01221}, doi = {10.48550/ARXIV.2405.01221}, eprinttype = {arXiv}, eprint = {2405.01221}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-01221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-02147, author = {Ben Weintraub and Satwik Prabhu Kumble and Cristina Nita{-}Rotaru and Stefanie Roos}, title = {Payout Races and Congested Channels: {A} Formal Analysis of Security in the Lightning Network}, journal = {CoRR}, volume = {abs/2405.02147}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.02147}, doi = {10.48550/ARXIV.2405.02147}, eprinttype = {arXiv}, eprint = {2405.02147}, timestamp = {Fri, 07 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-02147.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-10906, author = {Marco Spanghero and Panos Papadimitratos}, title = {{POSTER:} Testing network-based {RTK} for {GNSS} receiver security}, journal = {CoRR}, volume = {abs/2405.10906}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.10906}, doi = {10.48550/ARXIV.2405.10906}, eprinttype = {arXiv}, eprint = {2405.10906}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-10906.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-11141, author = {Negin Ayoughi and Shiva Nejati and Mehrdad Sabetzadeh and Patricio Saavedra}, title = {Enhancing Automata Learning with Statistical Machine Learning: {A} Network Security Case Study}, journal = {CoRR}, volume = {abs/2405.11141}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.11141}, doi = {10.48550/ARXIV.2405.11141}, eprinttype = {arXiv}, eprint = {2405.11141}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-11141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-13847, author = {Ali Mohammadi Ruzbahani}, title = {AI-Protected Blockchain-based IoT environments: Harnessing the Future of Network Security and Privacy}, journal = {CoRR}, volume = {abs/2405.13847}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.13847}, doi = {10.48550/ARXIV.2405.13847}, eprinttype = {arXiv}, eprint = {2405.13847}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-13847.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-15089, author = {Daniel Aronoff}, title = {Targeted Nakamoto: {A} Bitcoin Protocol to Balance Network Security and Energy Consumption}, journal = {CoRR}, volume = {abs/2405.15089}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.15089}, doi = {10.48550/ARXIV.2405.15089}, eprinttype = {arXiv}, eprint = {2405.15089}, timestamp = {Wed, 19 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-15089.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-02964, author = {Glory Justin and Santiago Paternain}, title = {Real-Time Small-Signal Security Assessment Using Graph Neural Networks}, journal = {CoRR}, volume = {abs/2406.02964}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.02964}, doi = {10.48550/ARXIV.2406.02964}, eprinttype = {arXiv}, eprint = {2406.02964}, timestamp = {Fri, 05 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-02964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-10089, author = {Rui Zhu}, title = {Enhancing Security in Millimeter Wave {SWIPT} Networks}, journal = {CoRR}, volume = {abs/2406.10089}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.10089}, doi = {10.48550/ARXIV.2406.10089}, eprinttype = {arXiv}, eprint = {2406.10089}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-10089.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-13365, author = {Louis Van Langendonck and Ismael Castell{-}Uroz and Pere Barlet{-}Ros}, title = {{PPT-GNN:} {A} Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security}, journal = {CoRR}, volume = {abs/2406.13365}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.13365}, doi = {10.48550/ARXIV.2406.13365}, eprinttype = {arXiv}, eprint = {2406.13365}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-13365.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-13920, author = {Tao Wu and Canyixing Cui and Xingping Xian and Shaojie Qiao and Chao Wang and Lin Yuan and Shui Yu}, title = {Explainable {AI} Security: Exploring Robustness of Graph Neural Networks to Adversarial Attacks}, journal = {CoRR}, volume = {abs/2406.13920}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.13920}, doi = {10.48550/ARXIV.2406.13920}, eprinttype = {arXiv}, eprint = {2406.13920}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-13920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-04077, author = {Anna Talgat and Ruibo Wang and Mustafa A. Kishk and Mohamed{-}Slim Alouini}, title = {Enhancing Physical Layer Security in {LEO} Satellite-Enabled IoT Network Communications}, journal = {CoRR}, volume = {abs/2407.04077}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.04077}, doi = {10.48550/ARXIV.2407.04077}, eprinttype = {arXiv}, eprint = {2407.04077}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-04077.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-06767, author = {Ziwei Liu and Wen Chen and Qingqing Wu and Zhendong Li and Xusheng Zhu and Qiong Wu and Nan Cheng}, title = {Enhancing Robustness and Security in {ISAC} Network Design: Leveraging Transmissive Reconfigurable Intelligent Surface with {RSMA}}, journal = {CoRR}, volume = {abs/2407.06767}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.06767}, doi = {10.48550/ARXIV.2407.06767}, eprinttype = {arXiv}, eprint = {2407.06767}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-06767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-00193, author = {Sazzad Sayyed and Milin Zhang and Shahriar Rifat and Ananthram Swami and Michael DeLucia and Francesco Restuccia}, title = {Resilience and Security of Deep Neural Networks Against Intentional and Unintentional Perturbations: Survey and Research Challenges}, journal = {CoRR}, volume = {abs/2408.00193}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.00193}, doi = {10.48550/ARXIV.2408.00193}, eprinttype = {arXiv}, eprint = {2408.00193}, timestamp = {Fri, 06 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-00193.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-01303, author = {Charles Oredola and Adnan Ashraf}, title = {A Systematic Mapping Study on {SDN} Controllers for Enhancing Security in IoT Networks}, journal = {CoRR}, volume = {abs/2408.01303}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.01303}, doi = {10.48550/ARXIV.2408.01303}, eprinttype = {arXiv}, eprint = {2408.01303}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-01303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-02318, author = {Mohuya Chakraborty and Atul Khekade}, title = {{XDC} Network Assessment: Decentralization, Scalability and Security}, journal = {CoRR}, volume = {abs/2408.02318}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.02318}, doi = {10.48550/ARXIV.2408.02318}, eprinttype = {arXiv}, eprint = {2408.02318}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-02318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-08433, author = {Muzun Althunayyan and Amir Javed and Omer Rana}, title = {A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning}, journal = {CoRR}, volume = {abs/2408.08433}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.08433}, doi = {10.48550/ARXIV.2408.08433}, eprinttype = {arXiv}, eprint = {2408.08433}, timestamp = {Mon, 23 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-08433.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lan24, title = {Network security threat detection technology based on {EPSO-BP} algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {6}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00152-9}, doi = {10.1186/S13635-024-00152-9}, timestamp = {Sat, 11 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LiuBJZ23, author = {Jianwei Liu and Lin Bai and Chunxiao Jiang and Wei Zhang}, title = {Space-Air-Ground Integrated Network Security}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-1125-7}, doi = {10.1007/978-981-99-1125-7}, isbn = {978-981-99-1124-0}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LiuBJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Huang23, author = {Shanshi Huang}, title = {Reliability and Security of Compute-In-Memory Based Deep Neural Network Accelerators}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2023}, url = {http://hdl.handle.net/1853/70136}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Huang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Frey23, author = {Matthias Frey}, title = {Distributed function approximation over noisy channels: with reliability and security guarantees for applications in wireless networks}, school = {Technical University of Berlin, Germany}, year = {2023}, url = {https://d-nb.info/127907745X}, urn = {urn:nbn:de:101:1-2023012500591671650836}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Frey23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Osman23, author = {Amr Osman}, title = {Agile Network Security for Software Defined Edge Clouds}, school = {Dresden University of Technology, Germany}, year = {2023}, url = {https://d-nb.info/1282727761}, urn = {urn:nbn:de:bsz:14-qucosa2-840067}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Osman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/es/Prats23, author = {Pol Alemany}, title = {Quality of service, security and trustworthiness for network slices}, school = {Polytechnic University of Catalonia, Spain}, year = {2023}, url = {http://hdl.handle.net/10803/688925}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/es/Prats23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Galtier23, author = {Florent Galtier}, title = {Wide and Local Area Wireless Network security based on physical layer monitoring. (S{\'{e}}curit{\'{e}} des r{\'{e}}seaux sans-fil courte et longue port{\'{e}}e bas{\'{e}}e sur desm{\'{e}}canismes de monitoring de la couche physique)}, school = {Paul Sabatier University, Toulouse, France}, year = {2023}, url = {https://tel.archives-ouvertes.fr/tel-04071193}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Galtier23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Hamza23, author = {Anis Amazigh Hamza}, title = {Improving cooperative non-orthogonal multiple access {(CNOMA)} and enhancing the physical layer security {(PLS)} for beyond 5G {(B5G)} and future eHealth wireless networks. (Am{\'{e}}lioration des techniques d'acc{\`{e}}s multiple non-orthogonales coop{\'{e}}ratives {(CNOMA)} et renforcement de la s{\'{e}}curit{\'{e}} de la couche physique pour les syst{\`{e}}mes sans fil au-del{\`{a}} de la 5G {(B5G)} et des futurs r{\'{e}}seaux de eSant{\'{e}})}, school = {Polytechnic University of Hauts-de-France, France}, year = {2023}, url = {https://hal.archives-ouvertes.fr/tel-04037829}, timestamp = {Thu, 29 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Hamza23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Saad23, author = {Sabra Ben Saad}, title = {Security architectures for network slice management for 5G and beyond. (Architectures s{\'{e}}curis{\'{e}}s pour la gestion des tranches de r{\'{e}}seau pour la 5G et au-del{\`{a}})}, school = {Sorbonne University, Paris, France}, year = {2023}, url = {https://tel.archives-ouvertes.fr/tel-04464041}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Saad23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Yakan23, author = {Hadi Yakan}, title = {Security of {V2X} communications in 3GPP - 5G cellular networks. (S{\'{e}}curit{\'{e}} des communications {V2X} dans les r{\'{e}}seaux cellulaires 5G - 3GPP)}, school = {University of Paris-Saclay, France}, year = {2023}, url = {https://tel.archives-ouvertes.fr/tel-04351530}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Yakan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/wn/MengZS23, author = {Yan Meng and Haojin Zhu and Xuemin (Sherman) Shen}, title = {Security in Smart Home Networks}, series = {Wireless Networks}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-24185-7}, doi = {10.1007/978-3-031-24185-7}, isbn = {978-3-031-24184-0}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wn/MengZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/wn/ShenZJ23, author = {Yulong Shen and Yuanyu Zhang and Xiaohong Jiang}, title = {Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach}, series = {Wireless Networks}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38465-3}, doi = {10.1007/978-3-031-38465-3}, isbn = {978-3-031-38464-6}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wn/ShenZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/wn/ShuW23, author = {Feng Shu and Jiangzhou Wang}, title = {Intelligent Reflecting Surface-Aided Physical-Layer Security}, series = {Wireless Networks}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41812-9}, doi = {10.1007/978-3-031-41812-9}, isbn = {978-3-031-41811-2}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/wn/ShuW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlShareedaM23, author = {Mahmood A. Al{-}Shareeda and Selvakumar Manickam}, title = {A Systematic Literature Review on Security of Vehicular Ad-Hoc Network {(VANET)} Based on {VEINS} Framework}, journal = {{IEEE} Access}, volume = {11}, pages = {46218--46228}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3274774}, doi = {10.1109/ACCESS.2023.3274774}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlShareedaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AzamKYJSMM23, author = {Muhammad Azam and Muhammad Sajjad Ali Khan and Shilin Yang and Saeed Ullah Jan and Tapan Senapati and Sarbast Moslem and Wali Khan Mashwani}, title = {Novel Dual Partitioned Maclaurin Symmetric Mean Operators for the Selection of Computer Network Security System With Complex Intuitionistic Fuzzy Setting}, journal = {{IEEE} Access}, volume = {11}, pages = {85050--85066}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3294229}, doi = {10.1109/ACCESS.2023.3294229}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AzamKYJSMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CookRK23, author = {Jonathan Cook and Sabih ur Rehman and M. Arif Khan}, title = {Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions}, journal = {{IEEE} Access}, volume = {11}, pages = {39295--39317}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3268064}, doi = {10.1109/ACCESS.2023.3268064}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CookRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DansanaBDAZAPS23, author = {Debabrata Dansana and Prafulla Kumar Behera and Abdulbasit A. Darem and Zubair Ashraf and Abu Taha Zamani and Mohammad Nadeem Ahmed and S. Gopal Krishna Patro and Mohammad Shameem}, title = {{BDDTPA:} Blockchain-Driven Deep Traffic Pattern Analysis for Enhanced Security in Cognitive Radio Ad-Hoc Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {98202--98216}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3312291}, doi = {10.1109/ACCESS.2023.3312291}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DansanaBDAZAPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DengDLWYPL23, author = {Junyi Deng and Jikai Deng and Peihao Liu and Huan Wang and Junjie Yan and Deru Pan and Jiahua Liu}, title = {A Survey on Vehicular Cloud Network Security}, journal = {{IEEE} Access}, volume = {11}, pages = {136741--136757}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3339192}, doi = {10.1109/ACCESS.2023.3339192}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DengDLWYPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/EkolleOK23, author = {Zie Eya Ekolle and Hideki Ochiai and Ryuji Kohno}, title = {Collabo: {A} Collaborative Machine Learning Model and Its Application to the Security of Heterogeneous Medical Data in an IoT Network}, journal = {{IEEE} Access}, volume = {11}, pages = {142663--142675}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3341837}, doi = {10.1109/ACCESS.2023.3341837}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/EkolleOK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhanemCFK23, author = {Mohamed Chahine Ghanem and Thomas M. Chen and Mohamed Amine Ferrag and Mohyi E. Kettouche}, title = {{ESASCF:} Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance}, journal = {{IEEE} Access}, volume = {11}, pages = {129840--129853}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3332834}, doi = {10.1109/ACCESS.2023.3332834}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GhanemCFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IftikharQAJ23, author = {Abeer Iftikhar and Kashif Naseer Qureshi and Ali A. Altalbe and Khalid Javeed}, title = {Security Provision by Using Detection and Prevention Methods to Ensure Trust in Edge-Based Smart City Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {137529--137547}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3338550}, doi = {10.1109/ACCESS.2023.3338550}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/IftikharQAJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JahangeerBAMAH23, author = {Asma Jahangeer and Sibghat Ullah Bazai and Saad Aslam and Shah Marjan and Muhammad Anas and Sayed Habibullah Hashemi}, title = {A Review on the Security of IoT Networks: From Network Layer's Perspective}, journal = {{IEEE} Access}, volume = {11}, pages = {71073--71087}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3246180}, doi = {10.1109/ACCESS.2023.3246180}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JahangeerBAMAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JangKSCKKH23, author = {Younghoan Jang and Dong{-}Wook Kim and Gun{-}Yoon Shin and Seungjae Cho and Kwangsoo Kim and Jaesik Kang and Myung{-}Mook Han}, title = {An Investigation of Learning Model Technologies for Network Traffic Classification Design in Cyber Security Exercises}, journal = {{IEEE} Access}, volume = {11}, pages = {138712--138731}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3336674}, doi = {10.1109/ACCESS.2023.3336674}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JangKSCKKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanN23, author = {Md Muhidul Islam Khan and Gianfranco Nencioni}, title = {Resource Allocation in Networking and Computing Systems: {A} Security and Dependability Perspective}, journal = {{IEEE} Access}, volume = {11}, pages = {89433--89454}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3306534}, doi = {10.1109/ACCESS.2023.3306534}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KondothSSH23, author = {Lashmi Kondoth and Rajan Shankaran and Quan Z. Sheng and Richard Han}, title = {Wireless Network-on-Chip Security Review: Attack Taxonomy, Implications, and Countermeasures}, journal = {{IEEE} Access}, volume = {11}, pages = {122876--122892}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3329572}, doi = {10.1109/ACCESS.2023.3329572}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KondothSSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuL23, author = {Jian Liu and Tim H. Lin}, title = {A Framework for the Synthesis of X-Ray Security Inspection Images Based on Generative Adversarial Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {63751--63760}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3288087}, doi = {10.1109/ACCESS.2023.3288087}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MartinsCMBDCMCARNMWFMPSSMRCS23, author = {Joberto S. B. Martins and Tereza Cristina M. B. Carvalho and Rodrigo Moreira and Cristiano Bonato Both and Adnei W. Donatti and Jo{\~{a}}o Henrique G. M. Corr{\^{e}}a and Jos{\'{e}} A. S. Monteiro and Sand Luz Correa and Ant{\^{o}}nio J. G. Abel{\'{e}}m and Mois{\'{e}}s R. N. Ribeiro and Jos{\'{e}} Marcos S. Nogueira and Luiz Claudio Schara Magalh{\~{a}}es and Juliano Araujo Wickboldt and Tiago C. Ferreto and Ricardo C. de Mello and Rafael Pasquini and Marcos F. Schwarz and Leobino N. Sampaio and Daniel F. Macedo and Jos{\'{e}} Ferreira de Rezende and Kleber Vieira Cardoso and Fl{\'{a}}vio Oliveira Silva}, title = {Enhancing Network Slicing Architectures With Machine Learning, Security, Sustainability and Experimental Networks Integration}, journal = {{IEEE} Access}, volume = {11}, pages = {69144--69163}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3292788}, doi = {10.1109/ACCESS.2023.3292788}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MartinsCMBDCMCARNMWFMPSSMRCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MelisSBCP23, author = {Andrea Melis and Amir Al Sadi and Davide Berardi and Franco Callegati and Marco Prandini}, title = {A Systematic Literature Review of Offensive and Defensive Security Solutions With Software Defined Network}, journal = {{IEEE} Access}, volume = {11}, pages = {93431--93463}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3276238}, doi = {10.1109/ACCESS.2023.3276238}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MelisSBCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MessabihKCCB23, author = {Hadjer Messabih and Chaker Abdelaziz Kerrache and Youssra Cheriguene and Carlos T. Calafate and Fatima Zohra Bousbaa}, title = {An Overview of Game Theory Approaches for Mobile Ad-Hoc Network's Security}, journal = {{IEEE} Access}, volume = {11}, pages = {107581--107604}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3321082}, doi = {10.1109/ACCESS.2023.3321082}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MessabihKCCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NguyenNVPLV23, author = {Hung Nguyen and Tan N. Nguyen and Minh Bui Vu and Thu{-}Ha Thi Pham and Anh{-}Tu Le and Miroslav Vozn{\'{a}}k}, title = {Security-Reliability Analysis in {CR-NOMA} IoT Network Under {I/Q} Imbalance}, journal = {{IEEE} Access}, volume = {11}, pages = {119045--119056}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3327789}, doi = {10.1109/ACCESS.2023.3327789}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/NguyenNVPLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/OrumaP23, author = {Samson O. Oruma and Slobodan Petrovic}, title = {Security Threats to 5G Networks for Social Robots in Public Spaces: {A} Survey}, journal = {{IEEE} Access}, volume = {11}, pages = {63205--63237}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3288338}, doi = {10.1109/ACCESS.2023.3288338}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/OrumaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RaniINCVYSBP23, author = {Sella Veluswami Jansi Rani and Iacovos Ioannou and Prabagarane Nagaradjane and Christophoros Christophorou and Vasos Vassiliou and Harshitaa Yarramsetti and Sai Shridhar and L. Mukund Balaji and Andreas Pitsillides}, title = {A Novel Deep Hierarchical Machine Learning Approach for Identification of Known and Unknown Multiple Security Attacks in a {D2D} Communications Network}, journal = {{IEEE} Access}, volume = {11}, pages = {95161--95194}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3308036}, doi = {10.1109/ACCESS.2023.3308036}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RaniINCVYSBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShahLAB23, author = {Mohammad Shahrul Mohd Shah and Yu{-}Beng Leau and Mohammed Anbar and Ali Abdulqader Bin{-}Salem}, title = {Security and Integrity Attacks in Named Data Networking: {A} Survey}, journal = {{IEEE} Access}, volume = {11}, pages = {7984--8004}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3238732}, doi = {10.1109/ACCESS.2023.3238732}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShahLAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShaodanFJJ23, author = {Lin Shaodan and Chen Feng and Tao Jiang and Huasong Jing}, title = {Evaluation of Network Security Grade Protection Combined With Deep Learning for Intrusion Detection}, journal = {{IEEE} Access}, volume = {11}, pages = {130990--131000}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3333013}, doi = {10.1109/ACCESS.2023.3333013}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ShaodanFJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShirkoA23, author = {Omar Shirko and Shavan K. Askar}, title = {A Novel Security Survival Model for Quantum Key Distribution Networks Enabled by Software-Defined Networking}, journal = {{IEEE} Access}, volume = {11}, pages = {21641--21654}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3251649}, doi = {10.1109/ACCESS.2023.3251649}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShirkoA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SoldaniNBJSGMOR23, author = {David Soldani and Petrit Nahi and Hamideh Bour and Saber Jafarizadeh and Mohammed F. Soliman and Leonardo Di Giovanna and Francesco Monaco and Giuseppe Ognibene and Fulvio Risso}, title = {eBPF: {A} New Approach to Cloud-Native Observability, Networking and Security for Current {(5G)} and Future Mobile Networks {(6G} and Beyond)}, journal = {{IEEE} Access}, volume = {11}, pages = {57174--57202}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3281480}, doi = {10.1109/ACCESS.2023.3281480}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SoldaniNBJSGMOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangYGLZ23, author = {Yuhe Wang and Yu Yang and Rencai Gao and Shiming Li and Yan Zhao}, title = {A Security Situation Prediction Model for Industrial Control Network Based on {EP-CMA-ES}}, journal = {{IEEE} Access}, volume = {11}, pages = {135449--135462}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3336698}, doi = {10.1109/ACCESS.2023.3336698}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangYGLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangFA23, author = {Shengcai Zhang and Qiming Fu and Dezhi An}, title = {Network Security Situation Prediction Model Based on {VMD} Decomposition and {DWOA} Optimized BiGRU-ATTN Neural Network}, journal = {{IEEE} Access}, volume = {11}, pages = {129507--129535}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3333666}, doi = {10.1109/ACCESS.2023.3333666}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/ShilovaV23, author = {A. D. Shilova and Alisa A. Vorobeva}, title = {A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity}, journal = {Autom. Control. Comput. Sci.}, volume = {57}, number = {8}, pages = {1116--1125}, year = {2023}, url = {https://doi.org/10.3103/S0146411623080308}, doi = {10.3103/S0146411623080308}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/accs/ShilovaV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AmanAMRK23, author = {Waqas Aman and Saif M. Al{-}Kuwari and Muhammad Muzzammil and Muhammad Mahboob Ur Rahman and Ambrish Kumar}, title = {Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook}, journal = {Ad Hoc Networks}, volume = {142}, pages = {103114}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103114}, doi = {10.1016/J.ADHOC.2023.103114}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/AmanAMRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KumarSBCARA23, author = {Sunil Kumar and Aman Singh and Abderrahim Benslimane and Premkumar Chithaluru and Marwan Ali Albahar and Rajkumar Singh Rathore and Roberto Marcelo {\'{A}}lvarez}, title = {An Optimized Intelligent Computational Security Model for Interconnected Blockchain-IoT System {\&} Cities}, journal = {Ad Hoc Networks}, volume = {151}, pages = {103299}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103299}, doi = {10.1016/J.ADHOC.2023.103299}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/KumarSBCARA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/LetafatiO23, author = {Mehdi Letafati and Safa Otoum}, title = {On the privacy and security for e-health services in the metaverse: An overview}, journal = {Ad Hoc Networks}, volume = {150}, pages = {103262}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103262}, doi = {10.1016/J.ADHOC.2023.103262}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/LetafatiO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MoudoudC23, author = {Hajar Moudoud and Soumaya Cherkaoui}, title = {Multi-tasking Federated Learning meets Blockchain to Foster Trust and Security in the Metaverse}, journal = {Ad Hoc Networks}, volume = {150}, pages = {103264}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103264}, doi = {10.1016/J.ADHOC.2023.103264}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/MoudoudC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhangXWL23, author = {Han Zhang and Jianbin Xue and Qi Wang and Ye Li}, title = {A security optimization scheme for data security transmission in UAV-assisted edge networks based on federal learning}, journal = {Ad Hoc Networks}, volume = {150}, pages = {103277}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103277}, doi = {10.1016/J.ADHOC.2023.103277}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhangXWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhaoSZ23, author = {Dongmei Zhao and Pengcheng Shen and Shuiguang Zeng}, title = {{ALSNAP:} Attention-based long and short-period network security situation prediction}, journal = {Ad Hoc Networks}, volume = {150}, pages = {103279}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103279}, doi = {10.1016/J.ADHOC.2023.103279}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhaoSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/MuthulakshmiK23, author = {S. Muthulakshmi and A. Kannammal}, title = {Security Enhancements Based on Optimal Lightweight Blockchain Model for Data Sharing in Wireless IoT Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {55}, number = {3-4}, pages = {233--256}, year = {2023}, url = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-3-4-2023/21263-2/}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/MuthulakshmiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/SathyarajDK23, author = {P. Sathyaraj and S. Rukmani Devi and K. Kannan}, title = {Host-based Detection and Prevention of Black Hole Attacks by {AODV-ICCSO} Algorithm for Security in MANETs}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {55}, number = {1-2}, pages = {45--73}, year = {2023}, url = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-1-2-2023/21214-2/}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/SathyarajDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/SathyarajDK23a, author = {P. Sathyaraj and S. Rukmani Devi and K. Kannan}, title = {Host-based Detection and Prevention of Black Hole Attacks by {AODV-ICCSO} Algorithm for Security in MANETs}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {55}, number = {3-4}, pages = {203--231}, year = {2023}, url = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-3-4-2023/21228-2/}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/SathyarajDK23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ZhaoGZLS23, author = {Younan Zhao and Peng Gu and Fanglai Zhu and Tianyi Liu and Runjie Shen}, title = {Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks}, journal = {Appl. Math. Comput.}, volume = {447}, pages = {127908}, year = {2023}, url = {https://doi.org/10.1016/j.amc.2023.127908}, doi = {10.1016/J.AMC.2023.127908}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/ZhaoGZLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CivinoL23, author = {Roberto Civino and Riccardo Longo}, title = {Formal security proof for a scheme on a topological network}, journal = {Adv. Math. Commun.}, volume = {17}, number = {3}, pages = {562--571}, year = {2023}, url = {https://doi.org/10.3934/amc.2021009}, doi = {10.3934/AMC.2021009}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CivinoL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/PS23, author = {Shalini P and Shankaraiah}, title = {Multimodal biometric decision fusion security technique to evade immoral social networking sites for minors}, journal = {Appl. Intell.}, volume = {53}, number = {3}, pages = {2751--2776}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-03538-9}, doi = {10.1007/S10489-022-03538-9}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/PS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/AhadAMTHGP23, author = {Abdul Ahad and Zahra Ali and Abdul Mateen and Mohammad Tahir and Abdul Hannan and Nuno M. Garcia and Ivan Miguel Pires}, title = {A Comprehensive review on 5G-based Smart Healthcare Network Security: Taxonomy, Issues, Solutions and Future research directions}, journal = {Array}, volume = {18}, pages = {100290}, year = {2023}, url = {https://doi.org/10.1016/j.array.2023.100290}, doi = {10.1016/J.ARRAY.2023.100290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/array/AhadAMTHGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/HossainI23, author = {Md. Alamgir Hossain and Md. Saiful Islam}, title = {Ensuring network security with a robust intrusion detection system using ensemble-based machine learning}, journal = {Array}, volume = {19}, pages = {100306}, year = {2023}, url = {https://doi.org/10.1016/j.array.2023.100306}, doi = {10.1016/J.ARRAY.2023.100306}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/array/HossainI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/SindjoungVD23, author = {Miguel Landry Foko Sindjoung and Mthulisi Velempini and Cl{\'{e}}mentin Tayou Djam{\'{e}}gni}, title = {A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network}, journal = {Array}, volume = {19}, pages = {100304}, year = {2023}, url = {https://doi.org/10.1016/j.array.2023.100304}, doi = {10.1016/J.ARRAY.2023.100304}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/array/SindjoungVD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/at/AckermannKK23, author = {Tim Ackermann and Markus Karch and J{\"{o}}rg Kippe}, title = {Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks}, journal = {Autom.}, volume = {71}, number = {9}, pages = {802--815}, year = {2023}, url = {https://doi.org/10.1515/auto-2023-0057}, doi = {10.1515/AUTO-2023-0057}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/at/AckermannKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/at/CaiW23, author = {Hui Cai and Dirk Westermann}, title = {Enhancing dynamic security assessment in converter dominated distribution networks through digital twin-based small signal stability analysis}, journal = {Autom.}, volume = {71}, number = {12}, pages = {1028--1039}, year = {2023}, url = {https://doi.org/10.1515/auto-2023-0119}, doi = {10.1515/AUTO-2023-0119}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/at/CaiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/ShuZ0Z23, author = {Haoyu Shu and Jiayu Zhou and Wen Yang and Heng Zhang}, title = {Distortion-based state security codes for distributed sensor networks}, journal = {Autom.}, volume = {151}, pages = {110904}, year = {2023}, url = {https://doi.org/10.1016/j.automatica.2023.110904}, doi = {10.1016/J.AUTOMATICA.2023.110904}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/automatica/ShuZ0Z23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdcc/OdarchenkoIIFS23, author = {Roman Odarchenko and Maksim Iavich and Giorgi Iashvili and Solomiia Fedushko and Yuriy Syerov}, title = {Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers}, journal = {Big Data Cogn. Comput.}, volume = {7}, number = {4}, pages = {169}, year = {2023}, url = {https://doi.org/10.3390/bdcc7040169}, doi = {10.3390/BDCC7040169}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdcc/OdarchenkoIIFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bspc/HuangXTH23, author = {Tongyuan Huang and Jia Xu and Shixin Tu and Baoru Han}, title = {Robust zero-watermarking scheme based on a depthwise overparameterized {VGG} network in healthcare information security}, journal = {Biomed. Signal Process. Control.}, volume = {81}, pages = {104478}, year = {2023}, url = {https://doi.org/10.1016/j.bspc.2022.104478}, doi = {10.1016/J.BSPC.2022.104478}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bspc/HuangXTH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KholdinasabA23, author = {Nayereh Kholdinasab and Maryam Amirmazlaghani}, title = {An adversarial learning based image steganography with security improvement against neural network steganalysis}, journal = {Comput. Electr. Eng.}, volume = {108}, pages = {108725}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108725}, doi = {10.1016/J.COMPELECENG.2023.108725}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KholdinasabA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Li23, author = {Hong Li}, title = {Simulation of education digital network security and anomaly detection based on neural networks}, journal = {Comput. Electr. Eng.}, volume = {112}, pages = {108992}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108992}, doi = {10.1016/J.COMPELECENG.2023.108992}, timestamp = {Mon, 01 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiuZ23, author = {Qinghui Liu and Tianping Zhang}, title = {Deep learning technology of computer network security detection based on artificial intelligence}, journal = {Comput. Electr. Eng.}, volume = {110}, pages = {108813}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108813}, doi = {10.1016/J.COMPELECENG.2023.108813}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LiuZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Wang23, author = {Man Wang}, title = {Optimization of Network Security in University Laboratories Based on Anomaly Intrusion Detection in Public Cloud Networks}, journal = {Comput. Electr. Eng.}, volume = {111}, number = {Part {B}}, pages = {108968}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108968}, doi = {10.1016/J.COMPELECENG.2023.108968}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/LuWXX23, author = {Yinglun Lu and Xiang Wang and Taotao Xie and Tian Xie}, title = {Analysis of research results of different aspects of network security and Internet of Things under the background of big data}, journal = {Open Comput. Sci.}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.1515/comp-2022-0277}, doi = {10.1515/COMP-2022-0277}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/LuWXX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/ZhangJJH23, author = {Yajuan Zhang and Ru Jing and Xiang Ji and Nan Hu}, title = {Application of wireless sensor network technology based on artificial intelligence in security monitoring system}, journal = {Open Comput. Sci.}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.1515/comp-2022-0280}, doi = {10.1515/COMP-2022-0280}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/ZhangJJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/AtutxaABUJ23, author = {Asier Atutxa and Jasone Astorga and Marc Barcelo and Aitor Urbieta and Eduardo Jacob}, title = {Improving efficiency and security of IIoT communications using in-network validation of server certificate}, journal = {Comput. Ind.}, volume = {144}, pages = {103802}, year = {2023}, url = {https://doi.org/10.1016/j.compind.2022.103802}, doi = {10.1016/J.COMPIND.2022.103802}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/AtutxaABUJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Lu23, author = {Yujing Lu}, title = {Enhanced Network Security Protection through Data Analysis and Machine Learning: An Application of GraphSAGE for Anomaly Detection and Operational Intelligence}, journal = {J. Comput. Inf. Technol.}, volume = {31}, number = {4}, pages = {233--250}, year = {2023}, url = {http://cit.fer.hr/index.php/CIT/article/view/5776}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Lu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/BhadoriaBSKR23, author = {Robin Singh Bhadoria and Naman Bhoj and Manoj Kumar Srivastav and Rahul Kumar and Balasubramanian Raman}, title = {A machine learning framework for security and privacy issues in building trust for social networking}, journal = {Clust. Comput.}, volume = {26}, number = {6}, pages = {3907--3930}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03787-w}, doi = {10.1007/S10586-022-03787-W}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/BhadoriaBSKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KiyaniQGJ23, author = {Faisal Kiyani and Kashif Naseer Qureshi and Kayhan Zrar Ghafoor and Gwanggil Jeon}, title = {{ISDA-BAN:} interoperability and security based data authentication scheme for body area network}, journal = {Clust. Comput.}, volume = {26}, number = {4}, pages = {2429--2442}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03823-9}, doi = {10.1007/S10586-022-03823-9}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/KiyaniQGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KumarGTKA23, author = {Senthil Kumar Jagatheesaperumal and Akhil Gupta and Sudeep Tanwar and Neeraj Kumar and Sedat Akleylek}, title = {Security enhancement in cellular networks employing {D2D} friendly jammer for {V2V} communication}, journal = {Clust. Comput.}, volume = {26}, number = {2}, pages = {865--878}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03551-0}, doi = {10.1007/S10586-022-03551-0}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/KumarGTKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/TaheriAA23, author = {Roya Taheri and Habib Ahmed and Engin Arslan}, title = {Deep learning for the security of software-defined networks: a review}, journal = {Clust. Comput.}, volume = {26}, number = {5}, pages = {3089--3112}, year = {2023}, url = {https://doi.org/10.1007/s10586-023-04069-9}, doi = {10.1007/S10586-023-04069-9}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/TaheriAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HongSY23, author = {SeukGue Hong and HyungBin Seo and MyungKeun Yoon}, title = {Data Auditing for Intelligent Network Security Monitoring}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {3}, pages = {74--79}, year = {2023}, url = {https://doi.org/10.1109/MCOM.003.2200046}, doi = {10.1109/MCOM.003.2200046}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HongSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BringhentiSV23, author = {Daniele Bringhenti and Riccardo Sisto and Fulvio Valenza}, title = {A novel abstraction for security configuration in virtual networks}, journal = {Comput. Networks}, volume = {228}, pages = {109745}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109745}, doi = {10.1016/J.COMNET.2023.109745}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BringhentiSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EspinLMPC23, author = {Jos{\'{e}} Antonio Parra Esp{\'{\i}}n and Rafael Mar{\'{\i}}n L{\'{o}}pez and Gabriel L{\'{o}}pez Mill{\'{a}}n and Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and {\'{O}}scar C{\'{a}}novas}, title = {SDN-based automated rekey of IPsec security associations: Design and practical validations}, journal = {Comput. Networks}, volume = {233}, pages = {109905}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109905}, doi = {10.1016/J.COMNET.2023.109905}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/EspinLMPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JavanmardiSMAC23, author = {Saeed Javanmardi and Mohammad Shojafar and Reza Mohammadi and Mamoun Alazab and Antonio Caruso}, title = {An {SDN} perspective IoT-Fog security: {A} survey}, journal = {Comput. Networks}, volume = {229}, pages = {109732}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109732}, doi = {10.1016/J.COMNET.2023.109732}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JavanmardiSMAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KowalskiM23, author = {Mikolaj Kowalski and Wojciech Mazurczyk}, title = {Toward the mutual routing security in wide area networks: {A} scoping review of current threats and countermeasures}, journal = {Comput. Networks}, volume = {230}, pages = {109778}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109778}, doi = {10.1016/J.COMNET.2023.109778}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KowalskiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MabroukN23, author = {Abdelfettah Mabrouk and Assia Naja}, title = {Intrusion detection game for ubiquitous security in vehicular networks: {A} signaling game based approach}, journal = {Comput. Networks}, volume = {225}, pages = {109649}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109649}, doi = {10.1016/J.COMNET.2023.109649}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MabroukN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MekdadABFCLU23, author = {Yassine Mekdad and Ahmet Aris and Leonardo Babun and Abdeslam El Fergougui and Mauro Conti and Riccardo Lazzeretti and A. Selcuk Uluagac}, title = {A survey on security and privacy issues of UAVs}, journal = {Comput. Networks}, volume = {224}, pages = {109626}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109626}, doi = {10.1016/J.COMNET.2023.109626}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MekdadABFCLU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MohammadzadKM23, author = {Maryam Mohammadzad and Jaber Karimpour and Farnaz Mahan}, title = {{MAGD:} Minimal Attack Graph Generation Dynamically in Cyber Security}, journal = {Comput. Networks}, volume = {236}, pages = {110004}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110004}, doi = {10.1016/J.COMNET.2023.110004}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MohammadzadKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PattaranantakulVT23, author = {Montida Pattaranantakul and Chalee Vorakulpipat and Takeshi Takahashi}, title = {Service Function Chaining security survey: Addressing security challenges and threats}, journal = {Comput. Networks}, volume = {221}, pages = {109484}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2022.109484}, doi = {10.1016/J.COMNET.2022.109484}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PattaranantakulVT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/QuWYZ23, author = {Lianwei Qu and Yong Wang and Jing Yang and Meng Zhao}, title = {A heterogeneous network structure publishing security framework based on cloud-edge collaboration}, journal = {Comput. Networks}, volume = {234}, pages = {109947}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109947}, doi = {10.1016/J.COMNET.2023.109947}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/QuWYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RamezanpourJJ23, author = {Keyvan Ramezanpour and Jithin Jagannath and Anu Jagannath}, title = {Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective}, journal = {Comput. Networks}, volume = {221}, pages = {109515}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2022.109515}, doi = {10.1016/J.COMNET.2022.109515}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RamezanpourJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WaqasTWMAA23, author = {Muhammad Waqas and Shanshan Tu and Jialin Wan and Talha Mir and Hisham Alasmary and Ghulam Abbas}, title = {Defense scheme against advanced persistent threats in mobile fog computing security}, journal = {Comput. Networks}, volume = {221}, pages = {109519}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2022.109519}, doi = {10.1016/J.COMNET.2022.109519}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WaqasTWMAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangMLZWT23, author = {Hengwei Zhang and Yan Mi and Xiaohu Liu and Yuchen Zhang and Jindong Wang and Jinglei Tan}, title = {A differential game approach for real-time security defense decision in scale-free networks}, journal = {Comput. Networks}, volume = {224}, pages = {109635}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109635}, doi = {10.1016/J.COMNET.2023.109635}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhangMLZWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/DolevK23, author = {Shlomi Dolev and Daniel Khankin}, title = {Random spanning trees for expanders, sparsifiers, and virtual network security}, journal = {Comput. Commun.}, volume = {212}, pages = {21--34}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.09.028}, doi = {10.1016/J.COMCOM.2023.09.028}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/DolevK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ModiriSMK23, author = {Mohammad Mahdi Modiri and Mahmoud Salmasizadeh and Javad Mohajeri and Babak Hossein Khalaj}, title = {Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks}, journal = {Comput. Commun.}, volume = {211}, pages = {286--301}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.09.021}, doi = {10.1016/J.COMCOM.2023.09.021}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ModiriSMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PalamaABGPB23, author = {Ivan Palam{\`{a}} and Alessandro Amici and Gabriele Bellicini and Francesco Gringoli and Fabio Pedretti and Giuseppe Bianchi}, title = {Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments}, journal = {Comput. Commun.}, volume = {212}, pages = {129--140}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.09.031}, doi = {10.1016/J.COMCOM.2023.09.031}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PalamaABGPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/XiongZZY23, author = {Qiang Xiong and Yifei Zhu and Zhangying Zeng and Xinqi Yang}, title = {Signal Game Analysis between Software Vendors and Third-Party Platforms in Collaborative Disclosure of Network Security Vulnerabilities}, journal = {Complex.}, volume = {2023}, pages = {1027215:1--1027215:11}, year = {2023}, url = {https://doi.org/10.1155/2023/1027215}, doi = {10.1155/2023/1027215}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/XiongZZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AndradeSJYHK23, author = {Ricardo de Andrade and Max Mauro Dias Santos and Jo{\~{a}}o Francisco Justo and Leopoldo Rideki Yoshioka and Hans{-}Joachim Hof and Jo{\~{a}}o Henrique Kleinschmidt}, title = {Security architecture for automotive communication networks with {CAN} {FD}}, journal = {Comput. Secur.}, volume = {129}, pages = {103203}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103203}, doi = {10.1016/J.COSE.2023.103203}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AndradeSJYHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanMBY23, author = {Kyusuk Han and Hyeran Mun and Malavika Balakrishnan and Chan Yeob Yeun}, title = {Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments}, journal = {Comput. Secur.}, volume = {135}, pages = {103481}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103481}, doi = {10.1016/J.COSE.2023.103481}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HanMBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimKYPSP23, author = {Jinwoo Kim and Yeonkeun Kim and Vinod Yegneswaran and Phillip A. Porras and Seungwon Shin and Taejune Park}, title = {Extended data plane architecture for in-network security services in software-defined networks}, journal = {Comput. Secur.}, volume = {124}, pages = {102976}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102976}, doi = {10.1016/J.COSE.2022.102976}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimKYPSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangMFLZWT23, author = {Hengwei Zhang and Yan Mi and Yumeng Fu and Xiaohu Liu and Yuchen Zhang and Jindong Wang and Jinglei Tan}, title = {Security defense decision method based on potential differential game for complex networks}, journal = {Comput. Secur.}, volume = {129}, pages = {103187}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103187}, doi = {10.1016/J.COSE.2023.103187}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangMFLZWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ChenWLHZZYK23, author = {Xiang Chen and Chunming Wu and Xuan Liu and Qun Huang and Dong Zhang and Haifeng Zhou and Qiang Yang and Muhammad Khurram Khan}, title = {Empowering Network Security With Programmable Switches: {A} Comprehensive Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {3}, pages = {1653--1704}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3265984}, doi = {10.1109/COMST.2023.3265984}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ChenWLHZZYK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KeersmaekerCNS23, author = {Fran{\c{c}}ois De Keersmaeker and Yinan Cao and Gorby Kabasele Ndonda and Ramin Sadre}, title = {A Survey of Public IoT Datasets for Network Security Research}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {3}, pages = {1808--1840}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3288942}, doi = {10.1109/COMST.2023.3288942}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/KeersmaekerCNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/MaoLWK23, author = {Bomin Mao and Jiajia Liu and Yingying Wu and Nei Kato}, title = {Security and Privacy on 6G Network Edge: {A} Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {2}, pages = {1095--1127}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3244674}, doi = {10.1109/COMST.2023.3244674}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/MaoLWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Kabakus23, author = {Abdullah Talha Kabakus}, title = {A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/cpe.7517}, doi = {10.1002/CPE.7517}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Kabakus23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/WangDGRWP23, author = {Chao Wang and Jiahan Dong and Guangxin Guo and Tianyu Ren and Xiaohu Wang and Ming{-}yu Pan}, title = {Security situational awareness of power information networks based on machine learning algorithms}, journal = {Connect. Sci.}, volume = {35}, number = {1}, year = {2023}, url = {https://doi.org/10.1080/09540091.2023.2284649}, doi = {10.1080/09540091.2023.2284649}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/WangDGRWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/ZhaoJZ23, author = {Dongmei Zhao and Guoqing Ji and Shuiguang Zeng}, title = {Network security situation assessment based on dual attention mechanism and HHO-ResNeXt}, journal = {Connect. Sci.}, volume = {35}, number = {1}, year = {2023}, url = {https://doi.org/10.1080/09540091.2023.2174080}, doi = {10.1080/09540091.2023.2174080}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/ZhaoJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LellaS23, author = {Eufemia Lella and Giovanni Schmid}, title = {On the Security of Quantum Key Distribution Networks}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {53}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040053}, doi = {10.3390/CRYPTOGRAPHY7040053}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LellaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiuYLD23, author = {Zi{-}yi Liu and Changsong Yang and Yueling Liu and Yong Ding}, title = {A BIPMU-based network security situation assessment method for wireless network}, journal = {Comput. Stand. Interfaces}, volume = {83}, pages = {103661}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2022.103661}, doi = {10.1016/J.CSI.2022.103661}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiuYLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/DhanasekaranPG23, author = {Ranganathan Mavureddi Dhanasekaran and Jing Ping and German Peinado Gomez}, title = {End-to-End Network Slicing Security Across Standards Organizations}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {7}, number = {1}, pages = {40--47}, year = {2023}, url = {https://doi.org/10.1109/MCOMSTD.0005.2200055}, doi = {10.1109/MCOMSTD.0005.2200055}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/DhanasekaranPG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/VermaCA23, author = {Himanshu Verma and Naveen Chauhan and Lalit Kumar Awasthi}, title = {A Comprehensive review of '\emph{Internet of Healthcare Things}': Networking aspects, technologies, services, applications, challenges, and security concerns}, journal = {Comput. Sci. Rev.}, volume = {50}, pages = {100591}, year = {2023}, url = {https://doi.org/10.1016/j.cosrev.2023.100591}, doi = {10.1016/J.COSREV.2023.100591}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/VermaCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AanjanadeviARP23, author = {S. Aanjanadevi and S. Aanjankumar and K. R. Ramela and V. Palanisamy}, title = {Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics}, journal = {Comput. Syst. Sci. Eng.}, volume = {45}, number = {3}, pages = {2351--2362}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.031893}, doi = {10.32604/CSSE.2023.031893}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/AanjanadeviARP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/IsyakuB23, author = {Babangida Isyaku and Kamalrulnizam Abu Bakar}, title = {Managing Smart Technologies with Software-Defined Networks for Routing and Security Challenges: {A} Survey}, journal = {Comput. Syst. Sci. Eng.}, volume = {47}, number = {2}, pages = {1839--1879}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.040456}, doi = {10.32604/CSSE.2023.040456}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/IsyakuB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/SabithaPK23, author = {R. Sabitha and C. Gokul Prasad and S. Karthik}, title = {Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks}, journal = {Comput. Syst. Sci. Eng.}, volume = {45}, number = {3}, pages = {2795--2810}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.026465}, doi = {10.32604/CSSE.2023.026465}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/SabithaPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/SunLSNW23, author = {Junfeng Sun and Chenghai Li and Yafei Song and Peng Ni and Jian Wang}, title = {Network Security Situation Prediction Based on TCAN-BiGRU Optimized by {SSA} and {IQPSO}}, journal = {Comput. Syst. Sci. Eng.}, volume = {47}, number = {1}, pages = {993--1021}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.039215}, doi = {10.32604/CSSE.2023.039215}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/SunLSNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PattnaikLN23, author = {Nandita Pattnaik and Shujun Li and Jason R. C. Nurse}, title = {A Survey of User Perspectives on Security and Privacy in a Home Networking Environment}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {9}, pages = {180:1--180:38}, year = {2023}, url = {https://doi.org/10.1145/3558095}, doi = {10.1145/3558095}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/PattnaikLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/BerardiTMPC23, author = {Davide Berardi and Nils Ole Tippenhauer and Andrea Melis and Marco Prandini and Franco Callegati}, title = {Time sensitive networking security: issues of precision time protocol and its implementation}, journal = {Cybersecur.}, volume = {6}, number = {1}, pages = {8}, year = {2023}, url = {https://doi.org/10.1186/s42400-023-00140-5}, doi = {10.1186/S42400-023-00140-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/BerardiTMPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/JiangLHASM23, author = {Jinfang Jiang and Chuan Lin and Guangjie Han and Adnan M. Abu{-}Mahfouz and Syed Bilal Hussain Shah and Miguel Mart{\'{\i}}nez{-}Garc{\'{\i}}a}, title = {How AI-enabled {SDN} technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities}, journal = {Digit. Commun. Networks}, volume = {9}, number = {6}, pages = {1351--1362}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.07.001}, doi = {10.1016/J.DCAN.2022.07.001}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/JiangLHASM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/KimSPSO23, author = {YeEun Kim and Junggab Son and Reza M. Parizi and Gautam Srivastava and Heekuck Oh}, title = {3-Multi ranked encryption with enhanced security in cloud computing}, journal = {Digit. Commun. Networks}, volume = {9}, number = {2}, pages = {313--326}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.05.021}, doi = {10.1016/J.DCAN.2022.05.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/KimSPSO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/NaeemZATMB23, author = {Muhammad Ali Naeem and Yousaf Bin Zikria and Rashid Ali and Usman Tariq and Yahui Meng and Ali Kashif Bashir}, title = {Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective}, journal = {Digit. Commun. Networks}, volume = {9}, number = {5}, pages = {1033--1052}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.08.004}, doi = {10.1016/J.DCAN.2022.08.004}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/NaeemZATMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YangLLHJLS23, author = {Aimin Yang and Chaomeng Lu and Jie Li and Xiangdong Huang and Tianhao Ji and Xichang Li and Yichao Sheng}, title = {Application of meta-learning in cyberspace security: a survey}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {67--78}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.03.007}, doi = {10.1016/J.DCAN.2022.03.007}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/YangLLHJLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YangMZHHZHW23, author = {Aimin Yang and Zezhong Ma and Chunying Zhang and Yang Han and Zhibin Hu and Wei Zhang and Xiangdong Huang and Yafeng Wu}, title = {Review on application progress of federated learning model and security hazard protection}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {146--158}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.11.006}, doi = {10.1016/J.DCAN.2022.11.006}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/YangMZHHZHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YazdanpanahCJ23, author = {Saeid Yazdanpanah and Saman Shojae Chaeikar and Alireza Jolfaei}, title = {Monitoring the security of audio biomedical signals communications in wearable IoT healthcare}, journal = {Digit. Commun. Networks}, volume = {9}, number = {2}, pages = {393--399}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.11.002}, doi = {10.1016/J.DCAN.2022.11.002}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/YazdanpanahCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/MaLXWLZ23, author = {Bin Ma and Kun Li and Jian Xu and Chunpeng Wang and Jian Li and Liwei Zhang}, title = {Enhancing the security of image steganography via multiple adversarial networks and channel attention modules}, journal = {Digit. Signal Process.}, volume = {141}, pages = {104121}, year = {2023}, url = {https://doi.org/10.1016/j.dsp.2023.104121}, doi = {10.1016/J.DSP.2023.104121}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/MaLXWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/DaoudOHKH23, author = {Wided Ben Daoud and Salwa Othmen and Monia Hamdi and Radhia Khdhir and Habib Hamam}, title = {Fog computing network security based on resources management}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2023}, number = {1}, pages = {50}, year = {2023}, url = {https://doi.org/10.1186/s13638-023-02256-1}, doi = {10.1186/S13638-023-02256-1}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/DaoudOHKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/DaoudOHKH23a, author = {Wided Ben Daoud and Salwa Othmen and Monia Hamdi and Radhia Khdhir and Habib Hamam}, title = {Correction: Fog computing network security based on resources management}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2023}, number = {1}, pages = {108}, year = {2023}, url = {https://doi.org/10.1186/s13638-023-02318-4}, doi = {10.1186/S13638-023-02318-4}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/DaoudOHKH23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/LeNNVLV23, author = {Si{-}Phu Le and Hong{-}Nhu Nguyen and Nhat{-}Tien Nguyen and Cuu Ho Van and Anh{-}Tu Le and Miroslav Vozn{\'{a}}k}, title = {Physical layer security analysis of IRS-based downlink and uplink {NOMA} networks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2023}, number = {1}, pages = {105}, year = {2023}, url = {https://doi.org/10.1186/s13638-023-02309-5}, doi = {10.1186/S13638-023-02309-5}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/LeNNVLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/BaiGY23, author = {Yang Bai and Xuan Guang and Raymond W. Yeung}, title = {Multiple Linear-Combination Security Network Coding}, journal = {Entropy}, volume = {25}, number = {8}, pages = {1135}, year = {2023}, url = {https://doi.org/10.3390/e25081135}, doi = {10.3390/E25081135}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/BaiGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/HayajnehG23, author = {Maymoona Hayajneh and Thomas Aaron Gulliver}, title = {Physical Layer Security in Two-Way {SWIPT} Relay Networks with Imperfect {CSI} and a Friendly Jammer}, journal = {Entropy}, volume = {25}, number = {1}, pages = {122}, year = {2023}, url = {https://doi.org/10.3390/e25010122}, doi = {10.3390/E25010122}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/HayajnehG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhouSZCWL23, author = {Buxiang Zhou and Binjie Sun and Tianlei Zang and Yating Cai and Jiale Wu and Huan Luo}, title = {Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities}, journal = {Entropy}, volume = {25}, number = {1}, pages = {47}, year = {2023}, url = {https://doi.org/10.3390/e25010047}, doi = {10.3390/E25010047}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/ZhouSZCWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AhmadAAKAN23, author = {Amreen Ahmad and Tanvir Ahmad and Musheer Ahmad and Chanchal Kumar and Fayadh Alenezi and Majid Kamal A. Nour}, title = {A complex network-based approach for security and governance in the smart green city}, journal = {Expert Syst. Appl.}, volume = {214}, pages = {119094}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2022.119094}, doi = {10.1016/J.ESWA.2022.119094}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AhmadAAKAN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SagarS23, author = {Dasari Sagar and Malgireddy Saidireddy}, title = {Security Measurement in {LTE/LTE-A} Network Based on zS-Lr Feature Selection Technique and Um-tGAN Attack Detection Technique}, journal = {Expert Syst. Appl.}, volume = {231}, pages = {120703}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120703}, doi = {10.1016/J.ESWA.2023.120703}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SagarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/DevarajanTATS23, author = {Ganesh Gopal Devarajan and M. Thirunavukkarasan and Sardar Irfanullah Amanullah and Vignesh T. and Audithan Sivaraman}, title = {An integrated security approach for vehicular networks in smart cities}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {34}, number = {11}, year = {2023}, url = {https://doi.org/10.1002/ett.4757}, doi = {10.1002/ETT.4757}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/DevarajanTATS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/SinghBLM23, author = {Moirangthem Tiken Singh and Surajit Borkotokey and Rachid Ait Maalem Lahcen and Ram N. Mohapatra}, title = {A generic scheme for cyber security in resource constraint network using incomplete information game}, journal = {Evol. Intell.}, volume = {16}, number = {3}, pages = {819--832}, year = {2023}, url = {https://doi.org/10.1007/s12065-021-00684-w}, doi = {10.1007/S12065-021-00684-W}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/SinghBLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evs/MazhariSefatH23, author = {Benyamin MazhariSefat and Soodeh Hosseini}, title = {Social network security using genetic algorithm}, journal = {Evol. Syst.}, volume = {14}, number = {2}, pages = {175--190}, year = {2023}, url = {https://doi.org/10.1007/s12530-022-09442-4}, doi = {10.1007/S12530-022-09442-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evs/MazhariSefatH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChengZZWL23, author = {Xin Cheng and Jingmei Zhou and Xiangmo Zhao and Hongfei Wang and Yuqi Li}, title = {A presentation attack detection network based on dynamic convolution and multi-level feature fusion with security and reliability}, journal = {Future Gener. Comput. Syst.}, volume = {146}, pages = {114--121}, year = {2023}, url = {https://doi.org/10.1016/j.future.2023.04.012}, doi = {10.1016/J.FUTURE.2023.04.012}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ChengZZWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/DelValleSotoBVVN23, author = {Carolina Del{-}Valle{-}Soto and Ramon A. Brise{\~{n}}o and Leonardo J. Valdivia and Ramiro Vel{\'{a}}zquez and Juan Arturo Nolazco{-}Flores}, title = {Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security}, journal = {Future Internet}, volume = {15}, number = {9}, pages = {287}, year = {2023}, url = {https://doi.org/10.3390/fi15090287}, doi = {10.3390/FI15090287}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/DelValleSotoBVVN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KoiralaBF23, author = {Ashish Koirala and Rabindra Bista and Jo{\~{a}}o C. Ferreira}, title = {Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms}, journal = {Future Internet}, volume = {15}, number = {6}, pages = {210}, year = {2023}, url = {https://doi.org/10.3390/fi15060210}, doi = {10.3390/FI15060210}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KoiralaBF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/NgoLTPTMP23, author = {Duc{-}Minh Ngo and Dominic Lightbody and Andriy Temko and Cuong Pham{-}Quoc and Ngoc{-}Thinh Tran and Colin C. Murphy and Emanuel M. Popovici}, title = {{HH-NIDS:} Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security}, journal = {Future Internet}, volume = {15}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.3390/fi15010009}, doi = {10.3390/FI15010009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/NgoLTPTMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/SalahE23, author = {Zaher Salah and Esraa Abu Elsoud}, title = {Enhancing Network Security: {A} Machine Learning-Based Approach for Detecting and Mitigating Krack and Kr00k Attacks in {IEEE} 802.11}, journal = {Future Internet}, volume = {15}, number = {8}, pages = {269}, year = {2023}, url = {https://doi.org/10.3390/fi15080269}, doi = {10.3390/FI15080269}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/SalahE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/SaminathanMDRL23, author = {Karthikeyan Saminathan and Sai Tharun Reddy Mulka and Sangeetha Damodharan and Maheswar Rajagopal and Josip Lorincz}, title = {An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection}, journal = {Future Internet}, volume = {15}, number = {12}, pages = {373}, year = {2023}, url = {https://doi.org/10.3390/fi15120373}, doi = {10.3390/FI15120373}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/SaminathanMDRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/SeverinoSDS23, author = {Ricardo Severino and Jos{\'{e}} Sim{\~{a}}o and Nuno Datia and Ant{\'{o}}nio Serrador}, title = {Protecting Hybrid {ITS} Networks: {A} Comprehensive Security Approach}, journal = {Future Internet}, volume = {15}, number = {12}, pages = {388}, year = {2023}, url = {https://doi.org/10.3390/fi15120388}, doi = {10.3390/FI15120388}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/SeverinoSDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fss/TanYXN23, author = {Yushun Tan and Ye Yuan and Xiangpeng Xie and Ben Niu}, title = {Dynamic event-triggered security control for networked {T-S} fuzzy system with non-uniform sampling}, journal = {Fuzzy Sets Syst.}, volume = {452}, pages = {91--109}, year = {2023}, url = {https://doi.org/10.1016/j.fss.2022.08.018}, doi = {10.1016/J.FSS.2022.08.018}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fss/TanYXN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/QiV23, author = {Yue Qi and Mojtaba Vaezi}, title = {IRS-Assisted Physical Layer Security in {MIMO-NOMA} Networks}, journal = {{IEEE} Commun. Lett.}, volume = {27}, number = {3}, pages = {792--796}, year = {2023}, url = {https://doi.org/10.1109/LCOMM.2023.3235722}, doi = {10.1109/LCOMM.2023.3235722}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/QiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icn/QiLSYYW23, author = {Longyun Qi and Xiaoliang Lv and Lianwen Sun and Tianle Yao and Jianye Yu and Lei Wang}, title = {Operating system network security enhancement scheme based on trusted storage}, journal = {Intell. Converged Networks}, volume = {4}, number = {2}, pages = {127--141}, year = {2023}, url = {https://doi.org/10.23919/icn.2023.0014}, doi = {10.23919/ICN.2023.0014}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icn/QiLSYYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/PhamHDT23, author = {Minh{-}Nam Pham and Duy{-}Hung Ha and Tran Trung Duy and Le{-}Tien Thuong}, title = {Security-reliability tradeoff of {MIMO} {TAS/SC} networks using harvest-to-jam cooperative jamming methods with random jammer location}, journal = {{ICT} Express}, volume = {9}, number = {1}, pages = {63--68}, year = {2023}, url = {https://doi.org/10.1016/j.icte.2021.11.003}, doi = {10.1016/J.ICTE.2021.11.003}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ict-express/PhamHDT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/FernandezK23, author = {Leon Fernandez and Gunnar Karlsson}, title = {Black-Box Fuzzing for Security in Managed Networks: An Outline}, journal = {{IEEE} Netw. Lett.}, volume = {5}, number = {4}, pages = {241--244}, year = {2023}, url = {https://doi.org/10.1109/LNET.2023.3286443}, doi = {10.1109/LNET.2023.3286443}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeenl/FernandezK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/Sun0W0ZLG23, author = {Jianwei Sun and Heng Zhang and Xin Wang and Ming Yang and Jian Zhang and Hongran Li and Chenglong Gong}, title = {Leveraging {UAV-RIS} Reflects to Improve the Security Performance of Wireless Network Systems}, journal = {{IEEE} Netw. Lett.}, volume = {5}, number = {2}, pages = {81--85}, year = {2023}, url = {https://doi.org/10.1109/LNET.2023.3262885}, doi = {10.1109/LNET.2023.3262885}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/Sun0W0ZLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LiMYS23, author = {Junxia Li and Xuexue Ma and Faxin Ye and Jiangfeng Sun}, title = {Physical layer security of single-input multiple-out relay networks over Beaulieu-Xie fading channels}, journal = {{IET} Commun.}, volume = {17}, number = {16}, pages = {1928--1939}, year = {2023}, url = {https://doi.org/10.1049/cmu2.12663}, doi = {10.1049/CMU2.12663}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/LiMYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/WenhuaHIZRIK23, author = {Zhang Wenhua and Mohammad Kamrul Hasan and Ahmad Fadzil Ismail and Yanke Zhang and Md. Abdur Razzaque and Shayla Islam and Budati Anil Kumar}, title = {Data security in smart devices: Advancement, constraints and future recommendations}, journal = {{IET} Networks}, volume = {12}, number = {6}, pages = {269--281}, year = {2023}, url = {https://doi.org/10.1049/ntw2.12091}, doi = {10.1049/NTW2.12091}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/WenhuaHIZRIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igpl/SokolSGP23, author = {Pavol Sokol and Richard Stana and Andrej Gajdos and Patrik Pekarc{\'{\i}}k}, title = {Network security situation awareness forecasting based on statistical approach and neural networks}, journal = {Log. J. {IGPL}}, volume = {31}, number = {2}, pages = {352--374}, year = {2023}, url = {https://doi.org/10.1093/jigpal/jzac024}, doi = {10.1093/JIGPAL/JZAC024}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igpl/SokolSGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/Fei23, author = {Gao Fei}, title = {Security key distribution method of wireless sensor network based on DV-hop algorithm}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {16}, number = {1}, pages = {66--83}, year = {2023}, url = {https://doi.org/10.1504/IJAACS.2023.10039241}, doi = {10.1504/IJAACS.2023.10039241}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaacs/Fei23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/DurgaS23, author = {R. Durga and Periyasamy Sudhakar}, title = {Implementing {RSA} algorithm for network security using dual prime secure protocol in crypt analysis}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {24}, number = {3/4}, pages = {355--368}, year = {2023}, url = {https://doi.org/10.1504/IJAIP.2018.10020057}, doi = {10.1504/IJAIP.2018.10020057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaip/DurgaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/Wang23, author = {Yue Wang}, title = {{CNS:} Research on Data Security Technology and Network Data Security Regulations Driven by Digital Economy}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {32}, number = {4}, pages = {2150009:1--2150009:19}, year = {2023}, url = {https://doi.org/10.1142/S021884302150009X}, doi = {10.1142/S021884302150009X}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/Li23, author = {Ju Li}, title = {Research on an optimised encryption algorithm for network information security communication}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {29}, number = {1}, pages = {31--46}, year = {2023}, url = {https://doi.org/10.1504/IJCNDS.2022.10044390}, doi = {10.1504/IJCNDS.2022.10044390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/SachdevaGMCD23, author = {Hardik Sachdeva and Shivam Gupta and Anushka Misra and Khushbu Chauhan and Mayank Dave}, title = {Privacy and security improvement in {UAV} network using blockchain}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {29}, number = {4}, pages = {383--406}, year = {2023}, url = {https://doi.org/10.1504/IJCNDS.2023.131736}, doi = {10.1504/IJCNDS.2023.131736}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/SachdevaGMCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LiaoC23, author = {Linsen Liao and Xinghua Cao}, title = {Data Transmission Security and Legal Regulation in Clinical Application of Human Gene Editing from Perspective of Big Data}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {4}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i4.6345}, doi = {10.17762/IJCNIS.V15I4.6345}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LiaoC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/LuS23, author = {Wenjie Lu and Ximing Sun}, title = {Research on Internet Technology Innovation and Information Security Challenges in New Vehicle Energy Sector}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {15}, number = {3}, pages = {86--98}, year = {2023}, url = {https://doi.org/10.17762/ijcnis.v15i3.6228}, doi = {10.17762/IJCNIS.V15I3.6228}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/LuS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/SuAZCLH23, author = {Bingshan Su and Shiyong An and Xuezhuan Zhao and Jiguang Chen and Xiaoyu Li and Yuantao He}, title = {An aeronautic X-ray image security inspection network for rotation and occlusion}, journal = {Int. J. Comput. Sci. Eng.}, volume = {26}, number = {3}, pages = {337--348}, year = {2023}, url = {https://doi.org/10.1504/IJCSE.2023.131504}, doi = {10.1504/IJCSE.2023.131504}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/SuAZCLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChengQWW23, author = {Shi Cheng and Yan Qu and Chuyue Wang and Jie Wan}, title = {Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332858}, doi = {10.4018/IJDCF.332858}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChengQWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiW23, author = {Yueying Li and Feng Wu}, title = {Improved Population Intelligence Algorithm and {BP} Neural Network for Network Security Posture Prediction}, journal = {Int. J. Distributed Sens. Networks}, volume = {2023}, pages = {1--11}, year = {2023}, url = {https://doi.org/10.1155/2023/9970205}, doi = {10.1155/2023/9970205}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/LiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/PrakashBAS23, author = {Chandra Prakash and Anurag Barthwal and Shwetank Avikal and Gyanendra Kumar Singh}, title = {{FSAS:} An IoT-Based Security System for Crop Field Storage}, journal = {Int. J. Distributed Sens. Networks}, volume = {2023}, pages = {1--13}, year = {2023}, url = {https://doi.org/10.1155/2023/2367167}, doi = {10.1155/2023/2367167}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/PrakashBAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Niu23, author = {Jing Niu}, title = {Design of automatic monitoring system for network information security in cloud computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {19--34}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131091}, doi = {10.1504/IJICS.2023.131091}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Niu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/ChenWZ23, author = {Gongping Chen and Hong Wang and Chuanqi Zhang}, title = {Mobile cellular network security vulnerability detection using machine learning}, journal = {Int. J. Inf. Commun. Technol.}, volume = {22}, number = {3}, pages = {327--341}, year = {2023}, url = {https://doi.org/10.1504/IJICT.2023.10054797}, doi = {10.1504/IJICT.2023.10054797}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/ChenWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/LiS23, author = {Yuanyuan Li and Jidong Sha}, title = {Network covert channel data security detection method based on threshold re-encryption}, journal = {Int. J. Inf. Commun. Technol.}, volume = {23}, number = {2}, pages = {188--200}, year = {2023}, url = {https://doi.org/10.1504/IJICT.2023.132768}, doi = {10.1504/IJICT.2023.132768}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/LiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/MaoLS23, author = {Xiaodong Mao and Haiyan Li and Shixin Sun}, title = {Research on dynamic bidirectional security authentication of user identity in wireless sensor network based on improved {DES} algorithm}, journal = {Int. J. Inf. Commun. Technol.}, volume = {23}, number = {1}, pages = {74--90}, year = {2023}, url = {https://doi.org/10.1504/IJICT.2023.132148}, doi = {10.1504/IJICT.2023.132148}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/MaoLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/Hussein23, author = {Mohammed Abdulridha Hussein}, title = {Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks}, journal = {Int. J. Interact. Mob. Technol.}, volume = {17}, number = {2}, pages = {153--165}, year = {2023}, url = {https://doi.org/10.3991/ijim.v17i02.36387}, doi = {10.3991/IJIM.V17I02.36387}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/Hussein23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/SandhiaNSSS23, author = {G. K. Sandhia and S. Nithyaselvakumari and V. Saidulu and Nor Hissam B. Sulaiman and Anas A. Salameh}, title = {Enhancing the Security of Software Defined Mobile Networks {(SDMN)} based on Blockchain Technology}, journal = {Int. J. Interact. Mob. Technol.}, volume = {17}, number = {4}, pages = {117--133}, year = {2023}, url = {https://doi.org/10.3991/ijim.v17i04.37807}, doi = {10.3991/IJIM.V17I04.37807}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/SandhiaNSSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/SivakumarDMKBK23, author = {T. K. Sivakumar and Saurabh Dhyani and S. V. Manikanthan and Vishnu Kumar Kaliappan and K. Baskaran and Kakarla Hari Kishore}, title = {Cluster-Factors of Mobile Sensor Network Technology for Security Enhanced {PEGASIS}}, journal = {Int. J. Interact. Mob. Technol.}, volume = {17}, number = {18}, pages = {143--155}, year = {2023}, url = {https://doi.org/10.3991/ijim.v17i18.42915}, doi = {10.3991/IJIM.V17I18.42915}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/SivakumarDMKBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijin/KousalyaB23, author = {A. Kousalya and Namkyun Baik}, title = {Enhance cloud security and effectiveness using improved RSA-based {RBAC} with {XACML} technique}, journal = {Int. J. Intell. Networks}, volume = {4}, pages = {62--67}, year = {2023}, url = {https://doi.org/10.1016/j.ijin.2023.03.003}, doi = {10.1016/J.IJIN.2023.03.003}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijin/KousalyaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijin/ZhangPH23, author = {Caixia Zhang and Zijian Pan and Chaofan Hou}, title = {Marketing data security and privacy protection based on federated gamma in cloud computing environment}, journal = {Int. J. Intell. Networks}, volume = {4}, pages = {261--271}, year = {2023}, url = {https://doi.org/10.1016/j.ijin.2023.09.003}, doi = {10.1016/J.IJIN.2023.09.003}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijin/ZhangPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijin/Zhu23, author = {Qingkun Zhu}, title = {Enhancing vulnerability scoring for information security in intelligent computers}, journal = {Int. J. Intell. Networks}, volume = {4}, pages = {253--260}, year = {2023}, url = {https://doi.org/10.1016/j.ijin.2023.09.002}, doi = {10.1016/J.IJIN.2023.09.002}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijin/Zhu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Zhang23, author = {Yin Sheng Zhang}, title = {Analysis of {OSPU} security effect and data assembly verification under semi-network {OS} architecture}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {5}, pages = {1497--1509}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00702-1}, doi = {10.1007/S10207-023-00702-1}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/EnnajiAH23, author = {Sabrine Ennaji and Nabil El Akkad and Khalid Haddouch}, title = {i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--17}, year = {2023}, url = {https://doi.org/10.4018/ijisp.317113}, doi = {10.4018/IJISP.317113}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/EnnajiAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/XieWC23, author = {Xiang Xie and Yingte Wang and Ying Cui}, title = {Research on evaluation of network payment security}, journal = {Int. J. Inf. Technol. Manag.}, volume = {22}, number = {1/2}, pages = {110--126}, year = {2023}, url = {https://doi.org/10.1504/IJITM.2023.10055154}, doi = {10.1504/IJITM.2023.10055154}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/XieWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitsa/Jiang23, author = {Guiwen Jiang}, title = {Security Detection Design for Laboratory Networks Based on Enhanced {LSTM} and AdamW Algorithms}, journal = {Int. J. Inf. Technol. Syst. Approach}, volume = {16}, number = {2}, pages = {1--13}, year = {2023}, url = {https://doi.org/10.4018/ijitsa.319721}, doi = {10.4018/IJITSA.319721}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitsa/Jiang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitsa/Jin23, author = {Min Jin}, title = {Computer Network Information Security and Protection Strategy Based on Big Data Environment}, journal = {Int. J. Inf. Technol. Syst. Approach}, volume = {16}, number = {2}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijitsa.319722}, doi = {10.4018/IJITSA.319722}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitsa/Jin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/Li23, author = {Lin Li}, title = {The Construction of Network Domain Name Security Access Identification System Based on Artificial Intelligence}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {18}, number = {1}, pages = {1--13}, year = {2023}, url = {https://doi.org/10.4018/ijitwe.333636}, doi = {10.4018/IJITWE.333636}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MengKCC23, author = {Weizhi Meng and Sokratis K. Katsikas and Jiageng Chen and Chao Chen}, title = {Editorial for special issue on security and trust on networked systems}, journal = {Int. J. Netw. Manag.}, volume = {33}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/nem.2229}, doi = {10.1002/NEM.2229}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MengKCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/Choudhary23, author = {Deepak Choudhary}, title = {Optimized security algorithm for connected vehicular network}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {19}, number = {5}, pages = {799--817}, year = {2023}, url = {https://doi.org/10.1108/IJPCC-12-2021-0300}, doi = {10.1108/IJPCC-12-2021-0300}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpcc/Choudhary23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/RautV23, author = {Umesh K. Raut and L. K. Vishwamitra}, title = {Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {19}, number = {1}, pages = {97--123}, year = {2023}, url = {https://doi.org/10.1108/IJPCC-01-2021-0020}, doi = {10.1108/IJPCC-01-2021-0020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/RautV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/WenPWO23, author = {Zhicheng Wen and Linhua Peng and Weiqing Wan and Jing Ou}, title = {An Algorithm for Network Security Situation Assessment Based on Deep Learning}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {37}, number = {2}, pages = {2252031:1--2252031:18}, year = {2023}, url = {https://doi.org/10.1142/S0218001422520310}, doi = {10.1142/S0218001422520310}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/WenPWO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/WenZWD23, author = {Zhicheng Wen and Longxin Zhang and Qinlan Wu and Wengui Deng}, title = {A Network Security Situation Awareness Method Based on {GRU} in Big Data Environment}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {37}, number = {1}, pages = {2251018:1--2251018:18}, year = {2023}, url = {https://doi.org/10.1142/S0218001422510181}, doi = {10.1142/S0218001422510181}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/WenZWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChiniahG23, author = {Aatish Chiniah and Feroz Ghannoo}, title = {A multi-theory model to evaluate new factors influencing information security compliance}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {19--29}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129949}, doi = {10.1504/IJSN.2023.129949}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChiniahG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SaadSS23, author = {Redhwan M. A. Saad and Khaled A. M. Al Soufy and Samir I. Shaheen}, title = {Security in smart home environment: issues, challenges, and countermeasures - a survey}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {1--9}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129887}, doi = {10.1504/IJSN.2023.129887}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SaadSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanZLQW23, author = {Hao Yan and Zheng Zhang and Yanan Liu and Shuo Qiu and Qiuling Wu}, title = {Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {125--132}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131610}, doi = {10.1504/IJSN.2023.131610}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanZLQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuDMS23, author = {Dexin Zhu and Xiaogang Du and Jigui Mao and Lijun Song}, title = {A security control scheme based on quantum keys for IoT terminals}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {189--198}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134123}, doi = {10.1504/IJSN.2023.134123}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuDMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/BenrebbouhMCP23, author = {Chahrazed Benrebbouh and Houssem Mansouri and Sarra Cherbal and Al{-}Sakib Khan Pathan}, title = {A lightweight security scheme to defend against quantum attack in IoT-based energy internet}, journal = {Int. J. Sens. Networks}, volume = {43}, number = {1}, pages = {13--26}, year = {2023}, url = {https://doi.org/10.1504/IJSNET.2023.133813}, doi = {10.1504/IJSNET.2023.133813}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/BenrebbouhMCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/ShiX23, author = {Shuai Shi and Ning Xiao}, title = {Security demonstration for the quantum noise-based physical layer using variable keys}, journal = {Int. J. Sens. Networks}, volume = {41}, number = {1}, pages = {60--66}, year = {2023}, url = {https://doi.org/10.1504/IJSNET.2022.10049293}, doi = {10.1504/IJSNET.2022.10049293}, timestamp = {Mon, 27 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/ShiX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/ChikhaleMD23, author = {Devidas V. Chikhale and Mahesh M. Munde and Shankar B. Deosarkar}, title = {HetNet security solution using femtocell network architecture and {UMTS} technology in the millimetre range}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {24}, number = {1}, pages = {83--90}, year = {2023}, url = {https://doi.org/10.1504/IJWMC.2023.10054168}, doi = {10.1504/IJWMC.2023.10054168}, timestamp = {Mon, 27 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/ChikhaleMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/Huc23, author = {Aleks Huc}, title = {Detecting Temporal and Spatial Anomalies in Users' Activities for Security Provisioning in Computer Networks}, journal = {Informatica (Slovenia)}, volume = {47}, number = {2}, year = {2023}, url = {https://doi.org/10.31449/inf.v47i2.4933}, doi = {10.31449/INF.V47I2.4933}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaSI/Huc23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/SchillerCWM23, author = {Thomas Schiller and Bruce Caulkins and Annie S. Wu and Sean C. Mondesire}, title = {Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing}, journal = {Inf.}, volume = {14}, number = {10}, pages = {536}, year = {2023}, url = {https://doi.org/10.3390/info14100536}, doi = {10.3390/INFO14100536}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/SchillerCWM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inis/NguyenNTNT23, author = {Sang Quang Nguyen and Van Hien Nguyen and Trung Duy Tran and Luong Nhat Nguyen and Lam{-}Thanh Tu}, title = {On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming}, journal = {{EAI} Endorsed Trans. Ind. Networks Intell. Syst.}, volume = {10}, number = {4}, pages = {3}, year = {2023}, url = {https://doi.org/10.4108/eetinis.v10i4.4192}, doi = {10.4108/EETINIS.V10I4.4192}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inis/NguyenNTNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/BakhshKAAAA23, author = {Shahid Allah Bakhsh and Muhammad Almas Khan and Fawad Ahmed and Mohammed S. Alshehri and Hisham Ali and Jawad Ahmad}, title = {Enhancing IoT network security through deep learning-powered Intrusion Detection System}, journal = {Internet Things}, volume = {24}, pages = {100936}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100936}, doi = {10.1016/J.IOT.2023.100936}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/BakhshKAAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/EdrisAKNCL23, author = {Ed Kamya Kiyemba Edris and Mahdi Aiash and Mohammad Ali Khoshkholghi and Ranesh Naha and Abdullahi Chowdhury and Jonathan Loo}, title = {Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain}, journal = {Internet Things}, volume = {24}, pages = {100913}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100913}, doi = {10.1016/J.IOT.2023.100913}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/EdrisAKNCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/FeijooAnazcoCGM23, author = {Anthony Feijoo{-}A{\~{n}}azco and Dan Garc{\'{\i}}a{-}Carrillo and Jes{\'{u}}s S{\'{a}}nchez G{\'{o}}mez and Rafael Mar{\'{\i}}n{-}P{\'{e}}rez}, title = {Innovative security and compression for constrained IoT networks}, journal = {Internet Things}, volume = {24}, pages = {100899}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100899}, doi = {10.1016/J.IOT.2023.100899}, timestamp = {Mon, 17 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/FeijooAnazcoCGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenCL23, author = {Zhuo Chen and Xiao Chen and Yun Li}, title = {Performance and Security Analysis of Distributed Ledger Under the Internet of Things Environments With Network Instability}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {5}, pages = {4213--4225}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3216586}, doi = {10.1109/JIOT.2022.3216586}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ChenCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DengWGCL23, author = {Lunzhi Deng and Bo Wang and Yan Gao and Zhiwei Chen and Siwei Li}, title = {Certificateless Anonymous Signcryption Scheme With Provable Security in the Standard Model Suitable for Healthcare Wireless Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {18}, pages = {15953--15965}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3266335}, doi = {10.1109/JIOT.2023.3266335}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DengWGCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GharibI23, author = {Anastassia Gharib and Mohamed Ibnkahla}, title = {Heterogeneous Cluster-Based Information-Centric Sensor Networks With User Security Satisfaction}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {9, May 1}, pages = {8123--8139}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3229891}, doi = {10.1109/JIOT.2022.3229891}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GharibI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/IlliQBA23, author = {Elmehdi Illi and Marwa K. Qaraqe and Faissal El Bouanani and Saif M. Al{-}Kuwari}, title = {On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect {CSI}}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {9, May 1}, pages = {7850--7867}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3229411}, doi = {10.1109/JIOT.2022.3229411}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/IlliQBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiQDZDZP23, author = {Xingwang Li and Hongyan Qi and Dinh{-}Thuan Do and Hui Zhang and Yuan Ding and Mingfu Zhu and Hongxing Peng}, title = {IQ-Impaired Wireless-Powered Modify-and-Forward Relaying for IoT Networks: An In-Depth Physical-Layer Security Analysis}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {17}, pages = {14912--14924}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3249964}, doi = {10.1109/JIOT.2023.3249964}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiQDZDZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NibouchaSKC23, author = {Redouane Niboucha and Sabra Ben Saad and Adlen Ksentini and Yacine Challal}, title = {Zero-Touch Security Management for mMTC Network Slices: DDoS Attack Detection and Mitigation}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {9, May 1}, pages = {7800--7812}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3230875}, doi = {10.1109/JIOT.2022.3230875}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/NibouchaSKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RaniBSGD23, author = {Shalli Rani and Himanshi Babbar and Gautam Srivastava and Thippa Reddy Gadekallu and Gaurav Dhiman}, title = {Security Framework for Internet-of-Things-Based Software-Defined Networks Using Blockchain}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {7}, pages = {6074--6081}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3223576}, doi = {10.1109/JIOT.2022.3223576}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/RaniBSGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SafavatR23, author = {Sunitha Safavat and Danda B. Rawat}, title = {Improved Multiresolution Neural Network for Mobility-Aware Security and Content Caching for Internet of Vehicles}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {20}, pages = {17813--17823}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3279048}, doi = {10.1109/JIOT.2023.3279048}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SafavatR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShiSXH23, author = {Guolong Shi and Xinyi Shen and Fuke Xiao and Yigang He}, title = {{DANTD:} {A} Deep Abnormal Network Traffic Detection Model for Security of Industrial Internet of Things Using High-Order Features}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {21143--21153}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3253777}, doi = {10.1109/JIOT.2023.3253777}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ShiSXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WuNWNL23, author = {Yixuan Wu and Laisen Nie and Shupeng Wang and Zhaolong Ning and Shengtao Li}, title = {Intelligent Intrusion Detection for Internet of Things Security: {A} Deep Convolutional Generative Adversarial Network-Enabled Approach}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {4}, pages = {3094--3106}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2021.3112159}, doi = {10.1109/JIOT.2021.3112159}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WuNWNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangWDDW23, author = {Xiaodong Yang and Haoqi Wen and Runze Diao and Xiaoni Du and Caifen Wang}, title = {Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {12}, pages = {10881--10892}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3240426}, doi = {10.1109/JIOT.2023.3240426}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangWDDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/BoualouacheBSE23, author = {Abdelwahab Boualouache and Bouziane Brik and Sidi{-}Mohammed Senouci and Thomas Engel}, title = {On-Demand Security Framework for 5GB Vehicular Networks}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {2}, pages = {26--31}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2200233}, doi = {10.1109/IOTM.001.2200233}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/BoualouacheBSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/SoodNQCKY23, author = {Keshav Sood and Dinh Duc Nha Nguyen and Youyang Qu and Lei Cui and Kallol Krishna Karmakar and Shui Yu}, title = {Security Challenges and Potential Solutions in Aerial-Terrestrial Wireless Networking}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {4}, pages = {118--123}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2300024}, doi = {10.1109/IOTM.001.2300024}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/SoodNQCKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/DadkhahDR23, author = {Parichehr Dadkhah and Mohammad Dakhilalian and Parvin Rastegari}, title = {Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {15}, number = {3}, year = {2023}, url = {https://doi.org/10.22042/isecure.2023.180857}, doi = {10.22042/ISECURE.2023.180857}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/DadkhahDR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoWLC23, author = {Mengnan Gao and Lifa Wu and Qi Li and Wei Chen}, title = {Anomaly traffic detection in IoT security using graph neural networks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103532}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103532}, doi = {10.1016/J.JISA.2023.103532}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoWLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SafdarM23, author = {Ghazanfar Ali Safdar and Ali Mansour}, title = {Security and Trust Issues in {BYOD} Networks}, journal = {{IT} Prof.}, volume = {25}, number = {4}, pages = {45--51}, year = {2023}, url = {https://doi.org/10.1109/MITP.2023.3293714}, doi = {10.1109/MITP.2023.3293714}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/SafdarM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/AlkhabetI23, author = {Mohammed Majeed Alkhabet and Mahamod Ismail}, title = {Security algorithms for distributed storage system for E-health application over wireless body area network}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {12}, pages = {15781--15792}, year = {2023}, url = {https://doi.org/10.1007/s12652-020-02733-1}, doi = {10.1007/S12652-020-02733-1}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/AlkhabetI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/IlavendhanS23, author = {A. Ilavendhan and K. Saruladha}, title = {Stackelberg security game to mitigate the DoS attack in vehicular ad-hoc networks}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {6}, pages = {6489--6496}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-03523-z}, doi = {10.1007/S12652-021-03523-Z}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/IlavendhanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/SahraouiH23, author = {Somia Sahraoui and Nabil Henni}, title = {{SAMP-RPL:} secure and adaptive multipath {RPL} for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {1}, pages = {409--429}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-03303-9}, doi = {10.1007/S12652-021-03303-9}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/SahraouiH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/BaiLYWLJ23, author = {Rufan Bai and Haoxing Lin and Xinyu Yang and Xiaowei Wu and Minming Li and Weijia Jia}, title = {Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue}, journal = {J. Artif. Intell. Res.}, volume = {77}, pages = {487--515}, year = {2023}, url = {https://doi.org/10.1613/jair.1.14563}, doi = {10.1613/JAIR.1.14563}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jair/BaiLYWLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/AliKK23, author = {Yasir Ali and Habib Ullah Khan and Muhammad Khalid}, title = {Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review}, journal = {J. Big Data}, volume = {10}, number = {1}, pages = {128}, year = {2023}, url = {https://doi.org/10.1186/s40537-023-00805-5}, doi = {10.1186/S40537-023-00805-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbd/AliKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/ShenHWLLL23, author = {Zihao Shen and Shuhan He and Hui Wang and Peiqian Liu and Kun Liu and Fangfang Lian}, title = {A Differential Privacy Budget Allocation Method Combining Privacy Security Level}, journal = {J. Commun. Inf. Networks}, volume = {8}, number = {1}, pages = {90--98}, year = {2023}, url = {https://doi.org/10.23919/jcin.2023.10087251}, doi = {10.23919/JCIN.2023.10087251}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcin/ShenHWLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/KrishnanJAPB23, author = {Prabhakar Krishnan and Kurunandan Jain and Amjad Aldweesh and P. Prabu and Rajkumar Buyya}, title = {OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure}, journal = {J. Cloud Comput.}, volume = {12}, number = {1}, pages = {26}, year = {2023}, url = {https://doi.org/10.1186/s13677-023-00406-w}, doi = {10.1186/S13677-023-00406-W}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/KrishnanJAPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/MahlakeMPM23, author = {Ntebatseng Mahlake and Topside E. Mathonsi and Deon Du Plessis and Tonderai Muchenje}, title = {A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things}, journal = {J. Commun.}, volume = {18}, number = {1}, pages = {47--57}, year = {2023}, url = {https://doi.org/10.12720/jcm.18.1.47-57}, doi = {10.12720/JCM.18.1.47-57}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/MahlakeMPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/ihyaouiYME23, author = {Abdelilah El ihyaoui and My Abdelkader Youssefi and Ahmed Mouhsen and Abdelhafid ELfarnane}, title = {Evaluate the Security Models Performances and Limitations of the Vehicular Network VANETcloudSim}, journal = {J. Commun.}, volume = {18}, number = {4}, pages = {221--227}, year = {2023}, url = {https://doi.org/10.12720/jcm.18.4.221-227}, doi = {10.12720/JCM.18.4.221-227}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/ihyaouiYME23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/ZhangKB23, author = {Hongwu Zhang and Kai Kang and Wei Bai}, title = {Hierarchical network security situation awareness data fusion method in cloud computing environment}, journal = {J. Comput. Methods Sci. Eng.}, volume = {23}, number = {1}, pages = {237--251}, year = {2023}, url = {https://doi.org/10.3233/JCM-226542}, doi = {10.3233/JCM-226542}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcmse/ZhangKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/WijethilakaL23, author = {Shalitha Wijethilaka and Madhusanka Liyanage}, title = {The role of security orchestrator in network slicing for future networks}, journal = {J. Commun. Networks}, volume = {25}, number = {3}, pages = {355--369}, year = {2023}, url = {https://doi.org/10.23919/jcn.2023.000030}, doi = {10.23919/JCN.2023.000030}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/WijethilakaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcondec/RajasekaranAA23, author = {Arun Sekar Rajasekaran and Maria Azees and Fadi M. Al{-}Turjman}, title = {A comprehensive survey on security issues in vehicle-to-grid networks}, journal = {J. Control. Decis.}, volume = {10}, number = {2}, pages = {150--159}, year = {2023}, url = {https://doi.org/10.1080/23307706.2021.2021113}, doi = {10.1080/23307706.2021.2021113}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcondec/RajasekaranAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/GuptaSDS23, author = {Koyel Datta Gupta and Deepak Kumar Sharma and Rinky Dwivedi and Gautam Srivastava}, title = {{AHDNN:} Attention-Enabled Hierarchical Deep Neural Network Framework for Enhancing Security of Connected and Autonomous Vehicles}, journal = {J. Circuits Syst. Comput.}, volume = {32}, number = {4}, pages = {2350058:1--2350058:19}, year = {2023}, url = {https://doi.org/10.1142/S0218126623500585}, doi = {10.1142/S0218126623500585}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/GuptaSDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Chen23, author = {Min Chen}, title = {Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {733--756}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1256}, doi = {10.13052/JCSM2245-1439.1256}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Du23, author = {Gaili Du}, title = {Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {675--696}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1253}, doi = {10.13052/JCSM2245-1439.1253}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Du23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li23, author = {Xingfeng Li}, title = {An Evaluation Model for Network Security Based on an Optimized Circular Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {711--732}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1255}, doi = {10.13052/JCSM2245-1439.1255}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Xue23, author = {Ying Xue}, title = {Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {697--710}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1254}, doi = {10.13052/JCSM2245-1439.1254}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Xue23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Zhang23, author = {Zhihong Zhang}, title = {Analysis of Network Security Countermeasures From the Perspective of Improved {FS} Algorithm and {ICT} Convergence}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1211}, doi = {10.13052/JCSM2245-1439.1211}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangL23, author = {Liu Zhang and Yanyu Liu}, title = {Network Security Prediction and Situational Assessment Using Neural Network-based Method}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {547--568}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1245}, doi = {10.13052/JCSM2245-1439.1245}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/X23ak, title = {Retracted: Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment}, journal = {J. Electr. Comput. Eng.}, volume = {2023}, pages = {9853289:1--9853289:1}, year = {2023}, url = {https://doi.org/10.1155/2023/9853289}, doi = {10.1155/2023/9853289}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jece/X23ak.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/X23an, title = {Retracted: Distribution Network Security Situation Awareness Method Based on the Distribution Network Topology Layered Model}, journal = {J. Electr. Comput. Eng.}, volume = {2023}, pages = {9856346:1--9856346:1}, year = {2023}, url = {https://doi.org/10.1155/2023/9856346}, doi = {10.1155/2023/9856346}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jece/X23an.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/WangJABKA23, author = {Bo Wang and Hadi Jahanshahi and Burak Aricioglu and Baris Boru and Sezgin Ka{\c{c}}ar and Naif D. Alotaibi}, title = {A variable-order fractional neural network: Dynamical properties, data security application, and synchronization using a novel control algorithm with a finite-time estimator}, journal = {J. Frankl. Inst.}, volume = {360}, number = {17}, pages = {13648--13670}, year = {2023}, url = {https://doi.org/10.1016/j.jfranklin.2022.04.036}, doi = {10.1016/J.JFRANKLIN.2022.04.036}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jfi/WangJABKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/NorouziAEB23, author = {Monire Norouzi and Zeynep G{\"{u}}rkas Aydin and Sefer Ergen and Mehmet Serif Bakir}, title = {Security-aware resource management approaches in software defined networks: Comprehensive analysis, opportunities and challenges}, journal = {J. High Speed Networks}, volume = {29}, number = {3}, pages = {169--181}, year = {2023}, url = {https://doi.org/10.3233/JHS-230004}, doi = {10.3233/JHS-230004}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/NorouziAEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/RanaP23, author = {Pragati Rana and B. P. Patil}, title = {Cyber security threats in IoT: {A} review}, journal = {J. High Speed Networks}, volume = {29}, number = {2}, pages = {105--120}, year = {2023}, url = {https://doi.org/10.3233/JHS-222042}, doi = {10.3233/JHS-222042}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/RanaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/SongR23, author = {Limin Song and Seungmin Rho}, title = {Hidden target recognition method for high-speed network security threats based on attack graph theory}, journal = {J. High Speed Networks}, volume = {29}, number = {4}, pages = {307--320}, year = {2023}, url = {https://doi.org/10.3233/JHS-222048}, doi = {10.3233/JHS-222048}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/SongR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiat/NguyenNT23, author = {Quang{-}Sang Nguyen and Tan N. Nguyen and Lam{-}Thanh Tu}, title = {On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks}, journal = {J. Inf. Telecommun.}, volume = {7}, number = {4}, pages = {462--476}, year = {2023}, url = {https://doi.org/10.1080/24751839.2023.2218046}, doi = {10.1080/24751839.2023.2218046}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiat/NguyenNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/BhatnagarT23, author = {Manisha Bhatnagar and Dolly Thankachan}, title = {Enhancing security {\&} QoS of trust-enabled wireless networks using machine learning powered transformable blockchain sharding}, journal = {J. Intell. Fuzzy Syst.}, volume = {44}, number = {1}, pages = {41--58}, year = {2023}, url = {https://doi.org/10.3233/JIFS-213482}, doi = {10.3233/JIFS-213482}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/BhatnagarT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ChenLHLZ23, author = {Ze Chen and Ning Lu and Botao Hou and Xin Liu and Xiaojun Zuo}, title = {A risk source identification model for network security of power {CPS} system {(CPS)} based on fuzzy artificial neural network}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {6}, pages = {10675--10691}, year = {2023}, url = {https://doi.org/10.3233/jifs-224090}, doi = {10.3233/JIFS-224090}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/ChenLHLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ChenSX23, author = {Hao Chen and Ze Su and Xiangqian Xu}, title = {A generalized integrated group decision-making framework for computer network security evaluation with Interval Neutrosophic information}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {5}, pages = {8945--8957}, year = {2023}, url = {https://doi.org/10.3233/jifs-233181}, doi = {10.3233/JIFS-233181}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/ChenSX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/Qiao23, author = {Wenbao Qiao}, title = {A novel {MADM} technique based on projection methods under q-rung orthopair fuzzy setting and its application to computer network security evaluation}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {1}, pages = {1029--1038}, year = {2023}, url = {https://doi.org/10.3233/JIFS-231351}, doi = {10.3233/JIFS-231351}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/Qiao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/TanZC23, author = {Lirui Tan and Qiuju Zheng and Junji Chen}, title = {Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {6}, pages = {10451--10466}, year = {2023}, url = {https://doi.org/10.3233/jifs-233476}, doi = {10.3233/JIFS-233476}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/TanZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/Wang23, author = {Hong Wang}, title = {A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment}, journal = {J. Inf. Process. Syst.}, volume = {19}, number = {5}, pages = {688--701}, year = {2023}, url = {https://doi.org/10.3745/JIPS.01.0097}, doi = {10.3745/JIPS.01.0097}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChengMCTG23, author = {Yunli Cheng and Hainie Meng and Yu{-}Qiang Chen and Yan{-}Xian Tan and Jian{-}Lan Guo}, title = {Research on Network Information Security Management System Based on Face Recognition}, journal = {J. Inf. Sci. Eng.}, volume = {39}, number = {4}, pages = {839--854}, year = {2023}, url = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=193\_2619}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChengMCTG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IftikharQSA23, author = {Abeer Iftikhar and Kashif Naseer Qureshi and Muhammad Shiraz and Saleh Albahli}, title = {Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: {A} systematic literature review}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {35}, number = {9}, pages = {101788}, year = {2023}, url = {https://doi.org/10.1016/j.jksuci.2023.101788}, doi = {10.1016/J.JKSUCI.2023.101788}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/IftikharQSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/TangYPW23, author = {Wei Tang and Hui Yang and Jinxiu Pi and Chun Wang}, title = {Network virus propagation and security situation awareness based on Hidden Markov Model}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {35}, number = {10}, pages = {101840}, year = {2023}, url = {https://doi.org/10.1016/j.jksuci.2023.101840}, doi = {10.1016/J.JKSUCI.2023.101840}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/TangYPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/XuAKARKMK23, author = {Fang Xu and Sajed Ahmad and Muhammad Naveed Khan and Manzoor Ahmed and Salman Raza and Feroz Khan and Yi Ma and Wali Ullah Khan}, title = {Beyond encryption: Exploring the potential of physical layer security in {UAV} networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {35}, number = {8}, pages = {101717}, year = {2023}, url = {https://doi.org/10.1016/j.jksuci.2023.101717}, doi = {10.1016/J.JKSUCI.2023.101717}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/XuAKARKMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/0004M23, author = {Bing Li and Maode Ma}, title = {An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking}, journal = {J. Netw. Syst. Manag.}, volume = {31}, number = {1}, pages = {13}, year = {2023}, url = {https://doi.org/10.1007/s10922-022-09689-x}, doi = {10.1007/S10922-022-09689-X}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/0004M23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/LewisBRR23, author = {Benjamin Lewis and Matthew Broadbent and Charalampos Rotsos and Nicholas J. P. Race}, title = {4MIDable: Flexible Network Offloading For Security VNFs}, journal = {J. Netw. Syst. Manag.}, volume = {31}, number = {3}, pages = {52}, year = {2023}, url = {https://doi.org/10.1007/s10922-023-09744-1}, doi = {10.1007/S10922-023-09744-1}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/LewisBRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/MartinsWG23, author = {Rafael de Jesus Martins and Juliano Araujo Wickboldt and Lisandro Zambenedetti Granville}, title = {Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with {SWEETEN}}, journal = {J. Netw. Syst. Manag.}, volume = {31}, number = {2}, pages = {36}, year = {2023}, url = {https://doi.org/10.1007/s10922-023-09728-1}, doi = {10.1007/S10922-023-09728-1}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/MartinsWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/CuginiSGSMCP22, author = {Filippo Cugini and Davide Scano and Alessio Giorgetti and Andrea Sgambelluri and Lorenzo De Marinis and Piero Castoldi and Francesco Paolucci}, title = {Telemetry and AI-based security {P4} applications for optical networks [Invited]}, journal = {{JOCN}}, volume = {15}, number = {1}, pages = {A1--A10}, year = {2023}, url = {https://doi.org/10.1364/jocn.470118}, doi = {10.1364/JOCN.470118}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocnet/CuginiSGSMCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/LiuWMXZWLTDZ23, author = {Tianhe Liu and Wei Wang and Xiangkun Man and Huifang Xiong and Yongli Zhao and Guangquan Wang and Yajie Li and Yanxia Tan and Shan Dong and Jie Zhang}, title = {Mapping sub-wavelength service with heterogenous security demand over physical-layer secured optical transport networks}, journal = {J. Opt. Commun. Netw.}, volume = {15}, number = {5}, pages = {268--281}, year = {2023}, url = {https://doi.org/10.1364/JOCN.480207}, doi = {10.1364/JOCN.480207}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocnet/LiuWMXZWLTDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/NatalinoGMGVMMF23, author = {Carlos Natalino and Lluis Gifre and Francisco{-}Javier Moreno{-}Muro and Sergio Gonzalez{-}Diaz and Ricard Vilalta and Raul Mu{\~{n}}oz and Paolo Monti and Marija Furdek}, title = {Flexible and scalable ML-based diagnosis module for optical networks: a security use case}, journal = {J. Opt. Commun. Netw.}, volume = {15}, number = {8}, pages = {C155--C165}, year = {2023}, url = {https://doi.org/10.1364/jocn.482932}, doi = {10.1364/JOCN.482932}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocnet/NatalinoGMGVMMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/WangZGLTHLCZ23, author = {Yunwu Wang and Min Zhu and Jiahua Gu and Xiang Liu and Weidong Tong and Bingchang Hua and Mingzheng Lei and Yuancheng Cai and Jiao Zhang}, title = {Security-aware 5G {RAN} slice mapping with tiered isolation in physical-layer secured metro-aggregation elastic optical networks using heuristic-assisted {DRL}}, journal = {J. Opt. Commun. Netw.}, volume = {15}, number = {12}, pages = {969}, year = {2023}, url = {https://doi.org/10.1364/jocn.499551}, doi = {10.1364/JOCN.499551}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocnet/WangZGLTHLCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/join/BiradarM23, author = {Mallanagouda Biradar and Basavaraj Mathapathi}, title = {Security and Energy Aware Clustering-Based Routing in Wireless Sensor Network: Hybrid Nature-Inspired Algorithm for Optimal Cluster Head Selection}, journal = {J. Interconnect. Networks}, volume = {23}, number = {1}, pages = {2150039:1--2150039:24}, year = {2023}, url = {https://doi.org/10.1142/S0219265921500390}, doi = {10.1142/S0219265921500390}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/join/BiradarM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/join/ManoharanBP23, author = {Maravarman Manoharan and S. Babu and R. Pitchai}, title = {Wireless Sensor Network Security Analysis for Data and Aggregation}, journal = {J. Interconnect. Networks}, volume = {23}, number = {2}, pages = {2250002:1--2250002:28}, year = {2023}, url = {https://doi.org/10.1142/S0219265922500025}, doi = {10.1142/S0219265922500025}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/join/ManoharanBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KhoeurtSMA23, author = {Sopha Khoeurt and Chakchai So{-}In and Pakarat Musikawan and Phet Aimtongkham}, title = {Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack Detection in the {RPL} Routing Protocol for Internet of Things}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {48--76}, year = {2023}, url = {https://doi.org/10.58346/jowua.2023.i3.005}, doi = {10.58346/JOWUA.2023.I3.005}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KhoeurtSMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KumaranTVSV23, author = {U. Kumaran and S. Thangam and Nidhin Prabhakar T. V and Jana Selvaganesan and H. N. Vishwas}, title = {Adversarial Defense: {A} {GAN-IF} Based Cyber-security Model for Intrusion Detection in Software Piracy}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {96--114}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.008}, doi = {10.58346/JOWUA.2023.I4.008}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KumaranTVSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TelloASMA23, author = {Alcides Bernardo Tello and Sohaib Alam and Archana Ravindra Salve and Kusuma Kumari B. M and Meena Arora}, title = {Quantitative Evaluation of Android Application Privacy Security Based on Privacy Policy and Behaviour}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {253--266}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.019}, doi = {10.58346/JOWUA.2023.I3.019}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TelloASMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VladaSRCBHP23, author = {Nikitina Vlada and Ra{\'{u}}l A. S{\'{a}}nchez{-}Ancajima and Miguel {\'{A}}ngel Torres Rubio and Walter Antonio Campos{-}Ugaz and An{\'{\i}}bal Mej{\'{\i}}a Benavides and Mar{\'{\i}}a Del Roc{\'{\i}}o Hende{-}Santolaya and Jacqueline C. Ponce{-}Meza}, title = {Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {77--88}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.006}, doi = {10.58346/JOWUA.2023.I3.006}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VladaSRCBHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/FerragMB23, author = {Mohamed Amine Ferrag and Leandros Maglaras and Mohamed Benbouzid}, title = {Blockchain and Artificial Intelligence as Enablers of Cyber Security in the Era of IoT and IIoT Applications}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {3}, pages = {40}, year = {2023}, url = {https://doi.org/10.3390/jsan12030040}, doi = {10.3390/JSAN12030040}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/FerragMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/HammoudehEP23, author = {Mohammad Hammoudeh and Gregory Epiphaniou and Pedro Pinto}, title = {Cyber-Physical Systems: Security Threats and Countermeasures}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {1}, pages = {18}, year = {2023}, url = {https://doi.org/10.3390/jsan12010018}, doi = {10.3390/JSAN12010018}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/HammoudehEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/SaqibA23, author = {Nazar Abbas Saqib and Shahad Talla AL{-}Talla}, title = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain Systems}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {2}, pages = {31}, year = {2023}, url = {https://doi.org/10.3390/jsan12020031}, doi = {10.3390/JSAN12020031}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/SaqibA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jus/JoshiLD23, author = {Apoorv Joshi and Jaykumar Lachure and Rajesh Doriya}, title = {Drone Security for Precision Agriculture by Using One-Dimensional Convolutional Neural Network}, journal = {J. Uncertain Syst.}, volume = {16}, number = {4}, pages = {2350007:1--2350007:16}, year = {2023}, url = {https://doi.org/10.1142/S1752890923500071}, doi = {10.1142/S1752890923500071}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jus/JoshiLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/juspn/BascioL23, author = {David Lo Bascio and Flavio Lombardi}, title = {Segment Routing v6 - Security Issues and Experimental Results}, journal = {J. Ubiquitous Syst. Pervasive Networks}, volume = {18}, number = {1}, pages = {15--21}, year = {2023}, url = {https://doi.org/10.5383/juspn.18.01.003}, doi = {10.5383/JUSPN.18.01.003}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/juspn/BascioL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/ShenL23, author = {Genhai Shen and Xiaoyu Li}, title = {A fuzzy group decision-making framework for computer network security evaluation with probabilistic linguistic information}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {27}, number = {3}, pages = {355--365}, year = {2023}, url = {https://doi.org/10.3233/kes-230083}, doi = {10.3233/KES-230083}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kes/ShenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/WangC23, author = {Hong Wang and Gongping Chen}, title = {Improving computer network security evaluation with grey relational analysis and probabilistic simplified neutrosophic sets}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {27}, number = {4}, pages = {425--436}, year = {2023}, url = {https://doi.org/10.3233/KES-230103}, doi = {10.3233/KES-230103}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/WangC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/ChenWCK23, author = {Yean{-}Ru Chen and Tzu{-}Fan Wang and Si{-}Han Chen and Yi{-}Chun Kao}, title = {Empirical study on security verification and assessment of neural network accelerator}, journal = {Microprocess. Microsystems}, volume = {99}, pages = {104845}, year = {2023}, url = {https://doi.org/10.1016/j.micpro.2023.104845}, doi = {10.1016/J.MICPRO.2023.104845}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/ChenWCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/MarchisioNKHMS23, author = {Alberto Marchisio and Giorgio Nanfa and Faiq Khalid and Muhammad Abdullah Hanif and Maurizio Martina and Muhammad Shafique}, title = {SeVuc: {A} study on the Security Vulnerabilities of Capsule Networks against adversarial attacks}, journal = {Microprocess. Microsystems}, volume = {96}, pages = {104738}, year = {2023}, url = {https://doi.org/10.1016/j.micpro.2022.104738}, doi = {10.1016/J.MICPRO.2022.104738}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/MarchisioNKHMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mdpinetwork/ChauhanS23, author = {Milan Chauhan and Stavros Shiaeles}, title = {An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions}, journal = {Network}, volume = {3}, number = {3}, pages = {422--450}, year = {2023}, url = {https://doi.org/10.3390/network3030018}, doi = {10.3390/NETWORK3030018}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mdpinetwork/ChauhanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/AhmadMAKS23, author = {Aakash Ahmad and Asad Waqar Malik and Abdulrahman A. Alshdadi and Wilayat Khan and Maryam Sajjad}, title = {Adaptive Security for Self-Protection of Mobile Computing Devices}, journal = {Mob. Networks Appl.}, volume = {28}, number = {2}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.1007/s11036-019-01355-y}, doi = {10.1007/S11036-019-01355-Y}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/AhmadMAKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/GeZH23, title = {Retraction Note: Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security}, journal = {Mob. Networks Appl.}, volume = {28}, number = {1}, pages = {433}, year = {2023}, url = {https://doi.org/10.1007/s11036-022-02064-9}, doi = {10.1007/S11036-022-02064-9}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/GeZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/HuangZWJ23, author = {Baoqi Huang and Long Zhao and En Wang and Bing Jia}, title = {Editorial: sensing, Service and Security in Mobile Internet (MobilWare 2020)}, journal = {Mob. Networks Appl.}, volume = {28}, number = {2}, pages = {437--438}, year = {2023}, url = {https://doi.org/10.1007/s11036-022-02022-5}, doi = {10.1007/S11036-022-02022-5}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/HuangZWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/KsibiJB23, author = {Sondes Ksibi and Faouzi Ja{\"{\i}}di and Adel Bouhoula}, title = {A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach}, journal = {Mob. Networks Appl.}, volume = {28}, number = {1}, pages = {107--127}, year = {2023}, url = {https://doi.org/10.1007/s11036-022-02042-1}, doi = {10.1007/S11036-022-02042-1}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/KsibiJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LinTLCC23, author = {Chun{-}Cheng Lin and Ching{-}Tsorng Tsai and Yu{-}Liang Liu and Tsai{-}Ting Chang and Yung{-}Sheng Chang}, title = {Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges}, journal = {Mob. Networks Appl.}, volume = {28}, number = {3}, pages = {1043--1058}, year = {2023}, url = {https://doi.org/10.1007/s11036-023-02143-5}, doi = {10.1007/S11036-023-02143-5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/LinTLCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/MarabissiAM23, author = {Dania Marabissi and Andrea Abrardo and Lorenzo Mucchi}, title = {A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning}, journal = {Mob. Networks Appl.}, volume = {28}, number = {4}, pages = {1473--1481}, year = {2023}, url = {https://doi.org/10.1007/s11036-023-02149-z}, doi = {10.1007/S11036-023-02149-Z}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/MarabissiAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SarkerKAA23, author = {Iqbal H. Sarker and Asif Irshad Khan and Yoosef B. Abushark and Fawaz Alsolami}, title = {Internet of Things (IoT) Security Intelligence: {A} Comprehensive Overview, Machine Learning Solutions and Research Directions}, journal = {Mob. Networks Appl.}, volume = {28}, number = {1}, pages = {296--312}, year = {2023}, url = {https://doi.org/10.1007/s11036-022-01937-3}, doi = {10.1007/S11036-022-01937-3}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SarkerKAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SharmaPYSGS23, author = {Mehul Sharma and Shrid Pant and Priety Yadav and Deepak Kumar Sharma and Nitin Gupta and Gautam Srivastava}, title = {Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks}, journal = {Mob. Networks Appl.}, volume = {28}, number = {2}, pages = {782--794}, year = {2023}, url = {https://doi.org/10.1007/s11036-023-02104-y}, doi = {10.1007/S11036-023-02104-Y}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/SharmaPYSGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/VijayakumarKUVMT23, title = {Retraction Note: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption}, journal = {Mob. Networks Appl.}, volume = {28}, number = {1}, pages = {432}, year = {2023}, url = {https://doi.org/10.1007/s11036-022-02062-x}, doi = {10.1007/S11036-022-02062-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/VijayakumarKUVMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ZhangMLTLL23, author = {Hao Zhang and Yuandong Min and Sanya Liu and Hang Tong and Yaopeng Li and Zhihan Lv}, title = {Improve the Security of Industrial Control System: {A} Fine-Grained Classification Method for DoS Attacks on Modbus/TCP}, journal = {Mob. Networks Appl.}, volume = {28}, number = {2}, pages = {839--852}, year = {2023}, url = {https://doi.org/10.1007/s11036-023-02108-8}, doi = {10.1007/S11036-023-02108-8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/ZhangMLTLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MohyEddineGBA23, author = {Mouaad Mohy{-}Eddine and Azidine Guezzaz and Said Benkirane and Mourade Azrour}, title = {An efficient network intrusion detection model for IoT security using {K-NN} classifier and feature selection}, journal = {Multim. Tools Appl.}, volume = {82}, number = {15}, pages = {23615--23633}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-14795-2}, doi = {10.1007/S11042-023-14795-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MohyEddineGBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SaidAK23, author = {Lal Said and Ammar S. Alanazi and Majid Khan}, title = {A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images}, journal = {Multim. Tools Appl.}, volume = {82}, number = {4}, pages = {6127--6145}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-13621-5}, doi = {10.1007/S11042-022-13621-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SaidAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/LiZ23, author = {Xingguo Li and Yu Zhong}, title = {Exploration of a network security situational awareness model based on multisource data fusion}, journal = {Neural Comput. Appl.}, volume = {35}, number = {36}, pages = {25083--25095}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08500-5}, doi = {10.1007/S00521-023-08500-5}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/LiZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/SelvarajanMKSMK23, author = {Shitharth Selvarajan and Hariprasath Manoharan and Alaa O. Khadidos and Achyut Shankar and M. S. Mekala and Adil Omar Khadidos}, title = {{RLIS:} Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {4}, pages = {2383--2396}, year = {2023}, url = {https://doi.org/10.1109/OJCOMS.2023.3318860}, doi = {10.1109/OJCOMS.2023.3318860}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/SelvarajanMKSMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/NawazIFKRAR23, author = {Naeem A. Nawaz and Kashif Ishaq and Uzma Farooq and Amna Khalil and Saim Rasheed and Adnan Abid and Fadhilah Rosdi}, title = {A comprehensive review of security threats and solutions for the online social networks industry}, journal = {PeerJ Comput. Sci.}, volume = {9}, pages = {e1143}, year = {2023}, url = {https://doi.org/10.7717/peerj-cs.1143}, doi = {10.7717/PEERJ-CS.1143}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/NawazIFKRAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/ZhangFAHL23, author = {Shengcai Zhang and Qiming Fu and Dezhi An and Zhenxiang He and Zhenyu Liu}, title = {A novel network security situation assessment model based on multiple strategies whale optimization algorithm and bidirectional {GRU}}, journal = {PeerJ Comput. Sci.}, volume = {9}, pages = {e1729}, year = {2023}, url = {https://doi.org/10.7717/peerj-cs.1729}, doi = {10.7717/PEERJ-CS.1729}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/ZhangFAHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/RibeiroMSRR23, author = {David Augusto Ribeiro and Dick Carrillo Melgarejo and Muhammad Saadi and Renata Lopes Rosa and Dem{\'{o}}stenes Zegarra Rodr{\'{\i}}guez}, title = {A novel deep deterministic policy gradient model applied to intelligent transportation system security problems in 5G and 6G network scenarios}, journal = {Phys. Commun.}, volume = {56}, pages = {101938}, year = {2023}, url = {https://doi.org/10.1016/j.phycom.2022.101938}, doi = {10.1016/J.PHYCOM.2022.101938}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/RibeiroMSRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/SharmaK23, author = {Himanshu Sharma and Neeraj Kumar}, title = {Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: {A} survey}, journal = {Phys. Commun.}, volume = {57}, pages = {102002}, year = {2023}, url = {https://doi.org/10.1016/j.phycom.2023.102002}, doi = {10.1016/J.PHYCOM.2023.102002}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/SharmaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ChoudharyP23, author = {Deepak Choudhary and Roop Pahuja}, title = {A blockchain-based cyber-security for connected networks}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {4}, pages = {1852--1867}, year = {2023}, url = {https://doi.org/10.1007/s12083-023-01506-9}, doi = {10.1007/S12083-023-01506-9}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ChoudharyP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/MehtaPP23, author = {Prarthana J. Mehta and Balu L. Parne and Sankita J. Patel}, title = {{SE-LAKAF:} Security enhanced lightweight authentication and key agreement framework for smart grid network}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {3}, pages = {1513--1535}, year = {2023}, url = {https://doi.org/10.1007/s12083-023-01494-w}, doi = {10.1007/S12083-023-01494-W}, timestamp = {Thu, 22 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/MehtaPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/PengTXZ23, author = {Shuangrong Peng and Xiaohu Tang and Ling Xiong and Hui Zhu}, title = {{LGAAFS:} {A} lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {5}, pages = {2474--2491}, year = {2023}, url = {https://doi.org/10.1007/s12083-023-01537-2}, doi = {10.1007/S12083-023-01537-2}, timestamp = {Tue, 10 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/PengTXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rairo/WangZ23, author = {Yigang Wang and Jianfeng Zhao}, title = {Security optimization method of high-power charging pile inter-group communication network under trusted taboo particle swarm optimization}, journal = {{RAIRO} Oper. Res.}, volume = {57}, number = {3}, pages = {1329--1341}, year = {2023}, url = {https://doi.org/10.1051/ro/2023038}, doi = {10.1051/RO/2023038}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rairo/WangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/WangZLJTKSBH23, author = {Yishan Wang and Fei Zhang and Xingyou Li and Verner Carl Johnson and Mou Leong Tan and Hsiang{-}te Kung and Jingchao Shi and Jupar Bahtebay and Xin He}, title = {Methodology for Mapping the Ecological Security Pattern and Ecological Network in the Arid Region of Xinjiang, China}, journal = {Remote. Sens.}, volume = {15}, number = {11}, pages = {2836}, year = {2023}, url = {https://doi.org/10.3390/rs15112836}, doi = {10.3390/RS15112836}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/WangZLJTKSBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saem/SinglaSS23, author = {Sanjay Singla and Purushottam Sharma and Parveen Kumar Sharma}, title = {Enhanced security using proxy signcryption technique for wireless mesh networks}, journal = {Int. J. Syst. Assur. Eng. Manag.}, volume = {14}, number = {1}, pages = {474--482}, year = {2023}, url = {https://doi.org/10.1007/s13198-022-01820-0}, doi = {10.1007/S13198-022-01820-0}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saem/SinglaSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BhattacharyaRCDS23, author = {Munmun Bhattacharya and Sandip Roy and Samiran Chattopadhyay and Ashok Kumar Das and Sachin Shetty}, title = {A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.275}, doi = {10.1002/SPY2.275}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BhattacharyaRCDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChandrakarBKDA23, author = {Palak Chandrakar and Rashi Bagga and Yogesh Kumar and Sanjeev Kumar Dwivedi and Ruhul Amin}, title = {Blockchain based security protocol for device to device secure communication in internet of things networks}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.267}, doi = {10.1002/SPY2.267}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ChandrakarBKDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DuOWH23, author = {Zhuang Du and Mohammad S. Obaidat and Guowei Wu and Kuei{-}Fang Hsiao}, title = {An efficient caching security approach for content-centric mobile networks in internet of things systems}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.294}, doi = {10.1002/SPY2.294}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DuOWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FarooqCK23, author = {Sameer Farooq and Priyanka Chawla and Neeraj Kumar}, title = {A cryptographic security framework for hybrid Cloud-Internet of Things network}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.309}, doi = {10.1002/SPY2.309}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/FarooqCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumharB23, author = {Malaram Kumhar and Jitendra Bhatia}, title = {Software-defined networks-enabled fog computing for IoT-based healthcare: Security, challenges and opportunities}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.291}, doi = {10.1002/SPY2.291}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumharB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AbualiNA23, author = {Khadija M. Abuali and Liyth Nissirat and Aida Al{-}Samawi}, title = {Advancing Network Security with {AI:} SVM-Based Deep Learning for Intrusion Detection}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8959}, year = {2023}, url = {https://doi.org/10.3390/s23218959}, doi = {10.3390/S23218959}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AbualiNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AllakanySMAIE23, author = {Alaa M. Allakany and Abeer Saber and Samih Mohemmed Mostafa and Maazen Alsabaan and Mohamed I. Ibrahem and Haitham Elwahsh}, title = {Enhancing Security in ZigBee Wireless Sensor Networks: {A} New Approach and Mutual Authentication Scheme for {D2D} Communication}, journal = {Sensors}, volume = {23}, number = {12}, pages = {5703}, year = {2023}, url = {https://doi.org/10.3390/s23125703}, doi = {10.3390/S23125703}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AllakanySMAIE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlmarazRiveraCB23, author = {Josue Genaro Almaraz{-}Rivera and Jose Antonio Cantoral{-}Ceballos and Juan Felipe Botero}, title = {Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8701}, year = {2023}, url = {https://doi.org/10.3390/s23218701}, doi = {10.3390/S23218701}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AlmarazRiveraCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/BakarK23, author = {Rana Abu Bakar and Boonserm Kijsirikul}, title = {Enhancing Network Visibility and Security with Advanced Port Scanning Techniques}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7541}, year = {2023}, url = {https://doi.org/10.3390/s23177541}, doi = {10.3390/S23177541}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/BakarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/CulticeCYT23, author = {Tyler Cultice and Joseph Clark and Wu Yang and Himanshu Thapliyal}, title = {A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World}, journal = {Sensors}, volume = {23}, number = {24}, pages = {9886}, year = {2023}, url = {https://doi.org/10.3390/s23249886}, doi = {10.3390/S23249886}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/CulticeCYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/DuDT23, author = {Xiuli Du and Xiaohui Ding and Fan Tao}, title = {Network Security Situation Prediction Based on Optimized Clock-Cycle Recurrent Neural Network for Sensor-Enabled Networks}, journal = {Sensors}, volume = {23}, number = {13}, pages = {6087}, year = {2023}, url = {https://doi.org/10.3390/s23136087}, doi = {10.3390/S23136087}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/DuDT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FrimpongOKB23, author = {Emmanuel Obeng Frimpong and BongHwan Oh and Taehoon Kim and Inkyu Bang}, title = {Physical-Layer Security with Irregular Reconfigurable Intelligent Surfaces for 6G Networks}, journal = {Sensors}, volume = {23}, number = {4}, pages = {1881}, year = {2023}, url = {https://doi.org/10.3390/s23041881}, doi = {10.3390/S23041881}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FrimpongOKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HammadJUNTKS23, author = {Muhammad Hammad and Rashad Maqbool Jillani and Sami Ullah and Abdallah Namoun and Ali Tufail and Ki{-}Hyung Kim and Habib Shah}, title = {Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7555}, year = {2023}, url = {https://doi.org/10.3390/s23177555}, doi = {10.3390/S23177555}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HammadJUNTKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KrishnasamyAAA23, author = {Sundaramoorthy Krishnasamy and Mutlaq B. Alotaibi and Lolwah I. Alehaideb and Qaisar Abbas}, title = {Development and Validation of a Cyber-Physical System Leveraging {EFDPN} for Enhanced WSN-IoT Network Security}, journal = {Sensors}, volume = {23}, number = {22}, pages = {9294}, year = {2023}, url = {https://doi.org/10.3390/s23229294}, doi = {10.3390/S23229294}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KrishnasamyAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LinQJJLW23, author = {Ruiquan Lin and Hangding Qiu and Weibin Jiang and Zhenglong Jiang and Zhili Li and Jun Wang}, title = {Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks}, journal = {Sensors}, volume = {23}, number = {2}, pages = {807}, year = {2023}, url = {https://doi.org/10.3390/s23020807}, doi = {10.3390/S23020807}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LinQJJLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiuRJZ23, author = {Zhiguo Liu and Junlin Rong and Yingru Jiang and Luxi Zhang}, title = {Satellite Network Security Routing Technology Based on Deep Learning and Trust Management}, journal = {Sensors}, volume = {23}, number = {20}, pages = {8474}, year = {2023}, url = {https://doi.org/10.3390/s23208474}, doi = {10.3390/S23208474}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LiuRJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NguyenVTLLNL23, author = {Tan N. Nguyen and Minh Bui Vu and Dinh Hieu Tran and Thanh{-}Lanh Le and Anh{-}Tu Le and Quang{-}Sang Nguyen and Byung Moo Lee}, title = {Security-Reliability Analysis of {AF} Full-Duplex Relay Networks Using Self-Energy Recycling and Deep Neural Networks}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7618}, year = {2023}, url = {https://doi.org/10.3390/s23177618}, doi = {10.3390/S23177618}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/NguyenVTLLNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RamachandranNPA23, author = {Divya Ramachandran and Syed Muhammad Naqi and Ganeshkumar Perumal and Qaisar Abbas}, title = {{DLTN-LOSP:} {A} Novel Deep-Linear-Transition-Network-Based Resource Allocation Model with the Logic Overhead Security Protocol for Cloud Systems}, journal = {Sensors}, volume = {23}, number = {20}, pages = {8448}, year = {2023}, url = {https://doi.org/10.3390/s23208448}, doi = {10.3390/S23208448}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/RamachandranNPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShinY23a, author = {Soohyun Shin and Hyosik Yang}, title = {Performance Analysis of Routable {GOOSE} Security Algorithm for Substation Communication through Public Internet Network}, journal = {Sensors}, volume = {23}, number = {12}, pages = {5396}, year = {2023}, url = {https://doi.org/10.3390/s23125396}, doi = {10.3390/S23125396}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ShinY23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SirimorokPAK23, author = {Nurdiansyah Sirimorok and Rio Mukhtarom Paweroi and Andi Arniaty Arsyad and Mario K{\"{o}}ppen}, title = {Smart Farm Security by Combining IoT Sensor Network and Virtualized Mycelium Network}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8689}, year = {2023}, url = {https://doi.org/10.3390/s23218689}, doi = {10.3390/S23218689}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SirimorokPAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WanC23, author = {Ying Wan and Jinde Cao}, title = {A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks}, journal = {Sensors}, volume = {23}, number = {8}, pages = {4013}, year = {2023}, url = {https://doi.org/10.3390/s23084013}, doi = {10.3390/S23084013}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WanC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangFLZ23, author = {Junwei Zhang and Huamin Feng and Biao Liu and Dongmei Zhao}, title = {Survey of Technology in Network Security Situation Awareness}, journal = {Sensors}, volume = {23}, number = {5}, pages = {2608}, year = {2023}, url = {https://doi.org/10.3390/s23052608}, doi = {10.3390/S23052608}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZhangFLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/KumarKM23, author = {Nitesh Kumar and Gaurav S. Kasbekar and D. Manjunath}, title = {Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {50}, number = {4}, pages = {5--7}, year = {2023}, url = {https://doi.org/10.1145/3595244.3595247}, doi = {10.1145/3595244.3595247}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/KumarKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/HuaM23, author = {Yingbo Hua and Ahmed Maksud}, title = {Continuous Encryption Functions for Security Over Networks}, journal = {Signal Process.}, volume = {203}, pages = {108807}, year = {2023}, url = {https://doi.org/10.1016/j.sigpro.2022.108807}, doi = {10.1016/J.SIGPRO.2022.108807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/HuaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/JiangYJHY23, author = {Wenyu Jiang and Jie Yang and Xinsheng Ji and Kaizhi Huang and Jinmei Yang}, title = {Robust Security Transmission Scheme for SWIPT-Enable Heterogeneous Networks With {RIS}}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {5417--5428}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3304314}, doi = {10.1109/JSYST.2023.3304314}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/JiangYJHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/KhoshafaNA23, author = {Majid H. Khoshafa and Telex M. N. Nkouatchah and Mohamed Hossam Ahmed}, title = {RIS-Aided Physical Layer Security Improvement in Underlay Cognitive Radio Networks}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {6437--6448}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3296012}, doi = {10.1109/JSYST.2023.3296012}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/KhoshafaNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LiYMCE23, author = {Meiling Li and Hu Yuan and Carsten Maple and Wenjie Cheng and Gregory Epiphaniou}, title = {Physical Layer Security Analysis of Cognitive {NOMA} Internet of Things Networks}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {1}, pages = {1045--1055}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2022.3190297}, doi = {10.1109/JSYST.2022.3190297}, timestamp = {Sat, 30 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/LiYMCE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/NguyenHCPVC23, author = {Tan Nhat Nguyen and Tran Dinh Hieu and Trinh Van Chien and Van{-}Duc Phan and Miroslav Vozn{\'{a}}k and Symeon Chatzinotas}, title = {Security and Reliability Analysis of Satellite-Terrestrial Multirelay Networks With Imperfect {CSI}}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {2}, pages = {2824--2835}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2022.3201128}, doi = {10.1109/JSYST.2022.3201128}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/NguyenHCPVC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/QiGX23, author = {Yiwen Qi and Honglin Geng and Ning Xing}, title = {Adaptive Learning Security Control for Networked Switched Systems Subject to Resource Constraints and Attacks}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {6069--6080}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3268710}, doi = {10.1109/JSYST.2023.3268710}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/QiGX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhengLZPF23, author = {Hangcheng Zheng and Min Luo and Yunru Zhang and Cong Peng and Qi Feng}, title = {A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {3}, pages = {3822--3833}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2022.3220869}, doi = {10.1109/JSYST.2022.3220869}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhengLZPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/Barati23, author = {Ramin Barati}, title = {Security Threats and Dealing with Social Networks}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.1007/s42979-022-01434-0}, doi = {10.1007/S42979-022-01434-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/Barati23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/BhardwajKKC23, author = {Manish Bhardwaj and Upma Kumari and Sumit Kumar and Sanju Choudhary}, title = {An Efficient User Authentication and Key Agreement Scheme Wireless Sensor Network and {IOT} Using Various Security Approaches}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {5}, pages = {574}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-01964-1}, doi = {10.1007/S42979-023-01964-1}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/BhardwajKKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/BharanidharanS23, title = {Retraction Note: Group hash function-based enhancing network security for network service providence}, journal = {Soft Comput.}, volume = {27}, number = {3}, pages = {1835}, year = {2023}, url = {https://doi.org/10.1007/s00500-022-07762-w}, doi = {10.1007/S00500-022-07762-W}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/BharanidharanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/SugiR23, title = {Retraction Note: {A} novel distributed training on fog node in IoT backbone networks for security}, journal = {Soft Comput.}, volume = {27}, number = {3}, pages = {1841}, year = {2023}, url = {https://doi.org/10.1007/s00500-022-07781-7}, doi = {10.1007/S00500-022-07781-7}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/SugiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/GuoG23, author = {Jian Guo and Hua Guo}, title = {Real-Time Risk Detection Method and Protection Strategy for Intelligent Ship Network Security Based on Cloud Computing}, journal = {Symmetry}, volume = {15}, number = {5}, pages = {988}, year = {2023}, url = {https://doi.org/10.3390/sym15050988}, doi = {10.3390/SYM15050988}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/GuoG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ShahMWAMAS23, author = {Sabir Shah and Asim Munir and Abdul Waheed and Amerah A. Alabrah and Muaadh Mukred and Farhan Amin and Abdu Salam}, title = {Enhancing Security and Efficiency in Underwater Wireless Sensor Networks: {A} Lightweight Key Management Framework}, journal = {Symmetry}, volume = {15}, number = {8}, pages = {1484}, year = {2023}, url = {https://doi.org/10.3390/sym15081484}, doi = {10.3390/SYM15081484}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/ShahMWAMAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/systems/PerumalSANQ23, author = {Ganeshkumar Perumal and Gopalakrishnan Subburayalu and Qaisar Abbas and Syed Muhammad Naqi and Imran Qureshi}, title = {VBQ-Net: {A} Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions}, journal = {Syst.}, volume = {11}, number = {8}, pages = {436}, year = {2023}, url = {https://doi.org/10.3390/systems11080436}, doi = {10.3390/SYSTEMS11080436}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/systems/PerumalSANQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/BankeySSM23, author = {Vinay Bankey and Shubha Sharma and R. Swaminathan and A. S. Madhukumar}, title = {Physical Layer Security of HAPS-Based Space-Air-Ground-Integrated Network With Hybrid {FSO/RF} Communication}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {59}, number = {4}, pages = {4680--4688}, year = {2023}, url = {https://doi.org/10.1109/TAES.2022.3233339}, doi = {10.1109/TAES.2022.3233339}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/BankeySSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/NguyenCTPVCDP23, author = {Tan Nhat Nguyen and Trinh Van Chien and Dinh Hieu Tran and Van{-}Duc Phan and Miroslav Vozn{\'{a}}k and Symeon Chatzinotas and Zhiguo Ding and H. Vincent Poor}, title = {Security-Reliability Tradeoffs for Satellite-Terrestrial Relay Networks With a Friendly Jammer and Imperfect {CSI}}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {59}, number = {5}, pages = {7004--7019}, year = {2023}, url = {https://doi.org/10.1109/TAES.2023.3282934}, doi = {10.1109/TAES.2023.3282934}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/NguyenCTPVCDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/AlrahisPHSS23, author = {Lilas Alrahis and Satwik Patnaik and Muhammad Abdullah Hanif and Muhammad Shafique and Ozgur Sinanoglu}, title = {{\textdollar}{\textbackslash}tt\{PoisonedGNN\}{\textdollar}: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {10}, pages = {2822--2834}, year = {2023}, url = {https://doi.org/10.1109/TC.2023.3271126}, doi = {10.1109/TC.2023.3271126}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/AlrahisPHSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/IslamAK23, author = {Md. Shohidul Islam and Ihsen Alouani and Khaled N. Khasawneh}, title = {SecureVolt: Enhancing Deep Neural Networks Security via Undervolting}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {42}, number = {12}, pages = {4922--4933}, year = {2023}, url = {https://doi.org/10.1109/TCAD.2023.3296379}, doi = {10.1109/TCAD.2023.3296379}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/IslamAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tccn/LiJWHCDHM23, author = {Xingwang Li and Junjie Jiang and Hao Wang and Congzheng Han and Gaojie Chen and Jianhe Du and Chunqiang Hu and Shahid Mumtaz}, title = {Physical Layer Security for Wireless-Powered Ambient Backscatter Cooperative Communication Networks}, journal = {{IEEE} Trans. Cogn. Commun. Netw.}, volume = {9}, number = {4}, pages = {927--939}, year = {2023}, url = {https://doi.org/10.1109/TCCN.2023.3270425}, doi = {10.1109/TCCN.2023.3270425}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tccn/LiJWHCDHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcns/LiuGZXT23, author = {Jinliang Liu and Enyu Gong and Lijuan Zha and Xiangpeng Xie and Engang Tian}, title = {Outlier-Resistant Recursive Security Filtering for Multirate Networked Systems Under Fading Measurements and Round-Robin Protocol}, journal = {{IEEE} Trans. Control. Netw. Syst.}, volume = {10}, number = {4}, pages = {1962--1974}, year = {2023}, url = {https://doi.org/10.1109/TCNS.2023.3256299}, doi = {10.1109/TCNS.2023.3256299}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcns/LiuGZXT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcst/ShuklaACD23, author = {Pratishtha Shukla and Lu An and Aranya Chakrabortty and Alexandra Duel{-}Hallen}, title = {A Robust Stackelberg Game for Cyber-Security Investment in Networked Control Systems}, journal = {{IEEE} Trans. Control. Syst. Technol.}, volume = {31}, number = {2}, pages = {856--871}, year = {2023}, url = {https://doi.org/10.1109/TCST.2022.3207671}, doi = {10.1109/TCST.2022.3207671}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcst/ShuklaACD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/Alanazi23, author = {Faisal S. Alanazi}, title = {Physical layer security of cognitive radio networks with adaptive transmit power and multi-antenna energy harvesting}, journal = {Telecommun. Syst.}, volume = {83}, number = {1}, pages = {91--99}, year = {2023}, url = {https://doi.org/10.1007/s11235-023-01011-7}, doi = {10.1007/S11235-023-01011-7}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/Alanazi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/BarikMSK23, author = {Kousik Barik and Sanjay Misra and Luis Fern{\'{a}}ndez Sanz and Murat Koyuncu}, title = {{RONSI:} a framework for calculating return on network security investment}, journal = {Telecommun. Syst.}, volume = {84}, number = {4}, pages = {533--548}, year = {2023}, url = {https://doi.org/10.1007/s11235-023-01039-9}, doi = {10.1007/S11235-023-01039-9}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/BarikMSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/LiuGZTX23, author = {Jinliang Liu and Enyu Gong and Lijuan Zha and Engang Tian and Xiangpeng Xie}, title = {Observer-Based Security Fuzzy Control for Nonlinear Networked Systems Under Weighted Try-Once-Discard Protocol}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {31}, number = {11}, pages = {3853--3865}, year = {2023}, url = {https://doi.org/10.1109/TFUZZ.2023.3269786}, doi = {10.1109/TFUZZ.2023.3269786}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/LiuGZTX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/LuoWHDY23, author = {Yuqiang Luo and Zidong Wang and Jun Hu and Hongli Dong and Dong Yue}, title = {Security-Guaranteed Fuzzy Networked State Estimation for 2-D Systems With Multiple Sensor Arrays Subject to Deception Attacks}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {31}, number = {10}, pages = {3624--3638}, year = {2023}, url = {https://doi.org/10.1109/TFUZZ.2023.3262609}, doi = {10.1109/TFUZZ.2023.3262609}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tfs/LuoWHDY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/Xing0C023, author = {Jing{-}Wen Xing and Chen Peng and Zhiru Cao and Wen{-}Bo Xie}, title = {Security-Based Control for Networked Interval Type-2 Fuzzy Systems With Multiple Cyber-Attacks: An Improved Dynamic Event-Triggered Scheme}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {31}, number = {8}, pages = {2747--2760}, year = {2023}, url = {https://doi.org/10.1109/TFUZZ.2023.3235441}, doi = {10.1109/TFUZZ.2023.3235441}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/Xing0C023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/NgoPMX23, author = {Quynh Tu Ngo and Khoa Tran Phan and Abdun Mahmood and Wei Xiang}, title = {Physical Layer Security in IRS-Assisted Cache-Enabled Satellite Communication Networks}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {7}, number = {4}, pages = {1920--1931}, year = {2023}, url = {https://doi.org/10.1109/TGCN.2023.3280118}, doi = {10.1109/TGCN.2023.3280118}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgcn/NgoPMX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuTWWFCT23, author = {Lin Hu and Shuai Tan and Hong Wen and Jinsong Wu and Jiabing Fan and Songlin Chen and Jie Tang}, title = {Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3692--3705}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3286711}, doi = {10.1109/TIFS.2023.3286711}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuTWWFCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MankaliAPKS23, author = {Likhitha Mankali and Lilas Alrahis and Satwik Patnaik and Johann Knechtel and Ozgur Sinanoglu}, title = {Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {304--318}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3218429}, doi = {10.1109/TIFS.2022.3218429}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MankaliAPKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YinCLSW23, author = {Zhisheng Yin and Nan Cheng and Tom H. Luan and Yunchao Song and Wei Wang}, title = {DT-Assisted Multi-Point Symbiotic Security in Space-Air-Ground Integrated Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5721--5734}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3313326}, doi = {10.1109/TIFS.2023.3313326}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YinCLSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/AhmedNAJM23, author = {Junaid Ahmed and Tu N. Nguyen and Bakhtiar Ali and Muhammad Awais Javed and Jawad Mirza}, title = {On the Physical Layer Security of Federated Learning Based IoMT Networks}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {27}, number = {2}, pages = {691--697}, year = {2023}, url = {https://doi.org/10.1109/JBHI.2022.3173947}, doi = {10.1109/JBHI.2022.3173947}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/AhmedNAJM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/DiaoZLLHG23, author = {Chunyan Diao and Dafang Zhang and Wei Liang and Kuan{-}Ching Li and Yujie Hong and Jean{-}Luc Gaudiot}, title = {A Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network Security Model for Vehicles Prediction}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {1}, pages = {904--914}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3140229}, doi = {10.1109/TITS.2022.3140229}, timestamp = {Wed, 18 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/DiaoZLLHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/GyamfiAKTJ23, author = {Eric Gyamfi and James Adu Ansere and Mohsin Kamal and Muhammad Tariq and Anca Jurcut}, title = {An Adaptive Network Security System for IoT-Enabled Maritime Transportation}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2538--2547}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3159450}, doi = {10.1109/TITS.2022.3159450}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/GyamfiAKTJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/HeWLDHWNW23, author = {Xudong He and Jian Wang and Jiqiang Liu and Weiping Ding and Zhen Han and Bin Wang and Jamel Nebhen and Wei Wang}, title = {{DNS} Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2643--2655}, year = {2023}, url = {https://doi.org/10.1109/TITS.2021.3135197}, doi = {10.1109/TITS.2021.3135197}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/HeWLDHWNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiZAHBZN23, author = {Xingwang Li and Yike Zheng and Mohammad Dahman Alshehri and Linpeng Hai and Venki Balasubramanian and Ming Zeng and Gaofeng Nie}, title = {Cognitive AmBC-NOMA IoV-MTS Networks With {IQI:} Reliability and Security Analysis}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2596--2607}, year = {2023}, url = {https://doi.org/10.1109/TITS.2021.3113995}, doi = {10.1109/TITS.2021.3113995}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/LiZAHBZN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangWBXH23, author = {Zhaoyang Wang and Song Wang and Md. Zakirul Alam Bhuiyan and Jiping Xu and Yanzhu Hu}, title = {Cooperative Location-Sensing Network Based on Vehicular Communication Security Against Attacks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {1}, pages = {942--952}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3160453}, doi = {10.1109/TITS.2022.3160453}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangWBXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangXCSW23, author = {Zhongru Wang and Xinzhou Xie and Lei Chen and Shouyou Song and Zhongjie Wang}, title = {Intrusion Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2135--2143}, year = {2023}, url = {https://doi.org/10.1109/TITS.2021.3127681}, doi = {10.1109/TITS.2021.3127681}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangXCSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhangGWTC23, author = {Jiangjiang Zhang and Bei Gong and Muhammad Waqas and Shanshan Tu and Sheng Chen}, title = {Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {12}, pages = {15051--15065}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3296002}, doi = {10.1109/TITS.2023.3296002}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/ZhangGWTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhuYAKHX23, author = {Fei Zhu and Xun Yi and Alsharif Abuadbba and Ibrahim Khalil and Xinyi Huang and Feihong Xu}, title = {A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {10}, pages = {10456--10466}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3275077}, doi = {10.1109/TITS.2023.3275077}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/ZhuYAKHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KaurKAK23, author = {Jasleen Kaur and Rajeev Kumar and Alka Agrawal and Raees Ahmad Khan}, title = {A neutrosophic AHP-based computational technique for security management in a fog computing network}, journal = {J. Supercomput.}, volume = {79}, number = {1}, pages = {295--320}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-04674-2}, doi = {10.1007/S11227-022-04674-2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/KaurKAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KumarA23, author = {Rohit Kumar and Neha Agrawal}, title = {A survey on software-defined vehicular networks (SDVNs): a security perspective}, journal = {J. Supercomput.}, volume = {79}, number = {8}, pages = {8368--8400}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-05008-y}, doi = {10.1007/S11227-022-05008-Y}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KumarA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/WangF23, title = {Retraction Note: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism}, journal = {J. Supercomput.}, volume = {79}, number = {5}, pages = {5843}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-04862-0}, doi = {10.1007/S11227-022-04862-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/WangF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/WuH23, author = {Bin Wu and Sean He}, title = {Self-learning and explainable deep learning network toward the security of artificial intelligence of things}, journal = {J. Supercomput.}, volume = {79}, number = {4}, pages = {4436--4467}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-04818-4}, doi = {10.1007/S11227-022-04818-4}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/WuH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/NguyenR23, author = {Thanh Thi Nguyen and Vijay Janapa Reddi}, title = {Deep Reinforcement Learning for Cyber Security}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {34}, number = {8}, pages = {3779--3795}, year = {2023}, url = {https://doi.org/10.1109/TNNLS.2021.3121870}, doi = {10.1109/TNNLS.2021.3121870}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/NguyenR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LiuGSLY23, author = {Yating Liu and Yuantao Gu and Xinyue Shen and Qingmin Liao and Quan Yu}, title = {{MSCA:} An Unsupervised Anomaly Detection System for Network Security in Backbone Network}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {1}, pages = {223--238}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3206353}, doi = {10.1109/TNSE.2022.3206353}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/LiuGSLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/TaoLZLLFO23, author = {Xiaoling Tao and Zi{-}yi Liu and Feng Zhao and Rushi Lan and Runrong Liu and Lianyou Fu and Yifu Ouyang}, title = {An {SSA-LC-DAE} Method for Extracting Network Security Elements}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {2}, pages = {1175--1185}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2023.3233986}, doi = {10.1109/TNSE.2023.3233986}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/TaoLZLLFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/WangWL23, author = {Liqing Wang and Zheng{-}Guang Wu and James Lam}, title = {Necessary and Sufficient Conditions for Security of Hidden Markov Boolean Control Networks Under Shifting Attacks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {1}, pages = {321--330}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3208335}, doi = {10.1109/TNSE.2022.3208335}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/WangWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ZhouXTA23, author = {Jianping Zhou and Dong Xu and Weipeng Tai and Choon Ki Ahn}, title = {Switched Event-Triggered H\({}_{\mbox{{\(\infty\)}}}\) Security Control for Networked Systems Vulnerable to Aperiodic DoS Attacks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {4}, pages = {2109--2123}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2023.3243095}, doi = {10.1109/TNSE.2023.3243095}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ZhouXTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/NowrooziMSMC23, author = {Ehsan Nowroozi and Mohammadreza Mohammadi and Erkay Savas and Yassine Mekdad and Mauro Conti}, title = {Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {2}, pages = {2096--2105}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3267831}, doi = {10.1109/TNSM.2023.3267831}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/NowrooziMSMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ParkPW23, author = {Chang{-}Seop Park and Wang{-}Seok Park and Samuel Woo}, title = {Security Bootstrapping for Securing Data Plane and Control Plane in Named Data Networking}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {3}, pages = {3765--3781}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2022.3232359}, doi = {10.1109/TNSM.2022.3232359}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ParkPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/VergutzSKN23, author = {Andressa Verg{\"{u}}tz and Bruna V. Dos Santos and Burak Kantarci and Michele Nogueira}, title = {Data Instrumentation From IoT Network Traffic as Support for Security Management}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {2}, pages = {1392--1404}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2022.3233673}, doi = {10.1109/TNSM.2022.3233673}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/VergutzSKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YuYL23, author = {Kan Yu and Jiguo Yu and Chuanwen Luo}, title = {The Impact of Mobility on Physical Layer Security of 5G IoT Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {31}, number = {3}, pages = {1042--1055}, year = {2023}, url = {https://doi.org/10.1109/TNET.2022.3208212}, doi = {10.1109/TNET.2022.3208212}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YuYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HossainSBKA23, author = {Tamanna Hossain and Sarjana Shabab and A. S. M. Badrudduza and Milton Kumar Kundu and Imran Shafique Ansari}, title = {On the Physical Layer Security Performance Over RIS-Aided Dual-Hop {RF-UOWC} Mixed Network}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {2}, pages = {2246--2257}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3214112}, doi = {10.1109/TVT.2022.3214112}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HossainSBKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/JiYQY23, author = {Yahui Ji and Kan Yu and Jing Qiu and Jiguo Yu}, title = {Massive {MIMO} and Secrecy Guard Zone Based Improving Physical Layer Security in UAV-Enabled uRLLC Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {4}, pages = {4553--4567}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3221866}, doi = {10.1109/TVT.2022.3221866}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/JiYQY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WuDHZZL23, author = {Wufei Wu and Junhao Dai and Huijuan Huang and Qinmin Zhao and Gang Zeng and Renfa Li}, title = {A Digital Watermark Method for In-Vehicle Network Security Enhancement}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {7}, pages = {8398--8408}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3247180}, doi = {10.1109/TVT.2023.3247180}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WuDHZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhangWLHLC23, author = {Zheng Zhang and Zhaolin Wang and Yuanwei Liu and Bingtao He and Lu Lv and Jian Chen}, title = {Security Enhancement for Coupled Phase-Shift {STAR-RIS} Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {6}, pages = {8210--8215}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3243545}, doi = {10.1109/TVT.2023.3243545}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ZhangWLHLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/LuoLCG23, author = {Xuewen Luo and Yiliang Liu and Hsiao{-}Hwa Chen and Qing Guo}, title = {{PHY} Security Design for Mobile Crowd Computing in {ICV} Networks Based on Multi-Agent Reinforcement Learning}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {10}, pages = {6810--6825}, year = {2023}, url = {https://doi.org/10.1109/TWC.2023.3245637}, doi = {10.1109/TWC.2023.3245637}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/LuoLCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/OrlandoBPBB23, author = {Danilo Orlando and Stefania Bartoletti and Ivan Palam{\`{a}} and Giuseppe Bianchi and Nicola Blefari{-}Melazzi}, title = {Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {1}, pages = {205--219}, year = {2023}, url = {https://doi.org/10.1109/TWC.2022.3192225}, doi = {10.1109/TWC.2022.3192225}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/OrlandoBPBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangHYLL23, author = {Yuhang Wang and Ying He and F. Richard Yu and Qiuzhen Lin and Victor C. M. Leung}, title = {Efficient Resource Allocation in Multi-UAV Assisted Vehicular Networks With Security Constraint and Attention Mechanism}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {7}, pages = {4802--4813}, year = {2023}, url = {https://doi.org/10.1109/TWC.2022.3229013}, doi = {10.1109/TWC.2022.3229013}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangHYLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/RameshNMRA23, author = {S. Ramesh and S. Nirmalraj and S. Murugan and Manikandan Ramachandran and Fadi Al{-}Turjman}, title = {Optimization of Energy and Security in Mobile Sensor Network Using Classification Based Signal Processing in Heterogeneous Network}, journal = {J. Signal Process. Syst.}, volume = {95}, number = {2-3}, pages = {153--160}, year = {2023}, url = {https://doi.org/10.1007/s11265-021-01690-y}, doi = {10.1007/S11265-021-01690-Y}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/RameshNMRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/ZhengYZ23, author = {Li Zheng and Gang Yu and Yuntian Zheng}, title = {An Interactive Visualization System for Network Security Data}, journal = {J. Signal Process. Syst.}, volume = {95}, number = {2-3}, pages = {393--405}, year = {2023}, url = {https://doi.org/10.1007/s11265-023-01836-0}, doi = {10.1007/S11265-023-01836-0}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/ZhengYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeLLSD23, author = {Chao He and Tom H. Luan and Rongxing Lu and Zhou Su and Mianxiong Dong}, title = {Security and Privacy in Vehicular Digital Twin Networks: Challenges and Solutions}, journal = {{IEEE} Wirel. Commun.}, volume = {30}, number = {4}, pages = {154--160}, year = {2023}, url = {https://doi.org/10.1109/MWC.002.2200015}, doi = {10.1109/MWC.002.2200015}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/HeLLSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/Rong23, author = {Bo Rong}, title = {Security in Wireless Communication Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {30}, number = {1}, pages = {10--11}, year = {2023}, url = {https://doi.org/10.1109/MWC.2023.10077227}, doi = {10.1109/MWC.2023.10077227}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/Rong23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/BalamuruganKSC23, author = {Venkatachalam Balamurugan and Ramamoorthy Karthikeyan and B. Sundaravadivazhagan and Robin Cyriac}, title = {Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security}, journal = {Wirel. Networks}, volume = {29}, number = {2}, pages = {523--537}, year = {2023}, url = {https://doi.org/10.1007/s11276-022-03142-2}, doi = {10.1007/S11276-022-03142-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/BalamuruganKSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/DeviB23, author = {Parmila Devi and Manoranjan Rai Bharti}, title = {Physical layer security for IoT over Nakagami-m and mixed Rayleigh-Nakagami-m fading channels}, journal = {Wirel. Networks}, volume = {29}, number = {8}, pages = {3479--3491}, year = {2023}, url = {https://doi.org/10.1007/s11276-023-03422-5}, doi = {10.1007/S11276-023-03422-5}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/DeviB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/KavaiyaP23, author = {Sagar Kavaiya and Dhaval K. Patel}, title = {Restricting passive attacks in 6G vehicular networks: a physical layer security perspective}, journal = {Wirel. Networks}, volume = {29}, number = {3}, pages = {1355--1365}, year = {2023}, url = {https://doi.org/10.1007/s11276-022-03189-1}, doi = {10.1007/S11276-022-03189-1}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/KavaiyaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/MahamatJB23, author = {Micha{\"{e}}l Mahamat and Ghada Jaber and Abdelmadjid Bouabdallah}, title = {Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges}, journal = {Wirel. Networks}, volume = {29}, number = {2}, pages = {787--808}, year = {2023}, url = {https://doi.org/10.1007/s11276-022-03170-y}, doi = {10.1007/S11276-022-03170-Y}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/MahamatJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/PatonicoBS23, author = {Simone Patonico and An Braeken and Kris Steenhaut}, title = {Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model}, journal = {Wirel. Networks}, volume = {29}, number = {3}, pages = {1017--1029}, year = {2023}, url = {https://doi.org/10.1007/s11276-019-02084-6}, doi = {10.1007/S11276-019-02084-6}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/PatonicoBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/Zhao23, author = {Xuemin Zhao}, title = {A network security algorithm using {SVC} and sliding window}, journal = {Wirel. Networks}, volume = {29}, number = {1}, pages = {345--351}, year = {2023}, url = {https://doi.org/10.1007/s11276-022-03064-z}, doi = {10.1007/S11276-022-03064-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/Zhao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GaikwadA23, author = {V. D. Gaikwad and S. Ananthakumaran}, title = {A Review: Security and Privacy for Health Care Application in Wireless Body Area Networks}, journal = {Wirel. Pers. Commun.}, volume = {130}, number = {1}, pages = {673--691}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10305-7}, doi = {10.1007/S11277-023-10305-7}, timestamp = {Thu, 04 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GaikwadA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/HemanandRJ23, author = {Duraivelu Hemanand and N. Sankar Ram and D. S. Jayalakshmi}, title = {{FSSAM:} {A} Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm}, journal = {Wirel. Pers. Commun.}, volume = {128}, number = {1}, pages = {487--506}, year = {2023}, url = {https://doi.org/10.1007/s11277-022-09964-9}, doi = {10.1007/S11277-022-09964-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/HemanandRJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KumarSHV23, author = {N. M. Saravana Kumar and E. Suryaprabha and K. Hariprasath and V. Vijayakumar}, title = {Deep Learning Based Hybrid Security Model in Wireless Sensor Network}, journal = {Wirel. Pers. Commun.}, volume = {129}, number = {3}, pages = {1789--1805}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10208-7}, doi = {10.1007/S11277-023-10208-7}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KumarSHV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LeN23, author = {Chi{-}Bao Le and Sang Quang Nguyen}, title = {Evaluation of Physical Layer Security for UAV-Enabled Wireless Networks over {\(\alpha\)} -{\(\kappa\)} -{\(\mu\)} Fading Channels}, journal = {Wirel. Pers. Commun.}, volume = {128}, number = {3}, pages = {1671--1687}, year = {2023}, url = {https://doi.org/10.1007/s11277-022-10014-7}, doi = {10.1007/S11277-022-10014-7}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/LeN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/PriyaSAB23, title = {Retraction Note: Security Aware Trusted Cluster Based Routing Protocol for Wireless Body Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {128}, number = {2}, pages = {1501}, year = {2023}, url = {https://doi.org/10.1007/s11277-022-10142-0}, doi = {10.1007/S11277-022-10142-0}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/PriyaSAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/TandonG23, author = {Righa Tandon and P. K. Gupta}, title = {A Hybrid Security Scheme for Inter-vehicle Communication in Content Centric Vehicular Networks}, journal = {Wirel. Pers. Commun.}, volume = {129}, number = {2}, pages = {1083--1096}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10175-z}, doi = {10.1007/S11277-023-10175-Z}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/TandonG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/6gnet/DjuitcheuMHKS23, author = {Hubert Djuitcheu and Sachinkumar Bavikatti Mallikarjun and Mohammad Asif Habibi and Nandish P. Kuruvatti and Hans D. Schotten}, title = {Securing Private 5G Campus Networks: Abstract Survey on Current Status, Security Threats, and Research Landscape}, booktitle = {2nd International Conference on 6G Networking, 6GNet 2023, Paris, France, October 18-20, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/6GNet58894.2023.10317752}, doi = {10.1109/6GNET58894.2023.10317752}, timestamp = {Tue, 28 Nov 2023 14:39:09 +0100}, biburl = {https://dblp.org/rec/conf/6gnet/DjuitcheuMHKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/InukondaTATM23, author = {Maruthi Seshidhar Inukonda and Jatin Tarachandani and Imtiaz Ahmed and Bheemarjuna Reddy Tamma and Sparsh Mittal}, title = {{ZETA:} {A} Zero-Trust Security based Forensic-Ready Solution for Perimeter-less Enterprise Networks}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2023, Jaipur, India, December 17-20, 2023}, pages = {189--194}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ANTS59832.2023.10469629}, doi = {10.1109/ANTS59832.2023.10469629}, timestamp = {Mon, 08 Apr 2024 20:48:41 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/InukondaTATM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/SiddiquiKQAKABC23, author = {Shams Tabrez Siddiqui and Mohammad Shahid Kamal and Khalid Ali Qidwai and Md Imran Alam and Haneef Khan and Malik Zaib Alam and Ishan Budhiraja and Sandeep Chintham}, title = {Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2023, Jaipur, India, December 17-20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ANTS59832.2023.10469094}, doi = {10.1109/ANTS59832.2023.10469094}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/SiddiquiKQAKABC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Mancini023, author = {Francesco Mancini and Giuseppe Bianchi}, title = {ScasDK - {A} Development Kit for Security Assurance test in Multi-Network-Function 5G}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {48:1--48:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605044}, doi = {10.1145/3600160.3605044}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Mancini023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MessaiS23, author = {Mohamed{-}Lamine Messai and Hamida Seba}, title = {IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {84:1--84:7}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605053}, doi = {10.1145/3600160.3605053}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MessaiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BurtPK23, author = {Timothy A. Burt and Nikos I. Passas and Ioannis A. Kakadiaris}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {{AI-SNIPS:} {A} Platform for Network Intelligence-Based Pharmaceutical Security}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {16407--16409}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i13.27061}, doi = {10.1609/AAAI.V37I13.27061}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BurtPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/LuL23, author = {Xiaozhen Lu and Zhibo Liu}, title = {Safety Guide-Based Deep Reinforcement Learning for Network Security Applications}, booktitle = {Proceedings of the {ACM} Turing Award Celebration Conference - China 2023, {ACM} {TURC} 2023, Wuhan, China, July 28-30, 2023}, pages = {136--137}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603165.3607439}, doi = {10.1145/3603165.3607439}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/LuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GengMX23, author = {Guining Geng and Junfeng Miao and Nan Xiao}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Round-Efficient Security Authentication Protocol for 5G Network}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {269--283}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_15}, doi = {10.1007/978-3-031-41181-6\_15}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/acns/GengMX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhip/ChenQL23, author = {Qiang Chen and Fang Qian and Yukang Liu}, editor = {Lin Yun and Jiang Han and Yu Han}, title = {Dynamic Mining of Wireless Network Information Transmission Security Vulnerabilities Based on Spatiotemporal Dimension}, booktitle = {Advanced Hybrid Information Processing - 7th {EAI} International Conference, {ADHIP} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {548}, pages = {403--417}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50546-1\_27}, doi = {10.1007/978-3-031-50546-1\_27}, timestamp = {Mon, 29 Apr 2024 16:23:54 +0200}, biburl = {https://dblp.org/rec/conf/adhip/ChenQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhip/HuangL23, author = {Zhiyu Huang and Chenyang Li}, editor = {Lin Yun and Jiang Han and Yu Han}, title = {A Machine Learning Based Security Detection Method for Privacy Data in Social Networks}, booktitle = {Advanced Hybrid Information Processing - 7th {EAI} International Conference, {ADHIP} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {547}, pages = {350--365}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50543-0\_24}, doi = {10.1007/978-3-031-50543-0\_24}, timestamp = {Mon, 22 Apr 2024 17:37:39 +0200}, biburl = {https://dblp.org/rec/conf/adhip/HuangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhip/QianCL23, author = {Fang Qian and Qiang Chen and Lincheng Li}, editor = {Lin Yun and Jiang Han and Yu Han}, title = {Design of Adaptive Detection Algorithm for Mobile Social Network Security Vulnerability Based on Static Analysis}, booktitle = {Advanced Hybrid Information Processing - 7th {EAI} International Conference, {ADHIP} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {548}, pages = {389--402}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50546-1\_26}, doi = {10.1007/978-3-031-50546-1\_26}, timestamp = {Mon, 29 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhip/QianCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/KholidyBBJ23, author = {Hisham A. Kholidy and Abdelkader Berrouachedi and Elhadj Benkhelifa and Rakia Jaziri}, title = {Enhancing Security in 5G Networks: {A} Hybrid Machine Learning Approach for Attack Classification}, booktitle = {20th {ACS/IEEE} International Conference on Computer Systems and Applications, {AICCSA} 2023, Giza, Egypt, December 4-7, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AICCSA59173.2023.10479294}, doi = {10.1109/AICCSA59173.2023.10479294}, timestamp = {Wed, 10 Apr 2024 20:58:44 +0200}, biburl = {https://dblp.org/rec/conf/aiccsa/KholidyBBJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aics/WijenayakeHF23, author = {D. S. Wijenayake and Shagufta Henna and William Farrelly}, title = {A Graph Neural Network-based Security Posture-aware Cloud Service Provider Selection for Multi-cloud}, booktitle = {31st Irish Conference on Artificial Intelligence and Cognitive Science, {AICS} 2023, Letterkenny, Ireland, December 7-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AICS60730.2023.10470882}, doi = {10.1109/AICS60730.2023.10470882}, timestamp = {Mon, 08 Apr 2024 20:48:41 +0200}, biburl = {https://dblp.org/rec/conf/aics/WijenayakeHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aimscm/LiYYZA23, author = {Siwei Li and Long Yu and Liang Yue and Xirun Zhang and Dengxin Ai}, title = {Homomorphic Encryption-Based Privacy and Security Protection Method for Multi-Objective Electric Heat Network Collaborative Data}, booktitle = {Proceedings of the 2023 International Conference on {AI} and Metaverse in Supply Chain Management, {AIMSCM} 2023, Bhubaneswar, India, November 18-19, 2023}, pages = {13}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3648050.3648052}, doi = {10.1145/3648050.3648052}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aimscm/LiYYZA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisns/LiTW23, author = {Wei Li and Kuang Tian and Wei Wang}, title = {Research and Practice on Network Security Vulnerability Management Methods in the Transportation Industry}, booktitle = {Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security, {AISNS} 2023, Mianyang, China, December 22-24, 2023}, pages = {318--322}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3661638.3661699}, doi = {10.1145/3661638.3661699}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aisns/LiTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisns/WangZDLZFC23, author = {Xiaohui Wang and Li Zhao and Jinbao Du and Jingang Liu and Wei Zhang and Baozhan Feng and Hua Chen}, title = {Dynamic Evaluation of Information Security in Self-organizing Network Based on Knowledge Map Driving}, booktitle = {Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security, {AISNS} 2023, Mianyang, China, December 22-24, 2023}, pages = {409--414}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3661638.3661715}, doi = {10.1145/3661638.3661715}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aisns/WangZDLZFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/LiCMWHC23, author = {Zhihao Li and Qi Chen and Weichuan Mo and Xiaolin Wang and Li Hu and Yongzhi Cao}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Converging Blockchain and Deep Learning in {UAV} Network Defense Strategy: Ensuring Data Security During Flight}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {156--171}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_12}, doi = {10.1007/978-981-99-9785-5\_12}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/aisp/LiCMWHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LamprechtHE23, author = {Robert Lamprecht and Franziska Haid and Andreas Eckhardt}, editor = {Paul A. Pavlou and Vishal Midha and Animesh Animesh and Traci A. Carte and Alexandre R. Graeml and Alanah Mitchell}, title = {Security Networks as an Effective Means to Reduce Spear Phishing Susceptibility}, booktitle = {29th Americas Conference on Information Systems, {AMCIS} 2023, Panama City, Panama, August 10-12, 2023}, publisher = {Association for Information Systems}, year = {2023}, url = {https://aisel.aisnet.org/amcis2023/sig\_sec/sig\_sec/21}, timestamp = {Wed, 19 Jul 2023 08:55:10 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LamprechtHE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/ElhalouiTEB23, author = {Loubna Elhaloui and Mohamed Tabaa and Sanaa Elfilali and Elhabib Benlahmer}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Dynamic security of IoT network traffic using {SDN}}, booktitle = {The 14th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2023) / The 6th International Conference on Emerging Data and Industry 4.0 {(EDI40} 2023) / Affiliated Workshops, March 15-17, 2023, Leuven, Belgium}, series = {Procedia Computer Science}, volume = {220}, pages = {356--363}, publisher = {Elsevier}, year = {2023}, url = {https://doi.org/10.1016/j.procs.2023.03.046}, doi = {10.1016/J.PROCS.2023.03.046}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/ElhalouiTEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/TsaiLW23, author = {Pang{-}Wei Tsai and Chao{-}Wei Lee and Ting{-}Wen Wang}, title = {Design and Development of a Trust Mechanism to Enhance Security Protection on SDN-based IoT Network}, booktitle = {24st Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2023, Sejong, Korea, Republic of, September 6-8, 2023}, pages = {125--130}, publisher = {{IEEE}}, year = {2023}, url = {https://ieeexplore.ieee.org/document/10258177}, timestamp = {Mon, 02 Oct 2023 20:30:43 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/TsaiLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/MengOL023, author = {Qiaoran Meng and Nay Oo and Hoon Wei Lim and Biplab Sikdar}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {{POSTER:} Security Logs Graph Analytics for Industry Network System}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {1043--1045}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3592830}, doi = {10.1145/3579856.3592830}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/MengOL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asicon/ChenL23, author = {Guang Chen and Binglong Li}, title = {Design and Implementation of High-speed Reconfigurable Multi-core Network Security Protocol Analyse Processor}, booktitle = {15th {IEEE} International Conference on ASIC, {ASICON} 2023, Nanjing, China, October 24-27, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ASICON58565.2023.10396112}, doi = {10.1109/ASICON58565.2023.10396112}, timestamp = {Fri, 16 Feb 2024 14:02:58 +0100}, biburl = {https://dblp.org/rec/conf/asicon/ChenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/AlrahisKS23, author = {Lilas Alrahis and Johann Knechtel and Ozgur Sinanoglu}, editor = {Atsushi Takahashi}, title = {Graph Neural Networks: {A} Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs}, booktitle = {Proceedings of the 28th Asia and South Pacific Design Automation Conference, {ASPDAC} 2023, Tokyo, Japan, January 16-19, 2023}, pages = {83--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3566097.3568345}, doi = {10.1145/3566097.3568345}, timestamp = {Mon, 26 Jun 2023 20:46:40 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/AlrahisKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asse/BalaisAMTV23, author = {Maricel A. Balais and Zyrus Kyle T. Alcazar and Ryan Patrick V. Martin and Vonn Eric M. Tulabot and Charles Anrei Z. Valerio}, title = {Wireless Network Infrastructure and Security Enhancement for St. Joseph School}, booktitle = {Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, {ASSE} 2023, Aizu-Wakamatsu City, Japan, October 27-29, 2023}, pages = {249--259}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3634814.3634846}, doi = {10.1145/3634814.3634846}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asse/BalaisAMTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/KumarRPA23, author = {Gaurav Kumar and Anjum Riaz and Yamuna Prasad and Satyadev Ahlawat}, title = {On Enhancing the Security of Streaming Scan Network Architecture}, booktitle = {32nd {IEEE} Asian Test Symposium, {ATS} 2023, Beijing, China, October 14-17, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ATS59501.2023.10317941}, doi = {10.1109/ATS59501.2023.10317941}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ats/KumarRPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/WangL23, author = {Huan Wang and Xiaoyang Lai}, title = {Quantum Information Technology for Network Security: An Application-Focused Overview}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {881--886}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00148}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00148}, timestamp = {Thu, 18 Apr 2024 16:12:26 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/WangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdiot/HuTCZ23, author = {Zhiyuan Hu and Yuan Tan and Anchao Cheng and Guangjun Zeng}, title = {Research on Network Dynamic Security Policy Model Based on Neural Network}, booktitle = {Proceedings of the 7th International Conference on Big Data and Internet of Things, {BDIOT} 2023, Beijing, China, August 11-13, 2023}, pages = {135--141}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617695.3617720}, doi = {10.1145/3617695.3617720}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bdiot/HuTCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdmip/XuZL23, author = {Xiangsen Xu and Shijun Zhang and Ji Lai}, title = {Application of Internet Big Data in Network Security Situation Assessment}, booktitle = {Proceedings of the International Conference on Big Data Mining and Information Processing, {BDMIP} 2023, Xiamen City, China, China, November 17-19, 2023}, pages = {77--81}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3645279.3645293}, doi = {10.1145/3645279.3645293}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdmip/XuZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdmip/ZengLX23, author = {Jing Zeng and Shuo Li and Xiangsen Xu}, title = {Simulation Design of a Network Security Intrusion Detection Model for Cloud Computing Based on Neural Network Model}, booktitle = {Proceedings of the International Conference on Big Data Mining and Information Processing, {BDMIP} 2023, Xiamen City, China, China, November 17-19, 2023}, pages = {111--115}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3645279.3645299}, doi = {10.1145/3645279.3645299}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdmip/ZengLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/AkterRSCW23, author = {Mst. Shapna Akter and Juanjose Rodriguez{-}Cardenas and Hossain Shahriar and Alfredo Cuzzocrea and Fan Wu}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {Quantum Cryptography for Enhanced Network Security: {A} Comprehensive Survey of Research, Developments, and Future Directions}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {5408--5417}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386889}, doi = {10.1109/BIGDATA59044.2023.10386889}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/AkterRSCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bisec/AlexandrovM23, author = {Alexander K. Alexandrov and Anastass N. Madzharov}, editor = {Nemanja Zdravkovic and Dragan Domazet and Sonsoles L{\'{o}}pez{-}Pernas and Miguel {\'{A}}ngel Conde and Ponnusamy Vijayakumar}, title = {Energy-Efficient Routing in UAVs Supported Perimeter Security Networks}, booktitle = {Proceedings of the 14th International Conference on Business Information Security {(BISEC} 2023), City of Ni{\v{s}}, Serbia, November 24th, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3676}, pages = {44--49}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3676/short\_06.pdf}, timestamp = {Mon, 13 May 2024 08:44:02 +0200}, biburl = {https://dblp.org/rec/conf/bisec/AlexandrovM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/brains/SurmontWC23, author = {Jasper Surmont and Weihong Wang and Tom Van Cutsem}, title = {Static Application Security Testing of Consensus-Critical Code in the Cosmos Network}, booktitle = {5th Conference on Blockchain Research {\&} Applications for Innovative Networks and Services, {BRAINS} 2023, Paris, France, October 11-13, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BRAINS59668.2023.10316912}, doi = {10.1109/BRAINS59668.2023.10316912}, timestamp = {Tue, 05 Dec 2023 20:47:36 +0100}, biburl = {https://dblp.org/rec/conf/brains/SurmontWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/JafarA23, author = {Imran Bin Jafar and Irfan S. Al{-}Anbagi}, title = {{RSM:} {A} Real-time Security Monitoring Platform for IoT Networks}, booktitle = {{IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2023, Regina, SK, Canada, September 24-27, 2023}, pages = {393--398}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCECE58730.2023.10289023}, doi = {10.1109/CCECE58730.2023.10289023}, timestamp = {Thu, 09 Nov 2023 15:01:12 +0100}, biburl = {https://dblp.org/rec/conf/ccece/JafarA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/HussainRYDTS23, author = {Lasani Hussain and Mayank Rawat and Neeraj Kumar Yadav and Sumit Darak and Praveen Tammana and Rinku Shah}, editor = {Yogesh Simmhan and Ilkay Altintas and Ana Lucia Varbanescu and Pavan Balaji and Abhinandan S. Prasad and Lorenzo Carnevale}, title = {Microservice-based in-network security framework for {FPGA} NICs}, booktitle = {23rd {IEEE/ACM} International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2023 - Workshops, Bangalore, India, May 1-4, 2023}, pages = {328--330}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCGridW59191.2023.00074}, doi = {10.1109/CCGRIDW59191.2023.00074}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccgrid/HussainRYDTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/Qian23, author = {Shen Qian}, title = {Physical Layer Security in Untrusted Lossy Decode-and-Forward Relay Networks with Finite Blocklength}, booktitle = {20th {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023}, pages = {218--223}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCNC51644.2023.10060369}, doi = {10.1109/CCNC51644.2023.10060369}, timestamp = {Tue, 21 Mar 2023 13:49:39 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/Qian23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/RanjiJBBH23, author = {Ramtin Ranji and Uzzam Javed and Bert Boltjes and Fay{\c{c}}al Bouhafs and Frank T. H. den Hartog}, title = {Optimizing wireless network throughput under the condition of Physical Layer Security using Software-Defined Networking enabled collaboration}, booktitle = {20th {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCNC51644.2023.10060341}, doi = {10.1109/CCNC51644.2023.10060341}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/RanjiJBBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/LinZHW23, author = {Xubin Lin and Situo Zhang and Feifei Hu and Liu Wu}, title = {Research on Security Audit Technology of Smart Grid Database Based on Neural Networks}, booktitle = {8th International Conference on Computer and Communication Systems, {ICCCS} 2023, Guangzhou, China, April 21-23, 2023}, pages = {1142--1146}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCS57501.2023.10151001}, doi = {10.1109/ICCCS57501.2023.10151001}, timestamp = {Mon, 10 Jul 2023 15:09:46 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/LinZHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Beltiukov0GW23, author = {Roman Beltiukov and Wenbo Guo and Arpit Gupta and Walter Willinger}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {In Search of netUnicorn: {A} Data-Collection Platform to Develop Generalizable {ML} Models for Network Security Problems}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2217--2231}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623075}, doi = {10.1145/3576915.3623075}, timestamp = {Tue, 09 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Beltiukov0GW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShiSYZ023, author = {Qingkai Shi and Junyang Shao and Yapeng Ye and Mingwei Zheng and Xiangyu Zhang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Lifting Network Protocol Implementation to Precise Format Specification with Security Applications}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1287--1301}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616614}, doi = {10.1145/3576915.3616614}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShiSYZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecct/ZhaiYZHYZ23, author = {Chenggong Zhai and Xinguang Yuan and Liyong Zhou and Yang Huang and Chaoshan Yang and Peng Zhou}, title = {Research on Network Security in Material Support}, booktitle = {Proceedings of the International Conference on Electronics, Computers and Communication Technology, {CECCT} 2023, Guilin, China, November 17-19, 2023}, pages = {6--10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3637494.3637496}, doi = {10.1145/3637494.3637496}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cecct/ZhaiYZHYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cecnet/FuLGZ23, author = {Yunxi Fu and Zesan Liu and Ziting Gao and Wenjuan Zhang}, editor = {Antonio J. Tall{\'{o}}n{-}Ballesteros and Estefan{\'{\i}}a Cort{\'{e}}s{-}Ancos and Diego A. L{\'{o}}pez Garc{\'{\i}}a}, title = {Research on Network Security Access Based on Intelligent Active Defense}, booktitle = {Electronics, Communications and Networks - Proceedings of the 13th International Conference (CECNet 2023), Macao, China, 17-20 November 2023}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {381}, pages = {327--332}, publisher = {{IOS} Press}, year = {2023}, url = {https://doi.org/10.3233/FAIA231209}, doi = {10.3233/FAIA231209}, timestamp = {Wed, 31 Jan 2024 15:27:35 +0100}, biburl = {https://dblp.org/rec/conf/cecnet/FuLGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/HellemansRPM23, author = {Wouter Hellemans and Md Masoom Rabbani and Bart Preneel and Nele Mentens}, editor = {Andrea Bartolini and Kristian F. D. Rietveld and Catherine D. Schuman and Jose Moreira}, title = {Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. {A} review}, booktitle = {Proceedings of the 20th {ACM} International Conference on Computing Frontiers, {CF} 2023, Bologna, Italy, May 9-11, 2023}, pages = {352--357}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3587135.3592818}, doi = {10.1145/3587135.3592818}, timestamp = {Sat, 30 Sep 2023 09:36:30 +0200}, biburl = {https://dblp.org/rec/conf/cf/HellemansRPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cipae/Yun23, author = {Feng Yun}, title = {Research on Network Security Image Cryptosystem Based on Computer Vision Technology}, booktitle = {International Conference on Computers, Information Processing and Advanced Education, {CIPAE} 2023, Ottawa, ON, Canada, August 26-28, 2023}, pages = {698--702}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CIPAE60493.2023.00135}, doi = {10.1109/CIPAE60493.2023.00135}, timestamp = {Thu, 25 Jan 2024 09:25:30 +0100}, biburl = {https://dblp.org/rec/conf/cipae/Yun23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/KumarA23, author = {Rohit Kumar and Neha Agrawal}, title = {{ACL} Assisted Security Mechanism Against Low-Rate DDoS Attack in SDN-Cloud-IoT Networks}, booktitle = {{OITS} International Conference on Information Technology, {OCIT} 2023, Raipur, India, December 13-15, 2023}, pages = {823--828}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/OCIT59427.2023.10431284}, doi = {10.1109/OCIT59427.2023.10431284}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cit/KumarA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cits/DikLB23, author = {Daniel Dik and Iacob Larsen and Michael St{\"{u}}bert Berger}, editor = {Mohammad S. Obaidat and Franco Davoli and Kuei{-}Fang Hsiao and Petros Nicopolitidis and Yu Guo}, title = {MACsec and {AES-GCM} Hardware Architecture with Frame Preemption Support for Transport Security in Time Sensitive Networking}, booktitle = {International Conference on Computer, Information and Telecommunication Systems, {CITS} 2023, Genoa, Italy, July 10-12, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CITS58301.2023.10188711}, doi = {10.1109/CITS58301.2023.10188711}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cits/DikLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/IvkicTRBG23, author = {Igor Ivkic and Dominik Thiede and Nicholas J. P. Race and Matthew Broadbent and Antonios Gouglidis}, editor = {Maarten van Steen and Claus Pahl}, title = {A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments}, booktitle = {Proceedings of the 13th International Conference on Cloud Computing and Services Science, {CLOSER} 2023, Prague, Czech Republic, April 26-28, 2023}, pages = {277--288}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011988300003488}, doi = {10.5220/0011988300003488}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/IvkicTRBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/YouNSS23, author = {Myoungsung You and Jaehyun Nam and Minjae Seo and Seungwon Shin}, title = {{HELIOS:} Hardware-assisted High-performance Security Extension for Cloud Networking}, booktitle = {Proceedings of the 2023 {ACM} Symposium on Cloud Computing, SoCC 2023, Santa Cruz, CA, USA, 30 October 2023 - 1 November 2023}, pages = {486--501}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3620678.3624786}, doi = {10.1145/3620678.3624786}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloud/YouNSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/GarrigaZS23, author = {Rodrigo Asensio Garriga and Alejandro Molina Zarca and Antonio F. Skarmeta}, title = {A Multi-stakeholder Cloud-continuum framework for 6G Networks security {\&} service management}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {466--471}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490020}, doi = {10.1109/CLOUDNET59005.2023.10490020}, timestamp = {Sun, 28 Apr 2024 20:40:19 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/GarrigaZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncit/WangWBHGQ23, author = {Yuman Wang and Wenhui Wang and Xiaoxue Bai and Bo Hu and Guangkai Ge and Kexiang Qian}, title = {{RRDD:} An ATT{\&}CK-based {ICS} Network Security Risk Assessment Method}, booktitle = {Proceedings of the 2nd International Conference on Networks, Communications and Information Technology, {CNCIT} 2023, Qinghai, China, June 16-18, 2023}, pages = {186--192}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605801.3605837}, doi = {10.1145/3605801.3605837}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncit/WangWBHGQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/JinSZLD23, author = {Kai Jin and Xin Shan and Yuan Zhou and Jing Li and Haidi Dong}, title = {Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network Security System}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {255--258}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640962}, doi = {10.1145/3640912.3640962}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/JinSZLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/LiLZ23, author = {Yimeng Li and Xi Li and Yichao Zhang}, title = {Traffic Classification of Network Security Agents Based on Feature Fusion Convolutional Neural Network}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {196--200}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640951}, doi = {10.1145/3640912.3640951}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/LiLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/XiongLCC23, author = {Zihan Xiong and Yuxuan Li and Jun Chen and Dabei Chen}, title = {FusedCNN-LSTM-AttNet: {A} Neural Network Model for Cyber Security Situation Prediction}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {207--210}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640953}, doi = {10.1145/3640912.3640953}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/XiongLCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnml/ZengFWXHL23, author = {Weijie Zeng and Rui Fan and Zhi Wang and Yu Xiao and Rui Huang and Mouhai Liu}, title = {Research on Docker Container Network Isolation and Security Management for Multi-Tenant Environments}, booktitle = {Proceedings of the 2023 International Conference on Communication Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October 27-28, 2023}, pages = {179--185}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640912.3640948}, doi = {10.1145/3640912.3640948}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnml/ZengFWXHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MensiR23, author = {Neji Mensi and Danda B. Rawat}, title = {Enhancing Security in NOMA-Based Networks: An Effective Deceptive Approach to Thwart Multiple Eavesdroppers}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288993}, doi = {10.1109/CNS59707.2023.10288993}, timestamp = {Mon, 13 Nov 2023 09:18:17 +0100}, biburl = {https://dblp.org/rec/conf/cns/MensiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/FangYYDL23, author = {Cheng Fang and Peng Yang and Meng Yi and Miao Du and Bing Li}, editor = {Honghao Gao and Xinheng Wang and Nikolaos S. Voros}, title = {Resource Cooperative Scheduling Optimization Considering Security in Edge Mobile Networks}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 19th {EAI} International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {561}, pages = {54--74}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54521-4\_4}, doi = {10.1007/978-3-031-54521-4\_4}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/colcom/FangYYDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/commnet/AhmedHS23, author = {Soumaya Marfoun{-}Dini Ahmed and Anne{-}Carole Honfoga and Patrick Sotindjo}, title = {Security of digital agriculture networks: {A} review and bibliometric analysis}, booktitle = {6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023, Rabat, Morocco, December 11-13, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CommNet60167.2023.10365311}, doi = {10.1109/COMMNET60167.2023.10365311}, timestamp = {Thu, 18 Jan 2024 08:27:09 +0100}, biburl = {https://dblp.org/rec/conf/commnet/AhmedHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/commnet/LeeSKG23, author = {Cheng{-}Yen Lee and Kyler R. Scott and Sunil P. Khatri and Ali Ghrayeb}, title = {A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol}, booktitle = {6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023, Rabat, Morocco, December 11-13, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CommNet60167.2023.10365286}, doi = {10.1109/COMMNET60167.2023.10365286}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/commnet/LeeSKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/WangZLZ23, author = {Yixuan Wang and Bo Zhao and Weidong Li and Lingzi Zhu}, editor = {Hossain Shahriar and Yuuichi Teranishi and Alfredo Cuzzocrea and Moushumi Sharmin and Dave Towey and A. K. M. Jahangir Alam Majumder and Hiroki Kashiwazaki and Ji{-}Jiang Yang and Michiharu Takemoto and Nazmus Sakib and Ryohei Banno and Sheikh Iqbal Ahamed}, title = {An Ontology-Centric Approach for Network Security Situation Awareness}, booktitle = {47th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2023, Torino, Italy, June 26-30, 2023}, pages = {777--787}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMPSAC57700.2023.00107}, doi = {10.1109/COMPSAC57700.2023.00107}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/WangZLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coms2/PatelPJ23, author = {Nisarg Patel and Viral Parekh and Kaushal Jani}, editor = {Nirbhay Chaubey and Sabu M. Thampi and Noor Zaman Jhanjhi and Satyen Parikh and Kiran Amin}, title = {Improvement of Network Protocol and Analysis of Security Using Aspect of Cryptography}, booktitle = {Computing Science, Communication and Security - 4th International Conference, {COMS2} 2023, Mehsana, Gujarat, India, February 6-7, 2023, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1861}, pages = {103--116}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40564-8\_8}, doi = {10.1007/978-3-031-40564-8\_8}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coms2/PatelPJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/IhitaAKCM23, author = {Gangavarapu Vigneswara Ihita and Vybhav. K. Acharya and Likhith Kanigolla and Sachin Chaudhari and Thierry Monteil}, title = {Security for oneM2M-Based Smart City Network: An {OM2M} Implementation}, booktitle = {15th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2023, Bangalore, India, January 3-8, 2023}, pages = {808--813}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMSNETS56262.2023.10041334}, doi = {10.1109/COMSNETS56262.2023.10041334}, timestamp = {Fri, 24 Feb 2023 15:04:53 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/IhitaAKCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/MishraB23, author = {Ayushi Mishra and Priyanka Bagade}, title = {Investigating IoT Systems Security Attacks using Network Forensics}, booktitle = {15th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2023, Bangalore, India, January 3-8, 2023}, pages = {72--77}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMSNETS56262.2023.10041322}, doi = {10.1109/COMSNETS56262.2023.10041322}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/MishraB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/VenkateswaranHR23, author = {Venkat Venkateswaran and Chin{-}Tser Huang and Kaliappa Ravindran}, title = {Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement}, booktitle = {15th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2023, Bangalore, India, January 3-8, 2023}, pages = {505--512}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMSNETS56262.2023.10041417}, doi = {10.1109/COMSNETS56262.2023.10041417}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/VenkateswaranHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/contel/DreibholzBA23, author = {Thomas Dreibholz and Steinar Bj{\o}rnstad and Jameel Ali}, title = {A Scalable Infrastructure for Continuous State of Polarisation Monitoring for Revealing Security and Vulnerability Impacts in Optical Networks}, booktitle = {17th International Conference on Telecommunications, ConTEL 2023, Graz, Austria, July 11-13, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ConTEL58387.2023.10198969}, doi = {10.1109/CONTEL58387.2023.10198969}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/contel/DreibholzBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coopis/SoveiziK23, author = {Nafiseh Soveizi and Dimka Karastoyanova}, editor = {Mohamed Sellami and Maria{-}Esther Vidal and Boudewijn F. van Dongen and Walid Gaaloul and Herv{\'{e}} Panetto}, title = {Enhancing Workflow Security in Multi-cloud Environments Through Monitoring and Adaptation upon Cloud Service and Network Security Violations}, booktitle = {Cooperative Information Systems - 29th International Conference, CoopIS 2023, Groningen, The Netherlands, October 30 - November 3, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14353}, pages = {157--175}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46846-9\_9}, doi = {10.1007/978-3-031-46846-9\_9}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coopis/SoveiziK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/DovzhenkoBAIO23, author = {Nadiia Dovzhenko and Oleg Barabash and Nataliia Ausheva and Yevhen Ivanichenko and Sergiy Obushnyi}, editor = {Volodymyr Sokolov and Tamara Radivilova and Vasyl Ustimenko and Mariya Nazarkevych}, title = {Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing (short paper)}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, October 26, 2023 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3550}, pages = {275--280}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3550/short12.pdf}, timestamp = {Fri, 24 Nov 2023 12:33:41 +0100}, biburl = {https://dblp.org/rec/conf/cpits/DovzhenkoBAIO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/ToliupaSBPK23, author = {Serhii Toliupa and Anatolii Shevchenko and Serhii Buchyk and Ihor Pampukha and Andrii Kulko}, editor = {Volodymyr Sokolov and Tamara Radivilova and Vasyl Ustimenko and Mariya Nazarkevych}, title = {Managing the Security of the Critical Infrastructure Information Network}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, October 26, 2023 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3550}, pages = {131--142}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3550/paper11.pdf}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpits/ToliupaSBPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BachoCLL23, author = {Renas Bacho and Daniel Collins and Chen{-}Da Liu{-}Zhang and Julian Loss}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Network-Agnostic Security Comes (Almost) for Free in {DKG} and {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {71--106}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_3}, doi = {10.1007/978-3-031-38557-5\_3}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BachoCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscn/AhmadMCPKS23, author = {Ijaz Ahmad and Jere Malinen and Filippos Christou and Pawani Porambage and Andreas Kirst{\"{a}}dter and Jani Suomalainen}, title = {Security in Intent-Based Networking: Challenges and Solutions}, booktitle = {{IEEE} Conference on Standards for Communications and Networking, {CSCN} 2023, Munich, Germany, November 6-8, 2023}, pages = {296--301}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSCN60443.2023.10453125}, doi = {10.1109/CSCN60443.2023.10453125}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscn/AhmadMCPKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csit/RiznykKKK23, author = {Oleg Riznyk and Yurii Kynash and Natalya Kustra and Roman Kuharchuk}, title = {Construction of security smart systems using wireless sensor networks}, booktitle = {18th {IEEE} International Conference on Computer Science and Information Technologies, {CSIT} 2023, Lviv, Ukraine, October 19-21, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSIT61576.2023.10324230}, doi = {10.1109/CSIT61576.2023.10324230}, timestamp = {Mon, 11 Dec 2023 15:24:42 +0100}, biburl = {https://dblp.org/rec/conf/csit/RiznykKKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/AhmadT23, author = {Tanwir Ahmad and Dragos Truscan}, title = {Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {154--159}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224923}, doi = {10.1109/CSR57506.2023.10224923}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/AhmadT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/DuanWMYXL23, author = {Luwen Duan and Min Wu and Lijian Mao and Jun Yin and Jianping Xiong and Xi Li}, title = {RWSC-Fusion: Region-Wise Style-Controlled Fusion Network for the Prohibited X-ray Security Image Synthesis}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {22398--22407}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.02145}, doi = {10.1109/CVPR52729.2023.02145}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/DuanWMYXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/YahiaLS23, author = {Selma Yahia and Valeria Loscr{\`{\i}} and Prakriti Saxena}, title = {Enhancing Security in 6G Vehicular Networks: Leveraging {VLC} and {MMW} Integration and Cooperative Relaying Technique}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023}, pages = {711--716}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361417}, doi = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361417}, timestamp = {Tue, 23 Jan 2024 20:30:56 +0100}, biburl = {https://dblp.org/rec/conf/dasc/YahiaLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/AhmadSH23, author = {Syed Tihaam Ahmad and Ayesha Siddique and Khaza Anuarul Hoque}, title = {Security-Aware Approximate Spiking Neural Networks}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2023, Antwerp, Belgium, April 17-19, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/DATE56975.2023.10137269}, doi = {10.23919/DATE56975.2023.10137269}, timestamp = {Wed, 07 Jun 2023 22:08:03 +0200}, biburl = {https://dblp.org/rec/conf/date/AhmadSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcai/GarciaROM23, author = {Carlos Rubio Garcia and Simon Rommel and Juan Jose Vegas Olmos and Idelfonso Tafur Monroy}, editor = {Rashid Mehmood and Victor Alves and Isabel Pra{\c{c}}a and Jaroslaw Wikarek and Javier Parra{-}Dom{\'{\i}}nguez and Roussanka Loukanova and Ignacio de Miguel and Tiago Pinto and Ricardo Nunes and Michela Ricca}, title = {Enhancing the Security of Software Defined Networks via Quantum Key Distribution and Post-Quantum Cryptography}, booktitle = {Distributed Computing and Artificial Intelligence, Special Sessions I, 20th International Conference, Guimaraes, Portugal, 12-14 July 2023}, series = {Lecture Notes in Networks and Systems}, volume = {741}, pages = {428--437}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38318-2\_42}, doi = {10.1007/978-3-031-38318-2\_42}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dcai/GarciaROM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dese/AcostaHP23, author = {Lyracelle Acosta and Seyed Ebrahim Hosseini and Shahbaz Pervez}, title = {Ethical Challenges Associated with Security Vulnerabilities and Data Privacy in Social Networking}, booktitle = {16th International Conference on Developments in eSystems Engineering, DeSE 2023, Istanbul, Turkiye, December 18-20, 2023}, pages = {647--652}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DeSE60595.2023.10469464}, doi = {10.1109/DESE60595.2023.10469464}, timestamp = {Tue, 02 Apr 2024 12:53:24 +0200}, biburl = {https://dblp.org/rec/conf/dese/AcostaHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/GuhaB23, author = {Krishnendu Guha and Gouriprasad Bhattacharyya}, editor = {Luca Cassano and Mihalis Psarakis and Marcello Traiola and Alberto Bosio}, title = {A Self Aware Security Approach for Real Time Neural Network Applications from Row Hammer Attacks in Multi {FPGA} Multi User Environment}, booktitle = {{IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2023, Juan-Les-Pins, France, October 3-5, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DFT59622.2023.10313547}, doi = {10.1109/DFT59622.2023.10313547}, timestamp = {Tue, 21 Nov 2023 12:38:06 +0100}, biburl = {https://dblp.org/rec/conf/dft/GuhaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/KoufopoulouPPPH23, author = {Amalia{-}Artemis Koufopoulou and Athanasios Papadimitriou and Aggelos Pikrakis and Mihalis Psarakis and David H{\'{e}}ly}, editor = {Luca Cassano and Mihalis Psarakis and Marcello Traiola and Alberto Bosio}, title = {On the Prediction of Hardware Security Properties of {HLS} Designs Using Graph Neural Networks}, booktitle = {{IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2023, Juan-Les-Pins, France, October 3-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DFT59622.2023.10313544}, doi = {10.1109/DFT59622.2023.10313544}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/KoufopoulouPPPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dis/Hamouda23, author = {Essia Hamouda}, editor = {Hossein Moosaei and Milan Hlad{\'{\i}}k and Panos M. Pardalos}, title = {A Critical Node-Centric Approach to Enhancing Network Security}, booktitle = {Dynamics of Information Systems - 6th International Conference, {DIS} 2023, Prague, Czech Republic, September 3-6, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14321}, pages = {116--130}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50320-7\_9}, doi = {10.1007/978-3-031-50320-7\_9}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dis/Hamouda23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drcn/BermejoDB23, author = {{\'{O}}scar Gotor Bermejo and Daniel Dik and Michael St{\"{u}}bert Berger}, title = {Risk Assessment on Hardware Offloading Architecture of Network Security Protocols with Linux-based Control Plane}, booktitle = {19th International Conference on the Design of Reliable Communication Networks, {DRCN} 2023, Vilanova i la Geltru, Spain, April 17-20, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DRCN57075.2023.10108289}, doi = {10.1109/DRCN57075.2023.10108289}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drcn/BermejoDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ChenZYL23, author = {Zhuoran Chen and Hongyu Zhu and Chen Yi and Zhen Liu}, title = {Research Ideas on Network Security Experiment and Appraisal of Avionics System}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {383--390}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00061}, doi = {10.1109/DSC59305.2023.00061}, timestamp = {Fri, 09 Feb 2024 20:38:47 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ChenZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiWYZ23, author = {Bokai Li and Shenglong Wu and Yuke Yang and Geyao Zhang}, title = {Analysis and Research of Neural Network Adversarial Samples for Power Grid Security}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {520--525}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00081}, doi = {10.1109/DSC59305.2023.00081}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiWYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/YeZTW23, author = {Haibo Ye and Lei Zhao and Leiting Tao and Xiaofeng Wang}, title = {Network Security Evaluation for Space-Ground Integrated Networks Based on Network Simulation}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {245--252}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00043}, doi = {10.1109/DSC59305.2023.00043}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/YeZTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtesi/AliRYNAK23, author = {Mohsin Ali and Abdul Razaque and Damelya M. Yeskendirova and Talgat A. Nurlybayev and Nessibeli Y. Askarbekova and Zarina A. Kashaganova}, editor = {Askar Khikmetov and Kateryna Kolesnikova and Madina T. Ipalakova}, title = {Enhancing Cloud Computing Security through AI-Based Intelligent Intrusion Detection Leveraging Neural Networks and Artificial Bee Colony Optimization}, booktitle = {Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, Science and Industry 2023, Almaty, Kazakhstan, December 6-7, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3680}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3680/S4Paper5.pdf}, timestamp = {Tue, 21 May 2024 17:19:33 +0200}, biburl = {https://dblp.org/rec/conf/dtesi/AliRYNAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/elinfocom/ChoiKLLK23, author = {Hojin Choi and Hyuk Kwon and Junghee Lee and Yonghee Lee and Kijoong Kim}, title = {Hardware-Based Isolation Technique to Guarantee Availability of Security Controls in a Gateway for Industrial Networks}, booktitle = {International Conference on Electronics, Information, and Communication, {ICEIC} 2023, Singapore, February 5-8, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICEIC57457.2023.10049871}, doi = {10.1109/ICEIC57457.2023.10049871}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/elinfocom/ChoiKLLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23, author = {Md. Nazmul Hoq and Jia Wei Yao and Suryadipta Majumdar and Luis Su{\'{a}}rez and Lingyu Wang and Amine Boukhtouta and Makan Pourzandi and Mourad Debbabi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {123--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_7}, doi = {10.1007/978-3-031-51476-0\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/LeanderJLHNP23, author = {Bj{\"{o}}rn Leander and Bjarne Johansson and Tomas Lindstr{\"{o}}m and Olof Holmgren and Thomas Nolte and Alessandro V. Papadopoulos}, title = {Dependability and Security Aspects of Network-Centric Control}, booktitle = {28th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2023, Sinaia, Romania, September 12-15, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ETFA54631.2023.10275344}, doi = {10.1109/ETFA54631.2023.10275344}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/etfa/LeanderJLHNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/AjayiMMOK23, author = {Idowu Ajayi and Yahia Medjahdi and Lina Mroueh and Olumide Okubadejo and Fatima Zohra Kaddour}, title = {Low-Complexity Neural Networks for Denoising Imperfect {CSI} in Physical Layer Security}, booktitle = {2023 Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023}, pages = {48--53}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188372}, doi = {10.1109/EUCNC/6GSUMMIT58263.2023.10188372}, timestamp = {Mon, 31 Jul 2023 13:56:43 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/AjayiMMOK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/PorambagePRTH23, author = {Pawani Porambage and Jarno Pinola and Yasintha Rumesh and Chen Tao and Jyrki Huusko}, title = {XcARet: {XAI} based Green Security Architecture for Resilient Open Radio Access Networks in 6G}, booktitle = {2023 Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023}, pages = {699--704}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188316}, doi = {10.1109/EUCNC/6GSUMMIT58263.2023.10188316}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/PorambagePRTH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/SinghAH23, author = {Rupender Singh and Ijaz Ahmad and Jyrki Huusko}, title = {The Role of Physical Layer Security in Satellite-Based Networks}, booktitle = {2023 Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023}, pages = {36--41}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188370}, doi = {10.1109/EUCNC/6GSUMMIT58263.2023.10188370}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/SinghAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/SnyderHMRK23, author = {Jacob Snyder and Lucas Hoffer and Bryan Martin and Darren Rogers and Vikram Kanth}, title = {Comparing 5G Network Latency Utilizing Native Security Algorithms}, booktitle = {2023 Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023}, pages = {532--537}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188309}, doi = {10.1109/EUCNC/6GSUMMIT58263.2023.10188309}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/SnyderHMRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euromicro/ChirivellaCiruelosG23, author = {Alejandro M. Chirivella{-}Ciruelos and Marisol Garc{\'{\i}}a{-}Valls}, title = {Automating the verification of smart contracts in blockchain networks for improving security}, booktitle = {49th Euromicro Conference on Software Engineering and Advanced Applications, {SEAA} 2023, Durres, Albania, September 6-8, 2023}, pages = {128--131}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SEAA60479.2023.00028}, doi = {10.1109/SEAA60479.2023.00028}, timestamp = {Tue, 16 Jan 2024 21:08:29 +0100}, biburl = {https://dblp.org/rec/conf/euromicro/ChirivellaCiruelosG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MillerBWSZ23, author = {Rhys Miller and Ioana Boureanu and Stephan Wesemeyer and Zhili Sun and Hemant Zope}, title = {Systematic Improvement of Access-Stratum Security in Mobile Networks}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {542--557}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00039}, doi = {10.1109/EUROSP57164.2023.00039}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MillerBWSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoapps/HassanSVPM13, author = {Mujtaba Hassan and Arish Sateesan and Jo Vliegen and Stjepan Picek and Nele Mentens}, editor = {Jo{\~{a}}o Correia and Stephen L. Smith and Raneem Qaddoura}, title = {Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications}, booktitle = {Applications of Evolutionary Computation - 26th European Conference, EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13989}, pages = {302--318}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30229-9\_20}, doi = {10.1007/978-3-031-30229-9\_20}, timestamp = {Tue, 29 Aug 2023 15:18:02 +0200}, biburl = {https://dblp.org/rec/conf/evoapps/HassanSVPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/ShresthaLL23, author = {Selina Shrestha and Willian T. Lunardi and Martin Andreoni Lopez}, editor = {Giancarlo Fortino and Valeria Loscr{\`{\i}} and Fabrizio Granelli and Tarek F. Abdelzaher and Antonella Guzzo and Claudio Savaglio}, title = {An Empirical Analysis of MeshShield: a Network Security System for Fully Distributed Networks}, booktitle = {Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, {EWSN} 2023, Rende, Italy, September 25-27, 2023}, pages = {403--408}, publisher = {{ACM}}, year = {2023}, url = {https://dl.acm.org/doi/10.5555/3639940.3640004}, doi = {10.5555/3639940.3640004}, timestamp = {Thu, 16 May 2024 19:19:26 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/ShresthaLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/RashidCLPHK23, author = {Md. Mamunur Rashid and Piljoo Choi and Suk{-}Hwan Lee and Jan Platos and Young Huh and Ki{-}Ryong Kwon}, editor = {Irfan Awan and Muhammad Younas and Markus Aleksy}, title = {Ensuring Privacy and Security of IoT Networks Utilizing Blockchain and Federated Learning}, booktitle = {10th International Conference on Future Internet of Things and Cloud, FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023}, pages = {298--305}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FiCloud58648.2023.00051}, doi = {10.1109/FICLOUD58648.2023.00051}, timestamp = {Tue, 07 May 2024 20:09:20 +0200}, biburl = {https://dblp.org/rec/conf/ficloud/RashidCLPHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/JeyasheeliDS23, author = {P. Golda Jeyasheeli and J. Deepika and R. R. Sathya}, editor = {Vikrant Bhateja and Xin{-}She Yang and Marta Campos Ferreira and Sandeep Singh Sengar and Carlos M. Travieso{-}Gonz{\'{a}}lez}, title = {Security for Software Defined Vehicular Networks}, booktitle = {Evolution in Computational Intelligence - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {370}, pages = {529--545}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6702-5\_43}, doi = {10.1007/978-981-99-6702-5\_43}, timestamp = {Tue, 28 Nov 2023 13:56:20 +0100}, biburl = {https://dblp.org/rec/conf/ficta/JeyasheeliDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/ManasaKSS23, author = {N. Manasa and Kotha Sita Kumari and P. Bhavya Sri and D. Sadhrusya}, editor = {Vikrant Bhateja and Xin{-}She Yang and Marta Campos Ferreira and Sandeep Singh Sengar and Carlos M. Travieso{-}Gonz{\'{a}}lez}, title = {Artificial Neural Network-Based Malware Detection Model Among Shopping Apps to Increase the App Security}, booktitle = {Evolution in Computational Intelligence - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {370}, pages = {267--275}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6702-5\_22}, doi = {10.1007/978-981-99-6702-5\_22}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficta/ManasaKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/QaderMAAMHR23, author = {Aryan Abdlwhab Qader and Mohammed Hasan Mutar and Sameer Alani and Waleed Khalid Al{-}Azzawi and Sarmad Nozad Mahmood and Hussein Muhi Hariz and Mustafa Asaad Rasol}, editor = {Vikrant Bhateja and Fiona Carroll and Jo{\~{a}}o Manuel R. S. Tavares and Sandeep Singh Sengar and Peter Peer}, title = {Hybrid Security Against Black Hole and Sybil Attacks in Drone-Assisted Vehicular Ad Hoc Networks}, booktitle = {Intelligent Data Engineering and Analytics - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {371}, pages = {399--413}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6706-3\_34}, doi = {10.1007/978-981-99-6706-3\_34}, timestamp = {Sun, 04 Aug 2024 19:42:19 +0200}, biburl = {https://dblp.org/rec/conf/ficta/QaderMAAMHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/VeerasamyNKSSM23, author = {B. Veerasamy and D. Nageswari and S. N. Kumar and Anil Shirgire and Ramachandran Sitharthan and A. Jasmine Gnana Malar}, editor = {Vikrant Bhateja and Fiona Carroll and Jo{\~{a}}o Manuel R. S. Tavares and Sandeep Singh Sengar and Peter Peer}, title = {An Optimized Cyber Security Framework for Network Applications}, booktitle = {Intelligent Data Engineering and Analytics - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {371}, pages = {511--518}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6706-3\_45}, doi = {10.1007/978-981-99-6706-3\_45}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ficta/VeerasamyNKSSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/FakhouriAAHAA23, author = {Hussam N. Fakhouri and Sadi Alawadi and Feras M. Awaysheh and Faten Hamad and Sawsan Al{-}Zubi and Mohammad Aladwan}, title = {An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks}, booktitle = {Eighth International Conference on Fog and Mobile Edge Computing, {FMEC} 2023, Tartu, Estonia, September 18-20, 2023}, pages = {42--51}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FMEC59375.2023.10305886}, doi = {10.1109/FMEC59375.2023.10305886}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmec/FakhouriAAHAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/YataghaWSK23, author = {Romarick Yatagha and Karl Waedt and Josef Schindler and Erkin Kirdan}, editor = {Maike Klein and Daniel Krupka and Cornelia Winter and Volker Wohlgemuth}, title = {Security challenges and best practices for resilient IIoT Networks: Network Segmentation}, booktitle = {53. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, {INFORMATIK} 2023, Designing Future - Zuk{\"{u}}nfte gestalten, Berlin, Germany September 26-29, 2023}, series = {{LNI}}, volume = {{P-337}}, pages = {2051--2070}, publisher = {Gesellschaft f{\"{u}}r Informatik, Bonn}, year = {2023}, url = {https://doi.org/10.18420/inf2023\_204}, doi = {10.18420/INF2023\_204}, timestamp = {Fri, 08 Mar 2024 15:16:29 +0100}, biburl = {https://dblp.org/rec/conf/gi/YataghaWSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AbasiAGD23, author = {Ammar Kamal Abasi and Moayad Aloqaily and Mohsen Guizani and M{\'{e}}rouane Debbah}, title = {Mitigating Security Risks in 6G Networks-Based Optimization of Deep Learning}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {7249--7254}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437026}, doi = {10.1109/GLOBECOM54140.2023.10437026}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AbasiAGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BoualouacheKSGE23, author = {Abdelwahab Boualouache and Abdelaziz Amara Korba and Sidi{-}Mohammed Senouci and Yacine Ghamri{-}Doudane and Thomas Engel}, title = {Reinforcement Learning-Based Security Orchestration for 5G-V2X Network Slicing at Cross-Borders}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {2949--2954}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437953}, doi = {10.1109/GLOBECOM54140.2023.10437953}, timestamp = {Sun, 10 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/BoualouacheKSGE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MaXTZDB23, author = {Yuanyuan Ma and Zhan Xu and Lu Tian and Ruxin Zhi and Xuhui Ding and Xiangyuan Bu}, title = {Uplink Security Analysis of Hybrid {RF-FSO} Cooperative Satellite-Aerial-Terrestrial Networks}, booktitle = {{IEEE} Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {2140--2145}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GCWkshps58843.2023.10465173}, doi = {10.1109/GCWKSHPS58843.2023.10465173}, timestamp = {Tue, 26 Mar 2024 22:14:40 +0100}, biburl = {https://dblp.org/rec/conf/globecom/MaXTZDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SangaiahCW23, author = {Arun Kumar Sangaiah and Mu Yen Chen and Hsin{-}Te Wu}, title = {Building a Smart Agricultural Product Classification System with Security Mechanism Using 5G Network}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {6407--6413}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10436921}, doi = {10.1109/GLOBECOM54140.2023.10436921}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SangaiahCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SebbarCCB23, author = {Anass Sebbar and Othmane Cherqi and Khalid Chougdali and Mohammed Boulmalf}, title = {Real-Time Anomaly Detection in {SDN} Architecture Using Integrated {SIEM} and Machine Learning for Enhancing Network Security}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {1795--1800}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10436884}, doi = {10.1109/GLOBECOM54140.2023.10436884}, timestamp = {Sun, 10 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/SebbarCCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/AdeyemoH23, author = {Adewale Adeyemo and Syed Rafay Hasan}, editor = {Himanshu Thapliyal and Ronald F. DeMara and Inna Partin{-}Vaisband and Srinivas Katkoori}, title = {Enhancing the Security of Collaborative Deep Neural Networks: An Examination of the Effect of Low Pass Filters}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI} 2023, Knoxville, TN, USA, June 5-7, 2023}, pages = {461--465}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583781.3590299}, doi = {10.1145/3583781.3590299}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/AdeyemoH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/ZhaoLWCLL23, author = {Xinjian Zhao and Qianmu Li and Qi Wang and Shi Chen and Tengfei Li and Nianzhe Li}, editor = {Hai Jin and Zhiwen Yu and Chen Yu and Xiaokang Zhou and Zeguang Lu and Xianhua Song}, title = {A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing}, booktitle = {Green, Pervasive, and Cloud Computing - 18th International Conference, {GPC} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14503}, pages = {14--29}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9893-7\_2}, doi = {10.1007/978-981-99-9893-7\_2}, timestamp = {Tue, 20 Aug 2024 07:54:45 +0200}, biburl = {https://dblp.org/rec/conf/gpc/ZhaoLWCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthcom/JiaZJ23, author = {Ruchun Jia and Jianwei Zhang and Zekun Jiang}, title = {Research on Clustering Detection Method for Security Attack Behaviors Based on Air Traffic Control Network}, booktitle = {{IEEE} International Conference on E-health Networking, Application {\&} Services, Healthcom 2023, Chongqing, China, December 15-17, 2023}, pages = {282--287}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/Healthcom56612.2023.10472388}, doi = {10.1109/HEALTHCOM56612.2023.10472388}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/healthcom/JiaZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaic/DuYKZ23, author = {Jia Du and Junqiang Yang and Wanli Kou and Huaizhe Zhou}, title = {Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security Events}, booktitle = {{IAIC} {(1)}}, pages = {333--339}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1277-9\_25}, doi = {10.1007/978-981-97-1277-9\_25}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaic/DuYKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaic/ZhangCC23, author = {Kun{-}Shan Zhang and Chiu{-}Mei Chen and Wen{-}Yu Chang}, title = {Research on the Regulation and Network Security of Smart Tourism Public Information Service Platform}, booktitle = {{IAIC} {(2)}}, pages = {209--218}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1280-9\_16}, doi = {10.1007/978-981-97-1280-9\_16}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaic/ZhangCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/IslamOUY23, author = {Md Rezanur Islam and Insu Oh and Muminov Ibrokhim Botir Ugli and Kangbin Yim}, title = {Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection}, booktitle = {Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023}, pages = {224--229}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607947.3607989}, doi = {10.1145/3607947.3607989}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3/IslamOUY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/NishaPS23, author = {T. N. Nisha and Dhanya Pramod and Ravi Singh}, title = {Zero trust security model: Defining new boundaries to organizational network}, booktitle = {Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023}, pages = {603--609}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607947.3608067}, doi = {10.1145/3607947.3608067}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3/NishaPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/GuptaRFP23, author = {Manish Kumar Gupta and Ashok Kumar Rai and Mansoor Farooq and Santhiya P.}, title = {Network Security and Protection Strategies for Big Data: Challenges and Innovations}, booktitle = {6th International Conference on Contemporary Computing and Informatics, {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023}, pages = {705--709}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC3I59117.2023.10398011}, doi = {10.1109/IC3I59117.2023.10398011}, timestamp = {Tue, 13 Feb 2024 08:24:21 +0100}, biburl = {https://dblp.org/rec/conf/ic3i/GuptaRFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/KumarPRMKKR23, author = {Rakesh Kumar and Hemant Singh Pokhariya and A Kakoli Rao and K. Mayuri and Amit Kumar and Sajeev Kumar and Ajay Rana}, title = {Role of Neural Network, Fuzzy, and loT in Integrating Artificial Intelligence as a Cyber Security System}, booktitle = {6th International Conference on Contemporary Computing and Informatics, {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023}, pages = {2599--2609}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC3I59117.2023.10397654}, doi = {10.1109/IC3I59117.2023.10397654}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3i/KumarPRMKKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/SharmaVRCKK23, author = {Himanshu Sharma and Devvret Verma and Aditya Rana and S. Lakshmana Chari and Rohit Kumar and Naveen Kumar}, title = {Enhancing Network Security in IoT Using Machine Learning- Based Anomaly Detection}, booktitle = {6th International Conference on Contemporary Computing and Informatics, {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023}, pages = {2650--2654}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC3I59117.2023.10397636}, doi = {10.1109/IC3I59117.2023.10397636}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3i/SharmaVRCKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangZSHLWL23, author = {Yixuan Wang and Bo Zhao and Zhonghao Sun and Zhihui Huo and Xueying Li and Yabiao Wu and Jiao Li}, editor = {Zahir Tari and Keqiu Li and Hongyi Wu}, title = {A Novel Network Topology Sensing Method for Network Security Situation Awareness}, booktitle = {Algorithms and Architectures for Parallel Processing - 23rd International Conference, {ICA3PP} 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14490}, pages = {82--101}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0859-8\_5}, doi = {10.1007/978-981-97-0859-8\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangZSHLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaice/LiZLCLH23, author = {Junhao Li and Jiacheng Zhou and Lei Li and Baowei Cheng and Shengfei Li and Wenhao He}, title = {Robust Detection for Adversarial Attacks - Based on a Graph Neural Network for Web Application Security Protection System}, booktitle = {Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, {ICAICE} 2023, Dalian, China, November 17-19, 2023}, pages = {927--932}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3652628.3652782}, doi = {10.1145/3652628.3652782}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaice/LiZLCLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaiic/PramitariniPSA23, author = {Yushintia Pramitarini and Ridho Hendra Yoga Perdana and Kyusung Shim and Beongku An}, title = {Exploiting {TAS} schemes to Enhance the PHY-security in Cooperative {NOMA} Networks: {A} Deep Learning Approach}, booktitle = {International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2023, Bali, Indonesia, February 20-23, 2023}, pages = {199--204}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIIC57133.2023.10067050}, doi = {10.1109/ICAIIC57133.2023.10067050}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaiic/PramitariniPSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.