Search dblp for Publications

export results for "network security"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/csi/JafarianGSA25,
  author       = {Tohid Jafarian and
                  Ali Ghaffari and
                  Ali Seyfollahi and
                  Bahman Arasteh},
  title        = {Detecting and mitigating security anomalies in Software-Defined Networking
                  {(SDN)} using Gradient-Boosted Trees and Floodlight Controller characteristics},
  journal      = {Comput. Stand. Interfaces},
  volume       = {91},
  pages        = {103871},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.csi.2024.103871},
  doi          = {10.1016/J.CSI.2024.103871},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/JafarianGSA25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SantosFMBPG25,
  author       = {Jonathan G. P. dos Santos and
                  Geraldo P. Rocha Filho and
                  Rodolfo Ipolito Meneguette and
                  Rodrigo Bonacin and
                  Gustavo Pessin and
                  Vin{\'{\i}}cius P. Gon{\c{c}}alves},
  title        = {Enhancing IoT device security in Kubernetes: An approach adopted for
                  network policies and the {SARIK} framework},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {162},
  pages        = {107485},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.future.2024.107485},
  doi          = {10.1016/J.FUTURE.2024.107485},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/SantosFMBPG25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Nguyen24,
  author       = {Huu Hoang Nguyen},
  title        = {Graph representation learning for security analytics in decentralized
                  software systems and social networks},
  school       = {Gottfried Wilhelm Leibniz Universit{\"{a}}t, Hannover, Germany},
  year         = {2024},
  url          = {https://www.repo.uni-hannover.de/handle/123456789/17473},
  urn          = {urn:nbn:de:101:1-2405230211167.474293296096},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Nguyen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/txcs/Kizza24,
  author       = {Joseph Migga Kizza},
  title        = {Guide to Computer Network Security, 6th Edition},
  series       = {Texts in Computer Science},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-47549-8},
  doi          = {10.1007/978-3-031-47549-8},
  isbn         = {978-3-031-47548-1},
  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/txcs/Kizza24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/wn/LiuS24,
  author       = {Dongxiao Liu and
                  Xuemin (Sherman) Shen},
  title        = {Blockchain-Based Data Security in Heterogeneous Communications Networks},
  series       = {Wireless Networks},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-52477-6},
  doi          = {10.1007/978-3-031-52477-6},
  isbn         = {978-3-031-52476-9},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wn/LiuS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aai/SA24,
  author       = {Aravindan S and
                  Rajaram A},
  title        = {Hybrid Secure Cluster-Based Routing Algorithm for Enhanced Security
                  and Efficiency in Mobile Ad Hoc Networks},
  journal      = {Appl. Artif. Intell.},
  volume       = {38},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1080/08839514.2024.2341357},
  doi          = {10.1080/08839514.2024.2341357},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aai/SA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AgnewAM24,
  author       = {Dennis Agnew and
                  Alvaro del Aguila and
                  Janise McNair},
  title        = {Enhanced Network Metric Prediction for Machine Learning-Based Cyber
                  Security of a Software-Defined {UAV} Relay Network},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {54202--54219},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3387728},
  doi          = {10.1109/ACCESS.2024.3387728},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AgnewAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlaroodA24,
  author       = {Ala Abdulsalam Alarood and
                  Ahmed Omar Alzahrani},
  title        = {Interoperable Defensive Strategies of Network Security Evaluation},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {33959--33971},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3373710},
  doi          = {10.1109/ACCESS.2024.3373710},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlaroodA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlkhalifaA24,
  author       = {Ibrahim Alkhalifa and
                  Ahmad S. Almogren},
  title        = {Enhancing Security and Scalability in Vehicular Networks: {A} Bayesian
                  {DAG} Blockchain Approach With Edge-Assisted {RSU}},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {116558--116571},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3429184},
  doi          = {10.1109/ACCESS.2024.3429184},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlkhalifaA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlotaibiSEAAI24,
  author       = {Saud S. Alotaibi and
                  Ahmed Sayed and
                  Elmouez Samir Abd Elhameed and
                  Omar Alghushairy and
                  Mohammed Assiri and
                  Sara Saadeldeen Ibrahim},
  title        = {Enhancing Security in IoT-Assisted {UAV} Networks Using Adaptive Mongoose
                  Optimization Algorithm With Deep Learning},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {63768--63776},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3392618},
  doi          = {10.1109/ACCESS.2024.3392618},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlotaibiSEAAI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlqahtaniAAIAA24,
  author       = {Jarallah Alqahtani and
                  Muhammad Akram and
                  Ghassan Ahmed Ali and
                  Nadeem Iqbal and
                  Ali Alqahtani and
                  Roobaea Alroobaea},
  title        = {Elevating Network Security: {A} Novel S-Box Algorithm for Robust Data
                  Encryption},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {2123--2134},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2023.3348144},
  doi          = {10.1109/ACCESS.2023.3348144},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlqahtaniAAIAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AslamTASR24,
  author       = {Muhammad Muzamil Aslam and
                  Ali Tufail and
                  Rosyzie Anna Awg Haji Mohd Apong and
                  Liyanage Chandratilake De Silva and
                  Muhammad Taqi Raza},
  title        = {Scrutinizing Security in Industrial Control Systems: An Architectural
                  Vulnerabilities and Communication Network Perspective},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {67537--67573},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3394848},
  doi          = {10.1109/ACCESS.2024.3394848},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AslamTASR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BabuRGGI24,
  author       = {S. Anantha Babu and
                  Abadhan Ranganath and
                  Manish M. Goswami and
                  T. Gnanaprakasam and
                  Mohamad Khairi Ishak},
  title        = {Modified Marine Predators Algorithm With Deep Learning-Driven Security
                  Solution for IoT-Assisted {UAV} Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {54991--54998},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3386570},
  doi          = {10.1109/ACCESS.2024.3386570},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BabuRGGI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Cao24a,
  author       = {Hui Cao},
  title        = {The Detection of Abnormal Behavior by Artificial Intelligence Algorithms
                  Under Network Security},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {118605--118617},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3436541},
  doi          = {10.1109/ACCESS.2024.3436541},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Cao24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DansanaBPQLW24,
  author       = {Debabrata Dansana and
                  Prafulla Kumar Behera and
                  S. Gopal Krishna Patro and
                  Noorulhasan Naveed Quadri and
                  Ayodele Lasisi and
                  Anteneh Wogasso Wodajo},
  title        = {{BSMACRN:} Design of an Efficient Blockchain-Based Security Model
                  for Improving Attack-Resilience of Cognitive Radio Ad-hoc Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {10047--10058},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3350739},
  doi          = {10.1109/ACCESS.2024.3350739},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DansanaBPQLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GabrDECPKA24,
  author       = {Mohamed Gabr and
                  Amr Diab and
                  Huwaida T. I. Elshoush and
                  Yen{-}Lin Chen and
                  Lip Yee Por and
                  Chin Soon Ku and
                  Wassim Alexan},
  title        = {Data Security Utilizing a Memristive Coupled Neural Network in 3D
                  Models},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {116457--116477},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3447075},
  doi          = {10.1109/ACCESS.2024.3447075},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GabrDECPKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhadiMSSSAH24,
  author       = {Yazeed Yasin Ghadi and
                  Tehseen Mazhar and
                  Tamara Al Shloul and
                  Tariq Shahzad and
                  Umair Ahmad Salaria and
                  Arfan Ahmed and
                  Habib Hamam},
  title        = {Machine Learning Solutions for the Security of Wireless Sensor Networks:
                  {A} Review},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {12699--12719},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3355312},
  doi          = {10.1109/ACCESS.2024.3355312},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GhadiMSSSAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GkonisNTSXMM24,
  author       = {Panagiotis K. Gkonis and
                  Nikolaos Nomikos and
                  Panagiotis Trakadas and
                  Lambros Sarakis and
                  George Xylouris and
                  Xavi Masip{-}Bruin and
                  Josep Martrat},
  title        = {Leveraging Network Data Analytics Function and Machine Learning for
                  Data Collection, Resource Optimization, Security and Privacy in 6G
                  Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {21320--21336},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3359992},
  doi          = {10.1109/ACCESS.2024.3359992},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GkonisNTSXMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HabibSAKBA24,
  author       = {Faiza Habib and
                  Syed Hamad Shirazi and
                  Khursheed Aurangzeb and
                  Asfandyar Khan and
                  Bharat Bhushan and
                  Musaed A. Alhussein},
  title        = {Deep Neural Networks for Enhanced Security: Detecting Metamorphic
                  Malware in IoT Devices},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {48570--48582},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3383831},
  doi          = {10.1109/ACCESS.2024.3383831},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HabibSAKBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KuriharaKT24,
  author       = {Itaru Kurihara and
                  Jun Kurihara and
                  Toshiaki Tanaka},
  title        = {A New Security Measure in Secret Sharing Schemes and Secure Network
                  Coding},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {69163--69171},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3401471},
  doi          = {10.1109/ACCESS.2024.3401471},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KuriharaKT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LavanyaHS24,
  author       = {P. Lavanya and
                  Anila Glory H. and
                  V. S. Shankar Sriram},
  title        = {Mitigating Insider Threat: {A} Neural Network Approach for Enhanced
                  Security},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {73752--73768},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3404814},
  doi          = {10.1109/ACCESS.2024.3404814},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LavanyaHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiFL24,
  author       = {Jian Li and
                  Meng Feng and
                  Shuai Li},
  title        = {A Deep Learning Cache Framework for Privacy Security on Heterogeneous
                  IoT Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {93261--93269},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3422487},
  doi          = {10.1109/ACCESS.2024.3422487},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LyuGS24,
  author       = {Minzhao Lyu and
                  Hassan Habibi Gharakheili and
                  Vijay Sivaraman},
  title        = {A Survey on Enterprise Network Security: Asset Behavioral Monitoring
                  and Distributed Attack Detection},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {89363--89383},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3419068},
  doi          = {10.1109/ACCESS.2024.3419068},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LyuGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PradhanDPH24,
  author       = {Annapurna Pradhan and
                  Susmita Das and
                  Mohammad Jalil Piran and
                  Zhu Han},
  title        = {A Survey on Physical Layer Security of Ultra/Hyper Reliable Low Latency
                  Communication in 5G and 6G Networks: Recent Advancements, Challenges,
                  and Future Directions},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {112320--112353},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3429285},
  doi          = {10.1109/ACCESS.2024.3429285},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PradhanDPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SheerazDTTSA24,
  author       = {Muhammad Sheeraz and
                  Muhammad Hanif Durad and
                  Shahzaib Tahir and
                  Hasan Tahir and
                  Saqib Saeed and
                  Abdullah Mohammed Almuhaideb},
  title        = {Advancing Snort {IPS} to Achieve Line Rate Traffic Processing for
                  Effective Network Security Monitoring},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {61848--61859},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3395123},
  doi          = {10.1109/ACCESS.2024.3395123},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SheerazDTTSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SinghSHG24,
  author       = {Virendra Singh and
                  Mahendra Pratap Singh and
                  Saumya Hegde and
                  Maanak Gupta},
  title        = {Security in 5G Network Slices: Concerns and Opportunities},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {52727--52743},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3386632},
  doi          = {10.1109/ACCESS.2024.3386632},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SinghSHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AlrashdiSAAA24,
  author       = {Ibrahim Alrashdi and
                  Karam M. Sallam and
                  Majed Abdullah Alrowaily and
                  Omar Alruwaili and
                  Bilal Arain},
  title        = {{FIDWATCH:} Federated incremental distillation for continuous monitoring
                  of IoT security threats},
  journal      = {Ad Hoc Networks},
  volume       = {165},
  pages        = {103637},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103637},
  doi          = {10.1016/J.ADHOC.2024.103637},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AlrashdiSAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/FuHLCW24,
  author       = {Yanming Fu and
                  Bocheng Huang and
                  Lin Li and
                  Jiayuan Chen and
                  Wei Wei},
  title        = {Privacy-security oriented chaotic compressed sensing data collection
                  in edge-assisted mobile crowd sensing},
  journal      = {Ad Hoc Networks},
  volume       = {160},
  pages        = {103507},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103507},
  doi          = {10.1016/J.ADHOC.2024.103507},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/FuHLCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HaddajiAF24,
  author       = {Achref Haddaji and
                  Samiha Ayed and
                  Lamia Chaari Fourati},
  title        = {A novel and efficient framework for in-vehicle security enforcement},
  journal      = {Ad Hoc Networks},
  volume       = {158},
  pages        = {103481},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103481},
  doi          = {10.1016/J.ADHOC.2024.103481},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/HaddajiAF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KampaMG24,
  author       = {Thomas Kampa and
                  Christian Klaus M{\"{u}}ller and
                  Daniel Gro{\ss}mann},
  title        = {Interlocking {IT/OT} security for edge cloud-enabled manufacturing},
  journal      = {Ad Hoc Networks},
  volume       = {154},
  pages        = {103384},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103384},
  doi          = {10.1016/J.ADHOC.2023.103384},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/KampaMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/LiLGXYZ24,
  author       = {Baogang Li and
                  Jia Liao and
                  Xi Gong and
                  Hongyin Xiang and
                  Zhi Yang and
                  Wei Zhao},
  title        = {UAV-assisted {ISAC} network physical layer security based on Stackelberg
                  game},
  journal      = {Ad Hoc Networks},
  volume       = {152},
  pages        = {103304},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103304},
  doi          = {10.1016/J.ADHOC.2023.103304},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/LiLGXYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MoundoungaS24,
  author       = {Anselme Russel Affane Moundounga and
                  Hassan Satori},
  title        = {Machine learning attack detection based-on stochastic classifier methods
                  for enhancing of routing security in wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {163},
  pages        = {103581},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103581},
  doi          = {10.1016/J.ADHOC.2024.103581},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/MoundoungaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/NasserMSO24,
  author       = {Ruba Nasser and
                  Rabeb Mizouni and
                  Shakti Singh and
                  Hadi Otrok},
  title        = {Systematic survey on artificial intelligence based mobile crowd sensing
                  and sourcing solutions: Applications and security challenges},
  journal      = {Ad Hoc Networks},
  volume       = {164},
  pages        = {103634},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103634},
  doi          = {10.1016/J.ADHOC.2024.103634},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/NasserMSO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/NawshinUHS24,
  author       = {Faria Nawshin and
                  Devrim Unal and
                  Mohammad Hammoudeh and
                  Ponnuthurai N. Suganthan},
  title        = {AI-powered malware detection with Differential Privacy for zero trust
                  security in Internet of Things networks},
  journal      = {Ad Hoc Networks},
  volume       = {161},
  pages        = {103523},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103523},
  doi          = {10.1016/J.ADHOC.2024.103523},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/NawshinUHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SarikayaB24,
  author       = {Burcu S{\"{o}}nmez Sarikaya and
                  Serif Bahtiyar},
  title        = {A survey on security of {UAV} and deep reinforcement learning},
  journal      = {Ad Hoc Networks},
  volume       = {164},
  pages        = {103642},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103642},
  doi          = {10.1016/J.ADHOC.2024.103642},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/SarikayaB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/WangZMQS24,
  author       = {Dan Wang and
                  Jincheng Zhou and
                  Mohammad Masdari and
                  Sultan Noman Qasem and
                  Biju Theruvil Sayed},
  title        = {Security in wireless body area networks via anonymous authentication:
                  Comprehensive literature review, scheme classification, and future
                  challenges},
  journal      = {Ad Hoc Networks},
  volume       = {153},
  pages        = {103332},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103332},
  doi          = {10.1016/J.ADHOC.2023.103332},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/WangZMQS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhangXGMX24,
  author       = {Han Zhang and
                  Jianbin Xue and
                  Xiangrui Guan and
                  Zerou Ma and
                  Jialing Xu},
  title        = {An optimization scheme of data link security transmission based on
                  mobile edge computing},
  journal      = {Ad Hoc Networks},
  volume       = {162},
  pages        = {103556},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103556},
  doi          = {10.1016/J.ADHOC.2024.103556},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhangXGMX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhaoHHLWF24,
  author       = {Junhui Zhao and
                  Fanwei Huang and
                  Huanhuan Hu and
                  Longxia Liao and
                  Dongming Wang and
                  Lisheng Fan},
  title        = {User security authentication protocol in multi gateway scenarios of
                  the Internet of Things},
  journal      = {Ad Hoc Networks},
  volume       = {156},
  pages        = {103427},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103427},
  doi          = {10.1016/J.ADHOC.2024.103427},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhaoHHLWF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/MattosPF24,
  author       = {Diogo Menezes Ferrazani Mattos and
                  Marc{-}Oliver Pahl and
                  Carol Fung},
  title        = {CSNet 2022 special issue - decentralized and data-driven security
                  in networking},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {79},
  number       = {7-8},
  pages        = {455--456},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12243-024-01049-x},
  doi          = {10.1007/S12243-024-01049-X},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/MattosPF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aei/ShahinMHC24,
  author       = {Mohammad Shahin and
                  Mazdak Maghanaki and
                  Ali Hosseinzadeh and
                  F. Frank Chen},
  title        = {Advancing Network Security in Industrial IoT: {A} Deep Dive into AI-Enabled
                  Intrusion Detection Systems},
  journal      = {Adv. Eng. Informatics},
  volume       = {62},
  pages        = {102685},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.aei.2024.102685},
  doi          = {10.1016/J.AEI.2024.102685},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aei/ShahinMHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/GuanZZC24,
  author       = {Faqian Guan and
                  Tianqing Zhu and
                  Wanlei Zhou and
                  Kim{-}Kwang Raymond Choo},
  title        = {Graph neural networks: a survey on the links between privacy and security},
  journal      = {Artif. Intell. Rev.},
  volume       = {57},
  number       = {2},
  pages        = {40},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10462-023-10656-4},
  doi          = {10.1007/S10462-023-10656-4},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/GuanZZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/AlkhamisiKB24,
  author       = {Abrar Omar Alkhamisi and
                  Iyad A. Katib and
                  Seyed M. Buhari},
  title        = {Federated Learning-Based Security Attack Detection for Multi-Controller
                  Software-Defined Networks},
  journal      = {Algorithms},
  volume       = {17},
  number       = {7},
  pages        = {290},
  year         = {2024},
  url          = {https://doi.org/10.3390/a17070290},
  doi          = {10.3390/A17070290},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithms/AlkhamisiKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/CuiLDJYW24,
  author       = {Guanghai Cui and
                  Jun{-}Li Li and
                  Kun{-}Xiang Dong and
                  Xing Jin and
                  Hong{-}Yong Yang and
                  Zhen Wang},
  title        = {Influence of subsidy policies against insurances on controlling the
                  propagation of epidemic security risks in networks},
  journal      = {Appl. Math. Comput.},
  volume       = {476},
  pages        = {128797},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.amc.2024.128797},
  doi          = {10.1016/J.AMC.2024.128797},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/CuiLDJYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/annals/Vagts24,
  author       = {Brian K. Vagts},
  title        = {Telenet, the 1983 Hacking Incidents, and the Construction of Network
                  Security in the United States},
  journal      = {{IEEE} Ann. Hist. Comput.},
  volume       = {46},
  number       = {1},
  pages        = {34--47},
  year         = {2024},
  url          = {https://doi.org/10.1109/MAHC.2023.3347632},
  doi          = {10.1109/MAHC.2023.3347632},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/annals/Vagts24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/HassanSVPM24,
  author       = {Mujtaba Hassan and
                  Arish Sateesan and
                  Jo Vliegen and
                  Stjepan Picek and
                  Nele Mentens},
  title        = {A Genetic Programming approach for hardware-oriented hash functions
                  for network security applications},
  journal      = {Appl. Soft Comput.},
  volume       = {165},
  pages        = {112078},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.112078},
  doi          = {10.1016/J.ASOC.2024.112078},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/HassanSVPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/SarveshwaranPBGS24,
  author       = {Velliangiri Sarveshwaran and
                  Shanthini Pandiaraj and
                  Garikapati Bindu and
                  Vithya Ganesan and
                  Iwin Thanakumar Joseph Swamidason},
  title        = {Binarized Spiking Neural Network with blockchain based intrusion detection
                  framework for enhancing privacy and security in cloud computing environment},
  journal      = {Appl. Soft Comput.},
  volume       = {154},
  pages        = {111218},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2023.111218},
  doi          = {10.1016/J.ASOC.2023.111218},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/SarveshwaranPBGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/SunLM24a,
  author       = {Le Sun and
                  Yuhang Li and
                  Ghulam Muhammad},
  title        = {Soft computing-driven infrared and visible image fusion network for
                  security application service},
  journal      = {Appl. Soft Comput.},
  volume       = {165},
  pages        = {112114},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2024.112114},
  doi          = {10.1016/J.ASOC.2024.112114},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/SunLM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KimOTU24,
  author       = {Jiwon Kim and
                  Hamed Okhravi and
                  Dave (Jing) Tian and
                  Benjamin E. Ujcich},
  title        = {Security Challenges of Intent-Based Networking},
  journal      = {Commun. {ACM}},
  volume       = {67},
  number       = {7},
  pages        = {56--65},
  year         = {2024},
  url          = {https://doi.org/10.1145/3639702},
  doi          = {10.1145/3639702},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/KimOTU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DuanWZL24,
  author       = {Ying Duan and
                  Qingtao Wu and
                  Xuezhuan Zhao and
                  Xiaoyu Li},
  title        = {Mobile edge computing based cognitive network security analysis using
                  multi agent machine learning techniques in {B5G}},
  journal      = {Comput. Electr. Eng.},
  volume       = {117},
  pages        = {109181},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109181},
  doi          = {10.1016/J.COMPELECENG.2024.109181},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/DuanWZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Fei24,
  author       = {Wang Fei},
  title        = {Research on optimization algorithms for artificial intelligence network
                  security management based on All {IP} Internet of Things fusion technology},
  journal      = {Comput. Electr. Eng.},
  volume       = {115},
  pages        = {109105},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109105},
  doi          = {10.1016/J.COMPELECENG.2024.109105},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/Fei24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiuSCL24,
  author       = {Ruixiao Liu and
                  Jing Shi and
                  Xingyu Chen and
                  Cuiying Lu},
  title        = {Network anomaly detection and security defense technology based on
                  machine learning: {A} review},
  journal      = {Comput. Electr. Eng.},
  volume       = {119},
  pages        = {109581},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109581},
  doi          = {10.1016/J.COMPELECENG.2024.109581},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LiuSCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ZhangYA24,
  author       = {Shengcai Zhang and
                  Huiju Yi and
                  Dezhi An},
  title        = {VTion-PatchTST: Elevated PatchTST model for network security situation
                  prediction},
  journal      = {Comput. Electr. Eng.},
  volume       = {118},
  pages        = {109393},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109393},
  doi          = {10.1016/J.COMPELECENG.2024.109393},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ZhangYA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/Jiang24,
  author       = {Qingjian Jiang},
  title        = {Communication network security situation analysis based on time series
                  data mining technology},
  journal      = {Open Comput. Sci.},
  volume       = {14},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/comp-2023-0104},
  doi          = {10.1515/COMP-2023-0104},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejcs/Jiang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/LuWJ24,
  author       = {Haifeng Lu and
                  Haiwei Wu and
                  Ru Jing},
  title        = {Evaluation of Internet of Things computer network security and remote
                  control technology},
  journal      = {Open Comput. Sci.},
  volume       = {14},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/comp-2024-0004},
  doi          = {10.1515/COMP-2024-0004},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejcs/LuWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/MohyEddineGBA24,
  author       = {Mouaad Mohy{-}Eddine and
                  Azidine Guezzaz and
                  Said Benkirane and
                  Mourade Azrour},
  title        = {Malicious detection model with artificial neural network in IoT-based
                  smart farming security},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {6},
  pages        = {7307--7322},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-024-04334-5},
  doi          = {10.1007/S10586-024-04334-5},
  timestamp    = {Fri, 13 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/MohyEddineGBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/NazirHZAP24,
  author       = {Ahsan Nazir and
                  Jingsha He and
                  Nafei Zhu and
                  Muhammad Shahid Anwar and
                  Muhammad Salman Pathan},
  title        = {Enhancing IoT security: a collaborative framework integrating federated
                  learning, dense neural networks, and blockchain},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {6},
  pages        = {8367--8392},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-024-04436-0},
  doi          = {10.1007/S10586-024-04436-0},
  timestamp    = {Fri, 13 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/NazirHZAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AliGLD24,
  author       = {Belal Ali and
                  Mark A. Gregory and
                  Shuo Li and
                  Omar Amjad Dib},
  title        = {Implementing zero trust security with dual fuzzy methodology for trust-aware
                  authentication and task offloading in Multi-access Edge Computing},
  journal      = {Comput. Networks},
  volume       = {241},
  pages        = {110197},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110197},
  doi          = {10.1016/J.COMNET.2024.110197},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AliGLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/EspinLM24,
  author       = {Jos{\'{e}} Antonio Parra Esp{\'{\i}}n and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Gabriel L{\'{o}}pez Mill{\'{a}}n},
  title        = {Establishment of IPsec Security Associations with Diffie-Hellman following
                  a SDN-based framework: Analysis and practical validation},
  journal      = {Comput. Networks},
  volume       = {253},
  pages        = {110720},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110720},
  doi          = {10.1016/J.COMNET.2024.110720},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/EspinLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Haddad24,
  author       = {Zaher Haddad},
  title        = {Enhancing privacy and security in 5G networks with an anonymous handover
                  protocol based on Blockchain and Zero Knowledge Proof},
  journal      = {Comput. Networks},
  volume       = {250},
  pages        = {110544},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110544},
  doi          = {10.1016/J.COMNET.2024.110544},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Haddad24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HeWZXXW24,
  author       = {Yunhua He and
                  Shuang Wang and
                  Zhihao Zhou and
                  Ke Xiao and
                  Anke Xie and
                  Bin Wu},
  title        = {A Blockchain-based carbon emission security accounting scheme},
  journal      = {Comput. Networks},
  volume       = {243},
  pages        = {110304},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110304},
  doi          = {10.1016/J.COMNET.2024.110304},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HeWZXXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KazmiQHNA24,
  author       = {Syed Hussain Ali Kazmi and
                  Faizan Qamar and
                  Rosilah Hassan and
                  Kashif Nisar and
                  Mohammed Azmi Al{-}Betar},
  title        = {Security of federated learning in 6G era: {A} review on conceptual
                  techniques and software platforms used for research and analysis},
  journal      = {Comput. Networks},
  volume       = {245},
  pages        = {110358},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110358},
  doi          = {10.1016/J.COMNET.2024.110358},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KazmiQHNA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KimSLNYPGS24,
  author       = {Jinwoo Kim and
                  Minjae Seo and
                  Seungsoo Lee and
                  Jaehyun Nam and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu and
                  Seungwon Shin},
  title        = {Enhancing security in {SDN:} Systematizing attacks and defenses from
                  a penetration perspective},
  journal      = {Comput. Networks},
  volume       = {241},
  pages        = {110203},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110203},
  doi          = {10.1016/J.COMNET.2024.110203},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KimSLNYPGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KumarC24,
  author       = {Naveen Kumar and
                  Ankit Chaudhary},
  title        = {Surveying cybersecurity vulnerabilities and countermeasures for enhancing
                  {UAV} security},
  journal      = {Comput. Networks},
  volume       = {252},
  pages        = {110695},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110695},
  doi          = {10.1016/J.COMNET.2024.110695},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KumarC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MohammedFF24,
  author       = {Ahmed Burhan Mohammed and
                  Lamia Chaari Fourati and
                  Ahmed Fakhrudeen},
  title        = {Comprehensive systematic review of intelligent approaches in UAV-based
                  intrusion detection, blockchain, and network security},
  journal      = {Comput. Networks},
  volume       = {239},
  pages        = {110140},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2023.110140},
  doi          = {10.1016/J.COMNET.2023.110140},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MohammedFF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PhamHTQTD24,
  author       = {Van{-}Hau Pham and
                  Hien Do Hoang and
                  Phan Thanh Trung and
                  Van Dinh Quoc and
                  Trong{-}Nghia To and
                  Phan The Duy},
  title        = {Raiju: Reinforcement learning-guided post-exploitation for automating
                  security assessment of network systems},
  journal      = {Comput. Networks},
  volume       = {253},
  pages        = {110706},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110706},
  doi          = {10.1016/J.COMNET.2024.110706},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PhamHTQTD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PittalaRSDMPC24,
  author       = {Gaetano Francesco Pittal{\`{a}} and
                  Lorenzo Rinieri and
                  Amir Al Sadi and
                  Gianluca Davoli and
                  Andrea Melis and
                  Marco Prandini and
                  Walter Cerroni},
  title        = {Leveraging Data Plane Programmability to enhance service orchestration
                  at the edge: {A} focus on industrial security},
  journal      = {Comput. Networks},
  volume       = {246},
  pages        = {110397},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110397},
  doi          = {10.1016/J.COMNET.2024.110397},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PittalaRSDMPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RzepkaSCM24,
  author       = {Karol Rzepka and
                  Przemyslaw Szary and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Performance evaluation of Raspberry Pi 4 and {STM32} Nucleo boards
                  for security-related operations in IoT environments},
  journal      = {Comput. Networks},
  volume       = {242},
  pages        = {110252},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110252},
  doi          = {10.1016/J.COMNET.2024.110252},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/RzepkaSCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangZWWH24,
  author       = {Jitao Wang and
                  Bo Zhang and
                  Kai Wang and
                  Yuzhou Wang and
                  Weili Han},
  title        = {BFTDiagnosis: An automated security testing framework with malicious
                  behavior injection for {BFT} protocols},
  journal      = {Comput. Networks},
  volume       = {249},
  pages        = {110404},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110404},
  doi          = {10.1016/J.COMNET.2024.110404},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/WangZWWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/XavierDMR24,
  author       = {Bruno Missi Xavier and
                  Merim Dzaferagic and
                  Magnos Martinello and
                  Marco Ruffini},
  title        = {Performance measurement dataset for open {RAN} with user mobility
                  and security threats},
  journal      = {Comput. Networks},
  volume       = {253},
  pages        = {110710},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110710},
  doi          = {10.1016/J.COMNET.2024.110710},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/XavierDMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangZL24,
  author       = {Shunliang Zhang and
                  Dali Zhu and
                  Yinlong Liu},
  title        = {Artificial intelligence empowered physical layer security for 6G:
                  State-of-the-art, challenges, and opportunities},
  journal      = {Comput. Networks},
  volume       = {242},
  pages        = {110255},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110255},
  doi          = {10.1016/J.COMNET.2024.110255},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/LiuL0KS24,
  author       = {Zhengli Liu and
                  Mengzhuo Luo and
                  Jun Cheng and
                  Iyad A. Katib and
                  Kaibo Shi},
  title        = {Security synchronization problem for stochastic complex networks via
                  event-triggered impulsive control with actuation delays},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {133},
  pages        = {107958},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cnsns.2024.107958},
  doi          = {10.1016/J.CNSNS.2024.107958},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/LiuL0KS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Abdallah24,
  author       = {Walid Abdallah},
  title        = {A physical layer security scheme for 6G wireless networks using post-quantum
                  cryptography},
  journal      = {Comput. Commun.},
  volume       = {218},
  pages        = {176--187},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.02.019},
  doi          = {10.1016/J.COMCOM.2024.02.019},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Abdallah24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/IoannouNABKMV24,
  author       = {Iacovos Ioannou and
                  Prabagarane Nagaradjane and
                  Pelin Angin and
                  Palaniappan Balasubramanian and
                  Karthick Jeyagopal Kavitha and
                  Palani Murugan and
                  Vasos Vassiliou},
  title        = {{GEMLIDS-MIOT:} {A} Green Effective Machine Learning Intrusion Detection
                  System based on Federated Learning for Medical IoT network security
                  hardening},
  journal      = {Comput. Commun.},
  volume       = {218},
  pages        = {209--239},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.02.023},
  doi          = {10.1016/J.COMCOM.2024.02.023},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/IoannouNABKMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangWL24,
  author       = {Yubian Wang and
                  Zhongsheng Wang and
                  Xiang Liu},
  title        = {Key security measurement method of authentication based on mobile
                  edge computing in urban rail transit communication network},
  journal      = {Comput. Commun.},
  volume       = {215},
  pages        = {140--149},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2023.12.020},
  doi          = {10.1016/J.COMCOM.2023.12.020},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/WangWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XuLL24,
  author       = {Meng Xu and
                  Shenghan Liu and
                  Xuewu Li},
  title        = {Network security situation assessment and prediction method based
                  on multimodal transformation in edge computing},
  journal      = {Comput. Commun.},
  volume       = {215},
  pages        = {103--111},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2023.12.014},
  doi          = {10.1016/J.COMCOM.2023.12.014},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/XuLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZengZTS24,
  author       = {Yanyang Zeng and
                  Dawei Zhang and
                  Kai Tang and
                  Jiangfeng Sun},
  title        = {Security analysis and prediction of multi-relay networks over Fisher-Snedecor
                  {F} fading channels},
  journal      = {Comput. Commun.},
  volume       = {222},
  pages        = {150--160},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.032},
  doi          = {10.1016/J.COMCOM.2024.04.032},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZengZTS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AllenMVG24,
  author       = {Ashley Allen and
                  Alexios Mylonas and
                  Stilianos Vidalis and
                  Dimitris Gritzalis},
  title        = {Smart homes under siege: Assessing the robustness of physical security
                  against wireless network attacks},
  journal      = {Comput. Secur.},
  volume       = {139},
  pages        = {103687},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103687},
  doi          = {10.1016/J.COSE.2023.103687},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AllenMVG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaseriCH24,
  author       = {Yaser Baseri and
                  Vikas Chouhan and
                  Abdelhakim Hafid},
  title        = {Navigating quantum security risks in networked environments: {A} comprehensive
                  study of quantum-safe network protocols},
  journal      = {Comput. Secur.},
  volume       = {142},
  pages        = {103883},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103883},
  doi          = {10.1016/J.COSE.2024.103883},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaseriCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JethavaR24,
  author       = {Gordhan Jethava and
                  Udai Pratap Rao},
  title        = {Exploring security and trust mechanisms in online social networks:
                  An extensive review},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103790},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103790},
  doi          = {10.1016/J.COSE.2024.103790},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JethavaR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JoseGSC24,
  author       = {G. Sahaya Stalin Jose and
                  Sugitha G and
                  Ayshwarya Lakshmi S and
                  Preethi Bangalore Chaluvaraj},
  title        = {Self-Attention conditional generative adversarial network optimised
                  with crayfish optimization algorithm for improving cyber security
                  in cloud computing},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103773},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103773},
  doi          = {10.1016/J.COSE.2024.103773},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JoseGSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KuznetsovZFM24,
  author       = {Oleksandr Kuznetsov and
                  Dmytro Zakharov and
                  Emanuele Frontoni and
                  Andrea Maranesi},
  title        = {AttackNet: Enhancing biometric security via tailored convolutional
                  neural network architectures for liveness detection},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103828},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103828},
  doi          = {10.1016/J.COSE.2024.103828},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KuznetsovZFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LimYLT24,
  author       = {Willone Lim and
                  Kelvin Sheng Chek Yong and
                  Bee Theng Lau and
                  Colin Choon Lin Tan},
  title        = {Future of generative adversarial networks {(GAN)} for anomaly detection
                  in network security: {A} review},
  journal      = {Comput. Secur.},
  volume       = {139},
  pages        = {103733},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103733},
  doi          = {10.1016/J.COSE.2024.103733},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LimYLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengKH24,
  author       = {Yunfei Meng and
                  Changbo Ke and
                  Zhiqiu Huang},
  title        = {A model transformation based security policy automatic management
                  framework for software-defined networking},
  journal      = {Comput. Secur.},
  volume       = {142},
  pages        = {103850},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103850},
  doi          = {10.1016/J.COSE.2024.103850},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengKH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RKAK24,
  author       = {Uma Mageswari R and
                  N. Zafar Ali Khan and
                  M. M. Gowthul Alam and
                  S. Jerald Nirmal Kumar},
  title        = {Addressing security challenges in industry 4.0: {AVA-MA} approach
                  for strengthening SDN-IoT network security},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103907},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103907},
  doi          = {10.1016/J.COSE.2024.103907},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RKAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SumanK24,
  author       = {Suman and
                  Raees Ahmad Khan},
  title        = {An optimized neural network for prediction of security threats on
                  software testing},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103626},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103626},
  doi          = {10.1016/J.COSE.2023.103626},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SumanK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuCZZ24,
  author       = {Zhengwei Zhu and
                  Miaojie Chen and
                  Chenyang Zhu and
                  Yanping Zhu},
  title        = {Effective defense strategies in network security using improved double
                  dueling deep Q-network},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103578},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103578},
  doi          = {10.1016/J.COSE.2023.103578},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuCZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/Nedyalkov24,
  author       = {Ivan Nedyalkov},
  title        = {Study the Level of Network Security and Penetration Tests on Power
                  Electronic Device},
  journal      = {Comput.},
  volume       = {13},
  number       = {3},
  pages        = {81},
  year         = {2024},
  url          = {https://doi.org/10.3390/computers13030081},
  doi          = {10.3390/COMPUTERS13030081},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/Nedyalkov24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/DhanarajSN24,
  author       = {Rajesh Kumar Dhanaraj and
                  Anamika Singh and
                  Anand Nayyar},
  title        = {Matyas-Meyer Oseas based device profiling for anomaly detection via
                  deep reinforcement learning {(MMODPAD-DRL)} in zero trust security
                  network},
  journal      = {Computing},
  volume       = {106},
  number       = {6},
  pages        = {1933--1962},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00607-024-01269-y},
  doi          = {10.1007/S00607-024-01269-Y},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/DhanarajSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/LiXLCZLK24,
  author       = {Yanlu Li and
                  Yufeng Xiao and
                  Wei Liang and
                  Jiahong Cai and
                  Ronglin Zhang and
                  Kuan{-}Ching Li and
                  Muhammad Khurram Khan},
  title        = {The security and privacy challenges toward cybersecurity of 6G networks:
                  {A} comprehensive review},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {21},
  number       = {3},
  pages        = {851--897},
  year         = {2024},
  url          = {https://doi.org/10.2298/csis230804016l},
  doi          = {10.2298/CSIS230804016L},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/LiXLCZLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/AliNKH24,
  author       = {Mansoor Ali and
                  Faisal Naeem and
                  Georges Kaddoum and
                  Ekram Hossain},
  title        = {Metaverse Communications, Networking, Security, and Applications:
                  Research Issues, State-of-the-Art, and Future Directions},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {26},
  number       = {2},
  pages        = {1238--1278},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMST.2023.3347172},
  doi          = {10.1109/COMST.2023.3347172},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/AliNKH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/AlwisPDGL24,
  author       = {Chamitha de Alwis and
                  Pawani Porambage and
                  Kapal Dev and
                  Thippa Reddy Gadekallu and
                  Madhusanka Liyanage},
  title        = {A Survey on Network Slicing Security: Attacks, Challenges, Solutions
                  and Research Directions},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {26},
  number       = {1},
  pages        = {534--570},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMST.2023.3312349},
  doi          = {10.1109/COMST.2023.3312349},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/AlwisPDGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ChaoXGZZZ24,
  author       = {Daichong Chao and
                  Dawei Xu and
                  Feng Gao and
                  Chuan Zhang and
                  Weiting Zhang and
                  Liehuang Zhu},
  title        = {A Systematic Survey on Security in Anonymity Networks: Vulnerabilities,
                  Attacks, Defenses, and Formalization},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {26},
  number       = {3},
  pages        = {1775--1829},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMST.2024.3350006},
  doi          = {10.1109/COMST.2024.3350006},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/ChaoXGZZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/IlliQAAARMRAA24,
  author       = {Elmehdi Illi and
                  Marwa K. Qaraqe and
                  Saud Althunibat and
                  Abdullah Al{-}Hasanat and
                  Moath Alsafasfeh and
                  Marcus de Ree and
                  Georgios Mantas and
                  Jonathan Rodriguez and
                  Waqas Aman and
                  Saif Al{-}Kuwari},
  title        = {Physical Layer Security for Authentication, Confidentiality, and Malicious
                  Node Detection: {A} Paradigm Shift in Securing IoT Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {26},
  number       = {1},
  pages        = {347--388},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMST.2023.3327327},
  doi          = {10.1109/COMST.2023.3327327},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/IlliQAAARMRAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AmirthabaiMSN24,
  author       = {Subasini Chellathurai Amirthabai and
                  Udita Malhotra and
                  Thapasimuthu Rajeswari Saravanan and
                  Sudhahar Thachankurichy Natesan},
  title        = {Healthcare security in cloud-based wireless sensor networks: Botnet
                  attack detection via autoencoder-aided goal-based artificial intelligent
                  agent},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {19},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.8152},
  doi          = {10.1002/CPE.8152},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/AmirthabaiMSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ShekhawatG24,
  author       = {Hema Shekhawat and
                  Daya Sagar Gupta},
  title        = {A survey on lattice-based security and authentication schemes for
                  smart-grid networks in the post-quantum era},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {14},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.8080},
  doi          = {10.1002/CPE.8080},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ShekhawatG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/MeenakshiK24,
  author       = {B. Meenakshi and
                  D. Karunkuzhali},
  title        = {Enhancing cyber security in {WSN} using optimized self-attention-based
                  provisional variational auto-encoder generative adversarial network},
  journal      = {Comput. Stand. Interfaces},
  volume       = {88},
  pages        = {103802},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103802},
  doi          = {10.1016/J.CSI.2023.103802},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/MeenakshiK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AlshammariSANAAAAAA24,
  author       = {Nasser O. Alshammari and
                  Shumaila Shahzadi and
                  Saad Awadh Alanazi and
                  Shahid Naseem and
                  Muhammad Anwar and
                  Maddalah Alruwaili and
                  Muhammad Rizwan Abid and
                  Omar Alruwali and
                  Ahmed Alsayat and
                  Fahad Ahmad},
  title        = {Security Monitoring and Management for the Network Services in the
                  Orchestration of {SDN-NFV} Environment Using Machine Learning Techniques},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {48},
  number       = {2},
  pages        = {363--394},
  year         = {2024},
  url          = {https://doi.org/10.32604/csse.2023.040721},
  doi          = {10.32604/CSSE.2023.040721},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/AlshammariSANAAAAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/GanguliSGB24,
  author       = {Chirag Ganguli and
                  Shishir Kumar Shandilya and
                  Michal Gregus and
                  Oleh Basystiuk},
  title        = {Adaptive Network Sustainability and Defense Based on Artificial Bees
                  Colony Optimization Algorithm for Nature Inspired Cyber Security},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {48},
  number       = {3},
  pages        = {739--758},
  year         = {2024},
  url          = {https://doi.org/10.32604/csse.2024.042607},
  doi          = {10.32604/CSSE.2024.042607},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/GanguliSGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BringhentiMSV24,
  author       = {Daniele Bringhenti and
                  Guido Marchetto and
                  Riccardo Sisto and
                  Fulvio Valenza},
  title        = {Automation for Network Security Configuration: State of the Art and
                  Research Trends},
  journal      = {{ACM} Comput. Surv.},
  volume       = {56},
  number       = {3},
  pages        = {57:1--57:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3616401},
  doi          = {10.1145/3616401},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BringhentiMSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/AchaalABIA24,
  author       = {Batoul Achaal and
                  Mehdi Adda and
                  Maxime Berger and
                  Hussein Ibrahim and
                  Ali Awde},
  title        = {Study of smart grid cyber-security, examining architectures, communication
                  networks, cyber-attacks, countermeasure techniques, and challenges},
  journal      = {Cybersecur.},
  volume       = {7},
  number       = {1},
  pages        = {10},
  year         = {2024},
  url          = {https://doi.org/10.1186/s42400-023-00200-w},
  doi          = {10.1186/S42400-023-00200-W},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/AchaalABIA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/Glisic24,
  author       = {Savo Glisic},
  title        = {Quantum vs post-quantum security for future networks: Survey},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100039},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100039},
  doi          = {10.1016/J.CSA.2024.100039},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/Glisic24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/LiuYWS24,
  author       = {Zhaowei Liu and
                  Dong Yang and
                  Shenqiang Wang and
                  Hang Su},
  title        = {Adaptive multi-channel Bayesian graph attention network for IoT transaction
                  security},
  journal      = {Digit. Commun. Networks},
  volume       = {10},
  number       = {3},
  pages        = {631--644},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dcan.2022.11.018},
  doi          = {10.1016/J.DCAN.2022.11.018},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/LiuYWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Chen24,
  title        = {Retraction Note: The design of network security protection trust management
                  system based on an improved hidden Markov model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {18},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00167-2},
  doi          = {10.1186/S13635-024-00167-2},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Chen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lan24a,
  title        = {Retraction Note: Network security threat detection technology based
                  on {EPSO-BP} algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {11},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00161-8},
  doi          = {10.1186/S13635-024-00161-8},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lan24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ShiHZS24,
  author       = {Chenhao Shi and
                  Yulin Hu and
                  Yao Zhu and
                  Anke Schmeink},
  title        = {Security-aware energy-efficient design for mobile edge computing network
                  operating with finite blocklength codes},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2024},
  number       = {1},
  pages        = {67},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13638-024-02395-z},
  doi          = {10.1186/S13638-024-02395-Z},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ShiHZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ZhaiZTZSZBH24,
  title        = {Retraction Note: Hybrid traffic security shaping scheme combining
                  {TAS} and {CQSF} of time-sensitive networks in smart grid},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2024},
  number       = {1},
  pages        = {25},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13638-024-02360-w},
  doi          = {10.1186/S13638-024-02360-W},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ZhaiZTZSZBH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/YangZLXY24,
  author       = {Guozheng Yang and
                  Yongheng Zhang and
                  Yuliang Lu and
                  Yi Xie and
                  Jiayi Yu},
  title        = {Research on a Critical Link Discovery Method for Network Security
                  Situational Awareness},
  journal      = {Entropy},
  volume       = {26},
  number       = {4},
  pages        = {315},
  year         = {2024},
  url          = {https://doi.org/10.3390/e26040315},
  doi          = {10.3390/E26040315},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/YangZLXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/NagurneyHNM24,
  author       = {Anna Nagurney and
                  Dana Hassani and
                  Oleg Nivievskyi and
                  Pavlo Martyshev},
  title        = {Multicommodity international agricultural trade network equilibrium:
                  Competition for limited production and transportation capacity under
                  disaster scenarios with implications for food security},
  journal      = {Eur. J. Oper. Res.},
  volume       = {314},
  number       = {3},
  pages        = {1127--1142},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ejor.2023.11.010},
  doi          = {10.1016/J.EJOR.2023.11.010},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eor/NagurneyHNM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BezerraVS24,
  author       = {Carlos Daniel de Sousa Bezerra and
                  Fl{\'{a}}vio Henrique Teles Vieira and
                  Anderson da Silva Soares},
  title        = {Deep-Q-Network hybridization with extended Kalman filter for accelerate
                  learning in autonomous navigation with auxiliary security module},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4946},
  doi          = {10.1002/ETT.4946},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/BezerraVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HuangZCH24,
  author       = {Xueda Huang and
                  Kuanlei Zheng and
                  Sisi Chen and
                  Zhaoren He},
  title        = {Construction of switch information security protection system based
                  on software-defined networking},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {9},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.5033},
  doi          = {10.1002/ETT.5033},
  timestamp    = {Tue, 17 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/HuangZCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/RahmanKMIKHKNP24,
  author       = {Anichur Rahman and
                  Md. Saikat Islam Khan and
                  Antonio Montieri and
                  Md. Jahidul Islam and
                  Md. Razaul Karim and
                  Mahedi Hasan and
                  Dipanjali Kundu and
                  Mostofa Kamal Nasir and
                  Antonio Pescap{\`{e}}},
  title        = {BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN
                  with ML-based bandwidth prediction},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4965},
  doi          = {10.1002/ETT.4965},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/RahmanKMIKHKNP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/WangYSS24,
  author       = {Fei Wang and
                  Nan Yang and
                  Pethuraj Mohamed Shakeel and
                  Vijayalakshmi Saravanan},
  title        = {Machine learning for mobile network payment security evaluation system},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4226},
  doi          = {10.1002/ETT.4226},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/WangYSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcomp/MoyleMA24,
  author       = {Steve Moyle and
                  Andrew P. Martin and
                  Nicholas Allott},
  title        = {{XAI} Human-Machine collaboration applied to network security},
  journal      = {Frontiers Comput. Sci.},
  volume       = {6},
  year         = {2024},
  url          = {https://doi.org/10.3389/fcomp.2024.1321238},
  doi          = {10.3389/FCOMP.2024.1321238},
  timestamp    = {Mon, 08 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcomp/MoyleMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JaveedSAAKI24,
  author       = {Danish Javeed and
                  Muhammad Shahid Saeed and
                  Ijaz Ahmad and
                  Muhammad Adil and
                  Prabhat Kumar and
                  A. K. M. Najmul Islam},
  title        = {Quantum-empowered federated learning and 6G wireless networks for
                  IoT security: Concept, challenges and future directions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {160},
  pages        = {577--597},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2024.06.023},
  doi          = {10.1016/J.FUTURE.2024.06.023},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/JaveedSAAKI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/CunhaFCONNSS24,
  author       = {Jos{\'{e}} Cunha and
                  Pedro Ferreira and
                  Eva M. Castro and
                  Paula Cristina Oliveira and
                  Maria Jo{\~{a}}o Nicolau and
                  Iv{\'{a}}n N{\'{u}}{\~{n}}ez and
                  Xos{\'{e}} Ram{\'{o}}n Sousa and
                  Carlos Ser{\^{o}}dio},
  title        = {Enhancing Network Slicing Security: Machine Learning, Software-Defined
                  Networking, and Network Functions Virtualization-Driven Strategies},
  journal      = {Future Internet},
  volume       = {16},
  number       = {7},
  pages        = {226},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16070226},
  doi          = {10.3390/FI16070226},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/CunhaFCONNSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/GentileMGF24,
  author       = {Antonio Francesco Gentile and
                  Davide Macr{\`{\i}} and
                  Emilio Greco and
                  Peppino Fazio},
  title        = {Overlay and Virtual Private Networks Security Performances Analysis
                  with Open Source Infrastructure Deployment},
  journal      = {Future Internet},
  volume       = {16},
  number       = {8},
  pages        = {283},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16080283},
  doi          = {10.3390/FI16080283},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/GentileMGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/TanDW24,
  author       = {Wuzheng Tan and
                  Shenglong Du and
                  Jian Weng},
  title        = {Enhancing Efficiency and Security in Unbalanced {PSI-CA} Protocols
                  through Cloud Computing and Homomorphic Encryption in Mobile Networks},
  journal      = {Future Internet},
  volume       = {16},
  number       = {6},
  pages        = {205},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16060205},
  doi          = {10.3390/FI16060205},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/TanDW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/GaldiJ24,
  author       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Special Issue on 13th International Conference on Security and Cryptography
                  for Networks {(SCN} 2022)},
  journal      = {Inf. Comput.},
  volume       = {296},
  pages        = {105135},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ic.2023.105135},
  doi          = {10.1016/J.IC.2023.105135},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/GaldiJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiSSGJ24,
  author       = {Hui Li and
                  Wei Sun and
                  Qingyang Song and
                  Lei Guo and
                  Abbas Jamalipour},
  title        = {Exploiting RIS's Role for Energy Efficiency and Security in Cell-Free
                  Massive {MIMO} Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {28},
  number       = {5},
  pages        = {1087--1091},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCOMM.2024.3369622},
  doi          = {10.1109/LCOMM.2024.3369622},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiSSGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiuLAL24,
  author       = {Fangfang Liu and
                  Yueyi Liu and
                  Wei An and
                  Xiaona Li},
  title        = {A DWT-Based {PHY} Key Generation Scheme for the Cross-Layer Security
                  in IoT Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {28},
  number       = {6},
  pages        = {1258--1262},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCOMM.2024.3381179},
  doi          = {10.1109/LCOMM.2024.3381179},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiuLAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/YuanCWWC24,
  author       = {Jing Yuan and
                  Gaojie Chen and
                  Miaowen Wen and
                  Dehuan Wan and
                  Kanapathippillai Cumanan},
  title        = {Security-Reliability Tradeoff in UAV-Carried Active RIS-Assisted Cooperative
                  Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {28},
  number       = {2},
  pages        = {437--441},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCOMM.2023.3347294},
  doi          = {10.1109/LCOMM.2023.3347294},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/YuanCWWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icn/SheelaSMKSSF24,
  author       = {M. Sahaya Sheela and
                  A. Gnana Soundari and
                  Aditya Mudigonda and
                  C. Kalpana and
                  K. Suresh and
                  K. Somasundaram and
                  Yousef Farhaoui},
  title        = {Adaptive Marine Predator Optimization Algorithm (AOMA)-Deep Supervised
                  Learning Classification {(DSLC)} Based {IDS} Framework for {MANET}
                  Security},
  journal      = {Intell. Converged Networks},
  volume       = {5},
  number       = {1},
  pages        = {1--18},
  year         = {2024},
  url          = {https://doi.org/10.23919/icn.2024.0001},
  doi          = {10.23919/ICN.2024.0001},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icn/SheelaSMKSSF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/StancoNFVB24,
  author       = {Giovanni Stanco and
                  Annalisa Navarro and
                  Flavio Frattini and
                  Giorgio Ventre and
                  Alessio Botta},
  title        = {A comprehensive survey on the security of low power wide area networks
                  for the Internet of Things},
  journal      = {{ICT} Express},
  volume       = {10},
  number       = {3},
  pages        = {519--552},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.icte.2024.03.003},
  doi          = {10.1016/J.ICTE.2024.03.003},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ict-express/StancoNFVB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/idt/ZhengZ24,
  author       = {Li Zheng and
                  Yuntian Zheng},
  title        = {Analysis of multimedia network data security based on routing algorithm},
  journal      = {Intell. Decis. Technol.},
  volume       = {18},
  number       = {1},
  pages        = {23--32},
  year         = {2024},
  url          = {https://doi.org/10.3233/IDT-230410},
  doi          = {10.3233/IDT-230410},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/idt/ZhengZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/ZhangBWNG24,
  author       = {Qingqi Zhang and
                  Xiaoan Bao and
                  Ren Wu and
                  Mitsuru Nakata and
                  Qi{-}Wei Ge},
  title        = {Prohibited Item Detection Within X-Ray Security Inspection Images
                  Based on an Improved Cascade Network},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {5},
  pages        = {813--824},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023map0007},
  doi          = {10.1587/TRANSFUN.2023MAP0007},
  timestamp    = {Sun, 02 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/ZhangBWNG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/TengZLYGG24,
  author       = {Zhijun Teng and
                  Sian Zhu and
                  Mingzhe Li and
                  Libo Yu and
                  Jinliang Gu and
                  Liwen Guo},
  title        = {Wireless sensor network security defense strategy based on Bayesian
                  reputation evaluation model},
  journal      = {{IET} Commun.},
  volume       = {18},
  number       = {1},
  pages        = {55--62},
  year         = {2024},
  url          = {https://doi.org/10.1049/cmu2.12700},
  doi          = {10.1049/CMU2.12700},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-com/TengZLYGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/LuLCL24a,
  author       = {Kuan{-}Chu Lu and
                  I{-}Hsien Liu and
                  Keng{-}Hao Chang and
                  Jung{-}Shian Li},
  title        = {VoWi-Fi security threats: Address resolution protocol attack and countermeasures},
  journal      = {{IET} Networks},
  volume       = {13},
  number       = {2},
  pages        = {129--146},
  year         = {2024},
  url          = {https://doi.org/10.1049/ntw2.12113},
  doi          = {10.1049/NTW2.12113},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/LuLCL24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbic/KrishnasamyPNU24,
  author       = {Bala Krishnasamy and
                  Sathish Kumar Palani and
                  Renjith Prabhavathi Neelakandan and
                  S. Uma},
  title        = {Aggregate-attention network optimised and graph sample with arithmetic
                  optimisation algorithm fostered IoT device type identification for
                  enhancing IoT security},
  journal      = {Int. J. Bio Inspired Comput.},
  volume       = {24},
  number       = {1},
  pages        = {22--31},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJBIC.2024.140139},
  doi          = {10.1504/IJBIC.2024.140139},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbic/KrishnasamyPNU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhuWZCZY24,
  author       = {Tianci Zhu and
                  Jun Wang and
                  Yonghai Zhu and
                  Haoran Chen and
                  Hang Zhang and
                  Shanshan Yin},
  title        = {Power grid network security: {A} lightweight detection model for composite
                  false data injection attacks using spatiotemporal features},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {46},
  pages        = {100697},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijcip.2024.100697},
  doi          = {10.1016/J.IJCIP.2024.100697},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhuWZCZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/LiOCY24,
  author       = {Jing Li and
                  Mohd Shahizan Othman and
                  Hewan Chen and
                  Lizawati Mi Yusuf},
  title        = {A critical review of feature selection methods for machine learning
                  in IoT security},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {30},
  number       = {3},
  pages        = {264--312},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJCNDS.2024.138214},
  doi          = {10.1504/IJCNDS.2024.138214},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/LiOCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/ZemoB24,
  author       = {Flavien Donkeng Zemo and
                  Sara Bakkali},
  title        = {A survey on security threats in cognitive radio networks based on
                  cooperative spectrum sensing},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {30},
  number       = {4},
  pages        = {433--466},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJCNDS.2024.139325},
  doi          = {10.1504/IJCNDS.2024.139325},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/ZemoB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KakadeRVS24,
  author       = {Kiran Shrimant Kakade and
                  C. Rajesh and
                  T. Veena and
                  P. Sivakumar},
  title        = {Security challenges for routing protocols in mobile ad hoc network},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {16},
  number       = {3},
  pages        = {344--356},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJESDF.2024.138338},
  doi          = {10.1504/IJESDF.2024.138338},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KakadeRVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SivajothiDRLDJ24,
  author       = {E. Sivajothi and
                  S. Mary Diana and
                  M. Rekha and
                  R. Babitha Lincy and
                  P. Damodharan and
                  Jency Rubia J},
  title        = {A future prediction for cyber-attacks in the network domain with the
                  visualisation of patterns in cyber-security tickets with machine learning},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {16},
  number       = {5},
  pages        = {648--661},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJESDF.2024.140758},
  doi          = {10.1504/IJESDF.2024.140758},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SivajothiDRLDJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SivakumarRFP24,
  author       = {K. Sivakumar and
                  C. Rajesh and
                  S. Julia Faith and
                  S. Narasimha Prasad},
  title        = {An effective network security scrutinising method based on deep learning},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {16},
  number       = {4},
  pages        = {464--473},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJESDF.2024.139656},
  doi          = {10.1504/IJESDF.2024.139656},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SivakumarRFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SrirangamABP24,
  author       = {Durga Prasad Srirangam and
                  Salina Adinarayana and
                  B. R. Tapas Bapu and
                  N. Partheeban},
  title        = {Network security intrusion target detection system in the cloud},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {16},
  number       = {5},
  pages        = {602--613},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJESDF.2024.140752},
  doi          = {10.1504/IJESDF.2024.140752},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SrirangamABP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijicc/XieZWC24,
  author       = {Jialiang Xie and
                  Shanli Zhang and
                  Honghui Wang and
                  Mingzhi Chen},
  title        = {Multiobjective network security dynamic assessment method based on
                  Bayesian network attack graph},
  journal      = {Int. J. Intell. Comput. Cybern.},
  volume       = {17},
  number       = {1},
  pages        = {38--60},
  year         = {2024},
  url          = {https://doi.org/10.1108/IJICC-05-2023-0121},
  doi          = {10.1108/IJICC-05-2023-0121},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijicc/XieZWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JiangW24,
  author       = {Jingfeng Jiang and
                  Yongyi Wu},
  title        = {Analysis of competitive differences in the bilateral platforms of
                  the digital economy using artificial intelligence and network data
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {98--116},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140213},
  doi          = {10.1504/IJICS.2024.140213},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JiangW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XiongW24,
  author       = {Jianxin Xiong and
                  Xianping Wang},
  title        = {Library data protection and threat detection system based on network
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {137--153},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140212},
  doi          = {10.1504/IJICS.2024.140212},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XiongW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijin/HangXZGL24,
  author       = {Feilu Hang and
                  Linjiang Xie and
                  Zhenhong Zhang and
                  Wei Guo and
                  Hanruo Li},
  title        = {Research on the application of network security defence in database
                  security services based on deep learning integrated with big data
                  analytics},
  journal      = {Int. J. Intell. Networks},
  volume       = {5},
  pages        = {101--109},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijin.2024.02.006},
  doi          = {10.1016/J.IJIN.2024.02.006},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijin/HangXZGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LagraaHSVSO24,
  author       = {Sofiane Lagraa and
                  Martin Hus{\'{a}}k and
                  Hamida Seba and
                  Satyanarayana Vuppala and
                  Radu State and
                  Moussa Ouedraogo},
  title        = {A review on graph-based approaches for network security monitoring
                  and botnet detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {119--140},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00742-7},
  doi          = {10.1007/S10207-023-00742-7},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LagraaHSVSO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MvahTDATK24,
  author       = {Fabrice Mvah and
                  Vianney Kengne Tchendji and
                  Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and
                  Ahmed H. Anwar and
                  Deepak K. Tosh and
                  Charles A. Kamhoua},
  title        = {GaTeBaSep: game theory-based security protocol against {ARP} spoofing
                  attacks in software-defined networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {373--387},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00749-0},
  doi          = {10.1007/S10207-023-00749-0},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/MvahTDATK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PayaGG24,
  author       = {Antonio Paya and
                  Vicente Garc{\'{\i}}a{-}D{\'{\i}}az and
                  Alberto G{\'{o}}mez},
  title        = {Securesdp: a novel software-defined perimeter implementation for enhanced
                  network security and scalability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {4},
  pages        = {2793--2808},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-024-00863-7},
  doi          = {10.1007/S10207-024-00863-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PayaGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/FuLZL24,
  author       = {Longfei Fu and
                  Yibin Liu and
                  Yanjun Zhang and
                  Ming Li},
  title        = {Network Information Security Monitoring Under Artificial Intelligence
                  Environment},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {18},
  pages        = {1--25},
  year         = {2024},
  url          = {https://doi.org/10.4018/ijisp.345038},
  doi          = {10.4018/IJISP.345038},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/FuLZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/LoneVS24,
  author       = {Faisal Rasheed Lone and
                  Harsh Kumar Verma and
                  Krishna Pal Sharma},
  title        = {A systematic study on the challenges, characteristics and security
                  issues in vehicular networks},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {20},
  number       = {1},
  pages        = {56--98},
  year         = {2024},
  url          = {https://doi.org/10.1108/IJPCC-04-2022-0164},
  doi          = {10.1108/IJPCC-04-2022-0164},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijpcc/LoneVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijris/KongLX24,
  author       = {Dehua Kong and
                  Lin Lu and
                  Nian Xiao},
  title        = {The computer network security situation awareness based on decision
                  tree algorithm},
  journal      = {Int. J. Reason. based Intell. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {125--136},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJRIS.2024.138623},
  doi          = {10.1504/IJRIS.2024.138623},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijris/KongLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuJZ24,
  author       = {Huajin Liu and
                  Chunhua Ju and
                  Houyuan Zhang},
  title        = {A social network security user recommendation algorithm based on community
                  user emotions},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {10--19},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137332},
  doi          = {10.1504/IJSN.2024.137332},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/QianLHX24,
  author       = {Jin Qian and
                  Hui Li and
                  Yan Huo and
                  Xiaoshuang Xing},
  title        = {Empowering IoT security: an innovative handover-driven node selection
                  approach to tackle conscious mobile eavesdropping},
  journal      = {Int. J. Sens. Networks},
  volume       = {44},
  number       = {2},
  pages        = {84--98},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSNET.2024.136692},
  doi          = {10.1504/IJSNET.2024.136692},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/QianLHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/XueLZ24,
  author       = {Qingshui Xue and
                  Zixuan Lu and
                  Tianhao Zhang},
  title        = {Attribute-based proxy signature scheme with dynamic strong forward
                  security},
  journal      = {Int. J. Sens. Networks},
  volume       = {44},
  number       = {4},
  pages        = {214--225},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSNET.2024.138518},
  doi          = {10.1504/IJSNET.2024.138518},
  timestamp    = {Sun, 02 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/XueLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/LvQGQL24,
  author       = {Yanbo Lv and
                  Yiwen Qi and
                  Shitong Guo and
                  Ziyu Qu and
                  He Li},
  title        = {Enhancing network security in constrained switched systems: event-triggered
                  {MPC} with a buffer-based anti-attack approach},
  journal      = {Int. J. Syst. Sci.},
  volume       = {55},
  number       = {14},
  pages        = {2963--2979},
  year         = {2024},
  url          = {https://doi.org/10.1080/00207721.2024.2364291},
  doi          = {10.1080/00207721.2024.2364291},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsysc/LvQGQL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/QaziKHA24,
  author       = {Farheen Qazi and
                  Sadiq Ali Khan and
                  Fozia Hanif and
                  Dur{-}e{-}Shawar Agha},
  title        = {Efficient Routing Algorithm Towards the Security of Vehicular Ad-Hoc
                  Network and Its Applications},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {31},
  number       = {1},
  pages        = {12--28},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10776-023-00613-x},
  doi          = {10.1007/S10776-023-00613-X},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwin/QaziKHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/KhanRPKHLK24,
  author       = {Izhar Ahmed Khan and
                  Imran Razzak and
                  Dechang Pi and
                  Nasrullah Khan and
                  Yasir Hussain and
                  Bentian Li and
                  Tanzeela Kousar},
  title        = {Fed-Inforce-Fusion: {A} federated reinforcement-based fusion model
                  for security and privacy protection of IoMT networks against cyber-attacks},
  journal      = {Inf. Fusion},
  volume       = {101},
  pages        = {102002},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2023.102002},
  doi          = {10.1016/J.INFFUS.2023.102002},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/KhanRPKHLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/Yu24,
  author       = {Gao{-}Feng Yu},
  title        = {A multi-objective decision method for the network security situation
                  grade assessment under multi-source information},
  journal      = {Inf. Fusion},
  volume       = {102},
  pages        = {102066},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.inffus.2023.102066},
  doi          = {10.1016/J.INFFUS.2023.102066},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/Yu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/AlsafwaniFA24,
  author       = {Nadher Alsafwani and
                  Yousef Fazea and
                  Fuad Alnajjar},
  title        = {Strategic Approaches in Network Communication and Information Security
                  Risk Assessment},
  journal      = {Inf.},
  volume       = {15},
  number       = {6},
  pages        = {353},
  year         = {2024},
  url          = {https://doi.org/10.3390/info15060353},
  doi          = {10.3390/INFO15060353},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/AlsafwaniFA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/GilaniAKSMS24,
  author       = {Syeda Mahnoor Gilani and
                  Adeel Anjum and
                  Abid Khan and
                  Madiha Haider Syed and
                  Syed Atif Moqurrab and
                  Gautam Srivastava},
  title        = {A robust Internet of Drones security surveillance communication network
                  based on {IOTA}},
  journal      = {Internet Things},
  volume       = {25},
  pages        = {101066},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iot.2024.101066},
  doi          = {10.1016/J.IOT.2024.101066},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/GilaniAKSMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GharibI24,
  author       = {Anastassia Gharib and
                  Mohamed Ibnkahla},
  title        = {User Security-Oriented Information-Centric IoT Nodes Clustering With
                  Graph Convolution Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {8311--8326},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3318123},
  doi          = {10.1109/JIOT.2023.3318123},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GharibI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/IslamARH24,
  author       = {Kazi Yasin Islam and
                  Iftekhar Ahmad and
                  Yue Rong and
                  Daryoush Habibi},
  title        = {Joint Energy and Security Optimization in Underwater Wireless Communication
                  Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {14282--14295},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3340269},
  doi          = {10.1109/JIOT.2023.3340269},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/IslamARH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiZHHZZW24,
  author       = {Xingwang Li and
                  Junyao Zhang and
                  Congzheng Han and
                  Wanming Hao and
                  Ming Zeng and
                  Zhengyu Zhu and
                  Han Wang},
  title        = {Reliability and Security of CR-STAR-RIS-NOMA-Assisted IoT Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {17},
  pages        = {27969--27980},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3340371},
  doi          = {10.1109/JIOT.2023.3340371},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiZHHZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PakravanCZLHD24,
  author       = {Saeid Pakravan and
                  Jean{-}Yves Chouinard and
                  Ming Zeng and
                  Xingwang Li and
                  Wanming Hao and
                  Octavia A. Dobre},
  title        = {Physical-Layer Security of RIS-Assisted Networks Over Correlated Fisher-Snedecor
                  {F} Fading Channels},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {9},
  pages        = {15152--15165},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3343936},
  doi          = {10.1109/JIOT.2023.3343936},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PakravanCZLHD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WuLLHWYJJW24,
  author       = {Yiming Wu and
                  Gaoyun Lin and
                  Lisong Liu and
                  Zhen Hong and
                  Yangyang Wang and
                  Xing Yang and
                  Zoe Lin Jiang and
                  Shouling Ji and
                  Zhenyu Wen},
  title        = {MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning
                  Framework},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {14},
  pages        = {25136--25146},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3395629},
  doi          = {10.1109/JIOT.2024.3395629},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WuLLHWYJJW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XieX24,
  author       = {Qingyun Xie and
                  Qi Xie},
  title        = {Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless
                  Sensor Networks for IoT System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {15038--15042},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3334708},
  doi          = {10.1109/JIOT.2023.3334708},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XieX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuWLLZYC24,
  author       = {Zhiyu Xu and
                  Liangliang Wang and
                  Yiyuan Luo and
                  Yu Long and
                  Kai Zhang and
                  Hailun Yan and
                  Kefei Chen},
  title        = {A Security-Enhanced Conditional Privacy-Preserving Certificateless
                  Aggregate Signature Scheme for Vehicular Ad-Hoc Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {13482--13495},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3337136},
  doi          = {10.1109/JIOT.2023.3337136},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XuWLLZYC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YanDSZZH24,
  author       = {Peishun Yan and
                  Wei Duan and
                  Qiang Sun and
                  Guoan Zhang and
                  Jiayi Zhang and
                  Pin{-}Han Ho},
  title        = {Improving Physical-Layer Security for Cognitive Networks via Artificial
                  Noise-Aided Rate Splitting},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {18932--18933},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3367889},
  doi          = {10.1109/JIOT.2024.3367889},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YanDSZZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangJZ24,
  author       = {Yi Zhang and
                  Chunxiao Jiang and
                  Peiying Zhang},
  title        = {Security-Aware Resource Allocation Scheme Based on {DRL} in Cloud-Edge-Terminal
                  Cooperative Vehicular Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {95--104},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3293497},
  doi          = {10.1109/JIOT.2023.3293497},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ir/KumarYY24,
  author       = {Manish Kumar and
                  Vibhash Yadav and
                  Satya Prakash Yadav},
  title        = {Advance comprehensive analysis for Zigbee network-based IoT system
                  security},
  journal      = {Discov. Comput.},
  volume       = {27},
  number       = {1},
  pages        = {22},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10791-024-09456-3},
  doi          = {10.1007/S10791-024-09456-3},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ir/KumarYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YeZRHZPK24,
  author       = {Pei{-}Gen Ye and
                  Jun Zheng and
                  Xiaojun Ren and
                  Jinbin Huang and
                  Zhenxin Zhang and
                  Yan Pang and
                  Guang Kou},
  title        = {Optimizing resource allocation in UAV-assisted ultra-dense networks
                  for enhanced performance and security},
  journal      = {Inf. Sci.},
  volume       = {679},
  pages        = {120788},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120788},
  doi          = {10.1016/J.INS.2024.120788},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YeZRHZPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/Geng24,
  author       = {Jiali Geng},
  title        = {Improving network data security interaction methods under wireless
                  communication},
  journal      = {Internet Technol. Lett.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/itl2.497},
  doi          = {10.1002/ITL2.497},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itl/Geng24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/YeLZ24,
  author       = {Jianfeng Ye and
                  Li Li and
                  Kaiyan Zheng},
  title        = {Computer intelligent network security and preventive measures of internet
                  of things devices},
  journal      = {Internet Technol. Lett.},
  volume       = {7},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/itl2.519},
  doi          = {10.1002/ITL2.519},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itl/YeLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KannaS24,
  author       = {P. Rajesh Kanna and
                  P. Santhi},
  title        = {Exploring the landscape of network security: a comparative analysis
                  of attack detection strategies},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {15},
  number       = {8},
  pages        = {3211--3228},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12652-024-04794-y},
  doi          = {10.1007/S12652-024-04794-Y},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/KannaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcs/CoelhoSML24,
  author       = {Roger William Co{\^{e}}lho and
                  Ronan Assump{\c{c}}{\~{a}}o Silva and
                  Luciana Andr{\'{e}}ia Fondazzi Martimiano and
                  Elvio Joao Leonardo},
  title        = {IoT and 5G Networks: {A} Discussion of SDN, {NFV} and Information
                  Security},
  journal      = {J. Braz. Comput. Soc.},
  volume       = {30},
  number       = {1},
  pages        = {212--227},
  year         = {2024},
  url          = {https://doi.org/10.5753/jbcs.2024.3021},
  doi          = {10.5753/JBCS.2024.3021},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcs/CoelhoSML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/DongFS24,
  author       = {Chunling Dong and
                  Yu Feng and
                  Wenqian Shang},
  title        = {A new method of dynamic network security analysis based on dynamic
                  uncertain causality graph},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {24},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-023-00568-7},
  doi          = {10.1186/S13677-023-00568-7},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/DongFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/LongYSZHC24,
  author       = {Zhenyue Long and
                  Huiru Yan and
                  Guiquan Shen and
                  Xiaolu Zhang and
                  Haoyang He and
                  Long Cheng},
  title        = {A Transformer-based network intrusion detection approach for cloud
                  security},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {5},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-023-00574-9},
  doi          = {10.1186/S13677-023-00574-9},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/LongYSZHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/HanL24,
  author       = {Yanhai Han and
                  Xu Lin},
  title        = {Multi-demand-side resource regulation capacity assessment for distribution
                  network safety and security},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {24},
  number       = {4-5},
  pages        = {2267--2282},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCM-247444},
  doi          = {10.3233/JCM-247444},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/HanL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/Huang24,
  author       = {Furong Huang},
  title        = {Industrial technology network security measurement in international
                  trade under discrete hopfield neural network},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {24},
  number       = {2},
  pages        = {657--674},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCM-237128},
  doi          = {10.3233/JCM-237128},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/Huang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/SuG24,
  author       = {Xuan Su and
                  Han Gao},
  title        = {Intelligent fault diagnosis and security early warning method of new
                  power system based on system network situation},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {24},
  number       = {2},
  pages        = {891--905},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCM-247293},
  doi          = {10.3233/JCM-247293},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/SuG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/QureshiSM24,
  author       = {Anam Qureshi and
                  Jawwad Shamsi and
                  Murk Marvi},
  title        = {An Efficient Framework for Security of Internet-of-Things Devices
                  against Malicious Software Updates},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2024},
  year         = {2024},
  url          = {https://doi.org/10.1155/2024/9915602},
  doi          = {10.1155/2024/9915602},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcnc/QureshiSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/QureshiSM24a,
  author       = {Anam Qureshi and
                  Jawwad Shamsi and
                  Murk Marvi},
  title        = {An Efficient Framework for Security of Internet-of-Things Devices
                  against Malicious Software Updates},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2024},
  year         = {2024},
  url          = {https://doi.org/10.1155/2024/9915602},
  doi          = {10.1155/2024/9915602},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcnc/QureshiSM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/ShiT24,
  title        = {Retraction Note: Cost-optimized data placement strategy for social
                  network with security awareness in edge-cloud computing environment},
  journal      = {J. Comb. Optim.},
  volume       = {47},
  number       = {3},
  pages        = {51},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10878-024-01161-7},
  doi          = {10.1007/S10878-024-01161-7},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jco/ShiT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/ShahraniRAASSZ24,
  author       = {Ali M. Al Shahrani and
                  Ali Rizwan and
                  Abdullah Algarni and
                  Khalid A. Alissa and
                  Mohammad Shabaz and
                  Bhupesh Kumar Singh and
                  John Zaki},
  title        = {A Deep Learning Network-on-Chip (NoC)-Based Switch-Router to Enhance
                  Information Security in Resource-Constrained Devices},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {33},
  number       = {4},
  pages        = {2450064:1--2450064:30},
  year         = {2024},
  url          = {https://doi.org/10.1142/S0218126624500646},
  doi          = {10.1142/S0218126624500646},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/ShahraniRAASSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Deng24,
  author       = {Yongsheng Deng},
  title        = {Design of Industrial IoT Intrusion Security Detection System Based
                  on LightGBM Feature Algorithm and Multi-layer Perception Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {327--348},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1327},
  doi          = {10.13052/JCSM2245-1439.1327},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Deng24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HanZZ24,
  author       = {Guoying Han and
                  Bin Zhou and
                  Yazi Zhang},
  title        = {Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector
                  Machine Algorithm in Network Security Services Assessment and Prediction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {941--962},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1356},
  doi          = {10.13052/JCSM2245-1439.1356},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HanZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HouLZGZ24,
  author       = {Botao Hou and
                  Zhefeng Li and
                  Xiaojun Zuo and
                  Yuling Guo and
                  Jianchun Zhou},
  title        = {Application of Intelligent Cloud Computing Technology in Optical Communication
                  Network Security of Smart Grid},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {605--632},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1342},
  doi          = {10.13052/JCSM2245-1439.1342},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HouLZGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li24,
  author       = {Wentao Li},
  title        = {Construction and Analysis of {QPSO-LSTM} Model in Network Security
                  Situation Prediction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {417--438},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1334},
  doi          = {10.13052/JCSM2245-1439.1334},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li24b,
  author       = {Xiaowu Li},
  title        = {Network Security Behavior Anomaly Detection Based on Improved Empirical
                  Mode Decomposition},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {917--940},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1355},
  doi          = {10.13052/JCSM2245-1439.1355},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Luo24,
  author       = {Xiaoyan Luo},
  title        = {Wireless Sensor Networks Security Enhancement Approach Based on Single
                  Path Secure Routing Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1085--1104},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13512},
  doi          = {10.13052/JCSM2245-1439.13512},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Luo24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Song24,
  author       = {Xiaobo Song},
  title        = {Analysis and Application of Chaotic Genetic Algorithm Based on Network
                  Security in The Research of Resilience of Cluster Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {657--676},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1344},
  doi          = {10.13052/JCSM2245-1439.1344},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Song24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangL24,
  author       = {Huan Wang and
                  Xin Li},
  title        = {Optimization of Network Security Intelligent Early Warning System
                  Based on Image Matching Technology of Partial Differential Equation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {461--488},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1336},
  doi          = {10.13052/JCSM2245-1439.1336},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Wu24,
  author       = {Yubao Wu},
  title        = {Construction and Application of Internet of Things Network Security
                  Situation Prediction Model Based on BiLSTM Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {843--862},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1352},
  doi          = {10.13052/JCSM2245-1439.1352},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Wu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YunhongG24,
  author       = {Guo Yunhong and
                  Tang Guoping},
  title        = {Intelligent Analysis and Dynamic Security of Network Traffic in Context
                  of Big Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {823--842},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1351},
  doi          = {10.13052/JCSM2245-1439.1351},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/YunhongG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangXS24,
  author       = {Yunfei Zhang and
                  Xingzhi Xu and
                  Yayuan Shi},
  title        = {Construction and Analysis of Network Cloud Security Situation Awareness
                  System Based on {DBN-DE} Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {439--460},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1335},
  doi          = {10.13052/JCSM2245-1439.1335},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangXS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhengXLDSL24,
  author       = {Lv Zheng and
                  Fang Xi and
                  Huang Lei and
                  Jiang Dan and
                  Ran Shuang and
                  Liang Lei},
  title        = {Optimization of Information Security Management Mechanism for Distribution
                  Network Information Storage Based on {RBAC} and Development of Visual
                  Operation and Maintenance Platform},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1061--1084},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13511},
  doi          = {10.13052/JCSM2245-1439.13511},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhengXLDSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/DuLZPL24,
  author       = {Xuyang Du and
                  Guobao Liu and
                  He Zhang and
                  Ju H. Park and
                  Xiaofeng Liu},
  title        = {Security load frequency control of networked power systems via Round-Robin
                  protocol under denial of service attacks},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {17},
  pages        = {107155},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.107155},
  doi          = {10.1016/J.JFRANKLIN.2024.107155},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/DuLZPL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/WuWCYH24,
  author       = {Di Wu and
                  Yi Wang and
                  Peng Cheng and
                  Hu Ye and
                  Shuping He},
  title        = {Enhancing security control in Markov jump networked systems against
                  DoS attacks: {A} dynamic-memory based event-triggered mechanism},
  journal      = {J. Frankl. Inst.},
  volume       = {361},
  number       = {5},
  pages        = {106688},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jfranklin.2024.106688},
  doi          = {10.1016/J.JFRANKLIN.2024.106688},
  timestamp    = {Tue, 27 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/WuWCYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/ChughtaiBKSLK24,
  author       = {Muhammad Saad Chughtai and
                  Irfana Bibi and
                  Shahid Karim and
                  Syed Wajid Ali Shah and
                  Asif Ali Laghari and
                  Abdullah Ayub Khan},
  title        = {Deep learning trends and future perspectives of web security and vulnerabilities},
  journal      = {J. High Speed Networks},
  volume       = {30},
  number       = {1},
  pages        = {115--146},
  year         = {2024},
  url          = {https://doi.org/10.3233/JHS-230037},
  doi          = {10.3233/JHS-230037},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/ChughtaiBKSLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/GranataMRCS24,
  author       = {Daniele Granata and
                  Michele Mastroianni and
                  Massimiliano Rak and
                  Pasquale Cantiello and
                  Giovanni Salzillo},
  title        = {{GDPR} compliance through standard security controls: An automated
                  approach},
  journal      = {J. High Speed Networks},
  volume       = {30},
  number       = {2},
  pages        = {147--174},
  year         = {2024},
  url          = {https://doi.org/10.3233/JHS-230080},
  doi          = {10.3233/JHS-230080},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/GranataMRCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/ShirleyKRKRHT24,
  author       = {C. P. Shirley and
                  Jaydip Kumar and
                  Kantilal Pitambar Rane and
                  Narendra Kumar and
                  Deevi Radha Rani and
                  Kuntamukkula Harshitha and
                  Mohit Tiwari},
  title        = {IoT device type identification using training deep quantum neural
                  networks optimized with a chimp optimization algorithm for enhancing
                  IoT security},
  journal      = {J. High Speed Networks},
  volume       = {30},
  number       = {2},
  pages        = {191--201},
  year         = {2024},
  url          = {https://doi.org/10.3233/JHS-230028},
  doi          = {10.3233/JHS-230028},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/ShirleyKRKRHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/Song24,
  author       = {Can Song},
  title        = {Performance study of fuzzy C-mean clustering algorithm based on local
                  density in network security},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {4},
  pages        = {10637--10651},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-235082},
  doi          = {10.3233/JIFS-235082},
  timestamp    = {Fri, 03 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/Song24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/WangZL24,
  author       = {Jia Wang and
                  Ke Zhang and
                  Jingyuan Li},
  title        = {Network awareness of security situation information security measurement
                  method based on data mining},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {1},
  pages        = {209--219},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-233390},
  doi          = {10.3233/JIFS-233390},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/WangZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ZhangZLWWHFW24,
  author       = {Kun Zhang and
                  Yu Zhou and
                  Haixia Long and
                  Shulei Wu and
                  Chaoyang Wang and
                  Haizhuang Hong and
                  Xixi Fu and
                  Haifeng Wang},
  title        = {Design and implementation of marine information management network
                  security system based on artificial intelligence embedded technology},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {2},
  pages        = {4817--4827},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-236018},
  doi          = {10.3233/JIFS-236018},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/ZhangZLWWHFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WuZ24,
  author       = {Yaxing Wu and
                  Dongmei Zhao},
  title        = {Build IPSO-ABiLSTM Model for Network Security Situation Prediction},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {40},
  number       = {1},
  pages        = {71--88},
  year         = {2024},
  url          = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=196\_2645},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jise/WuZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/NandyNKIB24,
  author       = {Tarak Nandy and
                  Rafidah Md Noor and
                  Raenu Kolandaisamy and
                  Mohd Yamani Idna Bin Idris and
                  Sananda Bhattacharyya},
  title        = {A review of security attacks and intrusion detection in the vehicular
                  networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {2},
  pages        = {101945},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2024.101945},
  doi          = {10.1016/J.JKSUCI.2024.101945},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/NandyNKIB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/WangGZ24,
  author       = {Feng Wang and
                  Yongjie Gai and
                  Haitao Zhang},
  title        = {Blockchain user digital identity big data and information security
                  process protection based on network trust},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {5},
  pages        = {102031},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2024.102031},
  doi          = {10.1016/J.JKSUCI.2024.102031},
  timestamp    = {Tue, 09 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/WangGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AltaweelAK24,
  author       = {Ala Altaweel and
                  Sidra Aslam and
                  Ibrahim Kamel},
  title        = {Security attacks in Opportunistic Mobile Networks: {A} systematic
                  literature review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {221},
  pages        = {103782},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2023.103782},
  doi          = {10.1016/J.JNCA.2023.103782},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AltaweelAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IndrasonS24,
  author       = {Ngangbam Indrason and
                  Goutam Saha},
  title        = {Exploring Blockchain-driven security in SDN-based IoT networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {224},
  pages        = {103838},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2024.103838},
  doi          = {10.1016/J.JNCA.2024.103838},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/IndrasonS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/LemosCFFF24,
  author       = {Filipe Augusto da Luz Lemos and
                  Thiago dos Santos Cavali and
                  Keiko Ver{\^{o}}nica Ono Fonseca and
                  Mauro S{\'{e}}rgio Pereira Fonseca and
                  Rubens Alexandre De Faria},
  title        = {Enhancing the Security of Software-Defined Networking through Forensic
                  Memory Analysis},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {32},
  number       = {4},
  pages        = {82},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10922-024-09862-4},
  doi          = {10.1007/S10922-024-09862-4},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/LemosCFFF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/RabahDRL24,
  author       = {Mohamed Amine Ould Rabah and
                  Hamza Drid and
                  Mohamed Rahouti and
                  Nadjib Lazaar},
  title        = {Empowering {UAV} Communications with AI-Assisted Software-Defined
                  Networks: {A} Review on Performance, Security, and Efficiency},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {32},
  number       = {4},
  pages        = {90},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10922-024-09866-0},
  doi          = {10.1007/S10922-024-09866-0},
  timestamp    = {Tue, 17 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/RabahDRL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocs/Yan24,
  author       = {Zhangmin Yan},
  title        = {Establishment of urban green corridor network based on neural network
                  and landscape ecological security},
  journal      = {J. Comput. Sci.},
  volume       = {79},
  pages        = {102315},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jocs.2024.102315},
  doi          = {10.1016/J.JOCS.2024.102315},
  timestamp    = {Sun, 14 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocs/Yan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/WaniRHK24,
  author       = {Mohamad Saalim Wani and
                  Michael Rademacher and
                  Thorsten Horstmann and
                  Mathias Kretschmer},
  title        = {Security Vulnerabilities in 5G Non-Stand-Alone Networks: {A} Systematic
                  Analysis and Attack Taxonomy},
  journal      = {J. Cybersecur. Priv.},
  volume       = {4},
  number       = {1},
  pages        = {23--40},
  year         = {2024},
  url          = {https://doi.org/10.3390/jcp4010002},
  doi          = {10.3390/JCP4010002},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/WaniRHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimS24,
  author       = {Ha Rang Kim and
                  Hyun Min Song},
  title        = {Lightweight {IDS} Framework Using Word Embeddings for In-Vehicle Network
                  Security},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {1--13},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.001},
  doi          = {10.58346/JOWUA.2024.I2.001},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SreevidyaS24,
  author       = {B. Sreevidya and
                  M. Supriya},
  title        = {Trust based Routing - {A} Novel Approach for Data Security in {WSN}
                  based Data Critical Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {27--41},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.003},
  doi          = {10.58346/JOWUA.2024.I1.003},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SreevidyaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jr/Robotics24g,
  title        = {Retracted: Security Risk and Preventive Measures of Multimedia Database
                  System under Remote Control of Network Robot},
  journal      = {J. Robotics},
  volume       = {2024},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.1155/2024/9893014},
  doi          = {10.1155/2024/9893014},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jr/Robotics24g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/AhmedA24,
  author       = {Huda A. Ahmed and
                  Hamid Ali Abed Al{-}Asadi},
  title        = {An Optimized Link State Routing Protocol with a Blockchain Framework
                  for Efficient Video-Packet Transmission and Security over Mobile Ad-Hoc
                  Networks},
  journal      = {J. Sens. Actuator Networks},
  volume       = {13},
  number       = {2},
  pages        = {22},
  year         = {2024},
  url          = {https://doi.org/10.3390/jsan13020022},
  doi          = {10.3390/JSAN13020022},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/AhmedA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/Batalla24,
  author       = {Jordi Mongay Batalla},
  title        = {Featured Papers on Network Security and Privacy},
  journal      = {J. Sens. Actuator Networks},
  volume       = {13},
  number       = {1},
  pages        = {11},
  year         = {2024},
  url          = {https://doi.org/10.3390/jsan13010011},
  doi          = {10.3390/JSAN13010011},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/Batalla24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/YiZAL24,
  author       = {Huiju Yi and
                  Shengcai Zhang and
                  Dezhi An and
                  Zhenyu Liu},
  title        = {PatchesNet: PatchTST-based multi-scale network security situation
                  prediction},
  journal      = {Knowl. Based Syst.},
  volume       = {299},
  pages        = {112037},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.112037},
  doi          = {10.1016/J.KNOSYS.2024.112037},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/YiZAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kes/JiangW24,
  author       = {Yan Jiang and
                  Xiuting Wang},
  title        = {Projection measure-driven optimization of q-rung orthopair fuzzy {MAGDM}
                  for computer network security evaluation},
  journal      = {Int. J. Knowl. Based Intell. Eng. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {31--44},
  year         = {2024},
  url          = {https://doi.org/10.3233/KES-230172},
  doi          = {10.3233/KES-230172},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kes/JiangW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kes/LeiCWW24,
  author       = {Fan Lei and
                  Qiang Cai and
                  Guiwu Wei and
                  Cun Wei},
  title        = {{PDHL-MARCOS} method based on cumulative prospect theory for {MAGDM}
                  and its application in network security evaluation},
  journal      = {Int. J. Knowl. Based Intell. Eng. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {359--387},
  year         = {2024},
  url          = {https://doi.org/10.3233/KES-230120},
  doi          = {10.3233/KES-230120},
  timestamp    = {Sun, 14 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kes/LeiCWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mdpinetwork/ElHajjG24,
  author       = {Mohammed El{-}Hajj and
                  Teklit Haftu Gebremariam},
  title        = {Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions
                  for Industry 4.0},
  journal      = {Network},
  volume       = {4},
  number       = {3},
  pages        = {260--294},
  year         = {2024},
  url          = {https://doi.org/10.3390/network4030013},
  doi          = {10.3390/NETWORK4030013},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mdpinetwork/ElHajjG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mdpinetwork/MaosaOG24,
  author       = {Herbert Maosa and
                  Karim Ouazzane and
                  Mohamed Chahine Ghanem},
  title        = {A Hierarchical Security Event Correlation Model for Real-Time Threat
                  Detection and Response},
  journal      = {Network},
  volume       = {4},
  number       = {1},
  pages        = {68--90},
  year         = {2024},
  url          = {https://doi.org/10.3390/network4010004},
  doi          = {10.3390/NETWORK4010004},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mdpinetwork/MaosaOG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AhujaSC24,
  author       = {Pooja Ahuja and
                  Preeti Sethi and
                  Naresh Chauhan},
  title        = {A comprehensive survey of security threats, detection, countermeasures,
                  and future directions for physical and network layers in cognitive
                  radio networks},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {11},
  pages        = {32715--32738},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16642-w},
  doi          = {10.1007/S11042-023-16642-W},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/AhujaSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AntonyR24,
  author       = {Blessy Antony and
                  S. Revathy},
  title        = {Enhancing security in online social networks: introducing the DeepSybil
                  model for Sybil attack detection},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {14},
  pages        = {41911--41937},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16851-3},
  doi          = {10.1007/S11042-023-16851-3},
  timestamp    = {Sun, 14 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AntonyR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MeganathanBAM24,
  author       = {R. Meganathan and
                  Manjunath B and
                  R. Anand and
                  V. Murugesh},
  title        = {Security establishment using deep convolutional network model in cyber-physical
                  systems},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {31},
  pages        = {76201--76221},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-024-18535-y},
  doi          = {10.1007/S11042-024-18535-Y},
  timestamp    = {Tue, 10 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MeganathanBAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ChiranjeeviM24,
  author       = {V. Rahul Chiranjeevi and
                  D. Malathi},
  title        = {Anomaly graph: leveraging dynamic graph convolutional networks for
                  enhanced video anomaly detection in surveillance and security applications},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {20},
  pages        = {12011--12028},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-024-09738-3},
  doi          = {10.1007/S00521-024-09738-3},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ChiranjeeviM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/NguyenDTG24,
  author       = {Giang T. Nguyen and
                  Stefan Dlugolinsky and
                  Viet D. Tran and
                  {\'{A}}lvaro L{\'{o}}pez Garc{\'{\i}}a},
  title        = {Network security AIOps for online stream data monitoring},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {24},
  pages        = {14925--14949},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-024-09863-z},
  doi          = {10.1007/S00521-024-09863-Z},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/NguyenDTG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/SongFYMJG24,
  author       = {Yanbo Song and
                  Tao Feng and
                  Chungang Yang and
                  Xinru Mi and
                  Shanqing Jiang and
                  Mohsen Guizani},
  title        = {{IS2N:} Intent-Driven Security Software-Defined Network With Blockchain},
  journal      = {{IEEE} Netw.},
  volume       = {38},
  number       = {3},
  pages        = {118--127},
  year         = {2024},
  url          = {https://doi.org/10.1109/MNET.138.2200539},
  doi          = {10.1109/MNET.138.2200539},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/SongFYMJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ZengSXL24,
  author       = {Hui Zeng and
                  Zhou Su and
                  Qichao Xu and
                  Ruidong Li},
  title        = {Security and Privacy in Space-Air-Ocean Integrated Unmanned Surface
                  Vehicle Networks},
  journal      = {{IEEE} Netw.},
  volume       = {38},
  number       = {3},
  pages        = {48--56},
  year         = {2024},
  url          = {https://doi.org/10.1109/MNET.2024.3369907},
  doi          = {10.1109/MNET.2024.3369907},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ZengSXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/LiHWZQ24,
  author       = {Peihao Li and
                  Jie Huang and
                  Huaqing Wu and
                  Zeping Zhang and
                  Chunyang Qi},
  title        = {SecureNet: Proactive intellectual property protection and model security
                  defense for DNNs based on backdoor learning},
  journal      = {Neural Networks},
  volume       = {174},
  pages        = {106199},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.neunet.2024.106199},
  doi          = {10.1016/J.NEUNET.2024.106199},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/LiHWZQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/GhoshKIBAASCAY24,
  author       = {Moloy Kumar Ghosh and
                  Milton Kumar Kundu and
                  Md. Ibrahim and
                  A. S. M. Badrudduza and
                  Md. Shamim Anower and
                  Imran Shafique Ansari and
                  Annie Solomon and
                  Sumit Chakravarty and
                  Imtiaz Ahmed and
                  Heejung Yu},
  title        = {Physical-Layer Security in Mixed {UOWC-RF} Networks With Energy Harvesting
                  Relay Against Multiple Eavesdroppers},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {2884--2902},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3373476},
  doi          = {10.1109/OJCOMS.2024.3373476},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/GhoshKIBAASCAY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/HoseiniSBAH24,
  author       = {Sayed Amir Hoseini and
                  Parastoo Sadeghi and
                  Faycal Bouhafs and
                  Neda Aboutorab and
                  Frank T. H. den Hartog},
  title        = {Experimental Evaluation of Network-Controlled Physical-Layer Security
                  Through Friendly Jamming},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {2968--2979},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3393023},
  doi          = {10.1109/OJCOMS.2024.3393023},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/HoseiniSBAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/ShahrakiMK24,
  author       = {Elmira Shahraki and
                  Mahtab Mirmohseni and
                  Hengameh Keshavarz},
  title        = {Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {3136--3150},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3391624},
  doi          = {10.1109/OJCOMS.2024.3391624},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/ShahrakiMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/ZhaoZHZS24,
  author       = {Xiang Zhao and
                  Yuqing Zhao and
                  Ju Huang and
                  Wenbo Zhao and
                  Jinyong Sun},
  title        = {Physical-Layer Security for Indoor Hybrid {PLC/VLC} Networks With
                  {NOMA}},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {872--884},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3353385},
  doi          = {10.1109/OJCOMS.2024.3353385},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ojcs/ZhaoZHZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/AlsumaytAAAEAAAAA24,
  author       = {Albandari Alsumayt and
                  Majid Alshammari and
                  Zeyad M. Alfawaer and
                  Fahd N. Al{-}Wesabi and
                  Nahla El{-}Haggar and
                  Sumayh S. Aljameel and
                  Sarah Albassam and
                  Shahad AlGhareeb and
                  Nouf Mohammed Alghamdi and
                  Nawir Aldossary},
  title        = {Efficient security level in wireless sensor networks (WSNs) using
                  four-factors authentication over the Internet of Things (IoT)},
  journal      = {PeerJ Comput. Sci.},
  volume       = {10},
  pages        = {e2091},
  year         = {2024},
  url          = {https://doi.org/10.7717/peerj-cs.2091},
  doi          = {10.7717/PEERJ-CS.2091},
  timestamp    = {Sun, 14 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/AlsumaytAAAEAAAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/Lu24,
  author       = {Feng Lu},
  title        = {Online shopping consumer perception analysis and future network security
                  service technology using logistic regression model},
  journal      = {PeerJ Comput. Sci.},
  volume       = {10},
  pages        = {e1777},
  year         = {2024},
  url          = {https://doi.org/10.7717/peerj-cs.1777},
  doi          = {10.7717/PEERJ-CS.1777},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/Lu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/Ding24,
  author       = {Weixiang Ding},
  title        = {A GAN-based security strategy for {WSN} networks based on honeypot
                  algorithm},
  journal      = {Phys. Commun.},
  volume       = {62},
  pages        = {102260},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.phycom.2023.102260},
  doi          = {10.1016/J.PHYCOM.2023.102260},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/Ding24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchererWS24a,
  author       = {Philip Scherer and
                  Christiane Weis and
                  Thorsten Strufe},
  title        = {Provable Security for the Onion Routing and Mix Network Packet Format
                  Sphinx},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {755--783},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0140},
  doi          = {10.56553/POPETS-2024-0140},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/SchererWS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qmi/HdaibRP24,
  author       = {Moe Hdaib and
                  Sutharshan Rajasegarar and
                  Lei Pan},
  title        = {Quantum deep learning-based anomaly detection for enhanced network
                  security},
  journal      = {Quantum Mach. Intell.},
  volume       = {6},
  number       = {1},
  pages        = {26},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42484-024-00163-2},
  doi          = {10.1007/S42484-024-00163-2},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qmi/HdaibRP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HemaB24,
  author       = {P. P. Hema and
                  Anchare V. Babu},
  title        = {Full-duplex jamming for physical layer security improvement in NOMA-enabled
                  overlay cognitive radio networks},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.371},
  doi          = {10.1002/SPY2.371},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HemaB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JavedAMK24,
  author       = {Mubeen Javed and
                  Muhammad Arslan Akram and
                  Adnan Noor Mian and
                  Saru Kumari},
  title        = {On the security of a novel privacy-preserving authentication scheme
                  for {V2G} networks},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.357},
  doi          = {10.1002/SPY2.357},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/JavedAMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/QasemSE24,
  author       = {Asmaa Amer Qasem and
                  Mona Shokair and
                  Fathi E. Abd El{-}Samie},
  title        = {Physical-layer security enhancement in wireless sensor networks through
                  artificial noise optimization},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.385},
  doi          = {10.1002/SPY2.385},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/QasemSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scl/LiSZ24,
  author       = {Xiaohang Li and
                  Peng Shi and
                  Weidong Zhang},
  title        = {Dynamic memory-based event-triggered security control for networked
                  control systems subjected to false-injection-data attack},
  journal      = {Syst. Control. Lett.},
  volume       = {190},
  pages        = {105843},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysconle.2024.105843},
  doi          = {10.1016/J.SYSCONLE.2024.105843},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scl/LiSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/BudatiISCN24,
  author       = {Anil Kumar Budati and
                  Shayla Islam and
                  Mohammad Rafee Shaik and
                  Chengamma Chitteti and
                  T. Lakshmi Narayana},
  title        = {Security Enabled New Term Weight Measure Technique with Data Driven
                  for Next Generation Mobile Computing Networks},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {2},
  pages        = {1191--1198},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i2.2624},
  doi          = {10.12694/SCPE.V25I2.2624},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/BudatiISCN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/HangXZH24a,
  author       = {Feilu Hang and
                  Linjiang Xie and
                  Zhenhong Zhang and
                  Jian Hu},
  title        = {Construction of Power System Network Security Defense Behavior Decision-making
                  Model based on Artificial Intelligence Technology},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {4},
  pages        = {2614--2620},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i4.2913},
  doi          = {10.12694/SCPE.V25I4.2913},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/HangXZH24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Liao24,
  author       = {Yan Liao},
  title        = {Enhancing Industrial Control Network Security Through Vulnerability
                  Detection and Attack Graph Analysis},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {1},
  pages        = {65--74},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i1.2254},
  doi          = {10.12694/SCPE.V25I1.2254},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/Liao24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/LiaoZY24,
  author       = {Zhouyuan Liao and
                  Zhenhong Zhang and
                  Ying Yan},
  title        = {Verification and Optimization of Network Security Defense System from
                  the Perspective of Blue Army in Actual Offensive and Defensive Exercises},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {4},
  pages        = {2596--2602},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i4.2901},
  doi          = {10.12694/SCPE.V25I4.2901},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/LiaoZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Long24,
  author       = {Kaiyi Long},
  title        = {A Study of Blockchain and Machine Learning-Enabled IoT Security in
                  Time-Delayed Neural Network Vocal Pattern Recognition to Improve Web-Based
                  Vocal Teaching},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {2},
  pages        = {812--823},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i2.2645},
  doi          = {10.12694/SCPE.V25I2.2645},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/Long24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/LuKY24,
  author       = {Yan Lu and
                  Yunxin Kuang and
                  Qiufen Yang},
  title        = {Intelligent Prediction of Network Security Situations based on Deep
                  Reinforcement Learning Algorithm},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {1},
  pages        = {147--155},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i1.2329},
  doi          = {10.12694/SCPE.V25I1.2329},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/LuKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/SongCZ24,
  author       = {Chunna Song and
                  Jinfang Cheng and
                  Guoqiu Zhang},
  title        = {Network Security with Virtual Reality based Antivirus Protection and
                  Reduced Detection Delays},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {1},
  pages        = {35--44},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i1.2172},
  doi          = {10.12694/SCPE.V25I1.2172},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/SongCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/TianCZLLLP24,
  author       = {Chongfeng Tian and
                  Zhihao Chen and
                  Yi Zhu and
                  Hongfei Lu and
                  Guoxiao Li and
                  Rongquan Li and
                  Wei Pan},
  title        = {Optimization of Computer Network Security System Based on Improved
                  Neural Network Algorithm and Data Searching},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {5},
  pages        = {3979--3988},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i5.3150},
  doi          = {10.12694/SCPE.V25I5.3150},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/TianCZLLLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Yang24b,
  author       = {Bingyu Yang},
  title        = {Research on Network Security Situation Awareness Technology Based
                  on Security Intelligent Monitoring Technology},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {2},
  pages        = {1107--1116},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i2.2604},
  doi          = {10.12694/SCPE.V25I2.2604},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/Yang24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AzizB24,
  author       = {Zagroz Aziz and
                  Robert Bestak},
  title        = {Insight into Anomaly Detection and Prediction and Mobile Network Security
                  Enhancement Leveraging K-Means Clustering on Call Detail Records},
  journal      = {Sensors},
  volume       = {24},
  number       = {6},
  pages        = {1716},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24061716},
  doi          = {10.3390/S24061716},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AzizB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GaoDZ24,
  author       = {Qingji Gao and
                  Haozhi Deng and
                  Gaowei Zhang},
  title        = {A Contraband Detection Scheme in X-ray Security Images Based on Improved
                  YOLOv8s Network Model},
  journal      = {Sensors},
  volume       = {24},
  number       = {4},
  pages        = {1158},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24041158},
  doi          = {10.3390/S24041158},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/GaoDZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HanainehMGB24,
  author       = {Wael Al Hanaineh and
                  Jos{\'{e}} Matas and
                  Josep M. Guerrero and
                  Mostafa Bakkar},
  title        = {A Secure Dual-Layer Fault Protection Strategy for Distribution Network
                  with DERs: Enhancing Security in the Face of Communication Challenges},
  journal      = {Sensors},
  volume       = {24},
  number       = {4},
  pages        = {1057},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24041057},
  doi          = {10.3390/S24041057},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HanainehMGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuHWZO24,
  author       = {Liyazhou Hu and
                  Chao Han and
                  Xiaojun Wang and
                  Han Zhu and
                  Jian Ouyang},
  title        = {Security Enhancement for Deep Reinforcement Learning-Based Strategy
                  in Energy-Efficient Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {24},
  number       = {6},
  pages        = {1993},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24061993},
  doi          = {10.3390/S24061993},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HuHWZO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KhanKA24,
  author       = {Shafiullah Khan and
                  Muhammad Altaf Khan and
                  Noha Alnazzawi},
  title        = {Artificial Neural Network-Based Mechanism to Detect Security Threats
                  in Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {24},
  number       = {5},
  pages        = {1641},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24051641},
  doi          = {10.3390/S24051641},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KhanKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiWLYYY24,
  author       = {Guoxing Li and
                  Yuhe Wang and
                  Shiming Li and
                  Chao Yang and
                  Qingqing Yang and
                  Yanbin Yuan},
  title        = {Network Security Prediction of Industrial Control Based on Projection
                  Equalization Optimization Algorithm},
  journal      = {Sensors},
  volume       = {24},
  number       = {14},
  pages        = {4716},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24144716},
  doi          = {10.3390/S24144716},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiWLYYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MaZM24,
  author       = {Ronghao Ma and
                  Jianhong Zhou and
                  Maode Ma},
  title        = {A Blockchain-Assisted Security Protocol for Group Handover of {MTC}
                  Devices in 5G Wireless Networks},
  journal      = {Sensors},
  volume       = {24},
  number       = {7},
  pages        = {2331},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24072331},
  doi          = {10.3390/S24072331},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MaZM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MengistuKL24,
  author       = {Tesfahunegn Minwuyelet Mengistu and
                  Taewoon Kim and
                  Jenn{-}Wei Lin},
  title        = {A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation
                  in the Integration of IoT, Wireless Sensor Networks and Federated
                  Learning},
  journal      = {Sensors},
  volume       = {24},
  number       = {3},
  pages        = {968},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24030968},
  doi          = {10.3390/S24030968},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/MengistuKL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TranTVNRL24,
  author       = {Minh Tran and
                  Lam{-}Thanh Tu and
                  Minh Bui Vu and
                  Sang Quang Nguyen and
                  Lubos Rejfek and
                  Byung Moo Lee},
  title        = {Security and Reliability Analysis of the Power Splitting-Based Relaying
                  in Wireless Sensors Network},
  journal      = {Sensors},
  volume       = {24},
  number       = {4},
  pages        = {1300},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24041300},
  doi          = {10.3390/S24041300},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/TranTVNRL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UllahTUCZ24,
  author       = {Farhan Ullah and
                  Ali Turab and
                  Shamsher Ullah and
                  Diletta Cacciagrano and
                  Yue Zhao},
  title        = {Enhanced Network Intrusion Detection System for Internet of Things
                  Security Using Multimodal Big Data Representation with Transfer Learning
                  and Game Theory},
  journal      = {Sensors},
  volume       = {24},
  number       = {13},
  pages        = {4152},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24134152},
  doi          = {10.3390/S24134152},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/UllahTUCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YingZW24,
  author       = {Fei Ying and
                  Shengjie Zhao and
                  Jia Wang},
  title        = {A Security Information Transmission Method Based on {DHR} for Seafloor
                  Observation Network},
  journal      = {Sensors},
  volume       = {24},
  number       = {4},
  pages        = {1147},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24041147},
  doi          = {10.3390/S24041147},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/YingZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/Singh24,
  author       = {Surendra Singh},
  title        = {Energy efficient Security Driven Scheduling for Real-Time Tasks through
                  DVS-enabled Fog Networks},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {134},
  pages        = {102941},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.simpat.2024.102941},
  doi          = {10.1016/J.SIMPAT.2024.102941},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/Singh24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/Kumar00KJ24,
  author       = {Rakesh Kumar and
                  Sunil K. Singh and
                  D. K. Lobiyal and
                  Sudhakar Kumar and
                  Shashi Jawla},
  title        = {Security Metrics and Authentication-based RouTing {(SMART)} Protocol
                  for Vehicular IoT Networks},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {2},
  pages        = {236},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-023-02566-7},
  doi          = {10.1007/S42979-023-02566-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/Kumar00KJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/SinghM24a,
  author       = {Wangjam Niranjan Singh and
                  Ningrinla Marchang},
  title        = {Mitigating Security Attacks in Spectrum Allocation in Cognitive Radio
                  Networks},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {5},
  pages        = {451},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02819-z},
  doi          = {10.1007/S42979-024-02819-Z},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/SinghM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/CuiCSDXF24,
  author       = {Zhiwei Cui and
                  Baojiang Cui and
                  Li Su and
                  Haitao Du and
                  Jie Xu and
                  Junsong Fu},
  title        = {A formal security analysis of the fast authentication procedure based
                  on the security context in 5G networks},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {3},
  pages        = {1865--1881},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-09486-x},
  doi          = {10.1007/S00500-023-09486-X},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/CuiCSDXF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/suscom/DeivakaniSPF24,
  author       = {M. Deivakani and
                  M. Sahaya Sheela and
                  K. Priyadarsini and
                  Yousef Farhaoui},
  title        = {An intelligent security mechanism in mobile Ad-Hoc networks using
                  precision probability genetic algorithms {(PPGA)} and deep learning
                  technique (Stacked {LSTM)}},
  journal      = {Sustain. Comput. Informatics Syst.},
  volume       = {43},
  pages        = {101021},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.suscom.2024.101021},
  doi          = {10.1016/J.SUSCOM.2024.101021},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/suscom/DeivakaniSPF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talip/GaoWQ24,
  author       = {Yuan Gao and
                  Yani Wu and
                  Jun Qian},
  title        = {Intelligent Multimedia Network Security and {PBL} Teaching Mode in
                  the Basic Course Teaching of College Design Major},
  journal      = {{ACM} Trans. Asian Low Resour. Lang. Inf. Process.},
  volume       = {23},
  number       = {6},
  pages        = {83},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597429},
  doi          = {10.1145/3597429},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/talip/GaoWQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/LiuXY24,
  author       = {Bing{-}Xin Liu and
                  Guang{-}Bao Xu and
                  Yu{-}Guang Yang},
  title        = {Complete Security Solution for Practical Quantum Network Coding},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {43},
  number       = {9},
  pages        = {2692--2704},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCAD.2024.3382827},
  doi          = {10.1109/TCAD.2024.3382827},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/LiuXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/DaiHWLXL24,
  author       = {Penglin Dai and
                  Yaorong Huang and
                  Xiao Wu and
                  Ke Li and
                  Huanlai Xing and
                  Kai Liu},
  title        = {Freshness and Security-Aware Cache Update in Blockchain-Based Vehicular
                  Edge Networks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {108--121},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3345861},
  doi          = {10.1109/TCE.2023.3345861},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/DaiHWLXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/WuNXSYN24,
  author       = {Yixuan Wu and
                  Laisen Nie and
                  Xuanrui Xiong and
                  Balqies Sadoun and
                  Lin Yang and
                  Zhaolong Ning},
  title        = {Incremental Update Intrusion Detection for Industry 5.0 Security:
                  {A} Graph Attention Network-Enabled Approach},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {2004--2017},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3331907},
  doi          = {10.1109/TCE.2023.3331907},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/WuNXSYN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/XuWZLX24,
  author       = {Bo Xu and
                  Jinpeng Wang and
                  Zhehuan Zhao and
                  Hongfei Lin and
                  Feng Xia},
  title        = {Unsupervised Anomaly Detection on Attributed Networks With Graph Contrastive
                  Learning for Consumer Electronics Security},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {4062--4072},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2024.3355122},
  doi          = {10.1109/TCE.2024.3355122},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/XuWZLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/YangXLWL24,
  author       = {Aimin Yang and
                  Baoshan Xie and
                  Yikai Liu and
                  Liya Wang and
                  Jie Li},
  title        = {A Network Security Situation Prediction for Consumer Data in the Internet
                  of Things Using Variational Mode Decomposition {(VMD)} and Fused CNN-BiLSTM-Attention},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1122--1133},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3323546},
  doi          = {10.1109/TCE.2023.3323546},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/YangXLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/AghajanPM24,
  author       = {Adel Aghajan and
                  Keith Paarporn and
                  Jason R. Marden},
  title        = {Extension Theorems for General Lotto Games With Applications to Network
                  Security},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {185--196},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCNS.2023.3272823},
  doi          = {10.1109/TCNS.2023.3272823},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/AghajanPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/OrugantiNA24,
  author       = {Pradeep Sharma Oruganti and
                  Parinaz Naghizadeh and
                  Qadeer Ahmed},
  title        = {The Impact of Network Design Interventions on the Security of Interdependent
                  Systems},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {173--184},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCNS.2023.3272849},
  doi          = {10.1109/TCNS.2023.3272849},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/OrugantiNA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuCWW24,
  author       = {Chuan Yu and
                  Shuhui Chen and
                  Ziling Wei and
                  Fei Wang},
  title        = {Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable
                  Security Configurations/ Implementations in Commercial {LTE/IMS} Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3048--3064},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3322267},
  doi          = {10.1109/TDSC.2023.3322267},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YuCWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangYLH24,
  author       = {Shiyu Wang and
                  Ming Yin and
                  Yiwen Liu and
                  Guofeng He},
  title        = {Generative adversarial networks-based security and applications in
                  cloud computing: a survey},
  journal      = {Telecommun. Syst.},
  volume       = {86},
  number       = {2},
  pages        = {305--331},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11235-024-01166-x},
  doi          = {10.1007/S11235-024-01166-X},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/WangYLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/LiuWZ24a,
  author       = {Siting Liu and
                  Changlin Wang and
                  Yong Zhou},
  title        = {Analysis of Financial Data Risk and Network Information Security by
                  Blockchain Technology and Edge Computing},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {71},
  pages        = {12579--12592},
  year         = {2024},
  url          = {https://doi.org/10.1109/TEM.2022.3224290},
  doi          = {10.1109/TEM.2022.3224290},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/LiuWZ24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ZhuGJZ24,
  author       = {Huifeng Zhu and
                  Xiaolong Guo and
                  Yier Jin and
                  Xuan Zhang},
  title        = {PowerScout: Security-Oriented Power Delivery Network Modeling for
                  Side-Channel Vulnerability Analysis},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {532--545},
  year         = {2024},
  url          = {https://doi.org/10.1109/TETC.2023.3257826},
  doi          = {10.1109/TETC.2023.3257826},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/ZhuGJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/TanGPXW24,
  author       = {Cheng Tan and
                  Chengzhen Gao and
                  Jinzhu Peng and
                  Xiangpeng Xie and
                  Yaonan Wang},
  title        = {Neural-Network-Based Security Control for {T-S} Fuzzy System With
                  Cooperative Event-Triggered Mechanism},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {8},
  pages        = {4633--4645},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2024.3407751},
  doi          = {10.1109/TFUZZ.2024.3407751},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/TanGPXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiSSCWQT24,
  author       = {Xiao Cai and
                  Kaibo Shi and
                  Yanbin Sun and
                  Jinde Cao and
                  Shiping Wen and
                  Cheng Qiao and
                  Zhihong Tian},
  title        = {Stability Analysis of Networked Control Systems Under DoS Attacks
                  and Security Controller Design With Mini-Batch Machine Learning Supervision},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3857--3865},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347889},
  doi          = {10.1109/TIFS.2023.3347889},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaiSSCWQT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SuoCCPXL24,
  author       = {Yuhan Suo and
                  Senchun Chai and
                  Runqi Chai and
                  Zhong{-}Hua Pang and
                  Yuanqing Xia and
                  Guo{-}Ping Liu},
  title        = {Security Defense of Large-Scale Networks Under False Data Injection
                  Attacks: An Attack Detection Scheduling Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1908--1921},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3340098},
  doi          = {10.1109/TIFS.2023.3340098},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/SuoCCPXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GuangBY24,
  author       = {Xuan Guang and
                  Yang Bai and
                  Raymond W. Yeung},
  title        = {Secure Network Function Computation for Linear Functions - Part {I:}
                  Source Security},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {70},
  number       = {1},
  pages        = {676--697},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIT.2023.3328454},
  doi          = {10.1109/TIT.2023.3328454},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GuangBY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangZWKF24,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Security Enhanced Authentication Protocol for Space-Ground Integrated
                  Railway Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {370--385},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3307453},
  doi          = {10.1109/TITS.2023.3307453},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZWKF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WeiAZZ24,
  author       = {Hongqian Wei and
                  Qiang Ai and
                  Yong Zhai and
                  Youtong Zhang},
  title        = {Automotive Security: Threat Forewarning and {ECU} Source Mapping Derived
                  From Physical Features of Network Signals},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {3},
  pages        = {2479--2491},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3321896},
  doi          = {10.1109/TITS.2023.3321896},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/WeiAZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/DongYZ24,
  author       = {Jiahao Dong and
                  Zehua Ye and
                  Dan Zhang},
  title        = {Finite-Time Security Control of Networked Unmanned Marine Vehicle
                  Systems Subject to DoS Attack},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {2},
  pages        = {3464--3477},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2024.3350246},
  doi          = {10.1109/TIV.2024.3350246},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/DongYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/Pu24,
  title        = {Retraction Note: Network security situation analysis based on a dynamic
                  Bayesian network and phase space reconstruction},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {10},
  pages        = {15101},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-05971-8},
  doi          = {10.1007/S11227-024-05971-8},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/Pu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/JebreelDBS24,
  author       = {Najeeb Moharram Jebreel and
                  Josep Domingo{-}Ferrer and
                  Alberto Blanco{-}Justicia and
                  David S{\'{a}}nchez},
  title        = {Enhanced Security and Privacy via Fragmented Federated Learning},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {5},
  pages        = {6703--6717},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3212627},
  doi          = {10.1109/TNNLS.2022.3212627},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/JebreelDBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhuoSG24,
  author       = {Yue Zhuo and
                  Zhihuan Song and
                  Zhiqiang Ge},
  title        = {Security Versus Accuracy: Trade-Off Data Modeling to Safe Fault Classification
                  Systems},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {9},
  pages        = {12095--12106},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2023.3251999},
  doi          = {10.1109/TNNLS.2023.3251999},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhuoSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/BozorgchenaniZCNGML24,
  author       = {Arash Bozorgchenani and
                  Charilaos C. Zarakovitis and
                  Su Fong Chien and
                  Qiang Ni and
                  Antonios Gouglidis and
                  Wissam Mallouli and
                  Heng Siong Lim},
  title        = {Intrusion Response Systems for the 5G Networks and Beyond: {A} New
                  Joint Security-vs-QoS Optimization Approach},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {3039--3052},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2024.3358170},
  doi          = {10.1109/TNSE.2024.3358170},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/BozorgchenaniZCNGML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/CaiYGWZG24,
  author       = {Yunfei Cai and
                  Haipeng Yao and
                  Yongkang Gong and
                  Fu Wang and
                  Ni Zhang and
                  Mohsen Guizani},
  title        = {Privacy-Driven Security-Aware Task Scheduling Mechanism for Space-Air-Ground
                  Integrated Networks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {5},
  pages        = {4704--4718},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2024.3392389},
  doi          = {10.1109/TNSE.2024.3392389},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/CaiYGWZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhuYZNZ24,
  author       = {Qingcheng Zhu and
                  Xiaosong Yu and
                  Yongli Zhao and
                  Avishek Nag and
                  Jie Zhang},
  title        = {{QKD} Key Provisioning With Multi-Level Pool Slicing for End-to-End
                  Security Services in Optical Networks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {2153--2169},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3338734},
  doi          = {10.1109/TNSE.2023.3338734},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhuYZNZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/BringhentiBSV24,
  author       = {Daniele Bringhenti and
                  Simone Bussa and
                  Riccardo Sisto and
                  Fulvio Valenza},
  title        = {A Two-Fold Traffic Flow Model for Network Security Management},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {3740--3758},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3407159},
  doi          = {10.1109/TNSM.2024.3407159},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/BringhentiBSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SedjelmaciB24,
  author       = {Hichem Sedjelmaci and
                  Abdelwahab Boualouache},
  title        = {When Two-Layer Federated Learning and Mean-Field Game Meet 5G and
                  Beyond Security: Cooperative Defense Systems for 5G and Beyond Network
                  Slicing},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1178--1189},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2023.3294568},
  doi          = {10.1109/TNSM.2023.3294568},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SedjelmaciB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/YangRSM24,
  author       = {Li Yang and
                  Mirna El Rajab and
                  Abdallah Shami and
                  Sami Muhaidat},
  title        = {Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {3555--3582},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3376631},
  doi          = {10.1109/TNSM.2024.3376631},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/YangRSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZhaoJZHZ24,
  author       = {Dongmei Zhao and
                  Guoqing Ji and
                  Yiling Zhang and
                  Xunzheng Han and
                  Shuiguang Zeng},
  title        = {A Network Security Situation Prediction Method Based on SSA-GResNeSt},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {3498--3510},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3373663},
  doi          = {10.1109/TNSM.2024.3373663},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZhaoJZHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LiLJWTC24,
  author       = {Yixin Li and
                  Liang Liang and
                  Yunjian Jia and
                  Wanli Wen and
                  Chaowei Tang and
                  Zhengchuan Chen},
  title        = {Blockchain for Data Sharing at the Network Edge: Trade-Off Between
                  Capability and Security},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {32},
  number       = {3},
  pages        = {2616--2630},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNET.2024.3364023},
  doi          = {10.1109/TNET.2024.3364023},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/LiLJWTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ChengZCCJX24,
  author       = {Yushi Cheng and
                  Boyang Zhou and
                  Yanjiao Chen and
                  Yi{-}Chao Chen and
                  Xiaoyu Ji and
                  Wenyuan Xu},
  title        = {Evaluating Compressive Sensing on the Security of Computer Vision
                  Systems},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {3},
  pages        = {56:1--56:24},
  year         = {2024},
  url          = {https://doi.org/10.1145/3645093},
  doi          = {10.1145/3645093},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ChengZCCJX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/JuYCLPXY24,
  author       = {Ying Ju and
                  Mingjie Yang and
                  Chinmay Chakraborty and
                  Lei Liu and
                  Qingqi Pei and
                  Ming Xiao and
                  Keping Yu},
  title        = {Reliability-Security Tradeoff Analysis in mmWave Ad Hoc-based {CPS}},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {28:1--28:23},
  year         = {2024},
  url          = {https://doi.org/10.1145/3582556},
  doi          = {10.1145/3582556},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/JuYCLPXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LiSX24,
  author       = {Fangyu Li and
                  WenZhan Song and
                  Xiaohua Xu},
  title        = {Editorial: Special Issue on Cyber-Physical Security and Zero Trust},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {26:1--26:2},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634700},
  doi          = {10.1145/3634700},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LiSX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LiuTZWLZ24,
  author       = {Junyi Liu and
                  Yifu Tang and
                  Haimeng Zhao and
                  Xieheng Wang and
                  Fangyu Li and
                  Jingyi Zhang},
  title        = {{CPS} Attack Detection under Limited Local Information in Cyber Security:
                  An Ensemble Multi-Node Multi-Class Classification Approach},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {33:1--33:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3585520},
  doi          = {10.1145/3585520},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LiuTZWLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/WangLLZ24,
  author       = {Di Wang and
                  Fangyu Li and
                  Kaibo Liu and
                  Xi Zhang},
  title        = {Real-time Cyber-Physical Security Solution Leveraging an Integrated
                  Learning-Based Approach},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {2},
  pages        = {27:1--27:22},
  year         = {2024},
  url          = {https://doi.org/10.1145/3582009},
  doi          = {10.1145/3582009},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/WangLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/LeiBW024,
  author       = {Chao Lei and
                  Siqi Bu and
                  Qianggang Wang and
                  Liang Liang},
  title        = {Observability Defense-Constrained Distribution Network Reconfiguration
                  for Cyber-Physical Security Enhancement},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2379--2382},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3334078},
  doi          = {10.1109/TSG.2023.3334078},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/LeiBW024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ZhangDY24a,
  author       = {Zhijun Zhang and
                  Zhao Yang Dong and
                  Christine Yip},
  title        = {When Mobile Energy Meets Active Distribution Networks: {A} Security-Economic
                  Coordination Perspective},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {3},
  pages        = {3126--3140},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3339617},
  doi          = {10.1109/TSG.2023.3339617},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/ZhangDY24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/ZhaGLXT24,
  author       = {Lijuan Zha and
                  Yaping Guo and
                  Jinliang Liu and
                  Xiangpeng Xie and
                  Engang Tian},
  title        = {Protocol-Based Distributed Security Fusion Estimation for Time-Varying
                  Uncertain Systems Over Sensor Networks: Tackling DoS Attacks},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {10},
  pages        = {119--130},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSIPN.2024.3356789},
  doi          = {10.1109/TSIPN.2024.3356789},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/ZhaGLXT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LiuKLXT24,
  author       = {Jian Liu and
                  Jiachen Ke and
                  Jinliang Liu and
                  Xiangpeng Xie and
                  Engang Tian},
  title        = {Stochastic Communication Protocol-Based Security Control for Discrete-Time
                  Networked Systems Using State Observer},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {54},
  number       = {9},
  pages        = {5501--5512},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSMC.2024.3406563},
  doi          = {10.1109/TSMC.2024.3406563},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/LiuKLXT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/MarabissiMM24,
  author       = {Dania Marabissi and
                  Simone Morosi and
                  Lorenzo Mucchi},
  title        = {Green Security in Ultra-Dense Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {6},
  pages        = {8736--8749},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2024.3356908},
  doi          = {10.1109/TVT.2024.3356908},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/MarabissiMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhouHJNLL24,
  author       = {Tianqing Zhou and
                  Haiqin Hu and
                  Nan Jiang and
                  Xuefang Nie and
                  Xuan Li and
                  Chunguo Li},
  title        = {Joint Security Service Assignment, Power Control and Multi-Step Computation
                  Offloading in Ultra-Dense Multi-Task NOMA-Enabled Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {7},
  pages        = {10211--10227},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2024.3368019},
  doi          = {10.1109/TVT.2024.3368019},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhouHJNLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/AliAHC24,
  author       = {Konpal Shaukat Ali and
                  Arafat Al{-}Dweik and
                  Ekram Hossain and
                  Marwa Chafii},
  title        = {Physical Layer Security of Partial-NOMA and {NOMA} in Poisson Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {23},
  number       = {6},
  pages        = {6562--6579},
  year         = {2024},
  url          = {https://doi.org/10.1109/TWC.2023.3334020},
  doi          = {10.1109/TWC.2023.3334020},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/AliAHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/FengLZNW24,
  author       = {Shaohan Feng and
                  Xiao Lu and
                  Kun Zhu and
                  Dusit Niyato and
                  Ping Wang},
  title        = {Covert {D2D} Communication Underlaying Cellular Network: {A} System-Level
                  Security Perspective},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {23},
  number       = {8},
  pages        = {9518--9533},
  year         = {2024},
  url          = {https://doi.org/10.1109/TWC.2024.3363186},
  doi          = {10.1109/TWC.2024.3363186},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/FengLZNW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/AlthunayyanJR24,
  author       = {Muzun Althunayyan and
                  Amir Javed and
                  Omer Rana},
  title        = {A robust multi-stage intrusion detection system for in-vehicle network
                  security using hierarchical federated learning},
  journal      = {Veh. Commun.},
  volume       = {49},
  pages        = {100837},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.vehcom.2024.100837},
  doi          = {10.1016/J.VEHCOM.2024.100837},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/AlthunayyanJR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/FanWBLGW24,
  author       = {Na Fan and
                  Chase Wu and
                  Slimane Benabdallah and
                  Jialong Li and
                  Yuxin Gao and
                  Qinglong Wang},
  title        = {On a security scheme against collusive attacks in vehicular ad hoc
                  networks},
  journal      = {Veh. Commun.},
  volume       = {49},
  pages        = {100821},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.vehcom.2024.100821},
  doi          = {10.1016/J.VEHCOM.2024.100821},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/FanWBLGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/OdongEAA24,
  author       = {Patrick Odong and
                  Ahmed H. Abd El{-}Malek and
                  Ahmed Allam and
                  Adel B. Abdel{-}Rahman},
  title        = {Physical layer security in SWIPT-based cooperative vehicular relaying
                  networks},
  journal      = {Veh. Commun.},
  volume       = {49},
  pages        = {100835},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.vehcom.2024.100835},
  doi          = {10.1016/J.VEHCOM.2024.100835},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/OdongEAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/ZhaoSHZ24,
  author       = {Dongmei Zhao and
                  Pengcheng Shen and
                  Xunzheng Han and
                  Shuiguang Zeng},
  title        = {Security situation assessment in {UAV} swarm networks using TransReSE:
                  {A} Transformer-ResNeXt-SE based approach},
  journal      = {Veh. Commun.},
  volume       = {50},
  pages        = {100842},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.vehcom.2024.100842},
  doi          = {10.1016/J.VEHCOM.2024.100842},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/ZhaoSHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/ZhangDXRLLH24,
  author       = {Xuemin Zhang and
                  Haitao Deng and
                  Zenggang Xiong and
                  Ying Rao and
                  Yanchao Liu and
                  Yuan Li and
                  Delin Hou},
  title        = {Self-Organizing Key Security Management Algorithm in Socially Aware
                  Networking},
  journal      = {J. Signal Process. Syst.},
  volume       = {96},
  number       = {6-7},
  pages        = {369--383},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11265-024-01918-7},
  doi          = {10.1007/S11265-024-01918-7},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/ZhangDXRLLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/AbdallaMAM24,
  author       = {Aly Sabri Abdalla and
                  Joshua Moore and
                  Nisha Adhikari and
                  Vuk Marojevic},
  title        = {{ZTRAN:} Prototyping Zero Trust Security xApps for Open Radio Access
                  Network Deployments},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {2},
  pages        = {66--73},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.001.2300419},
  doi          = {10.1109/MWC.001.2300419},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/AbdallaMAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/AloqailyPLTH24,
  author       = {Moayad Aloqaily and
                  Helen Paik and
                  Willian T. Lunardi and
                  Cihan Tunc and
                  Fang He},
  title        = {Guest Editorial: Zero Trust Security Methods for Wireless Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {2},
  pages        = {12--13},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.2024.10495912},
  doi          = {10.1109/MWC.2024.10495912},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/AloqailyPLTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/Ansari24,
  author       = {Nirwan Ansari},
  title        = {Advancements in Wireless Network Security and Next-Generation Technologies},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {2},
  pages        = {2--3},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.2024.10495917},
  doi          = {10.1109/MWC.2024.10495917},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/Ansari24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/CaoYGAG24,
  author       = {Haotong Cao and
                  Longxiang Yang and
                  Sahil Garg and
                  Mubarak Alrashoud and
                  Mohsen Guizani},
  title        = {Softwarized Resource Allocation of Tailored Services with Zero Security
                  Trust in 6G Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {2},
  pages        = {58--65},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.001.2300383},
  doi          = {10.1109/MWC.001.2300383},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/CaoYGAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/LiuSPXWL24,
  author       = {Yiliang Liu and
                  Zhou Su and
                  Haixia Peng and
                  Yushan Xiang and
                  Wei Wang and
                  Ruidong Li},
  title        = {Zero Trust-Based Mobile Network Security Architecture},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {2},
  pages        = {82--88},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.001.2300375},
  doi          = {10.1109/MWC.001.2300375},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/LiuSPXWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/WangLLK24,
  author       = {Jiadai Wang and
                  Yuanhao Li and
                  Jiajia Liu and
                  Nei Kato},
  title        = {Intelligent Network Slicing for {B5G} and 6G: Resource Allocation,
                  Service Provisioning, and Security},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {3},
  pages        = {271--277},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.021.2200589},
  doi          = {10.1109/MWC.021.2200589},
  timestamp    = {Wed, 03 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/WangLLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/WangYKNHG24,
  author       = {Weizheng Wang and
                  Yaoqi Yang and
                  Latif U. Khan and
                  Dusit Niyato and
                  Zhu Han and
                  Mohsen Guizani},
  title        = {Digital Twin for Wireless Networks: Security Attacks and Solutions},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {31},
  number       = {3},
  pages        = {278--285},
  year         = {2024},
  url          = {https://doi.org/10.1109/MWC.020.2200609},
  doi          = {10.1109/MWC.020.2200609},
  timestamp    = {Wed, 03 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/WangYKNHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AlghamdiSAKSDRV24,
  author       = {Abdullah Alghamdi and
                  Ali M. Al Shahrani and
                  Sultan Sughair AlYami and
                  Ihtiram Raza Khan and
                  P. S. G. Aruna Sri and
                  Papiya Dutta and
                  Ali Rizwan and
                  Prashanth Venkatareddy},
  title        = {Security and energy efficient cyber-physical systems using predictive
                  modeling approaches in wireless sensor network},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {6},
  pages        = {5851--5866},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-023-03345-1},
  doi          = {10.1007/S11276-023-03345-1},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/AlghamdiSAKSDRV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/DingW24,
  author       = {Zhenguo Ding and
                  Yuejin Wang},
  title        = {Multi-step attack threat recognition algorithm based on attribute
                  association in internet of things security},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {5},
  pages        = {4275--4286},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-022-02940-y},
  doi          = {10.1007/S11276-022-02940-Y},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/DingW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/FusterSPVPAL24,
  author       = {Jaime F{\'{u}}ster and
                  Sonia Solera{-}Cotanilla and
                  Jaime P{\'{e}}rez and
                  Mario Vega{-}Barbas and
                  Rafael Palacios and
                  Manuel Alvarez{-}Campana and
                  Gregorio L{\'{o}}pez},
  title        = {Analysis of security and privacy issues in wearables for minors},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {6},
  pages        = {5437--5453},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-022-03211-6},
  doi          = {10.1007/S11276-022-03211-6},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/FusterSPVPAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/JegatheesanA24,
  author       = {Divya Jegatheesan and
                  Chandrasekar Arumugam},
  title        = {SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security
                  and energy efficiency in social internet of vehicles},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {4},
  pages        = {2061--2080},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-023-03626-9},
  doi          = {10.1007/S11276-023-03626-9},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/JegatheesanA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/MohanrajK24,
  author       = {P. Mohanraj and
                  S. Anbu Karuppusamy},
  title        = {Efficient security framework against sybil attack in mobile adhoc
                  network using {EE-OLSR} protocol scheme},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {2},
  pages        = {661--669},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-023-03502-6},
  doi          = {10.1007/S11276-023-03502-6},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/MohanrajK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/PandeyB24,
  author       = {Shraiyash Pandey and
                  Bharat Bhushan},
  title        = {Recent Lightweight cryptography {(LWC)} based security advances for
                  resource-constrained IoT networks},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {4},
  pages        = {2987--3026},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-024-03714-4},
  doi          = {10.1007/S11276-024-03714-4},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/PandeyB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/PorkodiK24,
  author       = {S. Porkodi and
                  D. Kesavaraja},
  title        = {Scammer identification using CatBoost in smart contract for enhancing
                  security in blockchain network},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {3},
  pages        = {1165--1186},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-023-03552-w},
  doi          = {10.1007/S11276-023-03552-W},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/PorkodiK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/PorkodiK24a,
  author       = {S. Porkodi and
                  D. Kesavaraja},
  title        = {Smart contract: a survey towards extortionate vulnerability detection
                  and security enhancement},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {3},
  pages        = {1285--1304},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-023-03587-z},
  doi          = {10.1007/S11276-023-03587-Z},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/PorkodiK24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/SoundararajanNNV24,
  author       = {S. Soundararajan and
                  B. Nithya and
                  N. Nithya and
                  T. Vignesh},
  title        = {Block chain espoused adaptive multi-scale dual attention network with
                  quaternion fractional order meixner moments encryption for cyber security
                  in wireless communication network},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {4},
  pages        = {2439--2455},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-024-03674-9},
  doi          = {10.1007/S11276-024-03674-9},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/SoundararajanNNV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/TamizshelvanV24,
  author       = {C. Tamizshelvan and
                  V. Vijayalakshmi},
  title        = {Cloud data access governance and data security using distributed infrastructure
                  with hybrid machine learning architectures},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {4},
  pages        = {2099--2114},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-024-03658-9},
  doi          = {10.1007/S11276-024-03658-9},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/TamizshelvanV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/DeviS24a,
  author       = {V. Anusuya Devi and
                  T. Sampradeepraj},
  title        = {End-to-End Self-organizing Intelligent Security Model for Wireless
                  Sensor Network based on a Hybrid {(AES-RSA)} Cryptography},
  journal      = {Wirel. Pers. Commun.},
  volume       = {136},
  number       = {3},
  pages        = {1675--1703},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11353-3},
  doi          = {10.1007/S11277-024-11353-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/DeviS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/FatimaAMKC24,
  author       = {Sumbal Fatima and
                  Muhammad Arslan Akram and
                  Adnan Noor Mian and
                  Saru Kumari and
                  Chien{-}Ming Chen},
  title        = {On the Security of a Blockchain and PUF-Based Lightweight Authentication
                  Protocol for Wireless Medical Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {136},
  number       = {2},
  pages        = {1079--1106},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11318-6},
  doi          = {10.1007/S11277-024-11318-6},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/FatimaAMKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MoundoungaSBES24,
  author       = {Anselme Russel Affane Moundounga and
                  Hassan Satori and
                  Youssef Boutazart and
                  Abderahim Ezzine and
                  Khalid Satori},
  title        = {Machine Learning-Based Attack Detection for Wireless Sensor Network
                  Security Using Hidden Markov Models},
  journal      = {Wirel. Pers. Commun.},
  volume       = {135},
  number       = {4},
  pages        = {1965--1992},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-10999-3},
  doi          = {10.1007/S11277-024-10999-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MoundoungaSBES24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/RanaCP24,
  author       = {Pragati Rana and
                  Sanjeev Chauhan and
                  B. P. Patil},
  title        = {Cyber Security Threats Detection in IoT Using Krill Based Deep Neural
                  Network Stacked Auto Encoders},
  journal      = {Wirel. Pers. Commun.},
  volume       = {135},
  number       = {1},
  pages        = {299--322},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11002-9},
  doi          = {10.1007/S11277-024-11002-9},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/RanaCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/SekharM24,
  author       = {P. Chandra Sekhar and
                  T. S. N. Murthy},
  title        = {{RSMO:} Rider Spider Monkey Optimization-Based Artificial Noise Precoding
                  Technique for Physical Layer Security in 5G Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {135},
  number       = {4},
  pages        = {2355--2377},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11166-4},
  doi          = {10.1007/S11277-024-11166-4},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SekharM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/SelviGMYR24,
  author       = {M. Selvi and
                  Kalaiarasi Governor and
                  Suja Cherukullapurath Mana and
                  R. Yogitha and
                  Padmavathy Ramanujam},
  title        = {Energy and Security Aware Hybrid Optimal Cluster-based Routing in
                  Wireless Sensor Network},
  journal      = {Wirel. Pers. Commun.},
  volume       = {137},
  number       = {3},
  pages        = {1395--1422},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11288-9},
  doi          = {10.1007/S11277-024-11288-9},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SelviGMYR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/SharmaPC24,
  author       = {Rishi Sharma and
                  Anjali Potnis and
                  Vijayshri Chaurasia},
  title        = {Enhancing Smart Home Security Using Deep Convolutional Neural Networks
                  and Multiple Cameras},
  journal      = {Wirel. Pers. Commun.},
  volume       = {136},
  number       = {4},
  pages        = {2185--2200},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11371-1},
  doi          = {10.1007/S11277-024-11371-1},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SharmaPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BhosaleKS24,
  author       = {Pushparaj Bhosale and
                  Wolfgang Kastner and
                  Thilo Sauter},
  title        = {Modeling Human Error Factors with Security Incidents in Industrial
                  Control Systems: {A} Bayesian Belief Network Approach},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {53:1--53:9},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3670875},
  doi          = {10.1145/3664476.3670875},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BhosaleKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KomisarekPDKPC24,
  author       = {Mikolaj Komisarek and
                  Marek Pawlicki and
                  Salvatore D'Antonio and
                  Rafal Kozik and
                  Aleksandra Pawlicka and
                  Michal Choras},
  title        = {Enhancing Network Security Through Granular Computing: {A} Clustering-by-Time
                  Approach to NetFlow Traffic Analysis},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {93:1--93:8},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3670882},
  doi          = {10.1145/3664476.3670882},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KomisarekPDKPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VoudourisFPPX24,
  author       = {Anastassios Voudouris and
                  Aristeidis Farao and
                  Aggeliki Panou and
                  John Polley and
                  Christos Xenakis},
  title        = {Integrating Hyperledger Fabric with Satellite Communications: {A}
                  Revolutionary Approach for Enhanced Security and Decentralization
                  in Space Networks},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {134:1--134:8},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3669921},
  doi          = {10.1145/3664476.3669921},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VoudourisFPPX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aicconf/FenjanAAFSSV24,
  author       = {Ali Fenjan and
                  Mohammed Thakir Mahmood Almashhadany and
                  Saadaldeen Rashid Ahmed and
                  Hala Adnan Fadel and
                  Ravi Sekhar and
                  Pritesh Shah and
                  B. S. Veena},
  title        = {Adaptive Intrusion Detection System Using Deep Learning for Network
                  Security},
  booktitle    = {Proceedings of the Cognitive Models and Artificial Intelligence Conference,
                  {AICCONF} 2024, {\.{I}}stanbul, Turkiye, May 25-26, 2024},
  pages        = {279--284},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3660853.3660928},
  doi          = {10.1145/3660853.3660928},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aicconf/FenjanAAFSSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aicconf/HammadAAAMA24,
  author       = {Atheer Alaa Hammad and
                  Saadaldeen Rashid Ahmed and
                  Mohammad K. Abdul{-}Hussein and
                  Mohammed R. Ahmed and
                  Duaa A. Majeed and
                  Sameer Algburi},
  title        = {Deep Reinforcement Learning for Adaptive Cyber Defense in Network
                  Security},
  booktitle    = {Proceedings of the Cognitive Models and Artificial Intelligence Conference,
                  {AICCONF} 2024, {\.{I}}stanbul, Turkiye, May 25-26, 2024},
  pages        = {292--297},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3660853.3660930},
  doi          = {10.1145/3660853.3660930},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aicconf/HammadAAAMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aicconf/HarbiMAH24,
  author       = {Yasmine Harbi and
                  Salsabyl Merat and
                  Zibouda Aliouat and
                  Saad Harous},
  title        = {Bio-inspired Intrusion Detection System for Internet of Things Networks
                  Security},
  booktitle    = {Proceedings of the Cognitive Models and Artificial Intelligence Conference,
                  {AICCONF} 2024, {\.{I}}stanbul, Turkiye, May 25-26, 2024},
  pages        = {14--19},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3660853.3660856},
  doi          = {10.1145/3660853.3660856},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aicconf/HarbiMAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/MalhotraWG24,
  author       = {Akul Malhotra and
                  Chunguang Wang and
                  Sumeet Kumar Gupta},
  title        = {BNN-Flip: Enhancing the Fault Tolerance and Security of Compute-in-Memory
                  Enabled Binary Neural Network Accelerators},
  booktitle    = {Proceedings of the 29th Asia and South Pacific Design Automation Conference,
                  {ASPDAC} 2024, Incheon, Korea, January 22-25, 2024},
  pages        = {146--152},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ASP-DAC58780.2024.10473947},
  doi          = {10.1109/ASP-DAC58780.2024.10473947},
  timestamp    = {Thu, 22 Aug 2024 15:31:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/MalhotraWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balt/KamparsMG24,
  author       = {Janis Kampars and
                  Guntis Mosans and
                  Janis Grabis},
  editor       = {Audrone Lupeikiene and
                  Jolita Ralyt{\'{e}} and
                  Gintautas Dzemyda},
  title        = {Network Topology Based Identification and Analysis of Security Threats
                  in Data Centres},
  booktitle    = {Digital Business and Intelligent Systems - 16th International Baltic
                  Conference, Baltic DB{\&}IS 2024, Vilnius, Lithuania, June 30
                  - July 3, 2024, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2157},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-63543-4\_11},
  doi          = {10.1007/978-3-031-63543-4\_11},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/balt/KamparsMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/XuYHPZZ24,
  author       = {Ranyue Xu and
                  Wei Yu and
                  Hao Huang and
                  Yongchun Pan and
                  Chen Zhou and
                  Gang Zheng},
  title        = {Enhancing Cybersecurity in Power Substations through Active Immune
                  Detection and Low-Load Network Security Risk Intelligence Platform},
  booktitle    = {10th {IEEE} Conference on Big Data Security on Cloud, BigDataSecurity
                  2024, New York City, NY, USA, May 10-12, 2024},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/BigDataSecurity62737.2024.00038},
  doi          = {10.1109/BIGDATASECURITY62737.2024.00038},
  timestamp    = {Mon, 01 Jul 2024 17:15:07 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/XuYHPZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/YuQXJFS24,
  author       = {Wei Yu and
                  Jianguo Qian and
                  Ranyue Xu and
                  Chenxing Jin and
                  Haina Fang and
                  Xianhai Shi},
  title        = {Improving Substation Network Security with DevSecOps and AIOps},
  booktitle    = {10th {IEEE} Conference on Big Data Security on Cloud, BigDataSecurity
                  2024, New York City, NY, USA, May 10-12, 2024},
  pages        = {113--118},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/BigDataSecurity62737.2024.00027},
  doi          = {10.1109/BIGDATASECURITY62737.2024.00027},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/YuQXJFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsb/XuYWF24,
  author       = {Lei Xu and
                  Xiaoyu Ye and
                  Cuicui Wang and
                  Yu Fu},
  title        = {A Blockchain{\_}based Security Protection Scheme of Computing Force
                  Network},
  booktitle    = {{IEEE} International Symposium on Broadband Multimedia Systems and
                  Broadcasting, {BMSB} 2024, Toronto, ON, Canada, June 19-21, 2024},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/BMSB62888.2024.10608329},
  doi          = {10.1109/BMSB62888.2024.10608329},
  timestamp    = {Thu, 15 Aug 2024 10:49:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmsb/XuYWF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/AhmedA24,
  author       = {Sabrina Ahmed and
                  Mohammed Zamshed Ali},
  title        = {Application-Specific Security in IoT Network},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {636--637},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454649},
  doi          = {10.1109/CCNC51664.2024.10454649},
  timestamp    = {Tue, 26 Mar 2024 22:14:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/AhmedA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colins/SachenkoWR24,
  author       = {Anatoliy Sachenko and
                  Jacek Woloszyn and
                  Serhii Rimashevskyi},
  editor       = {Victoria Vysotska and
                  Yevhen Burov},
  title        = {Enhancing Network Security Through Wavelet Analysis},
  booktitle    = {Proceedings of the 8th International Conference on Computational Linguistics
                  and Intelligent Systems. Volume {III:} Intelligent Systems Workshop,
                  Lviv, Ukraine, April 12-13, 2024},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3688},
  pages        = {415--424},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3688/paper27.pdf},
  timestamp    = {Tue, 28 May 2024 17:18:47 +0200},
  biburl       = {https://dblp.org/rec/conf/colins/SachenkoWR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/DixitVF24,
  author       = {Unnati Dixit and
                  Shwetha Vittal and
                  A. Antony Franklin},
  title        = {A Systematic Study for Understanding the Security Risks in 5G Core
                  Network},
  booktitle    = {16th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMSNETS59351.2024.10427440},
  doi          = {10.1109/COMSNETS59351.2024.10427440},
  timestamp    = {Fri, 01 Mar 2024 14:04:41 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/DixitVF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/KotenkoL24,
  author       = {Igor V. Kotenko and
                  Diana Levshun},
  title        = {Anomaly Detection in IoT Networks Based on Intelligent Security Event
                  Correlation},
  booktitle    = {16th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024},
  pages        = {816--824},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMSNETS59351.2024.10426939},
  doi          = {10.1109/COMSNETS59351.2024.10426939},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/KotenkoL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/RaoK24,
  author       = {DTV Ramakrishna Rao and
                  Manjul Khandelwal},
  title        = {On Running Disabled Networking Features: {A} Taxonomy with Security
                  Implications},
  booktitle    = {16th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024},
  pages        = {582--585},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMSNETS59351.2024.10427438},
  doi          = {10.1109/COMSNETS59351.2024.10427438},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/RaoK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csaide/GaoPLJYL24,
  author       = {Xiaoping Gao and
                  Yue Pan and
                  Jinjin Li and
                  Tao Ji and
                  Yin Yuan and
                  Zhengnan Liu},
  title        = {Design of network security protection network architecture for intelligent
                  networked vehicles},
  booktitle    = {Proceedings of the 2024 3rd International Conference on Cyber Security,
                  Artificial Intelligence and Digital Economy, {CSAIDE} 2024, Nanjing,
                  China, March 1-3, 2024},
  pages        = {26--33},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3672919.3672925},
  doi          = {10.1145/3672919.3672925},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csaide/GaoPLJYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csaide/LiYZW24,
  author       = {Ting Li and
                  Jinjiang Yang and
                  Yin Zhou and
                  Shaojun Wei},
  title        = {Research on Performance Optimization of Encryption Algorithms for
                  Network Security Framework},
  booktitle    = {Proceedings of the 2024 3rd International Conference on Cyber Security,
                  Artificial Intelligence and Digital Economy, {CSAIDE} 2024, Nanjing,
                  China, March 1-3, 2024},
  pages        = {650--653},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3672919.3673034},
  doi          = {10.1145/3672919.3673034},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csaide/LiYZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/ZhouYLZGZ24,
  author       = {Feng Zhou and
                  Ming Yuan and
                  Yu Liu and
                  Hongbing Zhang and
                  Mingyu Gu and
                  Tongming Zhou},
  title        = {Niect: {A} Model for Intrusion Security Detection Applied to Campus
                  Video Surveillance Edge Networks},
  booktitle    = {11th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2024, Shanghai, China, June 28-30, 2024},
  pages        = {24--29},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCloud62866.2024.00012},
  doi          = {10.1109/CSCLOUD62866.2024.00012},
  timestamp    = {Fri, 16 Aug 2024 11:44:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cscloud/ZhouYLZGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/YanYZ0H24,
  author       = {Zeqing Yan and
                  Guangxi Yu and
                  Mengqi Zhan and
                  Yan Zhang and
                  Jiaxi Hu},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Tie Qiu and
                  Xiaobo Zhou and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Tianyi Xu and
                  Ning Chen},
  title        = {5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust},
  booktitle    = {27th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024},
  pages        = {1597--1602},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCWD61410.2024.10580371},
  doi          = {10.1109/CSCWD61410.2024.10580371},
  timestamp    = {Mon, 29 Jul 2024 16:18:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/YanYZ0H24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/Zhao0HZG24,
  author       = {Angxiao Zhao and
                  Wenying Feng and
                  Ning Hu and
                  Dawei Zhao and
                  Zhaoquan Gu},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Tie Qiu and
                  Xiaobo Zhou and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Tianyi Xu and
                  Ning Chen},
  title        = {Knowledge Embedding Enabled Cyber Security Defense for Networked System:
                  {A} Novel Risk Detection Method based on Knowledge Graph},
  booktitle    = {27th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024},
  pages        = {3146--3151},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCWD61410.2024.10580583},
  doi          = {10.1109/CSCWD61410.2024.10580583},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/Zhao0HZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/HamoucheKMS24,
  author       = {Djameleddine Hamouche and
                  Reda Kadri and
                  Mohamed{-}Lamine Messai and
                  Hamida Seba},
  title        = {{(POSTER)} {A} Graph Dataset for Security Enforcement in IoT Networks
                  : GRASEC-IoT},
  booktitle    = {20th International Conference on Distributed Computing in Smart Systems
                  and the Internet of Things, DCOSS-IoT 2024, Abu Dhabi, United Arab
                  Emirates, April 29 - May 1, 2024},
  pages        = {765--767},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/DCOSS-IoT61029.2024.00118},
  doi          = {10.1109/DCOSS-IOT61029.2024.00118},
  timestamp    = {Mon, 19 Aug 2024 20:57:13 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/HamoucheKMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GaltierANOCK24,
  author       = {Florent Galtier and
                  Guillaume Auriol and
                  Vincent Nicomette and
                  Paul L. R. Olivier and
                  Romain Cayre and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {Wireless Modulation Identification: Filling the Gap in IoT Networks
                  Security Audit},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14828},
  pages        = {525--544},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_27},
  doi          = {10.1007/978-3-031-64171-8\_27},
  timestamp    = {Sat, 20 Jul 2024 14:18:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GaltierANOCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ease/GambaIRGFNP24,
  author       = {Davide La Gamba and
                  Gerardo Iuliano and
                  Gilberto Recupito and
                  Giammaria Giordano and
                  Filomena Ferrucci and
                  Dario Di Nucci and
                  Fabio Palomba},
  title        = {Toward a Search-Based Approach to Support the Design of Security Tests
                  for Malicious Network Traffic},
  booktitle    = {Proceedings of the 28th International Conference on Evaluation and
                  Assessment in Software Engineering, {EASE} 2024, Salerno, Italy, June
                  18-21, 2024},
  pages        = {624--628},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3661167.3661288},
  doi          = {10.1145/3661167.3661288},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ease/GambaIRGFNP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/educon/Al-OmarTQP24,
  author       = {Ban Al{-}Omar and
                  Zouheir Trabelsi and
                  Tariq Qayyum and
                  Medha Mohan Ambali Parambil},
  title        = {{AI} and Network Security Curricula: Minding the Gap},
  booktitle    = {{IEEE} Global Engineering Education Conference, {EDUCON} 2024, Kos
                  Island, Greece, May 8-11, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EDUCON60312.2024.10578588},
  doi          = {10.1109/EDUCON60312.2024.10578588},
  timestamp    = {Thu, 18 Jul 2024 16:56:13 +0200},
  biburl       = {https://dblp.org/rec/conf/educon/Al-OmarTQP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/UccelloPDKC24,
  author       = {Federica Uccello and
                  Marek Pawlicki and
                  Salvatore D'Antonio and
                  Rafal Kozik and
                  Michal Choras},
  editor       = {Leonard Barolli},
  title        = {An Innovative Approach to Real-Time Concept Drift Detection in Network
                  Security},
  booktitle    = {Advances in Internet, Data {\&} Web Technologies - The 12th International
                  Conference on Emerging Internet, Data {\&} Web Technologies, {EIDWT}
                  2024, Naples, Italy, 21-23 February 2024},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {193},
  pages        = {130--139},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-53555-0\_13},
  doi          = {10.1007/978-3-031-53555-0\_13},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/UccelloPDKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/LiyanagePZSSYS24,
  author       = {Madhusanka Liyanage and
                  Pawani Porambage and
                  Engin Zeydan and
                  Thulitha Senavirathne and
                  Yushan Siriwardhana and
                  Awaneesh Kumar Yadav and
                  Bartlomiej Siniarski},
  title        = {Advancing Security for 6G Smart Networks and Services},
  booktitle    = {Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2024, Antwerp, Belgium, June 3-6, 2024},
  pages        = {1169--1174},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit60053.2024.10597131},
  doi          = {10.1109/EUCNC/6GSUMMIT60053.2024.10597131},
  timestamp    = {Mon, 29 Jul 2024 21:17:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/LiyanagePZSSYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/SuomalainenASKMAJR24,
  author       = {Jani Suomalainen and
                  Kimmo Ahola and
                  Mirko Sailio and
                  Gabor Kiss and
                  Gabor Megyaszai and
                  Rizwan Asif and
                  Petri Jehkonen and
                  Jonathan Rivalan},
  title        = {Tactical Orchestration : Network, Security, and Drone Intelligence
                  for Mission-Critical Operations},
  booktitle    = {Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2024, Antwerp, Belgium, June 3-6, 2024},
  pages        = {1061--1066},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit60053.2024.10597035},
  doi          = {10.1109/EUCNC/6GSUMMIT60053.2024.10597035},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/SuomalainenASKMAJR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/MonjurY24,
  author       = {Mohammad Mezanur Rahman Monjur and
                  Qiaoyan Yu},
  editor       = {Inna Partin{-}Vaisband and
                  Srinivas Katkoori and
                  Lu Peng and
                  Boris Vaisband and
                  Tooraj Nikoubin},
  title        = {Advanced Continuous-Time Convolution Framework for Security Assurance
                  in Wireless Sensor Networks},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2024, {GLSVLSI}
                  2024, Clearwater, FL, USA, June 12-14, 2024},
  pages        = {319--322},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3649476.3658785},
  doi          = {10.1145/3649476.3658785},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/MonjurY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/RakotondravonyPPH24,
  author       = {No{\"{e}}lle Rakotondravony and
                  Henrich C. P{\"{o}}hls and
                  Jan Pfeifer and
                  Lane Harrison},
  editor       = {Abbas Moallem},
  title        = {Viz\({}^{\mbox{4}}\)NetSec: Visualizing Dynamic Network Security Configurations
                  of Everyday Interconnected Objects in Home Networks},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - 6th International Conference,
                  {HCI-CPT} 2024, Held as Part of the 26th {HCI} International Conference,
                  {HCII} 2024, Washington, DC, USA, June 29 - July 4, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14729},
  pages        = {164--185},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-61382-1\_11},
  doi          = {10.1007/978-3-031-61382-1\_11},
  timestamp    = {Wed, 12 Jun 2024 15:08:27 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/RakotondravonyPPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/heart/HaaseVG24,
  author       = {Julian Haase and
                  Nico Volkens and
                  Diana Goehringer},
  editor       = {Lana Josipovic and
                  Peipei Zhou and
                  Shreejith Shanker and
                  Jo{\~{a}}o M. P. Cardoso and
                  Jason Anderson and
                  Shibata Yuichiro},
  title        = {Embedded Security Accelerators within Network-on-Chip Environments},
  booktitle    = {Proceedings of the 14th International Symposium on Highly Efficient
                  Accelerators and Reconfigurable Technologies, {HEART} 2024, Porto,
                  Portugal, June 19-21, 2024},
  pages        = {37--43},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3665283.3665290},
  doi          = {10.1145/3665283.3665290},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/heart/HaaseVG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/FerraroGP24,
  author       = {Antonino Ferraro and
                  Valerio La Gatta and
                  Marco Postiglione},
  title        = {Empowering Network Security with Autoencoders},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing,
                  {ICASSP} 2024 - Workshops, Seoul, Republic of Korea, April 14-19,
                  2024},
  pages        = {346--350},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICASSPW62465.2024.10627534},
  doi          = {10.1109/ICASSPW62465.2024.10627534},
  timestamp    = {Wed, 04 Sep 2024 08:54:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/FerraroGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChatterjeeR24,
  author       = {Pushpita Chatterjee and
                  Danda B. Rawat},
  title        = {Security Enhanced Framework for Network Access Control in Distributed
                  Software-Defined Networks},
  booktitle    = {{IEEE} International Conference on Communications Workshops, {ICC}
                  2024 Workshops, Denver, CO, USA, June 9-13, 2024},
  pages        = {1816--1821},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCWorkshops59551.2024.10615557},
  doi          = {10.1109/ICCWORKSHOPS59551.2024.10615557},
  timestamp    = {Wed, 21 Aug 2024 14:57:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChatterjeeR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GhoshNDL24,
  author       = {Uttam Ghosh and
                  Laurent Njilla and
                  Debashis Das and
                  Eugene Levin},
  title        = {{FLAS:} {A} Federated Learning Framework for Adaptive Security in
                  Edge-Driven {UAV} Networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {1298--1303},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622352},
  doi          = {10.1109/ICC51166.2024.10622352},
  timestamp    = {Mon, 02 Sep 2024 15:04:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GhoshNDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HossainO24,
  author       = {Khondoker Murad Hossain and
                  Tim Oates},
  title        = {Advancing Security in {AI} Systems: {A} Novel Approach to Detecting
                  Backdoors in Deep Neural Networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {740--745},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622312},
  doi          = {10.1109/ICC51166.2024.10622312},
  timestamp    = {Mon, 09 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HossainO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PatelRJ0TA24,
  author       = {Nemi Patel and
                  Fenil Ramoliya and
                  Nilesh Kumar Jadav and
                  Rajesh Gupta and
                  Sudeep Tanwar and
                  Gagangeet Singh Aujla},
  title        = {{X-NET:} Explainable AI-Based Network Data Security Framework for
                  Healthcare 4.0},
  booktitle    = {{IEEE} International Conference on Communications Workshops, {ICC}
                  2024 Workshops, Denver, CO, USA, June 9-13, 2024},
  pages        = {481--486},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCWorkshops59551.2024.10615382},
  doi          = {10.1109/ICCWORKSHOPS59551.2024.10615382},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PatelRJ0TA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PereraAFE24,
  author       = {Tharaka Perera and
                  Saman Atapattu and
                  Yuting Fang and
                  Jamie S. Evans},
  title        = {Graph Neural Networks for Physical-Layer Security in Multi-User Flexible-Duplex
                  Networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {2294--2299},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622731},
  doi          = {10.1109/ICC51166.2024.10622731},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PereraAFE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TamimSR24,
  author       = {Ibrahim Tamim and
                  Abdallah Shami and
                  Ahmed Refaey},
  title        = {Security and High-Availability While Upholding Network Defense Patterns:
                  The Advantages of {A2C} in {O-RAN} {VNF} Placement},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {1072--1077},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622252},
  doi          = {10.1109/ICC51166.2024.10622252},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/TamimSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TashmanCH24,
  author       = {Deemah H. Tashman and
                  Soumaya Cherkaoui and
                  Walaa Hamouda},
  title        = {Federated Learning-based {MARL} for Strengthening Physical-Layer Security
                  in {B5G} Networks},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {293--298},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622458},
  doi          = {10.1109/ICC51166.2024.10622458},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/TashmanCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad2/JablaouiL24a,
  author       = {Rahma Jablaoui and
                  Noureddine Liouane},
  title        = {An effective deep {CNN-LSTM} based intrusion detection system for
                  network security},
  booktitle    = {International Conference on Control, Automation and Diagnosis, {ICCAD}
                  2024, Paris, France, May 15-17, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCAD60883.2024.10553826},
  doi          = {10.1109/ICCAD60883.2024.10553826},
  timestamp    = {Thu, 27 Jun 2024 16:32:22 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad2/JablaouiL24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/MaoXSW24,
  author       = {Jianzhou Mao and
                  Guobin Xu and
                  Eric Sakk and
                  Shuangbao Wang},
  title        = {Advancing Network Security with Quantum-Safe System Integration},
  booktitle    = {33rd International Conference on Computer Communications and Networks,
                  {ICCCN} 2024, Kailua-Kona, HI, USA, July 29-31, 2024},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCCN61486.2024.10637630},
  doi          = {10.1109/ICCCN61486.2024.10637630},
  timestamp    = {Tue, 10 Sep 2024 15:34:17 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/MaoXSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccde/AnsariIA24,
  author       = {Jawad Ahmad Ansari and
                  Mohamad Khairi Ishak and
                  Khalid Ammar},
  title        = {Enhancing Network Security and Efficiency in Smart Cities: SDN-Based
                  Hashing Authentication},
  booktitle    = {Proceedings of the 2024 10th International Conference on Computing
                  and Data Engineering, {ICCDE} 2024, Bangkok, Thailand, January 15-17,
                  2024},
  pages        = {118--123},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641181.3641202},
  doi          = {10.1145/3641181.3641202},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccde/AnsariIA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccr/FakhouriAAND24,
  author       = {Hussam N. Fakhouri and
                  Basim Alhadidi and
                  Mohammad A. Alsharaiah and
                  Heba Al Naddaf and
                  Ashraf Saleh Alomoush Data},
  title        = {Critical Evaluation of the Role of Cloud Systems and Networking in
                  the Security and Growth of the Business Market},
  booktitle    = {2024 2nd International Conference on Cyber Resilience (ICCR), Dubai,
                  United Arab Emirates, February 26-28, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCR61006.2024.10533145},
  doi          = {10.1109/ICCR61006.2024.10533145},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccr/FakhouriAAND24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccr/SaeedIAAMG24,
  author       = {Nouf Majid Sultan Eid Saeed and
                  Amer Ibrahim and
                  Liaqat Ali and
                  Nidal A. Al{-}Dmour and
                  Abdul Salam Mohammed and
                  Taher M. Ghazal},
  title        = {Unveiling the Landscape of Machine Learning and Deep Learning Methodologies
                  in Network Security: {A} Comprehensive Literature Review},
  booktitle    = {2024 2nd International Conference on Cyber Resilience (ICCR), Dubai,
                  United Arab Emirates, February 26-28, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCR61006.2024.10533066},
  doi          = {10.1109/ICCR61006.2024.10533066},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccr/SaeedIAAMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/Tripathi24,
  author       = {Arpit Tripathi},
  title        = {Security Framework for Non-public 5G Network Deployments},
  booktitle    = {Proceedings of the 25th International Conference on Distributed Computing
                  and Networking, {ICDCN} 2024, Chennai, India, January 4-7, 2024},
  pages        = {248--249},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3631461.3632513},
  doi          = {10.1145/3631461.3632513},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/Tripathi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BusnelL24,
  author       = {Yann Busnel and
                  L{\'{e}}o Lavaur},
  title        = {Tutorial: Federated Learning {\texttimes} Security for Network Monitoring},
  booktitle    = {44th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2024 - Workshops, Jersey City, NJ, USA, July 23, 2024},
  pages        = {13--16},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICDCSW63686.2024.00008},
  doi          = {10.1109/ICDCSW63686.2024.00008},
  timestamp    = {Sat, 21 Sep 2024 14:04:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/BusnelL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/YouNSSKCS24,
  author       = {Myoungsung You and
                  Jaehyun Nam and
                  Hyunmin Seo and
                  Minjae Seo and
                  Jaehan Kim and
                  Dongmin Choi and
                  Seungwon Shin},
  title        = {HardWhale: {A} Hardware-Isolated Network Security Enforcement System
                  for Cloud Environments},
  booktitle    = {44th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2024, Jersey City, NJ, USA, July 23-26, 2024},
  pages        = {496--507},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICDCS60910.2024.00053},
  doi          = {10.1109/ICDCS60910.2024.00053},
  timestamp    = {Wed, 11 Sep 2024 11:31:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/YouNSSKCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/ZhangSCC24,
  author       = {Yu Zhang and
                  Yanqing Song and
                  Jianguo Chen and
                  Long Chen},
  editor       = {De{-}Shuang Huang and
                  Wei Chen and
                  Yijie Pan},
  title        = {Generative Adversarial Network for Enhancement Network Security Log
                  Detection},
  booktitle    = {Advanced Intelligent Computing Technology and Applications - 20th
                  International Conference, {ICIC} 2024, Tianjin, China, August 5-8,
                  2024, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14869},
  pages        = {381--390},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-5603-2\_31},
  doi          = {10.1007/978-981-97-5603-2\_31},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/ZhangSCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icict2/PapeM24a,
  author       = {Nathan Pape and
                  Christopher Mansour},
  title        = {{PASTA} Threat Modeling for Vehicular Networks Security},
  booktitle    = {7th International Conference on Information and Computer Technologies,
                  {ICICT} 2024, Honolulu, HI, USA, March 15-17, 2024},
  pages        = {474--478},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICICT62343.2024.00083},
  doi          = {10.1109/ICICT62343.2024.00083},
  timestamp    = {Wed, 26 Jun 2024 08:34:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icict2/PapeM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icict2/Tateiwa24a,
  author       = {Yuichiro Tateiwa},
  title        = {Development of Dialogue Feature between Participants and ChatGPT in
                  Network Security Exercise System},
  booktitle    = {7th International Conference on Information and Computer Technologies,
                  {ICICT} 2024, Honolulu, HI, USA, March 15-17, 2024},
  pages        = {479--484},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICICT62343.2024.00084},
  doi          = {10.1109/ICICT62343.2024.00084},
  timestamp    = {Wed, 26 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icict2/Tateiwa24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icin/KalafatidisAGLV24,
  author       = {Sarantis Kalafatidis and
                  George Agrafiotis and
                  Konstantinos Giapantzis and
                  Antonios Lalas and
                  Konstantinos Votis},
  editor       = {Prosper Chemouil and
                  Barbara Martini and
                  Carmen Mas Machuca and
                  Panagiotis Papadimitriou and
                  Davide Borsatti and
                  St{\'{e}}phane Rovedakis},
  title        = {Experiments with Digital Security Processes over SDN-Based Cloud-Native
                  5G Core Networks},
  booktitle    = {27th Conference on Innovation in Clouds, Internet and Networks, {ICIN}
                  2024, Paris, France, March 11-14, 2024},
  pages        = {97--99},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICIN60470.2024.10494481},
  doi          = {10.1109/ICIN60470.2024.10494481},
  timestamp    = {Tue, 07 May 2024 20:10:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icin/KalafatidisAGLV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icin/SantosTBTBJ24,
  author       = {Jos{\'{e}} Santos and
                  Eddy Truyen and
                  Christoph Baumann and
                  Filip De Turck and
                  Gerald Budigiri and
                  Wouter Joosen},
  editor       = {Prosper Chemouil and
                  Barbara Martini and
                  Carmen Mas Machuca and
                  Panagiotis Papadimitriou and
                  Davide Borsatti and
                  St{\'{e}}phane Rovedakis},
  title        = {Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud
                  Networks},
  booktitle    = {27th Conference on Innovation in Clouds, Internet and Networks, {ICIN}
                  2024, Paris, France, March 11-14, 2024},
  pages        = {222--227},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICIN60470.2024.10494432},
  doi          = {10.1109/ICIN60470.2024.10494432},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icin/SantosTBTBJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsa/BabuKVSP24,
  author       = {Chitra Babu and
                  Akil Karthikeyan and
                  Nandakishor Velu and
                  Kaarthik Sivakumar and
                  Abhishek Pathak},
  title        = {A Novel Approach for Security Analysis in Microservices Using Graph
                  Neural Networks},
  booktitle    = {21st {IEEE} International Conference on Software Architecture, {ICSA}
                  2024 - Companion, Hyderabad, India, June 4-8, 2024},
  pages        = {65--68},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICSA-C63560.2024.00017},
  doi          = {10.1109/ICSA-C63560.2024.00017},
  timestamp    = {Wed, 04 Sep 2024 21:11:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icsa/BabuKVSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenLZWSL24,
  author       = {Xuanbang Chen and
                  Ziqi Liu and
                  Xun Zhang and
                  Yuhao Wang and
                  Dayu Shi and
                  Xiaodong Liu},
  title        = {Optic Fingerprint: Enhancing Security in Visible Light Communication
                  Networks},
  booktitle    = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications
                  Workshops, Vancouver, BC, Canada, May 20, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620698},
  doi          = {10.1109/INFOCOMWKSHPS61880.2024.10620698},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ChenLZWSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/IhekoronyeINL024,
  author       = {Vivian Ukamaka Ihekoronye and
                  Urslla Uchechi Izuazu and
                  Cosmas Ifeanyi Nwakanma and
                  Jae Min Lee and
                  Dong{-}Seong Kim},
  title        = {{ASR-FED:} Agnostic Straggler Resilient Federated Algorithm for Drone
                  Networks Security},
  booktitle    = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications
                  Workshops, Vancouver, BC, Canada, May 20, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620729},
  doi          = {10.1109/INFOCOMWKSHPS61880.2024.10620729},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/IhekoronyeINL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/AliWLA24,
  author       = {Sijjad Ali and
                  Jia Wang and
                  Victor Chung Ming Leung and
                  Asad Ali},
  editor       = {Anna Kobusinska and
                  Andreas Jacobsson and
                  Victor Chang},
  title        = {Decentralized Ransomware Recovery Network: Enhancing Resilience and
                  Security Through Secret Sharing Schemes},
  booktitle    = {Proceedings of the 9th International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2024, Angers, France, April 28-30, 2024},
  pages        = {294--301},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012713500003705},
  doi          = {10.5220/0012713500003705},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/AliWLA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdfs/CaoZ24,
  author       = {Kunpeng Cao and
                  Leyi Zhang},
  title        = {Research on Network Security Measurement on the Basis of Defense-In-Depth},
  booktitle    = {12th International Symposium on Digital Forensics and Security, {ISDFS}
                  2024, San Antonio, TX, USA, April 29-30, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ISDFS60797.2024.10527238},
  doi          = {10.1109/ISDFS60797.2024.10527238},
  timestamp    = {Mon, 03 Jun 2024 20:37:05 +0200},
  biburl       = {https://dblp.org/rec/conf/isdfs/CaoZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdfs/KshetriMRS24,
  author       = {Naresh Kshetri and
                  Rahul Mishra and
                  Mir Mehedi Rahman and
                  Tanja Steigner},
  title        = {HNMblock: Blockchain Technology Powered Healthcare Network Model for
                  Epidemiological Monitoring, Medical Systems Security, and Wellness},
  booktitle    = {12th International Symposium on Digital Forensics and Security, {ISDFS}
                  2024, San Antonio, TX, USA, April 29-30, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ISDFS60797.2024.10527226},
  doi          = {10.1109/ISDFS60797.2024.10527226},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isdfs/KshetriMRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdfs/VijayanJS24,
  author       = {Vismaya Vijayan and
                  Kurunandan Jain and
                  Narayanan Subramanian},
  title        = {Chaos-Based Stream Ciphers for 5G Inter-Slice Network Security},
  booktitle    = {12th International Symposium on Digital Forensics and Security, {ISDFS}
                  2024, San Antonio, TX, USA, April 29-30, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ISDFS60797.2024.10527324},
  doi          = {10.1109/ISDFS60797.2024.10527324},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isdfs/VijayanJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/CiravegnaBL24,
  author       = {Flavio Ciravegna and
                  Giacomo Bruno and
                  Antonio Lioy},
  editor       = {Gianni D'Angelo and
                  Flaminia L. Luccio and
                  Francesco Palmieri},
  title        = {IKE-less IPsec: Enhancing Security for IoT Device Networks},
  booktitle    = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC}
                  2024), Salerno, Italy, April 8-12, 2024},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3731},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3731/paper35.pdf},
  timestamp    = {Fri, 26 Jul 2024 13:58:33 +0200},
  biburl       = {https://dblp.org/rec/conf/itasec/CiravegnaBL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/RivittiT024,
  author       = {Alessandro Rivitti and
                  Angelo Tulumello and
                  Giuseppe Bianchi},
  editor       = {Gianni D'Angelo and
                  Flaminia L. Luccio and
                  Francesco Palmieri},
  title        = {The Case for Ultra High Speed Portable Network Security Filters},
  booktitle    = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC}
                  2024), Salerno, Italy, April 8-12, 2024},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3731},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3731/paper11.pdf},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itasec/RivittiT024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medcomnet/IoannouSRCV24,
  author       = {Iacovos Ioannou and
                  Michael Savva and
                  Marios Raspopoulos and
                  Christophoros Christophorou and
                  Vasos Vassiliou},
  title        = {Revolutionising IoT Network Security By Assessing {ML} Localisation
                  Techniques Against Jamming Attacks},
  booktitle    = {22nd Mediterranean Communication and Computer Networking Conference,
                  MedComNet 2024, Nice, France, June 11-13, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/MedComNet62012.2024.10578201},
  doi          = {10.1109/MEDCOMNET62012.2024.10578201},
  timestamp    = {Thu, 18 Jul 2024 21:16:16 +0200},
  biburl       = {https://dblp.org/rec/conf/medcomnet/IoannouSRCV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meditcom/BattaggiaCDACR24,
  author       = {Matteo Battaggia and
                  Alessandro Cammarano and
                  Juan Manuel Villarreal D'Angelo and
                  Jose Avila and
                  Maxime Compasti{\'{e}} and
                  Hossein Rouzegar},
  title        = {A security threat analysis for unified network orchestration across
                  terrestrial and non-terrestrial resources},
  booktitle    = {{IEEE} International Mediterranean Conference on Communications and
                  Networking, MeditCom 2024, Madrid, Spain, July 8-11, 2024},
  pages        = {547--552},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/MeditCom61057.2024.10621163},
  doi          = {10.1109/MEDITCOM61057.2024.10621163},
  timestamp    = {Tue, 20 Aug 2024 14:42:17 +0200},
  biburl       = {https://dblp.org/rec/conf/meditcom/BattaggiaCDACR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metroi/MarabissiSM24,
  author       = {Dania Marabissi and
                  Andrea Stomaci and
                  Lorenzo Mucchi},
  title        = {Adaptive Security in Mobile Wireless Networks: Machine Learning-Enhanced
                  Continuous Physical Layer Authentication for Dynamic Environments},
  booktitle    = {{IEEE} International Workshop on Metrology for Industry 4.0 and IoT,
                  MetroInd4.0 {\&} IoT 2024, Firenze, Italy, May 29-31, 2024},
  pages        = {310--315},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/MetroInd4.0IoT61288.2024.10584234},
  doi          = {10.1109/METROIND4.0IOT61288.2024.10584234},
  timestamp    = {Mon, 15 Jul 2024 15:28:30 +0200},
  biburl       = {https://dblp.org/rec/conf/metroi/MarabissiSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/AyoughiNSS24,
  author       = {Negin Ayoughi and
                  Shiva Nejati and
                  Mehrdad Sabetzadeh and
                  Patricio Saavedra},
  editor       = {Alexander Egyed and
                  Manuel Wimmer and
                  Marsha Chechik and
                  Beno{\^{\i}}t Combemale},
  title        = {Enhancing Automata Learning with Statistical Machine Learning: {A}
                  Network Security Case Study},
  booktitle    = {Proceedings of the {ACM/IEEE} 27th International Conference on Model
                  Driven Engineering Languages and Systems, {MODELS} 2024, Linz, Austria,
                  September 22-27, 2024},
  pages        = {172--182},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3640310.3674087},
  doi          = {10.1145/3640310.3674087},
  timestamp    = {Mon, 23 Sep 2024 11:58:23 +0200},
  biburl       = {https://dblp.org/rec/conf/models/AyoughiNSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/MatencioEscolarBAWS24,
  author       = {Antonio Matencio{-}Escolar and
                  Jorge Bernal Bernab{\'{e}} and
                  Jos{\'{e}} M. Alcaraz and
                  Qi Wang and
                  Antonio F. Skarmeta},
  title        = {Network slicing as 6G security mechanism to mitigate cyber-attacks:
                  the {RIGOUROUS} approach},
  booktitle    = {10th {IEEE} International Conference on Network Softwarization, NetSoft
                  2024, Saint Louis, MO, USA, June 24-28, 2024},
  pages        = {387--392},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NetSoft60951.2024.10588887},
  doi          = {10.1109/NETSOFT60951.2024.10588887},
  timestamp    = {Thu, 18 Jul 2024 21:28:05 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/MatencioEscolarBAWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/QuinnSBH24,
  author       = {Travis Quinn and
                  Syed Danial Ali Shah and
                  Faycal Bouhafs and
                  Frank T. H. den Hartog},
  title        = {Towards trust-based routing for data plane security in heterogeneous
                  Software-Defined Wireless Networks},
  booktitle    = {10th {IEEE} International Conference on Network Softwarization, NetSoft
                  2024, Saint Louis, MO, USA, June 24-28, 2024},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NetSoft60951.2024.10588898},
  doi          = {10.1109/NETSOFT60951.2024.10588898},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/QuinnSBH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/SunkaraAMC24,
  author       = {Uday Kiran Sunkara and
                  Abdulquadri Abiru and
                  Kyle Morman and
                  Aaron Costin},
  title        = {Poster: Hardware Security for IoT Wireless Network},
  booktitle    = {10th {IEEE} International Conference on Network Softwarization, NetSoft
                  2024, Saint Louis, MO, USA, June 24-28, 2024},
  pages        = {324--325},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NetSoft60951.2024.10588947},
  doi          = {10.1109/NETSOFT60951.2024.10588947},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/SunkaraAMC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/PizzatoBSV24a,
  author       = {Francesco Pizzato and
                  Daniele Bringhenti and
                  Riccardo Sisto and
                  Fulvio Valenza},
  title        = {Security Automation in next-generation Networks and Cloud environments},
  booktitle    = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul,
                  Republic of Korea, May 6-10, 2024},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NOMS59830.2024.10575650},
  doi          = {10.1109/NOMS59830.2024.10575650},
  timestamp    = {Tue, 16 Jul 2024 15:37:36 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/PizzatoBSV24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/TovarnakCDHRT24,
  author       = {Daniel Tovarn{\'{a}}k and
                  Michal Cech and
                  Vojtech Dohnal and
                  Martin Hamern{\'{\i}}k and
                  Mat{\'{u}}s Racek and
                  Dusan Tich{\'{y}}},
  title        = {The True Cost of Network Security Automation: Demo Playbook for Posture
                  Assessment},
  booktitle    = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul,
                  Republic of Korea, May 6-10, 2024},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/NOMS59830.2024.10575557},
  doi          = {10.1109/NOMS59830.2024.10575557},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/TovarnakCDHRT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/Abdo0A24,
  author       = {Ahmed Abdo and
                  Guoyuan Wu and
                  Nael B. Abu{-}Ghazaleh},
  editor       = {Margaret Loper and
                  Alessandro Pellegrini},
  title        = {VEhicular Secure Network Open Simulator {(VESNOS):} {A} Cyber-security
                  oriented co-simulation platform for connected and automated driving},
  booktitle    = {Proceedings of the 38th {ACM} {SIGSIM} Conference on Principles of
                  Advanced Discrete Simulation, {SIGSIM-PADS} 2024, Atlanta, GA, USA,
                  June 24-26, 2024},
  pages        = {108--118},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3615979.3656054},
  doi          = {10.1145/3615979.3656054},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pads/Abdo0A24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/HuWQJ24,
  author       = {Zheng Hu and
                  Luke Waind and
                  Yanfeng Qu and
                  Dong Jin},
  editor       = {Margaret Loper and
                  Alessandro Pellegrini},
  title        = {Synchronized Power Simulation and Programmable Network Emulation Testbed
                  for {SCADA} System Security Evaluation},
  booktitle    = {Proceedings of the 38th {ACM} {SIGSIM} Conference on Principles of
                  Advanced Discrete Simulation, {SIGSIM-PADS} 2024, Atlanta, GA, USA,
                  June 24-26, 2024},
  pages        = {69--70},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3615979.3662153},
  doi          = {10.1145/3615979.3662153},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pads/HuWQJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siu/AydinAG24,
  author       = {Burak Aydin and
                  Hakan Aydin and
                  Sedat G{\"{o}}rm{\"{u}}s},
  title        = {A Security Mechanism Against Man in the Middle Attack in 6TiSCH Networks},
  booktitle    = {32nd Signal Processing and Communications Applications Conference,
                  {SIU} 2024, Mersin, Turkiye, May 15-18, 2024},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SIU61531.2024.10600741},
  doi          = {10.1109/SIU61531.2024.10600741},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/siu/AydinAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnets/Asefi-GhamariHM24,
  author       = {Hamidreza Asefi{-}Ghamari and
                  Murtadha Hassani and
                  Imad Mahgoub},
  title        = {Game-Theoretic Method for Optimal Initial Allocation of Honeypots
                  for Enhanced Network Security},
  booktitle    = {International Conference on Smart Applications, Communications and
                  Networking, SmartNets 2024, Harrisonburg, VA, USA, May 28-30, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SmartNets61466.2024.10577718},
  doi          = {10.1109/SMARTNETS61466.2024.10577718},
  timestamp    = {Tue, 23 Jul 2024 14:13:06 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnets/Asefi-GhamariHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnets/GhubaishYJ24,
  author       = {Ali Ghubaish and
                  Zebo Yang and
                  Raj Jain},
  title        = {{HDRL-IDS:} {A} Hybrid Deep Reinforcement Learning Intrusion Detection
                  System for Enhancing the Security of Medical Applications in 5G Networks},
  booktitle    = {International Conference on Smart Applications, Communications and
                  Networking, SmartNets 2024, Harrisonburg, VA, USA, May 28-30, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SmartNets61466.2024.10577692},
  doi          = {10.1109/SMARTNETS61466.2024.10577692},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnets/GhubaishYJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XuSL24,
  author       = {Jiacen Xu and
                  Xiaokui Shu and
                  Zhou Li},
  title        = {Understanding and Bridging the Gap Between Unsupervised Network Representation
                  Learning and Security Analytics},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco,
                  CA, USA, May 19-23, 2024},
  pages        = {3590--3608},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SP54263.2024.00012},
  doi          = {10.1109/SP54263.2024.00012},
  timestamp    = {Sat, 21 Sep 2024 14:24:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/XuSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syscon/CalloM24,
  author       = {Anthony Callo and
                  Mo Mansouri},
  title        = {Food Security in Global Food Distribution Networks: {A} Systems Thinking
                  Approach},
  booktitle    = {{IEEE} International Systems Conference, SysCon 2024, Montreal, QC,
                  Canada, April 15-18, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SysCon61195.2024.10553516},
  doi          = {10.1109/SYSCON61195.2024.10553516},
  timestamp    = {Mon, 24 Jun 2024 15:01:05 +0200},
  biburl       = {https://dblp.org/rec/conf/syscon/CalloM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tfm/BruckerM24,
  author       = {Achim D. Brucker and
                  Diego Marmsoler},
  editor       = {Emil Sekerinski and
                  Leila Ribeiro},
  title        = {Teaching Formal Methods in Application Domains - {A} Case Study in
                  Computer and Network Security},
  booktitle    = {Formal Methods Teaching - 6th Formal Methods Teaching Workshop, FMTea
                  2024, Milan, Italy, September 10, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14939},
  pages        = {124--140},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-71379-8\_8},
  doi          = {10.1007/978-3-031-71379-8\_8},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tfm/BruckerM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/BabusiakS24,
  author       = {Branko Babusiak and
                  Maros Smondrk},
  title        = {Building a Wireless Sensor Network with nRF24 Module for Home Security:
                  Design and Implementation},
  booktitle    = {47th International Conference on Telecommunications and Signal Processing,
                  {TSP} 2024, Prague, Czech Republic, July 10-12, 2024},
  pages        = {315--319},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSP63128.2024.10605919},
  doi          = {10.1109/TSP63128.2024.10605919},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tsp/BabusiakS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DiaaFHDEK0LMOAK24,
  author       = {Abdulrahman Diaa and
                  Lucas Fenaux and
                  Thomas Humphries and
                  Marian Dietz and
                  Faezeh Ebrahimianghazani and
                  Bailey Kacsmar and
                  Xinda Li and
                  Nils Lukas and
                  Rasoul Akhavan Mahdavi and
                  Simon Oya and
                  Ehsan Amjadian and
                  Florian Kerschbaum},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Fast and Private Inference of Deep Neural Networks by Co-designing
                  Activation Functions},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/diaa},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DiaaFHDEK0LMOAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GastCJRFG24,
  author       = {Stefan Gast and
                  Roland Czerny and
                  Jonas Juffinger and
                  Fabian Rauscher and
                  Simone Franza and
                  Daniel Gruss},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {SnailLoad: Exploiting Remote Network Latency Measurements without
                  JavaScript},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/gast},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GastCJRFG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Ge0H000Z0FZ24,
  author       = {Yunjie Ge and
                  Qian Wang and
                  Huayang Huang and
                  Qi Li and
                  Cong Wang and
                  Chao Shen and
                  Lingchen Zhao and
                  Peipei Jiang and
                  Zheng Fang and
                  Shenyi Zhang},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Hijacking Attacks against Neural Network by Analyzing Training Data},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/ge-hijacking},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Ge0H000Z0FZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HorvathL0B24,
  author       = {P{\'{e}}ter Horv{\'{a}}th and
                  Dirk Lauret and
                  Zhuoran Liu and
                  Lejla Batina},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {SoK: Neural Network Extraction Through Physical Side Channels},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/horvath},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HorvathL0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuangXCAZLGS24,
  author       = {Xuanbo Huang and
                  Kaiping Xue and
                  Lutong Chen and
                  Mingrui Ai and
                  Huancheng Zhou and
                  Bo Luo and
                  Guofei Gu and
                  Qibin Sun},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against
                  Network Topology Obfuscation},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/huang-xuanbo},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HuangXCAZLGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/IshtiaqDRRTWSWA24,
  author       = {Abdullah Al Ishtiaq and
                  Sarkar Snigdha Sarathi Das and
                  Syed Md. Mukit Rashid and
                  Ali Ranjbar and
                  Kai Tu and
                  Tianwei Wu and
                  Zhezheng Song and
                  Weixuan Wang and
                  Mujtahid Akon and
                  Rui Zhang and
                  Syed Rafiul Hussain},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Hermes: Unlocking Security Analysis of Cellular Network Protocols
                  by Synthesizing Finite State Machines from Natural Language Specifications},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/al-ishtiaq},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/IshtiaqDRRTWSWA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoisserMYVS24,
  author       = {David Koisser and
                  Richard Mitev and
                  Nikita Yadav and
                  Franziska Vollmer and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Orbital Trust and Privacy: SoK on {PKI} and Location Privacy Challenges
                  in Space Networks},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/koisser},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KoisserMYVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MankaliSP24,
  author       = {Lakshmi Likhitha Mankali and
                  Ozgur Sinanoglu and
                  Satwik Patnaik},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {{INSIGHT:} Attacking Industry-Adopted Learning Resilient Logic Locking
                  Techniques Using Explainable Graph Neural Network},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/mankali},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MankaliSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MazzoccaAUM24,
  author       = {Carlo Mazzocca and
                  Abbas Acar and
                  A. Selcuk Uluagac and
                  Rebecca Montanari},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {{EVOKE:} Efficient Revocation of Verifiable Credentials in IoT Networks},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/mazzocca},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MazzoccaAUM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MirnajafizadehS24,
  author       = {Seyed Mohammad Mehdi Mirnajafizadeh and
                  Ashwin Raam Sethuram and
                  David Mohaisen and
                  DaeHun Nyang and
                  Rhongho Jang},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Enhancing Network Attack Detection with Distributed and In-Network
                  Data Collection System},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/mirnajafizadeh},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MirnajafizadehS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OygenblikYZM0S24,
  author       = {David Oygenblik and
                  Carter Yagemann and
                  Joseph Zhang and
                  Arianna Mastali and
                  Jeman Park and
                  Brendan Saltaformaggio},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {{AI} Psychiatry: Forensic Investigation of Deep Learning Networks
                  in Memory Images},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/oygenblik},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OygenblikYZM0S24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PoissonCF24,
  author       = {Manuel Poisson and
                  Rodrigo Matos Carnier and
                  Kensuke Fukuda},
  title        = {GothX: a generator of customizable, legitimate and malicious IoT network
                  traffic},
  booktitle    = {Proceedings of the 17th Cyber Security Experimentation and Test Workshop,
                  {CSET} 2024, Philadelphia, PA, USA, 13 August 2024},
  pages        = {65--73},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3675741.3675753},
  doi          = {10.1145/3675741.3675753},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/PoissonCF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RahmanKB24,
  author       = {Mirza Masfiqur Rahman and
                  Imtiaz Karim and
                  Elisa Bertino},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {CellularLint: {A} Systematic Approach to Identify Inconsistent Behavior
                  in Cellular Network Specifications},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/rahman},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RahmanKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RameshWKE24,
  author       = {Reethika Ramesh and
                  Philipp Winter and
                  Sam Korman and
                  Roya Ensafi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {CalcuLatency: Leveraging Cross-Layer Network Latency Measurements
                  to Detect Proxy-Enabled Abuse},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/ramesh},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RameshWKE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SabziVGSLM24,
  author       = {Amir Sabzi and
                  Rut Vora and
                  Swati Goswami and
                  Margo I. Seltzer and
                  Mathias L{\'{e}}cuyer and
                  Aastha Mehta},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {NetShaper: {A} Differentially Private Network Side-Channel Mitigation
                  System},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/sabzi},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SabziVGSLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Sun0KS24,
  author       = {Bing Sun and
                  Jun Sun and
                  Wayne Koh and
                  Jie Shi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Neural Network Semantic Backdoor Detection and Mitigation: {A} Causality-Based
                  Approach},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/sun-bing},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Sun0KS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UetzHHSH24,
  author       = {Rafael Uetz and
                  Marco Herzog and
                  Louis Hackl{\"{a}}nder and
                  Simon Schwarz and
                  Martin Henze},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {You Cannot Escape Me: Detecting Evasions of {SIEM} Rules in Enterprise
                  Networks},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/uetz},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/UetzHHSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangT0HG024,
  author       = {Zihao Wang and
                  Di Tang and
                  XiaoFeng Wang and
                  Wei He and
                  Zhaoyang Geng and
                  Wenhao Wang},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural
                  Networks for Runtime Trojan Injection},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/wang-zihao-tossing},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangT0HG024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XingYFKR24,
  author       = {Jiarong Xing and
                  Sophia Yoo and
                  Xenofon Foukas and
                  Daehyeok Kim and
                  Michael K. Reiter},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {On the Criticality of Integrity Protection in 5G Fronthaul Networks},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/xing-jiarong},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XingYFKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuL0AYY24,
  author       = {Zhibo Xu and
                  Shangqi Lai and
                  Xiaoning Liu and
                  Alsharif Abuadbba and
                  Xingliang Yuan and
                  Xun Yi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {OblivGNN: Oblivious Inference on Transductive and Inductive Graph
                  Neural Network},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/xu-zhibo},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XuL0AYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Yang0WZBCAWKI024,
  author       = {Limin Yang and
                  Zhi Chen and
                  Chenkai Wang and
                  Zhenning Zhang and
                  Sushruth Booma and
                  Phuong Cao and
                  Constantin Adam and
                  Alexander Withers and
                  Zbigniew Kalbarczyk and
                  Ravishankar K. Iyer and
                  Gang Wang},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement
                  of Network Alerts in a Security Operations Center},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/yang-limin},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Yang0WZBCAWKI024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuLXBGLABDDNS024,
  author       = {Chang Zhu and
                  Ziyang Li and
                  Anton Xue and
                  Ati Priya Bajaj and
                  Wil Gibbs and
                  Yibo Liu and
                  Rajeev Alur and
                  Tiffany Bao and
                  Hanjun Dai and
                  Adam Doup{\'{e}} and
                  Mayur Naik and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Aravind Machiry},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {{TYGR:} Type Inference on Stripped Binaries using Graph Neural Networks},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/zhu-chang},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuLXBGLABDDNS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuangSZCLZ024,
  author       = {Yuanxin Zhuang and
                  Chuan Shi and
                  Mengmei Zhang and
                  Jinghui Chen and
                  Lingjuan Lyu and
                  Pan Zhou and
                  Lichao Sun},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited
                  through Data-Free Model Extraction Attacks?},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/zhuang},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuangSZCLZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/VembuCS24,
  author       = {Swathi Kumar Vembu and
                  Anupam Chattopadhyay and
                  Sayandeep Saha},
  title        = {Authenticating Edge Neural Network through Hardware Security Modules
                  and Quantum-Safe Key Management},
  booktitle    = {37th International Conference on {VLSI} Design and 23rd International
                  Conference on Embedded Systems, {VLSID} 2024, Kolkata, India, January
                  6-10, 2024},
  pages        = {318--323},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/VLSID60093.2024.00059},
  doi          = {10.1109/VLSID60093.2024.00059},
  timestamp    = {Mon, 08 Apr 2024 20:48:39 +0200},
  biburl       = {https://dblp.org/rec/conf/vlsid/VembuCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/DhonthiEHH24,
  author       = {Akshay Dhonthi and
                  Marcello Eiermann and
                  Ernst Moritz Hahn and
                  Vahid Hashemi},
  editor       = {Rayna Dimitrova and
                  Ori Lahav and
                  Sebastian Wolff},
  title        = {{AGNES:} Abstraction-Guided Framework for Deep Neural Networks Security},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation - 25th International
                  Conference, {VMCAI} 2024, London, United Kingdom, January 15-16, 2024,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14500},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-50521-8\_6},
  doi          = {10.1007/978-3-031-50521-8\_6},
  timestamp    = {Mon, 15 Jan 2024 09:04:26 +0100},
  biburl       = {https://dblp.org/rec/conf/vmcai/DhonthiEHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ShafiqueRCJ24,
  author       = {Rahman Shafique and
                  Furqan Rustam and
                  Gyu Sang Choi and
                  Anca Delia Jurcut},
  title        = {Enhancing In-Vehicle Network Security Against AI-Generated Cyberattacks
                  Using Machine Learning},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2024,
                  Dubai, United Arab Emirates, April 21-24, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/WCNC57260.2024.10571300},
  doi          = {10.1109/WCNC57260.2024.10571300},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ShafiqueRCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PacherkarY24,
  author       = {Harsh Sanjay Pacherkar and
                  Guanhua Yan},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {{PROV5GC:} Hardening 5G Core Network Security with Attack Detection
                  and Attribution Based on Provenance Graphs},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {254--264},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656129},
  doi          = {10.1145/3643833.3656129},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PacherkarY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/UnniBB24,
  author       = {Pranav Unni and
                  Saumya Banerjee and
                  Samia Bouzefrane},
  editor       = {Samia Bouzefrane and
                  Damien Sauveron},
  title        = {Enhancing Security in Blockchain Enabled IoT Networks Empowered with
                  zk-SNARKs and Physically Unclonable Functions},
  booktitle    = {Information Security Theory and Practice - 14th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2024, Paris, France, February 29 - March 1, 2024,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14625},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-60391-4\_7},
  doi          = {10.1007/978-3-031-60391-4\_7},
  timestamp    = {Wed, 26 Jun 2024 11:16:11 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/UnniBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wons/PaciCB24,
  author       = {Andrea Paci and
                  Matteo Chiacchia and
                  Giuseppe Bianchi},
  title        = {5GMap: User-Driven Audit of Access Security Configurations in Cellular
                  Networks},
  booktitle    = {19th Wireless On-Demand Network Systems and Services Conference, {WONS}
                  2024, Chamonix, France, January 29-31, 2024},
  pages        = {97--104},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.23919/WONS60642.2024.10449586},
  doi          = {10.23919/WONS60642.2024.10449586},
  timestamp    = {Wed, 13 Mar 2024 19:10:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wons/PaciCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/AnwarQ24,
  author       = {Raja Waseem Anwar and
                  Kashif Naseer Qureshi},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Attack Detection Mechanisms for Internet of Everything (IoE) Networks},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_3},
  doi          = {10.1007/978-3-031-45162-1\_3},
  timestamp    = {Thu, 04 Jan 2024 17:09:15 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/AnwarQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/IftikharQ24,
  author       = {Abeer Iftikhar and
                  Kashif Naseer Qureshi},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Future Privacy and Trust Challenges for IoE Networks},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {193--218},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_12},
  doi          = {10.1007/978-3-031-45162-1\_12},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/IftikharQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/IqbalMS24,
  author       = {Saleem Iqbal and
                  Saqib Majeed and
                  Syed Amad Hussain Shah},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Future Cybersecurity Challenges for IoE Networks},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {75--86},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_5},
  doi          = {10.1007/978-3-031-45162-1\_5},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/IqbalMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/PahlevanzadehA24,
  author       = {Bahareh Pahlevanzadeh and
                  Sima Ahmadpour},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Cybersecurity Threats and Attacks in IoE Networks},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_2},
  doi          = {10.1007/978-3-031-45162-1\_2},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/PahlevanzadehA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/RehmanSAR24,
  author       = {Faisal Rehman and
                  Hanan Sharif and
                  Muhammad Anwar and
                  Naveed Riaz},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Big Data Analytics for Cybersecurity in IoE Networks},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {163--176},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_10},
  doi          = {10.1007/978-3-031-45162-1\_10},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/RehmanSAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/UllahU24,
  author       = {Fasee Ullah and
                  Asad Ullah},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Networking and Security Architectures for IoE Networks},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {89--107},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_6},
  doi          = {10.1007/978-3-031-45162-1\_6},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/UllahU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-1,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6},
  doi          = {10.1007/978-3-031-54770-6},
  isbn         = {978-3-031-54769-0},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-2,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7},
  doi          = {10.1007/978-3-031-54773-7},
  isbn         = {978-3-031-54772-0},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-3,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8},
  doi          = {10.1007/978-3-031-54776-8},
  isbn         = {978-3-031-54775-1},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024w1,
  editor       = {Martin Andreoni},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2024
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE,
                  and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14586},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-61486-6},
  doi          = {10.1007/978-3-031-61486-6},
  isbn         = {978-3-031-61485-9},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2024w1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024w2,
  editor       = {Martin Andreoni},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2024
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE,
                  and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14587},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-61489-7},
  doi          = {10.1007/978-3-031-61489-7},
  isbn         = {978-3-031-61488-0},
  timestamp    = {Sat, 20 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2024w2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2024-1,
  editor       = {Clemente Galdi and
                  Duong Hieu Phan},
  title        = {Security and Cryptography for Networks - 14th International Conference,
                  {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14973},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-71070-4},
  doi          = {10.1007/978-3-031-71070-4},
  isbn         = {978-3-031-71069-8},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2024-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2024-2,
  editor       = {Clemente Galdi and
                  Duong Hieu Phan},
  title        = {Security and Cryptography for Networks - 14th International Conference,
                  {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14974},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-71073-5},
  doi          = {10.1007/978-3-031-71073-5},
  isbn         = {978-3-031-71072-8},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2024-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2024,
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833},
  doi          = {10.1145/3643833},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-00192,
  author       = {Abuzar B. M. Adam and
                  Mohamed Amine Ouamri and
                  Mohammed Saleh Ali Muthanna and
                  Xingwang Li and
                  Mohammed A. M. Elhassan and
                  Ammar Muthanna},
  title        = {Real-Time and Security-Aware Precoding in RIS-Empowered Multi-User
                  Wireless Networks},
  journal      = {CoRR},
  volume       = {abs/2401.00192},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.00192},
  doi          = {10.48550/ARXIV.2401.00192},
  eprinttype    = {arXiv},
  eprint       = {2401.00192},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-00192.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-08135,
  author       = {Thanh Nguyen Canh and
                  Xiem HoangVan},
  title        = {Machine Learning-Based Malicious Vehicle Detection for Security Threats
                  and Attacks in Vehicle Ad-hoc Network {(VANET)} Communications},
  journal      = {CoRR},
  volume       = {abs/2401.08135},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.08135},
  doi          = {10.48550/ARXIV.2401.08135},
  eprinttype    = {arXiv},
  eprint       = {2401.08135},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-08135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-13630,
  author       = {Emanuel Vieira and
                  Jo{\~{a}}o Almeida and
                  Joaquim Ferreira and
                  Paulo C. Bartolomeu},
  title        = {Enabling Seamless Data Security, Consensus, and Trading in Vehicular
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2401.13630},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.13630},
  doi          = {10.48550/ARXIV.2401.13630},
  eprinttype    = {arXiv},
  eprint       = {2401.13630},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-13630.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-14350,
  author       = {Fatema Bannat Wala and
                  Mariam Kiran},
  title        = {5G Network Security Practices: An Overview and Survey},
  journal      = {CoRR},
  volume       = {abs/2401.14350},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.14350},
  doi          = {10.48550/ARXIV.2401.14350},
  eprinttype    = {arXiv},
  eprint       = {2401.14350},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-14350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-00002,
  author       = {Zhongfu Guo and
                  Xinsheng Ji and
                  Wei You and
                  Mingyan Xu and
                  Yu Zhao and
                  Zhimo Cheng and
                  Deqiang Zhou},
  title        = {Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission
                  with Security Consideration in {B5G} Edge Network},
  journal      = {CoRR},
  volume       = {abs/2402.00002},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.00002},
  doi          = {10.48550/ARXIV.2402.00002},
  eprinttype    = {arXiv},
  eprint       = {2402.00002},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-00002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03769,
  author       = {Oleksandr Kuznetsov and
                  Dmytro Zakharov and
                  Emanuele Frontoni and
                  Andrea Maranesi},
  title        = {AttackNet: Enhancing Biometric Security via Tailored Convolutional
                  Neural Network Architectures for Liveness Detection},
  journal      = {CoRR},
  volume       = {abs/2402.03769},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03769},
  doi          = {10.48550/ARXIV.2402.03769},
  eprinttype    = {arXiv},
  eprint       = {2402.03769},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-05378,
  author       = {Tharaka Perera and
                  Saman Atapattu and
                  Yuting Fang and
                  Jamie S. Evans},
  title        = {Graph Neural Networks for Physical-Layer Security in Multi-User Flexible-Duplex
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2402.05378},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.05378},
  doi          = {10.48550/ARXIV.2402.05378},
  eprinttype    = {arXiv},
  eprint       = {2402.05378},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-05378.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-07054,
  author       = {Naresh Kshetri and
                  Rahul Mishra and
                  Mir Mehedi Rahman and
                  Tanja Steigner},
  title        = {HNMblock: Blockchain technology powered Healthcare Network Model for
                  epidemiological monitoring, medical systems security, and wellness},
  journal      = {CoRR},
  volume       = {abs/2402.07054},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.07054},
  doi          = {10.48550/ARXIV.2402.07054},
  eprinttype    = {arXiv},
  eprint       = {2402.07054},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-07054.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-09108,
  author       = {Yew Kee Wong and
                  Yifan Zhou and
                  Xinlin Zhou and
                  Yan Shing Liang and
                  Zi Yan Li},
  title        = {Web 3.0 and Quantum Security: Long-Distance Free-Space {QSDC} for
                  Global Web 3.0 Networks},
  journal      = {CoRR},
  volume       = {abs/2402.09108},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.09108},
  doi          = {10.48550/ARXIV.2402.09108},
  eprinttype    = {arXiv},
  eprint       = {2402.09108},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-09108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-10389,
  author       = {Maha Ali Allouzi and
                  Javed Khan},
  title        = {Enabling Zero Trust Security in IoMT Edge Network},
  journal      = {CoRR},
  volume       = {abs/2402.10389},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.10389},
  doi          = {10.48550/ARXIV.2402.10389},
  eprinttype    = {arXiv},
  eprint       = {2402.10389},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-10389.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-11231,
  author       = {J{\"{o}}rg Osterrieder and
                  Stephen Chan and
                  Jeffrey Chu and
                  Yuanyuan Zhang and
                  Branka Hadji Misheva and
                  Codruta Mare},
  title        = {Enhancing Security in Blockchain Networks: Anomalies, Frauds, and
                  Advanced Detection Techniques},
  journal      = {CoRR},
  volume       = {abs/2402.11231},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.11231},
  doi          = {10.48550/ARXIV.2402.11231},
  eprinttype    = {arXiv},
  eprint       = {2402.11231},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-11231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-04113,
  author       = {Aly Sabri Abdalla and
                  Joshua Moore and
                  Nisha Adhikari and
                  Vuk Marojevic},
  title        = {{ZTRAN:} Prototyping Zero Trust Security xApps for Open Radio Access
                  Network Deployments},
  journal      = {CoRR},
  volume       = {abs/2403.04113},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.04113},
  doi          = {10.48550/ARXIV.2403.04113},
  eprinttype    = {arXiv},
  eprint       = {2403.04113},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-04113.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-08208,
  author       = {Khondoker Murad Hossain and
                  Tim Oates},
  title        = {Advancing Security in {AI} Systems: {A} Novel Approach to Detecting
                  Backdoors in Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2403.08208},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.08208},
  doi          = {10.48550/ARXIV.2403.08208},
  eprinttype    = {arXiv},
  eprint       = {2403.08208},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-08208.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-08507,
  author       = {Gabriel Karl Gegenhuber and
                  Wilfried Mayer and
                  Edgar R. Weippl and
                  Adrian Dabrowski},
  title        = {MobileAtlas: Geographically Decoupled Measurements in Cellular Networks
                  for Security and Privacy Research},
  journal      = {CoRR},
  volume       = {abs/2403.08507},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.08507},
  doi          = {10.48550/ARXIV.2403.08507},
  eprinttype    = {arXiv},
  eprint       = {2403.08507},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-08507.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-11303,
  author       = {Tulasi Udupa A and
                  Sushma Jayaram and
                  Shreya Ganesh Hegde},
  title        = {A Brief Study of Computer Network Security Technologies},
  journal      = {CoRR},
  volume       = {abs/2403.11303},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.11303},
  doi          = {10.48550/ARXIV.2403.11303},
  eprinttype    = {arXiv},
  eprint       = {2403.11303},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-11303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-13266,
  author       = {Ziqi Yang and
                  Roberto Tron},
  title        = {Enhancing Security in Multi-Robot Systems through Co-Observation Planning,
                  Reachability Analysis, and Network Flow},
  journal      = {CoRR},
  volume       = {abs/2403.13266},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.13266},
  doi          = {10.48550/ARXIV.2403.13266},
  eprinttype    = {arXiv},
  eprint       = {2403.13266},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-13266.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-20120,
  author       = {Ayush Rastogi and
                  Harsh Rastogi and
                  Yash Rastogi and
                  Divyansh Dubey},
  title        = {Privacy-Preserving Data Aggregation Techniques for Enhanced Efficiency
                  and Security in Wireless Sensor Networks: {A} Comprehensive Analysis
                  and Evaluation},
  journal      = {CoRR},
  volume       = {abs/2403.20120},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.20120},
  doi          = {10.48550/ARXIV.2403.20120},
  eprinttype    = {arXiv},
  eprint       = {2403.20120},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-20120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-20136,
  author       = {Jiani Fan and
                  Lwin Khin Shar and
                  Jiale Guo and
                  Wenzhuo Yang and
                  Dusit Niyato and
                  Kwok{-}Yan Lam},
  title        = {Differentiated Security Architecture for Secure and Efficient Infotainment
                  Data Communication in IoV Networks},
  journal      = {CoRR},
  volume       = {abs/2403.20136},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.20136},
  doi          = {10.48550/ARXIV.2403.20136},
  eprinttype    = {arXiv},
  eprint       = {2403.20136},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-20136.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-08232,
  author       = {Yaser Baseri and
                  Vikas Chouhan and
                  Abdelhakim Hafid},
  title        = {Navigating Quantum Security Risks in Networked Environments: {A} Comprehensive
                  Study of Quantum-Safe Network Protocols},
  journal      = {CoRR},
  volume       = {abs/2404.08232},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.08232},
  doi          = {10.48550/ARXIV.2404.08232},
  eprinttype    = {arXiv},
  eprint       = {2404.08232},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-08232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-08643,
  author       = {Navneet Kaur and
                  Naresh Kshetri and
                  Purnendu Shekhar Pandey},
  title        = {6AInets: Harnessing artificial intelligence for the 6G network security:
                  Impacts and Challenges},
  journal      = {CoRR},
  volume       = {abs/2404.08643},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.08643},
  doi          = {10.48550/ARXIV.2404.08643},
  eprinttype    = {arXiv},
  eprint       = {2404.08643},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-08643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-10012,
  author       = {Sreenitha Kasarapu and
                  Sanket Shukla and
                  Sai Manoj Pudukotai Dinakarrao},
  title        = {Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware
                  Distributed Computing for Enhanced Security},
  journal      = {CoRR},
  volume       = {abs/2404.10012},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.10012},
  doi          = {10.48550/ARXIV.2404.10012},
  eprinttype    = {arXiv},
  eprint       = {2404.10012},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-10012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-11388,
  author       = {Akinsola Ahmed and
                  Ejiofor Oluomachi and
                  Akinde Abdullah and
                  Njoku Tochukwu},
  title        = {Enhancing Data Privacy In Wireless Sensor Networks: Investigating
                  Techniques And Protocols To Protect Privacy Of Data Transmitted Over
                  Wireless Sensor Networks In Critical Applications Of Healthcare And
                  National Security},
  journal      = {CoRR},
  volume       = {abs/2404.11388},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.11388},
  doi          = {10.48550/ARXIV.2404.11388},
  eprinttype    = {arXiv},
  eprint       = {2404.11388},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-11388.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-15278,
  author       = {Wenjun Lan and
                  Kongyang Chen and
                  Jiannong Cao and
                  Yikai Li and
                  Ning Li and
                  Qi Chen and
                  Yuvraj Sahni},
  title        = {Security-Sensitive Task Offloading in Integrated Satellite-Terrestrial
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2404.15278},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.15278},
  doi          = {10.48550/ARXIV.2404.15278},
  eprinttype    = {arXiv},
  eprint       = {2404.15278},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-15278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-00793,
  author       = {Karwan Mustafa Kareem},
  title        = {The Impact of {IMSI} Catcher Deployments on Cellular Network Security:
                  Challenges and Countermeasures in 4G and 5G Networks},
  journal      = {CoRR},
  volume       = {abs/2405.00793},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.00793},
  doi          = {10.48550/ARXIV.2405.00793},
  eprinttype    = {arXiv},
  eprint       = {2405.00793},
  timestamp    = {Sun, 09 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-00793.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-01221,
  author       = {Shaolong Guo and
                  Yuntao Wang and
                  Ning Zhang and
                  Zhou Su and
                  Tom H. Luan and
                  Zhiyi Tian and
                  Xuemin Shen},
  title        = {A Survey on Semantic Communication Networks: Architecture, Security,
                  and Privacy},
  journal      = {CoRR},
  volume       = {abs/2405.01221},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.01221},
  doi          = {10.48550/ARXIV.2405.01221},
  eprinttype    = {arXiv},
  eprint       = {2405.01221},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-01221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-02147,
  author       = {Ben Weintraub and
                  Satwik Prabhu Kumble and
                  Cristina Nita{-}Rotaru and
                  Stefanie Roos},
  title        = {Payout Races and Congested Channels: {A} Formal Analysis of Security
                  in the Lightning Network},
  journal      = {CoRR},
  volume       = {abs/2405.02147},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.02147},
  doi          = {10.48550/ARXIV.2405.02147},
  eprinttype    = {arXiv},
  eprint       = {2405.02147},
  timestamp    = {Fri, 07 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-02147.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-10906,
  author       = {Marco Spanghero and
                  Panos Papadimitratos},
  title        = {{POSTER:} Testing network-based {RTK} for {GNSS} receiver security},
  journal      = {CoRR},
  volume       = {abs/2405.10906},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.10906},
  doi          = {10.48550/ARXIV.2405.10906},
  eprinttype    = {arXiv},
  eprint       = {2405.10906},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-10906.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-11141,
  author       = {Negin Ayoughi and
                  Shiva Nejati and
                  Mehrdad Sabetzadeh and
                  Patricio Saavedra},
  title        = {Enhancing Automata Learning with Statistical Machine Learning: {A}
                  Network Security Case Study},
  journal      = {CoRR},
  volume       = {abs/2405.11141},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.11141},
  doi          = {10.48550/ARXIV.2405.11141},
  eprinttype    = {arXiv},
  eprint       = {2405.11141},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-11141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-13847,
  author       = {Ali Mohammadi Ruzbahani},
  title        = {AI-Protected Blockchain-based IoT environments: Harnessing the Future
                  of Network Security and Privacy},
  journal      = {CoRR},
  volume       = {abs/2405.13847},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.13847},
  doi          = {10.48550/ARXIV.2405.13847},
  eprinttype    = {arXiv},
  eprint       = {2405.13847},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-13847.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-15089,
  author       = {Daniel Aronoff},
  title        = {Targeted Nakamoto: {A} Bitcoin Protocol to Balance Network Security
                  and Energy Consumption},
  journal      = {CoRR},
  volume       = {abs/2405.15089},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.15089},
  doi          = {10.48550/ARXIV.2405.15089},
  eprinttype    = {arXiv},
  eprint       = {2405.15089},
  timestamp    = {Wed, 19 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-15089.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-02964,
  author       = {Glory Justin and
                  Santiago Paternain},
  title        = {Real-Time Small-Signal Security Assessment Using Graph Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2406.02964},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.02964},
  doi          = {10.48550/ARXIV.2406.02964},
  eprinttype    = {arXiv},
  eprint       = {2406.02964},
  timestamp    = {Fri, 05 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-02964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-10089,
  author       = {Rui Zhu},
  title        = {Enhancing Security in Millimeter Wave {SWIPT} Networks},
  journal      = {CoRR},
  volume       = {abs/2406.10089},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.10089},
  doi          = {10.48550/ARXIV.2406.10089},
  eprinttype    = {arXiv},
  eprint       = {2406.10089},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-10089.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-13365,
  author       = {Louis Van Langendonck and
                  Ismael Castell{-}Uroz and
                  Pere Barlet{-}Ros},
  title        = {{PPT-GNN:} {A} Practical Pre-Trained Spatio-Temporal Graph Neural
                  Network for Network Security},
  journal      = {CoRR},
  volume       = {abs/2406.13365},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.13365},
  doi          = {10.48550/ARXIV.2406.13365},
  eprinttype    = {arXiv},
  eprint       = {2406.13365},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-13365.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-13920,
  author       = {Tao Wu and
                  Canyixing Cui and
                  Xingping Xian and
                  Shaojie Qiao and
                  Chao Wang and
                  Lin Yuan and
                  Shui Yu},
  title        = {Explainable {AI} Security: Exploring Robustness of Graph Neural Networks
                  to Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2406.13920},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.13920},
  doi          = {10.48550/ARXIV.2406.13920},
  eprinttype    = {arXiv},
  eprint       = {2406.13920},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-13920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-04077,
  author       = {Anna Talgat and
                  Ruibo Wang and
                  Mustafa A. Kishk and
                  Mohamed{-}Slim Alouini},
  title        = {Enhancing Physical Layer Security in {LEO} Satellite-Enabled IoT Network
                  Communications},
  journal      = {CoRR},
  volume       = {abs/2407.04077},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.04077},
  doi          = {10.48550/ARXIV.2407.04077},
  eprinttype    = {arXiv},
  eprint       = {2407.04077},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-04077.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-06767,
  author       = {Ziwei Liu and
                  Wen Chen and
                  Qingqing Wu and
                  Zhendong Li and
                  Xusheng Zhu and
                  Qiong Wu and
                  Nan Cheng},
  title        = {Enhancing Robustness and Security in {ISAC} Network Design: Leveraging
                  Transmissive Reconfigurable Intelligent Surface with {RSMA}},
  journal      = {CoRR},
  volume       = {abs/2407.06767},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.06767},
  doi          = {10.48550/ARXIV.2407.06767},
  eprinttype    = {arXiv},
  eprint       = {2407.06767},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-06767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-00193,
  author       = {Sazzad Sayyed and
                  Milin Zhang and
                  Shahriar Rifat and
                  Ananthram Swami and
                  Michael DeLucia and
                  Francesco Restuccia},
  title        = {Resilience and Security of Deep Neural Networks Against Intentional
                  and Unintentional Perturbations: Survey and Research Challenges},
  journal      = {CoRR},
  volume       = {abs/2408.00193},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.00193},
  doi          = {10.48550/ARXIV.2408.00193},
  eprinttype    = {arXiv},
  eprint       = {2408.00193},
  timestamp    = {Fri, 06 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-00193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-01303,
  author       = {Charles Oredola and
                  Adnan Ashraf},
  title        = {A Systematic Mapping Study on {SDN} Controllers for Enhancing Security
                  in IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2408.01303},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.01303},
  doi          = {10.48550/ARXIV.2408.01303},
  eprinttype    = {arXiv},
  eprint       = {2408.01303},
  timestamp    = {Wed, 11 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-01303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-02318,
  author       = {Mohuya Chakraborty and
                  Atul Khekade},
  title        = {{XDC} Network Assessment: Decentralization, Scalability and Security},
  journal      = {CoRR},
  volume       = {abs/2408.02318},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.02318},
  doi          = {10.48550/ARXIV.2408.02318},
  eprinttype    = {arXiv},
  eprint       = {2408.02318},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-02318.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-08433,
  author       = {Muzun Althunayyan and
                  Amir Javed and
                  Omer Rana},
  title        = {A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network
                  Security using Hierarchical Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2408.08433},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.08433},
  doi          = {10.48550/ARXIV.2408.08433},
  eprinttype    = {arXiv},
  eprint       = {2408.08433},
  timestamp    = {Mon, 23 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-08433.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lan24,
  title        = {Network security threat detection technology based on {EPSO-BP} algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {6},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00152-9},
  doi          = {10.1186/S13635-024-00152-9},
  timestamp    = {Sat, 11 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LiuBJZ23,
  author       = {Jianwei Liu and
                  Lin Bai and
                  Chunxiao Jiang and
                  Wei Zhang},
  title        = {Space-Air-Ground Integrated Network Security},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-1125-7},
  doi          = {10.1007/978-981-99-1125-7},
  isbn         = {978-981-99-1124-0},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LiuBJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Huang23,
  author       = {Shanshi Huang},
  title        = {Reliability and Security of Compute-In-Memory Based Deep Neural Network
                  Accelerators},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2023},
  url          = {http://hdl.handle.net/1853/70136},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Huang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Frey23,
  author       = {Matthias Frey},
  title        = {Distributed function approximation over noisy channels: with reliability
                  and security guarantees for applications in wireless networks},
  school       = {Technical University of Berlin, Germany},
  year         = {2023},
  url          = {https://d-nb.info/127907745X},
  urn          = {urn:nbn:de:101:1-2023012500591671650836},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Frey23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Osman23,
  author       = {Amr Osman},
  title        = {Agile Network Security for Software Defined Edge Clouds},
  school       = {Dresden University of Technology, Germany},
  year         = {2023},
  url          = {https://d-nb.info/1282727761},
  urn          = {urn:nbn:de:bsz:14-qucosa2-840067},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Osman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/es/Prats23,
  author       = {Pol Alemany},
  title        = {Quality of service, security and trustworthiness for network slices},
  school       = {Polytechnic University of Catalonia, Spain},
  year         = {2023},
  url          = {http://hdl.handle.net/10803/688925},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/es/Prats23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Galtier23,
  author       = {Florent Galtier},
  title        = {Wide and Local Area Wireless Network security based on physical layer
                  monitoring. (S{\'{e}}curit{\'{e}} des r{\'{e}}seaux
                  sans-fil courte et longue port{\'{e}}e bas{\'{e}}e sur desm{\'{e}}canismes
                  de monitoring de la couche physique)},
  school       = {Paul Sabatier University, Toulouse, France},
  year         = {2023},
  url          = {https://tel.archives-ouvertes.fr/tel-04071193},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Galtier23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Hamza23,
  author       = {Anis Amazigh Hamza},
  title        = {Improving cooperative non-orthogonal multiple access {(CNOMA)} and
                  enhancing the physical layer security {(PLS)} for beyond 5G {(B5G)}
                  and future eHealth wireless networks. (Am{\'{e}}lioration des
                  techniques d'acc{\`{e}}s multiple non-orthogonales coop{\'{e}}ratives
                  {(CNOMA)} et renforcement de la s{\'{e}}curit{\'{e}} de
                  la couche physique pour les syst{\`{e}}mes sans fil au-del{\`{a}}
                  de la 5G {(B5G)} et des futurs r{\'{e}}seaux de eSant{\'{e}})},
  school       = {Polytechnic University of Hauts-de-France, France},
  year         = {2023},
  url          = {https://hal.archives-ouvertes.fr/tel-04037829},
  timestamp    = {Thu, 29 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Hamza23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Saad23,
  author       = {Sabra Ben Saad},
  title        = {Security architectures for network slice management for 5G and beyond.
                  (Architectures s{\'{e}}curis{\'{e}}s pour la gestion des
                  tranches de r{\'{e}}seau pour la 5G et au-del{\`{a}})},
  school       = {Sorbonne University, Paris, France},
  year         = {2023},
  url          = {https://tel.archives-ouvertes.fr/tel-04464041},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Saad23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Yakan23,
  author       = {Hadi Yakan},
  title        = {Security of {V2X} communications in 3GPP - 5G cellular networks. (S{\'{e}}curit{\'{e}}
                  des communications {V2X} dans les r{\'{e}}seaux cellulaires 5G
                  - 3GPP)},
  school       = {University of Paris-Saclay, France},
  year         = {2023},
  url          = {https://tel.archives-ouvertes.fr/tel-04351530},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Yakan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/wn/MengZS23,
  author       = {Yan Meng and
                  Haojin Zhu and
                  Xuemin (Sherman) Shen},
  title        = {Security in Smart Home Networks},
  series       = {Wireless Networks},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-24185-7},
  doi          = {10.1007/978-3-031-24185-7},
  isbn         = {978-3-031-24184-0},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wn/MengZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/wn/ShenZJ23,
  author       = {Yulong Shen and
                  Yuanyu Zhang and
                  Xiaohong Jiang},
  title        = {Secrecy, Covertness and Authentication in Wireless Communications
                  - Physical Layer Security Approach},
  series       = {Wireless Networks},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38465-3},
  doi          = {10.1007/978-3-031-38465-3},
  isbn         = {978-3-031-38464-6},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wn/ShenZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/wn/ShuW23,
  author       = {Feng Shu and
                  Jiangzhou Wang},
  title        = {Intelligent Reflecting Surface-Aided Physical-Layer Security},
  series       = {Wireless Networks},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41812-9},
  doi          = {10.1007/978-3-031-41812-9},
  isbn         = {978-3-031-41811-2},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/wn/ShuW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlShareedaM23,
  author       = {Mahmood A. Al{-}Shareeda and
                  Selvakumar Manickam},
  title        = {A Systematic Literature Review on Security of Vehicular Ad-Hoc Network
                  {(VANET)} Based on {VEINS} Framework},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {46218--46228},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3274774},
  doi          = {10.1109/ACCESS.2023.3274774},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlShareedaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AzamKYJSMM23,
  author       = {Muhammad Azam and
                  Muhammad Sajjad Ali Khan and
                  Shilin Yang and
                  Saeed Ullah Jan and
                  Tapan Senapati and
                  Sarbast Moslem and
                  Wali Khan Mashwani},
  title        = {Novel Dual Partitioned Maclaurin Symmetric Mean Operators for the
                  Selection of Computer Network Security System With Complex Intuitionistic
                  Fuzzy Setting},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {85050--85066},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3294229},
  doi          = {10.1109/ACCESS.2023.3294229},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AzamKYJSMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CookRK23,
  author       = {Jonathan Cook and
                  Sabih ur Rehman and
                  M. Arif Khan},
  title        = {Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks:
                  Challenges and Future Directions},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {39295--39317},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3268064},
  doi          = {10.1109/ACCESS.2023.3268064},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CookRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DansanaBDAZAPS23,
  author       = {Debabrata Dansana and
                  Prafulla Kumar Behera and
                  Abdulbasit A. Darem and
                  Zubair Ashraf and
                  Abu Taha Zamani and
                  Mohammad Nadeem Ahmed and
                  S. Gopal Krishna Patro and
                  Mohammad Shameem},
  title        = {{BDDTPA:} Blockchain-Driven Deep Traffic Pattern Analysis for Enhanced
                  Security in Cognitive Radio Ad-Hoc Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {98202--98216},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3312291},
  doi          = {10.1109/ACCESS.2023.3312291},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DansanaBDAZAPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DengDLWYPL23,
  author       = {Junyi Deng and
                  Jikai Deng and
                  Peihao Liu and
                  Huan Wang and
                  Junjie Yan and
                  Deru Pan and
                  Jiahua Liu},
  title        = {A Survey on Vehicular Cloud Network Security},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {136741--136757},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3339192},
  doi          = {10.1109/ACCESS.2023.3339192},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DengDLWYPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/EkolleOK23,
  author       = {Zie Eya Ekolle and
                  Hideki Ochiai and
                  Ryuji Kohno},
  title        = {Collabo: {A} Collaborative Machine Learning Model and Its Application
                  to the Security of Heterogeneous Medical Data in an IoT Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {142663--142675},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3341837},
  doi          = {10.1109/ACCESS.2023.3341837},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/EkolleOK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhanemCFK23,
  author       = {Mohamed Chahine Ghanem and
                  Thomas M. Chen and
                  Mohamed Amine Ferrag and
                  Mohyi E. Kettouche},
  title        = {{ESASCF:} Expertise Extraction, Generalization and Reply Framework
                  for Optimized Automation of Network Security Compliance},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {129840--129853},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3332834},
  doi          = {10.1109/ACCESS.2023.3332834},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GhanemCFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IftikharQAJ23,
  author       = {Abeer Iftikhar and
                  Kashif Naseer Qureshi and
                  Ali A. Altalbe and
                  Khalid Javeed},
  title        = {Security Provision by Using Detection and Prevention Methods to Ensure
                  Trust in Edge-Based Smart City Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {137529--137547},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3338550},
  doi          = {10.1109/ACCESS.2023.3338550},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/IftikharQAJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JahangeerBAMAH23,
  author       = {Asma Jahangeer and
                  Sibghat Ullah Bazai and
                  Saad Aslam and
                  Shah Marjan and
                  Muhammad Anas and
                  Sayed Habibullah Hashemi},
  title        = {A Review on the Security of IoT Networks: From Network Layer's Perspective},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {71073--71087},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3246180},
  doi          = {10.1109/ACCESS.2023.3246180},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JahangeerBAMAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JangKSCKKH23,
  author       = {Younghoan Jang and
                  Dong{-}Wook Kim and
                  Gun{-}Yoon Shin and
                  Seungjae Cho and
                  Kwangsoo Kim and
                  Jaesik Kang and
                  Myung{-}Mook Han},
  title        = {An Investigation of Learning Model Technologies for Network Traffic
                  Classification Design in Cyber Security Exercises},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {138712--138731},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3336674},
  doi          = {10.1109/ACCESS.2023.3336674},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JangKSCKKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanN23,
  author       = {Md Muhidul Islam Khan and
                  Gianfranco Nencioni},
  title        = {Resource Allocation in Networking and Computing Systems: {A} Security
                  and Dependability Perspective},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {89433--89454},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3306534},
  doi          = {10.1109/ACCESS.2023.3306534},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KondothSSH23,
  author       = {Lashmi Kondoth and
                  Rajan Shankaran and
                  Quan Z. Sheng and
                  Richard Han},
  title        = {Wireless Network-on-Chip Security Review: Attack Taxonomy, Implications,
                  and Countermeasures},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {122876--122892},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3329572},
  doi          = {10.1109/ACCESS.2023.3329572},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KondothSSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuL23,
  author       = {Jian Liu and
                  Tim H. Lin},
  title        = {A Framework for the Synthesis of X-Ray Security Inspection Images
                  Based on Generative Adversarial Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {63751--63760},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3288087},
  doi          = {10.1109/ACCESS.2023.3288087},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MartinsCMBDCMCARNMWFMPSSMRCS23,
  author       = {Joberto S. B. Martins and
                  Tereza Cristina M. B. Carvalho and
                  Rodrigo Moreira and
                  Cristiano Bonato Both and
                  Adnei W. Donatti and
                  Jo{\~{a}}o Henrique G. M. Corr{\^{e}}a and
                  Jos{\'{e}} A. S. Monteiro and
                  Sand Luz Correa and
                  Ant{\^{o}}nio J. G. Abel{\'{e}}m and
                  Mois{\'{e}}s R. N. Ribeiro and
                  Jos{\'{e}} Marcos S. Nogueira and
                  Luiz Claudio Schara Magalh{\~{a}}es and
                  Juliano Araujo Wickboldt and
                  Tiago C. Ferreto and
                  Ricardo C. de Mello and
                  Rafael Pasquini and
                  Marcos F. Schwarz and
                  Leobino N. Sampaio and
                  Daniel F. Macedo and
                  Jos{\'{e}} Ferreira de Rezende and
                  Kleber Vieira Cardoso and
                  Fl{\'{a}}vio Oliveira Silva},
  title        = {Enhancing Network Slicing Architectures With Machine Learning, Security,
                  Sustainability and Experimental Networks Integration},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {69144--69163},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3292788},
  doi          = {10.1109/ACCESS.2023.3292788},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MartinsCMBDCMCARNMWFMPSSMRCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MelisSBCP23,
  author       = {Andrea Melis and
                  Amir Al Sadi and
                  Davide Berardi and
                  Franco Callegati and
                  Marco Prandini},
  title        = {A Systematic Literature Review of Offensive and Defensive Security
                  Solutions With Software Defined Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {93431--93463},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3276238},
  doi          = {10.1109/ACCESS.2023.3276238},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MelisSBCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MessabihKCCB23,
  author       = {Hadjer Messabih and
                  Chaker Abdelaziz Kerrache and
                  Youssra Cheriguene and
                  Carlos T. Calafate and
                  Fatima Zohra Bousbaa},
  title        = {An Overview of Game Theory Approaches for Mobile Ad-Hoc Network's
                  Security},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {107581--107604},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3321082},
  doi          = {10.1109/ACCESS.2023.3321082},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MessabihKCCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NguyenNVPLV23,
  author       = {Hung Nguyen and
                  Tan N. Nguyen and
                  Minh Bui Vu and
                  Thu{-}Ha Thi Pham and
                  Anh{-}Tu Le and
                  Miroslav Vozn{\'{a}}k},
  title        = {Security-Reliability Analysis in {CR-NOMA} IoT Network Under {I/Q}
                  Imbalance},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {119045--119056},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3327789},
  doi          = {10.1109/ACCESS.2023.3327789},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/NguyenNVPLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/OrumaP23,
  author       = {Samson O. Oruma and
                  Slobodan Petrovic},
  title        = {Security Threats to 5G Networks for Social Robots in Public Spaces:
                  {A} Survey},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {63205--63237},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3288338},
  doi          = {10.1109/ACCESS.2023.3288338},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/OrumaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RaniINCVYSBP23,
  author       = {Sella Veluswami Jansi Rani and
                  Iacovos Ioannou and
                  Prabagarane Nagaradjane and
                  Christophoros Christophorou and
                  Vasos Vassiliou and
                  Harshitaa Yarramsetti and
                  Sai Shridhar and
                  L. Mukund Balaji and
                  Andreas Pitsillides},
  title        = {A Novel Deep Hierarchical Machine Learning Approach for Identification
                  of Known and Unknown Multiple Security Attacks in a {D2D} Communications
                  Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {95161--95194},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3308036},
  doi          = {10.1109/ACCESS.2023.3308036},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RaniINCVYSBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShahLAB23,
  author       = {Mohammad Shahrul Mohd Shah and
                  Yu{-}Beng Leau and
                  Mohammed Anbar and
                  Ali Abdulqader Bin{-}Salem},
  title        = {Security and Integrity Attacks in Named Data Networking: {A} Survey},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {7984--8004},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3238732},
  doi          = {10.1109/ACCESS.2023.3238732},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShahLAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShaodanFJJ23,
  author       = {Lin Shaodan and
                  Chen Feng and
                  Tao Jiang and
                  Huasong Jing},
  title        = {Evaluation of Network Security Grade Protection Combined With Deep
                  Learning for Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {130990--131000},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3333013},
  doi          = {10.1109/ACCESS.2023.3333013},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ShaodanFJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShirkoA23,
  author       = {Omar Shirko and
                  Shavan K. Askar},
  title        = {A Novel Security Survival Model for Quantum Key Distribution Networks
                  Enabled by Software-Defined Networking},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {21641--21654},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3251649},
  doi          = {10.1109/ACCESS.2023.3251649},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShirkoA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SoldaniNBJSGMOR23,
  author       = {David Soldani and
                  Petrit Nahi and
                  Hamideh Bour and
                  Saber Jafarizadeh and
                  Mohammed F. Soliman and
                  Leonardo Di Giovanna and
                  Francesco Monaco and
                  Giuseppe Ognibene and
                  Fulvio Risso},
  title        = {eBPF: {A} New Approach to Cloud-Native Observability, Networking and
                  Security for Current {(5G)} and Future Mobile Networks {(6G} and Beyond)},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {57174--57202},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3281480},
  doi          = {10.1109/ACCESS.2023.3281480},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SoldaniNBJSGMOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangYGLZ23,
  author       = {Yuhe Wang and
                  Yu Yang and
                  Rencai Gao and
                  Shiming Li and
                  Yan Zhao},
  title        = {A Security Situation Prediction Model for Industrial Control Network
                  Based on {EP-CMA-ES}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {135449--135462},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3336698},
  doi          = {10.1109/ACCESS.2023.3336698},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangYGLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangFA23,
  author       = {Shengcai Zhang and
                  Qiming Fu and
                  Dezhi An},
  title        = {Network Security Situation Prediction Model Based on {VMD} Decomposition
                  and {DWOA} Optimized BiGRU-ATTN Neural Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {129507--129535},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3333666},
  doi          = {10.1109/ACCESS.2023.3333666},
  timestamp    = {Tue, 12 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/ShilovaV23,
  author       = {A. D. Shilova and
                  Alisa A. Vorobeva},
  title        = {A Method of Network Access Control for Ensuring Network Infrastructure
                  Security Based on Severing Superfluous Network Connectivity},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {57},
  number       = {8},
  pages        = {1116--1125},
  year         = {2023},
  url          = {https://doi.org/10.3103/S0146411623080308},
  doi          = {10.3103/S0146411623080308},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/accs/ShilovaV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AmanAMRK23,
  author       = {Waqas Aman and
                  Saif M. Al{-}Kuwari and
                  Muhammad Muzzammil and
                  Muhammad Mahboob Ur Rahman and
                  Ambrish Kumar},
  title        = {Security of underwater and air-water wireless communication: State-of-the-art,
                  challenges and outlook},
  journal      = {Ad Hoc Networks},
  volume       = {142},
  pages        = {103114},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103114},
  doi          = {10.1016/J.ADHOC.2023.103114},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/AmanAMRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KumarSBCARA23,
  author       = {Sunil Kumar and
                  Aman Singh and
                  Abderrahim Benslimane and
                  Premkumar Chithaluru and
                  Marwan Ali Albahar and
                  Rajkumar Singh Rathore and
                  Roberto Marcelo {\'{A}}lvarez},
  title        = {An Optimized Intelligent Computational Security Model for Interconnected
                  Blockchain-IoT System {\&} Cities},
  journal      = {Ad Hoc Networks},
  volume       = {151},
  pages        = {103299},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103299},
  doi          = {10.1016/J.ADHOC.2023.103299},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/KumarSBCARA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/LetafatiO23,
  author       = {Mehdi Letafati and
                  Safa Otoum},
  title        = {On the privacy and security for e-health services in the metaverse:
                  An overview},
  journal      = {Ad Hoc Networks},
  volume       = {150},
  pages        = {103262},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103262},
  doi          = {10.1016/J.ADHOC.2023.103262},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/LetafatiO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MoudoudC23,
  author       = {Hajar Moudoud and
                  Soumaya Cherkaoui},
  title        = {Multi-tasking Federated Learning meets Blockchain to Foster Trust
                  and Security in the Metaverse},
  journal      = {Ad Hoc Networks},
  volume       = {150},
  pages        = {103264},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103264},
  doi          = {10.1016/J.ADHOC.2023.103264},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/MoudoudC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhangXWL23,
  author       = {Han Zhang and
                  Jianbin Xue and
                  Qi Wang and
                  Ye Li},
  title        = {A security optimization scheme for data security transmission in UAV-assisted
                  edge networks based on federal learning},
  journal      = {Ad Hoc Networks},
  volume       = {150},
  pages        = {103277},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103277},
  doi          = {10.1016/J.ADHOC.2023.103277},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhangXWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhaoSZ23,
  author       = {Dongmei Zhao and
                  Pengcheng Shen and
                  Shuiguang Zeng},
  title        = {{ALSNAP:} Attention-based long and short-period network security situation
                  prediction},
  journal      = {Ad Hoc Networks},
  volume       = {150},
  pages        = {103279},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103279},
  doi          = {10.1016/J.ADHOC.2023.103279},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhaoSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/MuthulakshmiK23,
  author       = {S. Muthulakshmi and
                  A. Kannammal},
  title        = {Security Enhancements Based on Optimal Lightweight Blockchain Model
                  for Data Sharing in Wireless IoT Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {55},
  number       = {3-4},
  pages        = {233--256},
  year         = {2023},
  url          = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-3-4-2023/21263-2/},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/MuthulakshmiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/SathyarajDK23,
  author       = {P. Sathyaraj and
                  S. Rukmani Devi and
                  K. Kannan},
  title        = {Host-based Detection and Prevention of Black Hole Attacks by {AODV-ICCSO}
                  Algorithm for Security in MANETs},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {55},
  number       = {1-2},
  pages        = {45--73},
  year         = {2023},
  url          = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-1-2-2023/21214-2/},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/SathyarajDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/SathyarajDK23a,
  author       = {P. Sathyaraj and
                  S. Rukmani Devi and
                  K. Kannan},
  title        = {Host-based Detection and Prevention of Black Hole Attacks by {AODV-ICCSO}
                  Algorithm for Security in MANETs},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {55},
  number       = {3-4},
  pages        = {203--231},
  year         = {2023},
  url          = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-55-number-3-4-2023/21228-2/},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/SathyarajDK23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhaoGZLS23,
  author       = {Younan Zhao and
                  Peng Gu and
                  Fanglai Zhu and
                  Tianyi Liu and
                  Runjie Shen},
  title        = {Security control scheme for cyber-physical system with a complex network
                  in physical layer against false data injection attacks},
  journal      = {Appl. Math. Comput.},
  volume       = {447},
  pages        = {127908},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.amc.2023.127908},
  doi          = {10.1016/J.AMC.2023.127908},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/ZhaoGZLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CivinoL23,
  author       = {Roberto Civino and
                  Riccardo Longo},
  title        = {Formal security proof for a scheme on a topological network},
  journal      = {Adv. Math. Commun.},
  volume       = {17},
  number       = {3},
  pages        = {562--571},
  year         = {2023},
  url          = {https://doi.org/10.3934/amc.2021009},
  doi          = {10.3934/AMC.2021009},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CivinoL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/PS23,
  author       = {Shalini P and
                  Shankaraiah},
  title        = {Multimodal biometric decision fusion security technique to evade immoral
                  social networking sites for minors},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {3},
  pages        = {2751--2776},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-03538-9},
  doi          = {10.1007/S10489-022-03538-9},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/PS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/AhadAMTHGP23,
  author       = {Abdul Ahad and
                  Zahra Ali and
                  Abdul Mateen and
                  Mohammad Tahir and
                  Abdul Hannan and
                  Nuno M. Garcia and
                  Ivan Miguel Pires},
  title        = {A Comprehensive review on 5G-based Smart Healthcare Network Security:
                  Taxonomy, Issues, Solutions and Future research directions},
  journal      = {Array},
  volume       = {18},
  pages        = {100290},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.array.2023.100290},
  doi          = {10.1016/J.ARRAY.2023.100290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/array/AhadAMTHGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/HossainI23,
  author       = {Md. Alamgir Hossain and
                  Md. Saiful Islam},
  title        = {Ensuring network security with a robust intrusion detection system
                  using ensemble-based machine learning},
  journal      = {Array},
  volume       = {19},
  pages        = {100306},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.array.2023.100306},
  doi          = {10.1016/J.ARRAY.2023.100306},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/array/HossainI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/SindjoungVD23,
  author       = {Miguel Landry Foko Sindjoung and
                  Mthulisi Velempini and
                  Cl{\'{e}}mentin Tayou Djam{\'{e}}gni},
  title        = {A data security and privacy scheme for user quality of experience
                  in a Mobile Edge Computing-based network},
  journal      = {Array},
  volume       = {19},
  pages        = {100304},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.array.2023.100304},
  doi          = {10.1016/J.ARRAY.2023.100304},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/array/SindjoungVD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/at/AckermannKK23,
  author       = {Tim Ackermann and
                  Markus Karch and
                  J{\"{o}}rg Kippe},
  title        = {Integration of Cyber Threat Intelligence into Security Onion and Malcolm
                  for the use case of industrial networks},
  journal      = {Autom.},
  volume       = {71},
  number       = {9},
  pages        = {802--815},
  year         = {2023},
  url          = {https://doi.org/10.1515/auto-2023-0057},
  doi          = {10.1515/AUTO-2023-0057},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/at/AckermannKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/at/CaiW23,
  author       = {Hui Cai and
                  Dirk Westermann},
  title        = {Enhancing dynamic security assessment in converter dominated distribution
                  networks through digital twin-based small signal stability analysis},
  journal      = {Autom.},
  volume       = {71},
  number       = {12},
  pages        = {1028--1039},
  year         = {2023},
  url          = {https://doi.org/10.1515/auto-2023-0119},
  doi          = {10.1515/AUTO-2023-0119},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/at/CaiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/ShuZ0Z23,
  author       = {Haoyu Shu and
                  Jiayu Zhou and
                  Wen Yang and
                  Heng Zhang},
  title        = {Distortion-based state security codes for distributed sensor networks},
  journal      = {Autom.},
  volume       = {151},
  pages        = {110904},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.automatica.2023.110904},
  doi          = {10.1016/J.AUTOMATICA.2023.110904},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/automatica/ShuZ0Z23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/OdarchenkoIIFS23,
  author       = {Roman Odarchenko and
                  Maksim Iavich and
                  Giorgi Iashvili and
                  Solomiia Fedushko and
                  Yuriy Syerov},
  title        = {Assessment of Security KPIs for 5G Network Slices for Special Groups
                  of Subscribers},
  journal      = {Big Data Cogn. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {169},
  year         = {2023},
  url          = {https://doi.org/10.3390/bdcc7040169},
  doi          = {10.3390/BDCC7040169},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdcc/OdarchenkoIIFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/HuangXTH23,
  author       = {Tongyuan Huang and
                  Jia Xu and
                  Shixin Tu and
                  Baoru Han},
  title        = {Robust zero-watermarking scheme based on a depthwise overparameterized
                  {VGG} network in healthcare information security},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {81},
  pages        = {104478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.bspc.2022.104478},
  doi          = {10.1016/J.BSPC.2022.104478},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/HuangXTH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KholdinasabA23,
  author       = {Nayereh Kholdinasab and
                  Maryam Amirmazlaghani},
  title        = {An adversarial learning based image steganography with security improvement
                  against neural network steganalysis},
  journal      = {Comput. Electr. Eng.},
  volume       = {108},
  pages        = {108725},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108725},
  doi          = {10.1016/J.COMPELECENG.2023.108725},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KholdinasabA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Li23,
  author       = {Hong Li},
  title        = {Simulation of education digital network security and anomaly detection
                  based on neural networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {112},
  pages        = {108992},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108992},
  doi          = {10.1016/J.COMPELECENG.2023.108992},
  timestamp    = {Mon, 01 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiuZ23,
  author       = {Qinghui Liu and
                  Tianping Zhang},
  title        = {Deep learning technology of computer network security detection based
                  on artificial intelligence},
  journal      = {Comput. Electr. Eng.},
  volume       = {110},
  pages        = {108813},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108813},
  doi          = {10.1016/J.COMPELECENG.2023.108813},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LiuZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Wang23,
  author       = {Man Wang},
  title        = {Optimization of Network Security in University Laboratories Based
                  on Anomaly Intrusion Detection in Public Cloud Networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {111},
  number       = {Part {B}},
  pages        = {108968},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108968},
  doi          = {10.1016/J.COMPELECENG.2023.108968},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/LuWXX23,
  author       = {Yinglun Lu and
                  Xiang Wang and
                  Taotao Xie and
                  Tian Xie},
  title        = {Analysis of research results of different aspects of network security
                  and Internet of Things under the background of big data},
  journal      = {Open Comput. Sci.},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1515/comp-2022-0277},
  doi          = {10.1515/COMP-2022-0277},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejcs/LuWXX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/ZhangJJH23,
  author       = {Yajuan Zhang and
                  Ru Jing and
                  Xiang Ji and
                  Nan Hu},
  title        = {Application of wireless sensor network technology based on artificial
                  intelligence in security monitoring system},
  journal      = {Open Comput. Sci.},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1515/comp-2022-0280},
  doi          = {10.1515/COMP-2022-0280},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejcs/ZhangJJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/AtutxaABUJ23,
  author       = {Asier Atutxa and
                  Jasone Astorga and
                  Marc Barcelo and
                  Aitor Urbieta and
                  Eduardo Jacob},
  title        = {Improving efficiency and security of IIoT communications using in-network
                  validation of server certificate},
  journal      = {Comput. Ind.},
  volume       = {144},
  pages        = {103802},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compind.2022.103802},
  doi          = {10.1016/J.COMPIND.2022.103802},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/AtutxaABUJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Lu23,
  author       = {Yujing Lu},
  title        = {Enhanced Network Security Protection through Data Analysis and Machine
                  Learning: An Application of GraphSAGE for Anomaly Detection and Operational
                  Intelligence},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {31},
  number       = {4},
  pages        = {233--250},
  year         = {2023},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5776},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Lu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/BhadoriaBSKR23,
  author       = {Robin Singh Bhadoria and
                  Naman Bhoj and
                  Manoj Kumar Srivastav and
                  Rahul Kumar and
                  Balasubramanian Raman},
  title        = {A machine learning framework for security and privacy issues in building
                  trust for social networking},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {6},
  pages        = {3907--3930},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03787-w},
  doi          = {10.1007/S10586-022-03787-W},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/BhadoriaBSKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KiyaniQGJ23,
  author       = {Faisal Kiyani and
                  Kashif Naseer Qureshi and
                  Kayhan Zrar Ghafoor and
                  Gwanggil Jeon},
  title        = {{ISDA-BAN:} interoperability and security based data authentication
                  scheme for body area network},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {4},
  pages        = {2429--2442},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03823-9},
  doi          = {10.1007/S10586-022-03823-9},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/KiyaniQGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KumarGTKA23,
  author       = {Senthil Kumar Jagatheesaperumal and
                  Akhil Gupta and
                  Sudeep Tanwar and
                  Neeraj Kumar and
                  Sedat Akleylek},
  title        = {Security enhancement in cellular networks employing {D2D} friendly
                  jammer for {V2V} communication},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {2},
  pages        = {865--878},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03551-0},
  doi          = {10.1007/S10586-022-03551-0},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/KumarGTKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/TaheriAA23,
  author       = {Roya Taheri and
                  Habib Ahmed and
                  Engin Arslan},
  title        = {Deep learning for the security of software-defined networks: a review},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {5},
  pages        = {3089--3112},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-023-04069-9},
  doi          = {10.1007/S10586-023-04069-9},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/TaheriAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HongSY23,
  author       = {SeukGue Hong and
                  HyungBin Seo and
                  MyungKeun Yoon},
  title        = {Data Auditing for Intelligent Network Security Monitoring},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {3},
  pages        = {74--79},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.003.2200046},
  doi          = {10.1109/MCOM.003.2200046},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HongSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BringhentiSV23,
  author       = {Daniele Bringhenti and
                  Riccardo Sisto and
                  Fulvio Valenza},
  title        = {A novel abstraction for security configuration in virtual networks},
  journal      = {Comput. Networks},
  volume       = {228},
  pages        = {109745},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109745},
  doi          = {10.1016/J.COMNET.2023.109745},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BringhentiSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/EspinLMPC23,
  author       = {Jos{\'{e}} Antonio Parra Esp{\'{\i}}n and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Gabriel L{\'{o}}pez Mill{\'{a}}n and
                  Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  {\'{O}}scar C{\'{a}}novas},
  title        = {SDN-based automated rekey of IPsec security associations: Design and
                  practical validations},
  journal      = {Comput. Networks},
  volume       = {233},
  pages        = {109905},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109905},
  doi          = {10.1016/J.COMNET.2023.109905},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/EspinLMPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JavanmardiSMAC23,
  author       = {Saeed Javanmardi and
                  Mohammad Shojafar and
                  Reza Mohammadi and
                  Mamoun Alazab and
                  Antonio Caruso},
  title        = {An {SDN} perspective IoT-Fog security: {A} survey},
  journal      = {Comput. Networks},
  volume       = {229},
  pages        = {109732},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109732},
  doi          = {10.1016/J.COMNET.2023.109732},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JavanmardiSMAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KowalskiM23,
  author       = {Mikolaj Kowalski and
                  Wojciech Mazurczyk},
  title        = {Toward the mutual routing security in wide area networks: {A} scoping
                  review of current threats and countermeasures},
  journal      = {Comput. Networks},
  volume       = {230},
  pages        = {109778},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109778},
  doi          = {10.1016/J.COMNET.2023.109778},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KowalskiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MabroukN23,
  author       = {Abdelfettah Mabrouk and
                  Assia Naja},
  title        = {Intrusion detection game for ubiquitous security in vehicular networks:
                  {A} signaling game based approach},
  journal      = {Comput. Networks},
  volume       = {225},
  pages        = {109649},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109649},
  doi          = {10.1016/J.COMNET.2023.109649},
  timestamp    = {Sun, 02 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MabroukN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MekdadABFCLU23,
  author       = {Yassine Mekdad and
                  Ahmet Aris and
                  Leonardo Babun and
                  Abdeslam El Fergougui and
                  Mauro Conti and
                  Riccardo Lazzeretti and
                  A. Selcuk Uluagac},
  title        = {A survey on security and privacy issues of UAVs},
  journal      = {Comput. Networks},
  volume       = {224},
  pages        = {109626},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109626},
  doi          = {10.1016/J.COMNET.2023.109626},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MekdadABFCLU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MohammadzadKM23,
  author       = {Maryam Mohammadzad and
                  Jaber Karimpour and
                  Farnaz Mahan},
  title        = {{MAGD:} Minimal Attack Graph Generation Dynamically in Cyber Security},
  journal      = {Comput. Networks},
  volume       = {236},
  pages        = {110004},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110004},
  doi          = {10.1016/J.COMNET.2023.110004},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MohammadzadKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PattaranantakulVT23,
  author       = {Montida Pattaranantakul and
                  Chalee Vorakulpipat and
                  Takeshi Takahashi},
  title        = {Service Function Chaining security survey: Addressing security challenges
                  and threats},
  journal      = {Comput. Networks},
  volume       = {221},
  pages        = {109484},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2022.109484},
  doi          = {10.1016/J.COMNET.2022.109484},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PattaranantakulVT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/QuWYZ23,
  author       = {Lianwei Qu and
                  Yong Wang and
                  Jing Yang and
                  Meng Zhao},
  title        = {A heterogeneous network structure publishing security framework based
                  on cloud-edge collaboration},
  journal      = {Comput. Networks},
  volume       = {234},
  pages        = {109947},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109947},
  doi          = {10.1016/J.COMNET.2023.109947},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/QuWYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RamezanpourJJ23,
  author       = {Keyvan Ramezanpour and
                  Jithin Jagannath and
                  Anu Jagannath},
  title        = {Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and
                  research directions from a coexistence perspective},
  journal      = {Comput. Networks},
  volume       = {221},
  pages        = {109515},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2022.109515},
  doi          = {10.1016/J.COMNET.2022.109515},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RamezanpourJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WaqasTWMAA23,
  author       = {Muhammad Waqas and
                  Shanshan Tu and
                  Jialin Wan and
                  Talha Mir and
                  Hisham Alasmary and
                  Ghulam Abbas},
  title        = {Defense scheme against advanced persistent threats in mobile fog computing
                  security},
  journal      = {Comput. Networks},
  volume       = {221},
  pages        = {109519},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2022.109519},
  doi          = {10.1016/J.COMNET.2022.109519},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WaqasTWMAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangMLZWT23,
  author       = {Hengwei Zhang and
                  Yan Mi and
                  Xiaohu Liu and
                  Yuchen Zhang and
                  Jindong Wang and
                  Jinglei Tan},
  title        = {A differential game approach for real-time security defense decision
                  in scale-free networks},
  journal      = {Comput. Networks},
  volume       = {224},
  pages        = {109635},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109635},
  doi          = {10.1016/J.COMNET.2023.109635},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangMLZWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DolevK23,
  author       = {Shlomi Dolev and
                  Daniel Khankin},
  title        = {Random spanning trees for expanders, sparsifiers, and virtual network
                  security},
  journal      = {Comput. Commun.},
  volume       = {212},
  pages        = {21--34},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.09.028},
  doi          = {10.1016/J.COMCOM.2023.09.028},
  timestamp    = {Tue, 12 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/DolevK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ModiriSMK23,
  author       = {Mohammad Mahdi Modiri and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Babak Hossein Khalaj},
  title        = {Two protocols for improving security during the authentication and
                  key agreement procedure in the 3GPP networks},
  journal      = {Comput. Commun.},
  volume       = {211},
  pages        = {286--301},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.09.021},
  doi          = {10.1016/J.COMCOM.2023.09.021},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ModiriSMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PalamaABGPB23,
  author       = {Ivan Palam{\`{a}} and
                  Alessandro Amici and
                  Gabriele Bellicini and
                  Francesco Gringoli and
                  Fabio Pedretti and
                  Giuseppe Bianchi},
  title        = {Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security
                  awareness assessment through credential stealing attack experiments},
  journal      = {Comput. Commun.},
  volume       = {212},
  pages        = {129--140},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.09.031},
  doi          = {10.1016/J.COMCOM.2023.09.031},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PalamaABGPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/XiongZZY23,
  author       = {Qiang Xiong and
                  Yifei Zhu and
                  Zhangying Zeng and
                  Xinqi Yang},
  title        = {Signal Game Analysis between Software Vendors and Third-Party Platforms
                  in Collaborative Disclosure of Network Security Vulnerabilities},
  journal      = {Complex.},
  volume       = {2023},
  pages        = {1027215:1--1027215:11},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/1027215},
  doi          = {10.1155/2023/1027215},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/XiongZZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AndradeSJYHK23,
  author       = {Ricardo de Andrade and
                  Max Mauro Dias Santos and
                  Jo{\~{a}}o Francisco Justo and
                  Leopoldo Rideki Yoshioka and
                  Hans{-}Joachim Hof and
                  Jo{\~{a}}o Henrique Kleinschmidt},
  title        = {Security architecture for automotive communication networks with {CAN}
                  {FD}},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103203},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103203},
  doi          = {10.1016/J.COSE.2023.103203},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AndradeSJYHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanMBY23,
  author       = {Kyusuk Han and
                  Hyeran Mun and
                  Malavika Balakrishnan and
                  Chan Yeob Yeun},
  title        = {Enhancing security and robustness of Cyphal on Controller Area Network
                  in unmanned aerial vehicle environments},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103481},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103481},
  doi          = {10.1016/J.COSE.2023.103481},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HanMBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKYPSP23,
  author       = {Jinwoo Kim and
                  Yeonkeun Kim and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Seungwon Shin and
                  Taejune Park},
  title        = {Extended data plane architecture for in-network security services
                  in software-defined networks},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102976},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102976},
  doi          = {10.1016/J.COSE.2022.102976},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimKYPSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangMFLZWT23,
  author       = {Hengwei Zhang and
                  Yan Mi and
                  Yumeng Fu and
                  Xiaohu Liu and
                  Yuchen Zhang and
                  Jindong Wang and
                  Jinglei Tan},
  title        = {Security defense decision method based on potential differential game
                  for complex networks},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103187},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103187},
  doi          = {10.1016/J.COSE.2023.103187},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangMFLZWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ChenWLHZZYK23,
  author       = {Xiang Chen and
                  Chunming Wu and
                  Xuan Liu and
                  Qun Huang and
                  Dong Zhang and
                  Haifeng Zhou and
                  Qiang Yang and
                  Muhammad Khurram Khan},
  title        = {Empowering Network Security With Programmable Switches: {A} Comprehensive
                  Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {3},
  pages        = {1653--1704},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3265984},
  doi          = {10.1109/COMST.2023.3265984},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/ChenWLHZZYK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KeersmaekerCNS23,
  author       = {Fran{\c{c}}ois De Keersmaeker and
                  Yinan Cao and
                  Gorby Kabasele Ndonda and
                  Ramin Sadre},
  title        = {A Survey of Public IoT Datasets for Network Security Research},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {3},
  pages        = {1808--1840},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3288942},
  doi          = {10.1109/COMST.2023.3288942},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/KeersmaekerCNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/MaoLWK23,
  author       = {Bomin Mao and
                  Jiajia Liu and
                  Yingying Wu and
                  Nei Kato},
  title        = {Security and Privacy on 6G Network Edge: {A} Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {2},
  pages        = {1095--1127},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3244674},
  doi          = {10.1109/COMST.2023.3244674},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/MaoLWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Kabakus23,
  author       = {Abdullah Talha Kabakus},
  title        = {A novel robust convolutional neural network for uniform resource locator
                  classification from the view of cyber security},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7517},
  doi          = {10.1002/CPE.7517},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/Kabakus23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/WangDGRWP23,
  author       = {Chao Wang and
                  Jiahan Dong and
                  Guangxin Guo and
                  Tianyu Ren and
                  Xiaohu Wang and
                  Ming{-}yu Pan},
  title        = {Security situational awareness of power information networks based
                  on machine learning algorithms},
  journal      = {Connect. Sci.},
  volume       = {35},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1080/09540091.2023.2284649},
  doi          = {10.1080/09540091.2023.2284649},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/WangDGRWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/ZhaoJZ23,
  author       = {Dongmei Zhao and
                  Guoqing Ji and
                  Shuiguang Zeng},
  title        = {Network security situation assessment based on dual attention mechanism
                  and HHO-ResNeXt},
  journal      = {Connect. Sci.},
  volume       = {35},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1080/09540091.2023.2174080},
  doi          = {10.1080/09540091.2023.2174080},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/ZhaoJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LellaS23,
  author       = {Eufemia Lella and
                  Giovanni Schmid},
  title        = {On the Security of Quantum Key Distribution Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {53},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040053},
  doi          = {10.3390/CRYPTOGRAPHY7040053},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LellaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiuYLD23,
  author       = {Zi{-}yi Liu and
                  Changsong Yang and
                  Yueling Liu and
                  Yong Ding},
  title        = {A BIPMU-based network security situation assessment method for wireless
                  network},
  journal      = {Comput. Stand. Interfaces},
  volume       = {83},
  pages        = {103661},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103661},
  doi          = {10.1016/J.CSI.2022.103661},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiuYLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/DhanasekaranPG23,
  author       = {Ranganathan Mavureddi Dhanasekaran and
                  Jing Ping and
                  German Peinado Gomez},
  title        = {End-to-End Network Slicing Security Across Standards Organizations},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {7},
  number       = {1},
  pages        = {40--47},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOMSTD.0005.2200055},
  doi          = {10.1109/MCOMSTD.0005.2200055},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/DhanasekaranPG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/VermaCA23,
  author       = {Himanshu Verma and
                  Naveen Chauhan and
                  Lalit Kumar Awasthi},
  title        = {A Comprehensive review of '\emph{Internet of Healthcare Things}':
                  Networking aspects, technologies, services, applications, challenges,
                  and security concerns},
  journal      = {Comput. Sci. Rev.},
  volume       = {50},
  pages        = {100591},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cosrev.2023.100591},
  doi          = {10.1016/J.COSREV.2023.100591},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/VermaCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AanjanadeviARP23,
  author       = {S. Aanjanadevi and
                  S. Aanjankumar and
                  K. R. Ramela and
                  V. Palanisamy},
  title        = {Face Attribute Convolutional Neural Network System for Data Security
                  with Improved Crypto Biometrics},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {45},
  number       = {3},
  pages        = {2351--2362},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.031893},
  doi          = {10.32604/CSSE.2023.031893},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/AanjanadeviARP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/IsyakuB23,
  author       = {Babangida Isyaku and
                  Kamalrulnizam Abu Bakar},
  title        = {Managing Smart Technologies with Software-Defined Networks for Routing
                  and Security Challenges: {A} Survey},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {47},
  number       = {2},
  pages        = {1839--1879},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.040456},
  doi          = {10.32604/CSSE.2023.040456},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/IsyakuB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/SabithaPK23,
  author       = {R. Sabitha and
                  C. Gokul Prasad and
                  S. Karthik},
  title        = {Enhanced Security with Improved Defensive Routing Mechanism in Wireless
                  Sensor Networks},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {45},
  number       = {3},
  pages        = {2795--2810},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.026465},
  doi          = {10.32604/CSSE.2023.026465},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/SabithaPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/SunLSNW23,
  author       = {Junfeng Sun and
                  Chenghai Li and
                  Yafei Song and
                  Peng Ni and
                  Jian Wang},
  title        = {Network Security Situation Prediction Based on TCAN-BiGRU Optimized
                  by {SSA} and {IQPSO}},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {47},
  number       = {1},
  pages        = {993--1021},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.039215},
  doi          = {10.32604/CSSE.2023.039215},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/SunLSNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PattnaikLN23,
  author       = {Nandita Pattnaik and
                  Shujun Li and
                  Jason R. C. Nurse},
  title        = {A Survey of User Perspectives on Security and Privacy in a Home Networking
                  Environment},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {9},
  pages        = {180:1--180:38},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558095},
  doi          = {10.1145/3558095},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/PattnaikLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/BerardiTMPC23,
  author       = {Davide Berardi and
                  Nils Ole Tippenhauer and
                  Andrea Melis and
                  Marco Prandini and
                  Franco Callegati},
  title        = {Time sensitive networking security: issues of precision time protocol
                  and its implementation},
  journal      = {Cybersecur.},
  volume       = {6},
  number       = {1},
  pages        = {8},
  year         = {2023},
  url          = {https://doi.org/10.1186/s42400-023-00140-5},
  doi          = {10.1186/S42400-023-00140-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/BerardiTMPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/JiangLHASM23,
  author       = {Jinfang Jiang and
                  Chuan Lin and
                  Guangjie Han and
                  Adnan M. Abu{-}Mahfouz and
                  Syed Bilal Hussain Shah and
                  Miguel Mart{\'{\i}}nez{-}Garc{\'{\i}}a},
  title        = {How AI-enabled {SDN} technologies improve the security and functionality
                  of industrial IoT network: Architectures, enabling technologies, and
                  opportunities},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {6},
  pages        = {1351--1362},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.07.001},
  doi          = {10.1016/J.DCAN.2022.07.001},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/JiangLHASM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/KimSPSO23,
  author       = {YeEun Kim and
                  Junggab Son and
                  Reza M. Parizi and
                  Gautam Srivastava and
                  Heekuck Oh},
  title        = {3-Multi ranked encryption with enhanced security in cloud computing},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {313--326},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.05.021},
  doi          = {10.1016/J.DCAN.2022.05.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/KimSPSO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/NaeemZATMB23,
  author       = {Muhammad Ali Naeem and
                  Yousaf Bin Zikria and
                  Rashid Ali and
                  Usman Tariq and
                  Yahui Meng and
                  Ali Kashif Bashir},
  title        = {Cache in fog computing design, concepts, contributions, and security
                  issues in machine learning prospective},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {5},
  pages        = {1033--1052},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.08.004},
  doi          = {10.1016/J.DCAN.2022.08.004},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/NaeemZATMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YangLLHJLS23,
  author       = {Aimin Yang and
                  Chaomeng Lu and
                  Jie Li and
                  Xiangdong Huang and
                  Tianhao Ji and
                  Xichang Li and
                  Yichao Sheng},
  title        = {Application of meta-learning in cyberspace security: a survey},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {67--78},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.03.007},
  doi          = {10.1016/J.DCAN.2022.03.007},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/YangLLHJLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YangMZHHZHW23,
  author       = {Aimin Yang and
                  Zezhong Ma and
                  Chunying Zhang and
                  Yang Han and
                  Zhibin Hu and
                  Wei Zhang and
                  Xiangdong Huang and
                  Yafeng Wu},
  title        = {Review on application progress of federated learning model and security
                  hazard protection},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {146--158},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.11.006},
  doi          = {10.1016/J.DCAN.2022.11.006},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/YangMZHHZHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YazdanpanahCJ23,
  author       = {Saeid Yazdanpanah and
                  Saman Shojae Chaeikar and
                  Alireza Jolfaei},
  title        = {Monitoring the security of audio biomedical signals communications
                  in wearable IoT healthcare},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {393--399},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.11.002},
  doi          = {10.1016/J.DCAN.2022.11.002},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/YazdanpanahCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/MaLXWLZ23,
  author       = {Bin Ma and
                  Kun Li and
                  Jian Xu and
                  Chunpeng Wang and
                  Jian Li and
                  Liwei Zhang},
  title        = {Enhancing the security of image steganography via multiple adversarial
                  networks and channel attention modules},
  journal      = {Digit. Signal Process.},
  volume       = {141},
  pages        = {104121},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dsp.2023.104121},
  doi          = {10.1016/J.DSP.2023.104121},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/MaLXWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/DaoudOHKH23,
  author       = {Wided Ben Daoud and
                  Salwa Othmen and
                  Monia Hamdi and
                  Radhia Khdhir and
                  Habib Hamam},
  title        = {Fog computing network security based on resources management},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2023},
  number       = {1},
  pages        = {50},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13638-023-02256-1},
  doi          = {10.1186/S13638-023-02256-1},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/DaoudOHKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/DaoudOHKH23a,
  author       = {Wided Ben Daoud and
                  Salwa Othmen and
                  Monia Hamdi and
                  Radhia Khdhir and
                  Habib Hamam},
  title        = {Correction: Fog computing network security based on resources management},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2023},
  number       = {1},
  pages        = {108},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13638-023-02318-4},
  doi          = {10.1186/S13638-023-02318-4},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/DaoudOHKH23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/LeNNVLV23,
  author       = {Si{-}Phu Le and
                  Hong{-}Nhu Nguyen and
                  Nhat{-}Tien Nguyen and
                  Cuu Ho Van and
                  Anh{-}Tu Le and
                  Miroslav Vozn{\'{a}}k},
  title        = {Physical layer security analysis of IRS-based downlink and uplink
                  {NOMA} networks},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2023},
  number       = {1},
  pages        = {105},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13638-023-02309-5},
  doi          = {10.1186/S13638-023-02309-5},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/LeNNVLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/BaiGY23,
  author       = {Yang Bai and
                  Xuan Guang and
                  Raymond W. Yeung},
  title        = {Multiple Linear-Combination Security Network Coding},
  journal      = {Entropy},
  volume       = {25},
  number       = {8},
  pages        = {1135},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25081135},
  doi          = {10.3390/E25081135},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/BaiGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/HayajnehG23,
  author       = {Maymoona Hayajneh and
                  Thomas Aaron Gulliver},
  title        = {Physical Layer Security in Two-Way {SWIPT} Relay Networks with Imperfect
                  {CSI} and a Friendly Jammer},
  journal      = {Entropy},
  volume       = {25},
  number       = {1},
  pages        = {122},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25010122},
  doi          = {10.3390/E25010122},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/HayajnehG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhouSZCWL23,
  author       = {Buxiang Zhou and
                  Binjie Sun and
                  Tianlei Zang and
                  Yating Cai and
                  Jiale Wu and
                  Huan Luo},
  title        = {Security Risk Assessment Approach for Distribution Network Cyber Physical
                  Systems Considering Cyber Attack Vulnerabilities},
  journal      = {Entropy},
  volume       = {25},
  number       = {1},
  pages        = {47},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25010047},
  doi          = {10.3390/E25010047},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhouSZCWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AhmadAAKAN23,
  author       = {Amreen Ahmad and
                  Tanvir Ahmad and
                  Musheer Ahmad and
                  Chanchal Kumar and
                  Fayadh Alenezi and
                  Majid Kamal A. Nour},
  title        = {A complex network-based approach for security and governance in the
                  smart green city},
  journal      = {Expert Syst. Appl.},
  volume       = {214},
  pages        = {119094},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2022.119094},
  doi          = {10.1016/J.ESWA.2022.119094},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AhmadAAKAN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SagarS23,
  author       = {Dasari Sagar and
                  Malgireddy Saidireddy},
  title        = {Security Measurement in {LTE/LTE-A} Network Based on zS-Lr Feature
                  Selection Technique and Um-tGAN Attack Detection Technique},
  journal      = {Expert Syst. Appl.},
  volume       = {231},
  pages        = {120703},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120703},
  doi          = {10.1016/J.ESWA.2023.120703},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/SagarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/DevarajanTATS23,
  author       = {Ganesh Gopal Devarajan and
                  M. Thirunavukkarasan and
                  Sardar Irfanullah Amanullah and
                  Vignesh T. and
                  Audithan Sivaraman},
  title        = {An integrated security approach for vehicular networks in smart cities},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {34},
  number       = {11},
  year         = {2023},
  url          = {https://doi.org/10.1002/ett.4757},
  doi          = {10.1002/ETT.4757},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/DevarajanTATS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evi/SinghBLM23,
  author       = {Moirangthem Tiken Singh and
                  Surajit Borkotokey and
                  Rachid Ait Maalem Lahcen and
                  Ram N. Mohapatra},
  title        = {A generic scheme for cyber security in resource constraint network
                  using incomplete information game},
  journal      = {Evol. Intell.},
  volume       = {16},
  number       = {3},
  pages        = {819--832},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12065-021-00684-w},
  doi          = {10.1007/S12065-021-00684-W},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evi/SinghBLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/MazhariSefatH23,
  author       = {Benyamin MazhariSefat and
                  Soodeh Hosseini},
  title        = {Social network security using genetic algorithm},
  journal      = {Evol. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {175--190},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12530-022-09442-4},
  doi          = {10.1007/S12530-022-09442-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evs/MazhariSefatH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChengZZWL23,
  author       = {Xin Cheng and
                  Jingmei Zhou and
                  Xiangmo Zhao and
                  Hongfei Wang and
                  Yuqi Li},
  title        = {A presentation attack detection network based on dynamic convolution
                  and multi-level feature fusion with security and reliability},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {146},
  pages        = {114--121},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2023.04.012},
  doi          = {10.1016/J.FUTURE.2023.04.012},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChengZZWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/DelValleSotoBVVN23,
  author       = {Carolina Del{-}Valle{-}Soto and
                  Ramon A. Brise{\~{n}}o and
                  Leonardo J. Valdivia and
                  Ramiro Vel{\'{a}}zquez and
                  Juan Arturo Nolazco{-}Flores},
  title        = {Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost
                  Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security},
  journal      = {Future Internet},
  volume       = {15},
  number       = {9},
  pages        = {287},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15090287},
  doi          = {10.3390/FI15090287},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/DelValleSotoBVVN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KoiralaBF23,
  author       = {Ashish Koirala and
                  Rabindra Bista and
                  Jo{\~{a}}o C. Ferreira},
  title        = {Enhancing IoT Device Security through Network Attack Data Analysis
                  Using Machine Learning Algorithms},
  journal      = {Future Internet},
  volume       = {15},
  number       = {6},
  pages        = {210},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15060210},
  doi          = {10.3390/FI15060210},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KoiralaBF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/NgoLTPTMP23,
  author       = {Duc{-}Minh Ngo and
                  Dominic Lightbody and
                  Andriy Temko and
                  Cuong Pham{-}Quoc and
                  Ngoc{-}Thinh Tran and
                  Colin C. Murphy and
                  Emanuel M. Popovici},
  title        = {{HH-NIDS:} Heterogeneous Hardware-Based Network Intrusion Detection
                  Framework for IoT Security},
  journal      = {Future Internet},
  volume       = {15},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15010009},
  doi          = {10.3390/FI15010009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/NgoLTPTMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/SalahE23,
  author       = {Zaher Salah and
                  Esraa Abu Elsoud},
  title        = {Enhancing Network Security: {A} Machine Learning-Based Approach for
                  Detecting and Mitigating Krack and Kr00k Attacks in {IEEE} 802.11},
  journal      = {Future Internet},
  volume       = {15},
  number       = {8},
  pages        = {269},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15080269},
  doi          = {10.3390/FI15080269},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/SalahE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/SaminathanMDRL23,
  author       = {Karthikeyan Saminathan and
                  Sai Tharun Reddy Mulka and
                  Sangeetha Damodharan and
                  Maheswar Rajagopal and
                  Josip Lorincz},
  title        = {An Artificial Neural Network Autoencoder for Insider Cyber Security
                  Threat Detection},
  journal      = {Future Internet},
  volume       = {15},
  number       = {12},
  pages        = {373},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15120373},
  doi          = {10.3390/FI15120373},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/SaminathanMDRL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/SeverinoSDS23,
  author       = {Ricardo Severino and
                  Jos{\'{e}} Sim{\~{a}}o and
                  Nuno Datia and
                  Ant{\'{o}}nio Serrador},
  title        = {Protecting Hybrid {ITS} Networks: {A} Comprehensive Security Approach},
  journal      = {Future Internet},
  volume       = {15},
  number       = {12},
  pages        = {388},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15120388},
  doi          = {10.3390/FI15120388},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/SeverinoSDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fss/TanYXN23,
  author       = {Yushun Tan and
                  Ye Yuan and
                  Xiangpeng Xie and
                  Ben Niu},
  title        = {Dynamic event-triggered security control for networked {T-S} fuzzy
                  system with non-uniform sampling},
  journal      = {Fuzzy Sets Syst.},
  volume       = {452},
  pages        = {91--109},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fss.2022.08.018},
  doi          = {10.1016/J.FSS.2022.08.018},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fss/TanYXN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/QiV23,
  author       = {Yue Qi and
                  Mojtaba Vaezi},
  title        = {IRS-Assisted Physical Layer Security in {MIMO-NOMA} Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {27},
  number       = {3},
  pages        = {792--796},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCOMM.2023.3235722},
  doi          = {10.1109/LCOMM.2023.3235722},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/QiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icn/QiLSYYW23,
  author       = {Longyun Qi and
                  Xiaoliang Lv and
                  Lianwen Sun and
                  Tianle Yao and
                  Jianye Yu and
                  Lei Wang},
  title        = {Operating system network security enhancement scheme based on trusted
                  storage},
  journal      = {Intell. Converged Networks},
  volume       = {4},
  number       = {2},
  pages        = {127--141},
  year         = {2023},
  url          = {https://doi.org/10.23919/icn.2023.0014},
  doi          = {10.23919/ICN.2023.0014},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icn/QiLSYYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/PhamHDT23,
  author       = {Minh{-}Nam Pham and
                  Duy{-}Hung Ha and
                  Tran Trung Duy and
                  Le{-}Tien Thuong},
  title        = {Security-reliability tradeoff of {MIMO} {TAS/SC} networks using harvest-to-jam
                  cooperative jamming methods with random jammer location},
  journal      = {{ICT} Express},
  volume       = {9},
  number       = {1},
  pages        = {63--68},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.icte.2021.11.003},
  doi          = {10.1016/J.ICTE.2021.11.003},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ict-express/PhamHDT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/FernandezK23,
  author       = {Leon Fernandez and
                  Gunnar Karlsson},
  title        = {Black-Box Fuzzing for Security in Managed Networks: An Outline},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {5},
  number       = {4},
  pages        = {241--244},
  year         = {2023},
  url          = {https://doi.org/10.1109/LNET.2023.3286443},
  doi          = {10.1109/LNET.2023.3286443},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeenl/FernandezK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/Sun0W0ZLG23,
  author       = {Jianwei Sun and
                  Heng Zhang and
                  Xin Wang and
                  Ming Yang and
                  Jian Zhang and
                  Hongran Li and
                  Chenglong Gong},
  title        = {Leveraging {UAV-RIS} Reflects to Improve the Security Performance
                  of Wireless Network Systems},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {5},
  number       = {2},
  pages        = {81--85},
  year         = {2023},
  url          = {https://doi.org/10.1109/LNET.2023.3262885},
  doi          = {10.1109/LNET.2023.3262885},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/Sun0W0ZLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LiMYS23,
  author       = {Junxia Li and
                  Xuexue Ma and
                  Faxin Ye and
                  Jiangfeng Sun},
  title        = {Physical layer security of single-input multiple-out relay networks
                  over Beaulieu-Xie fading channels},
  journal      = {{IET} Commun.},
  volume       = {17},
  number       = {16},
  pages        = {1928--1939},
  year         = {2023},
  url          = {https://doi.org/10.1049/cmu2.12663},
  doi          = {10.1049/CMU2.12663},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/LiMYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/WenhuaHIZRIK23,
  author       = {Zhang Wenhua and
                  Mohammad Kamrul Hasan and
                  Ahmad Fadzil Ismail and
                  Yanke Zhang and
                  Md. Abdur Razzaque and
                  Shayla Islam and
                  Budati Anil Kumar},
  title        = {Data security in smart devices: Advancement, constraints and future
                  recommendations},
  journal      = {{IET} Networks},
  volume       = {12},
  number       = {6},
  pages        = {269--281},
  year         = {2023},
  url          = {https://doi.org/10.1049/ntw2.12091},
  doi          = {10.1049/NTW2.12091},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-net/WenhuaHIZRIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igpl/SokolSGP23,
  author       = {Pavol Sokol and
                  Richard Stana and
                  Andrej Gajdos and
                  Patrik Pekarc{\'{\i}}k},
  title        = {Network security situation awareness forecasting based on statistical
                  approach and neural networks},
  journal      = {Log. J. {IGPL}},
  volume       = {31},
  number       = {2},
  pages        = {352--374},
  year         = {2023},
  url          = {https://doi.org/10.1093/jigpal/jzac024},
  doi          = {10.1093/JIGPAL/JZAC024},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igpl/SokolSGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/Fei23,
  author       = {Gao Fei},
  title        = {Security key distribution method of wireless sensor network based
                  on DV-hop algorithm},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {66--83},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJAACS.2023.10039241},
  doi          = {10.1504/IJAACS.2023.10039241},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaacs/Fei23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/DurgaS23,
  author       = {R. Durga and
                  Periyasamy Sudhakar},
  title        = {Implementing {RSA} algorithm for network security using dual prime
                  secure protocol in crypt analysis},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {24},
  number       = {3/4},
  pages        = {355--368},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJAIP.2018.10020057},
  doi          = {10.1504/IJAIP.2018.10020057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaip/DurgaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/Wang23,
  author       = {Yue Wang},
  title        = {{CNS:} Research on Data Security Technology and Network Data Security
                  Regulations Driven by Digital Economy},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {32},
  number       = {4},
  pages        = {2150009:1--2150009:19},
  year         = {2023},
  url          = {https://doi.org/10.1142/S021884302150009X},
  doi          = {10.1142/S021884302150009X},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcis/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/Li23,
  author       = {Ju Li},
  title        = {Research on an optimised encryption algorithm for network information
                  security communication},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {29},
  number       = {1},
  pages        = {31--46},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJCNDS.2022.10044390},
  doi          = {10.1504/IJCNDS.2022.10044390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/SachdevaGMCD23,
  author       = {Hardik Sachdeva and
                  Shivam Gupta and
                  Anushka Misra and
                  Khushbu Chauhan and
                  Mayank Dave},
  title        = {Privacy and security improvement in {UAV} network using blockchain},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {29},
  number       = {4},
  pages        = {383--406},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJCNDS.2023.131736},
  doi          = {10.1504/IJCNDS.2023.131736},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/SachdevaGMCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LiaoC23,
  author       = {Linsen Liao and
                  Xinghua Cao},
  title        = {Data Transmission Security and Legal Regulation in Clinical Application
                  of Human Gene Editing from Perspective of Big Data},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6345},
  doi          = {10.17762/IJCNIS.V15I4.6345},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LiaoC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LuS23,
  author       = {Wenjie Lu and
                  Ximing Sun},
  title        = {Research on Internet Technology Innovation and Information Security
                  Challenges in New Vehicle Energy Sector},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {86--98},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6228},
  doi          = {10.17762/IJCNIS.V15I3.6228},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LuS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/SuAZCLH23,
  author       = {Bingshan Su and
                  Shiyong An and
                  Xuezhuan Zhao and
                  Jiguang Chen and
                  Xiaoyu Li and
                  Yuantao He},
  title        = {An aeronautic X-ray image security inspection network for rotation
                  and occlusion},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {26},
  number       = {3},
  pages        = {337--348},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJCSE.2023.131504},
  doi          = {10.1504/IJCSE.2023.131504},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/SuAZCLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChengQWW23,
  author       = {Shi Cheng and
                  Yan Qu and
                  Chuyue Wang and
                  Jie Wan},
  title        = {Assurance of Network Communication Information Security Based on Cyber-Physical
                  Fusion and Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332858},
  doi          = {10.4018/IJDCF.332858},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChengQWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiW23,
  author       = {Yueying Li and
                  Feng Wu},
  title        = {Improved Population Intelligence Algorithm and {BP} Neural Network
                  for Network Security Posture Prediction},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2023},
  pages        = {1--11},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/9970205},
  doi          = {10.1155/2023/9970205},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/PrakashBAS23,
  author       = {Chandra Prakash and
                  Anurag Barthwal and
                  Shwetank Avikal and
                  Gyanendra Kumar Singh},
  title        = {{FSAS:} An IoT-Based Security System for Crop Field Storage},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2023},
  pages        = {1--13},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/2367167},
  doi          = {10.1155/2023/2367167},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/PrakashBAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Niu23,
  author       = {Jing Niu},
  title        = {Design of automatic monitoring system for network information security
                  in cloud computing environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {19--34},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131091},
  doi          = {10.1504/IJICS.2023.131091},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Niu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/ChenWZ23,
  author       = {Gongping Chen and
                  Hong Wang and
                  Chuanqi Zhang},
  title        = {Mobile cellular network security vulnerability detection using machine
                  learning},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {22},
  number       = {3},
  pages        = {327--341},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICT.2023.10054797},
  doi          = {10.1504/IJICT.2023.10054797},
  timestamp    = {Sun, 30 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/ChenWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/LiS23,
  author       = {Yuanyuan Li and
                  Jidong Sha},
  title        = {Network covert channel data security detection method based on threshold
                  re-encryption},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {188--200},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICT.2023.132768},
  doi          = {10.1504/IJICT.2023.132768},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/LiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/MaoLS23,
  author       = {Xiaodong Mao and
                  Haiyan Li and
                  Shixin Sun},
  title        = {Research on dynamic bidirectional security authentication of user
                  identity in wireless sensor network based on improved {DES} algorithm},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {74--90},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICT.2023.132148},
  doi          = {10.1504/IJICT.2023.132148},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/MaoLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/Hussein23,
  author       = {Mohammed Abdulridha Hussein},
  title        = {Proposed Multi-Layer Firewall to Improve the Security of Software
                  Defined Networks},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {17},
  number       = {2},
  pages        = {153--165},
  year         = {2023},
  url          = {https://doi.org/10.3991/ijim.v17i02.36387},
  doi          = {10.3991/IJIM.V17I02.36387},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/Hussein23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/SandhiaNSSS23,
  author       = {G. K. Sandhia and
                  S. Nithyaselvakumari and
                  V. Saidulu and
                  Nor Hissam B. Sulaiman and
                  Anas A. Salameh},
  title        = {Enhancing the Security of Software Defined Mobile Networks {(SDMN)}
                  based on Blockchain Technology},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {17},
  number       = {4},
  pages        = {117--133},
  year         = {2023},
  url          = {https://doi.org/10.3991/ijim.v17i04.37807},
  doi          = {10.3991/IJIM.V17I04.37807},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/SandhiaNSSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/SivakumarDMKBK23,
  author       = {T. K. Sivakumar and
                  Saurabh Dhyani and
                  S. V. Manikanthan and
                  Vishnu Kumar Kaliappan and
                  K. Baskaran and
                  Kakarla Hari Kishore},
  title        = {Cluster-Factors of Mobile Sensor Network Technology for Security Enhanced
                  {PEGASIS}},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {17},
  number       = {18},
  pages        = {143--155},
  year         = {2023},
  url          = {https://doi.org/10.3991/ijim.v17i18.42915},
  doi          = {10.3991/IJIM.V17I18.42915},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/SivakumarDMKBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijin/KousalyaB23,
  author       = {A. Kousalya and
                  Namkyun Baik},
  title        = {Enhance cloud security and effectiveness using improved RSA-based
                  {RBAC} with {XACML} technique},
  journal      = {Int. J. Intell. Networks},
  volume       = {4},
  pages        = {62--67},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijin.2023.03.003},
  doi          = {10.1016/J.IJIN.2023.03.003},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijin/KousalyaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijin/ZhangPH23,
  author       = {Caixia Zhang and
                  Zijian Pan and
                  Chaofan Hou},
  title        = {Marketing data security and privacy protection based on federated
                  gamma in cloud computing environment},
  journal      = {Int. J. Intell. Networks},
  volume       = {4},
  pages        = {261--271},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijin.2023.09.003},
  doi          = {10.1016/J.IJIN.2023.09.003},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijin/ZhangPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijin/Zhu23,
  author       = {Qingkun Zhu},
  title        = {Enhancing vulnerability scoring for information security in intelligent
                  computers},
  journal      = {Int. J. Intell. Networks},
  volume       = {4},
  pages        = {253--260},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijin.2023.09.002},
  doi          = {10.1016/J.IJIN.2023.09.002},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijin/Zhu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Zhang23,
  author       = {Yin Sheng Zhang},
  title        = {Analysis of {OSPU} security effect and data assembly verification
                  under semi-network {OS} architecture},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {5},
  pages        = {1497--1509},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00702-1},
  doi          = {10.1007/S10207-023-00702-1},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/EnnajiAH23,
  author       = {Sabrine Ennaji and
                  Nabil El Akkad and
                  Khalid Haddouch},
  title        = {i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong
                  Network Security},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {1--17},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijisp.317113},
  doi          = {10.4018/IJISP.317113},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/EnnajiAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitm/XieWC23,
  author       = {Xiang Xie and
                  Yingte Wang and
                  Ying Cui},
  title        = {Research on evaluation of network payment security},
  journal      = {Int. J. Inf. Technol. Manag.},
  volume       = {22},
  number       = {1/2},
  pages        = {110--126},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJITM.2023.10055154},
  doi          = {10.1504/IJITM.2023.10055154},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitm/XieWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitsa/Jiang23,
  author       = {Guiwen Jiang},
  title        = {Security Detection Design for Laboratory Networks Based on Enhanced
                  {LSTM} and AdamW Algorithms},
  journal      = {Int. J. Inf. Technol. Syst. Approach},
  volume       = {16},
  number       = {2},
  pages        = {1--13},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijitsa.319721},
  doi          = {10.4018/IJITSA.319721},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitsa/Jiang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitsa/Jin23,
  author       = {Min Jin},
  title        = {Computer Network Information Security and Protection Strategy Based
                  on Big Data Environment},
  journal      = {Int. J. Inf. Technol. Syst. Approach},
  volume       = {16},
  number       = {2},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijitsa.319722},
  doi          = {10.4018/IJITSA.319722},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitsa/Jin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitwe/Li23,
  author       = {Lin Li},
  title        = {The Construction of Network Domain Name Security Access Identification
                  System Based on Artificial Intelligence},
  journal      = {Int. J. Inf. Technol. Web Eng.},
  volume       = {18},
  number       = {1},
  pages        = {1--13},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijitwe.333636},
  doi          = {10.4018/IJITWE.333636},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitwe/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MengKCC23,
  author       = {Weizhi Meng and
                  Sokratis K. Katsikas and
                  Jiageng Chen and
                  Chao Chen},
  title        = {Editorial for special issue on security and trust on networked systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2229},
  doi          = {10.1002/NEM.2229},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MengKCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/Choudhary23,
  author       = {Deepak Choudhary},
  title        = {Optimized security algorithm for connected vehicular network},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {19},
  number       = {5},
  pages        = {799--817},
  year         = {2023},
  url          = {https://doi.org/10.1108/IJPCC-12-2021-0300},
  doi          = {10.1108/IJPCC-12-2021-0300},
  timestamp    = {Tue, 12 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijpcc/Choudhary23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/RautV23,
  author       = {Umesh K. Raut and
                  L. K. Vishwamitra},
  title        = {Seek-and-destroy algorithm for optimal resource allocation and security
                  analysis in software-defined vehicular networks},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {19},
  number       = {1},
  pages        = {97--123},
  year         = {2023},
  url          = {https://doi.org/10.1108/IJPCC-01-2021-0020},
  doi          = {10.1108/IJPCC-01-2021-0020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/RautV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/WenPWO23,
  author       = {Zhicheng Wen and
                  Linhua Peng and
                  Weiqing Wan and
                  Jing Ou},
  title        = {An Algorithm for Network Security Situation Assessment Based on Deep
                  Learning},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {37},
  number       = {2},
  pages        = {2252031:1--2252031:18},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218001422520310},
  doi          = {10.1142/S0218001422520310},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/WenPWO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/WenZWD23,
  author       = {Zhicheng Wen and
                  Longxin Zhang and
                  Qinlan Wu and
                  Wengui Deng},
  title        = {A Network Security Situation Awareness Method Based on {GRU} in Big
                  Data Environment},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {37},
  number       = {1},
  pages        = {2251018:1--2251018:18},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218001422510181},
  doi          = {10.1142/S0218001422510181},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/WenZWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChiniahG23,
  author       = {Aatish Chiniah and
                  Feroz Ghannoo},
  title        = {A multi-theory model to evaluate new factors influencing information
                  security compliance},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {19--29},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129949},
  doi          = {10.1504/IJSN.2023.129949},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChiniahG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SaadSS23,
  author       = {Redhwan M. A. Saad and
                  Khaled A. M. Al Soufy and
                  Samir I. Shaheen},
  title        = {Security in smart home environment: issues, challenges, and countermeasures
                  - a survey},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {1--9},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129887},
  doi          = {10.1504/IJSN.2023.129887},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SaadSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanZLQW23,
  author       = {Hao Yan and
                  Zheng Zhang and
                  Yanan Liu and
                  Shuo Qiu and
                  Qiuling Wu},
  title        = {Comments on a dynamic cloud data integrity verification scheme: security
                  analysis and improvement},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {125--132},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131610},
  doi          = {10.1504/IJSN.2023.131610},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanZLQW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuDMS23,
  author       = {Dexin Zhu and
                  Xiaogang Du and
                  Jigui Mao and
                  Lijun Song},
  title        = {A security control scheme based on quantum keys for IoT terminals},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {189--198},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134123},
  doi          = {10.1504/IJSN.2023.134123},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuDMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/BenrebbouhMCP23,
  author       = {Chahrazed Benrebbouh and
                  Houssem Mansouri and
                  Sarra Cherbal and
                  Al{-}Sakib Khan Pathan},
  title        = {A lightweight security scheme to defend against quantum attack in
                  IoT-based energy internet},
  journal      = {Int. J. Sens. Networks},
  volume       = {43},
  number       = {1},
  pages        = {13--26},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSNET.2023.133813},
  doi          = {10.1504/IJSNET.2023.133813},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/BenrebbouhMCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ShiX23,
  author       = {Shuai Shi and
                  Ning Xiao},
  title        = {Security demonstration for the quantum noise-based physical layer
                  using variable keys},
  journal      = {Int. J. Sens. Networks},
  volume       = {41},
  number       = {1},
  pages        = {60--66},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSNET.2022.10049293},
  doi          = {10.1504/IJSNET.2022.10049293},
  timestamp    = {Mon, 27 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/ShiX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/ChikhaleMD23,
  author       = {Devidas V. Chikhale and
                  Mahesh M. Munde and
                  Shankar B. Deosarkar},
  title        = {HetNet security solution using femtocell network architecture and
                  {UMTS} technology in the millimetre range},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {83--90},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJWMC.2023.10054168},
  doi          = {10.1504/IJWMC.2023.10054168},
  timestamp    = {Mon, 27 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwmc/ChikhaleMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/Huc23,
  author       = {Aleks Huc},
  title        = {Detecting Temporal and Spatial Anomalies in Users' Activities for
                  Security Provisioning in Computer Networks},
  journal      = {Informatica (Slovenia)},
  volume       = {47},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.31449/inf.v47i2.4933},
  doi          = {10.31449/INF.V47I2.4933},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/Huc23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/SchillerCWM23,
  author       = {Thomas Schiller and
                  Bruce Caulkins and
                  Annie S. Wu and
                  Sean C. Mondesire},
  title        = {Security Awareness in Smart Homes and Internet of Things Networks
                  through Swarm-Based Cybersecurity Penetration Testing},
  journal      = {Inf.},
  volume       = {14},
  number       = {10},
  pages        = {536},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14100536},
  doi          = {10.3390/INFO14100536},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/SchillerCWM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inis/NguyenNTNT23,
  author       = {Sang Quang Nguyen and
                  Van Hien Nguyen and
                  Trung Duy Tran and
                  Luong Nhat Nguyen and
                  Lam{-}Thanh Tu},
  title        = {On the Security and Reliability Trade-off of the Satellite Terrestrial
                  Networks with Fountain Codes and Friendly Jamming},
  journal      = {{EAI} Endorsed Trans. Ind. Networks Intell. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.4108/eetinis.v10i4.4192},
  doi          = {10.4108/EETINIS.V10I4.4192},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inis/NguyenNTNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/BakhshKAAAA23,
  author       = {Shahid Allah Bakhsh and
                  Muhammad Almas Khan and
                  Fawad Ahmed and
                  Mohammed S. Alshehri and
                  Hisham Ali and
                  Jawad Ahmad},
  title        = {Enhancing IoT network security through deep learning-powered Intrusion
                  Detection System},
  journal      = {Internet Things},
  volume       = {24},
  pages        = {100936},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100936},
  doi          = {10.1016/J.IOT.2023.100936},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/BakhshKAAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/EdrisAKNCL23,
  author       = {Ed Kamya Kiyemba Edris and
                  Mahdi Aiash and
                  Mohammad Ali Khoshkholghi and
                  Ranesh Naha and
                  Abdullahi Chowdhury and
                  Jonathan Loo},
  title        = {Performance and cryptographic evaluation of security protocols in
                  distributed networks using applied pi calculus and Markov Chain},
  journal      = {Internet Things},
  volume       = {24},
  pages        = {100913},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100913},
  doi          = {10.1016/J.IOT.2023.100913},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/EdrisAKNCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/FeijooAnazcoCGM23,
  author       = {Anthony Feijoo{-}A{\~{n}}azco and
                  Dan Garc{\'{\i}}a{-}Carrillo and
                  Jes{\'{u}}s S{\'{a}}nchez G{\'{o}}mez and
                  Rafael Mar{\'{\i}}n{-}P{\'{e}}rez},
  title        = {Innovative security and compression for constrained IoT networks},
  journal      = {Internet Things},
  volume       = {24},
  pages        = {100899},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100899},
  doi          = {10.1016/J.IOT.2023.100899},
  timestamp    = {Mon, 17 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/FeijooAnazcoCGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenCL23,
  author       = {Zhuo Chen and
                  Xiao Chen and
                  Yun Li},
  title        = {Performance and Security Analysis of Distributed Ledger Under the
                  Internet of Things Environments With Network Instability},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {5},
  pages        = {4213--4225},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3216586},
  doi          = {10.1109/JIOT.2022.3216586},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DengWGCL23,
  author       = {Lunzhi Deng and
                  Bo Wang and
                  Yan Gao and
                  Zhiwei Chen and
                  Siwei Li},
  title        = {Certificateless Anonymous Signcryption Scheme With Provable Security
                  in the Standard Model Suitable for Healthcare Wireless Sensor Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {18},
  pages        = {15953--15965},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3266335},
  doi          = {10.1109/JIOT.2023.3266335},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DengWGCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GharibI23,
  author       = {Anastassia Gharib and
                  Mohamed Ibnkahla},
  title        = {Heterogeneous Cluster-Based Information-Centric Sensor Networks With
                  User Security Satisfaction},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {9, May 1},
  pages        = {8123--8139},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3229891},
  doi          = {10.1109/JIOT.2022.3229891},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GharibI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/IlliQBA23,
  author       = {Elmehdi Illi and
                  Marwa K. Qaraqe and
                  Faissal El Bouanani and
                  Saif M. Al{-}Kuwari},
  title        = {On the Physical-Layer Security of a Dual-Hop UAV-Based Network in
                  the Presence of Per-Hop Eavesdropping and Imperfect {CSI}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {9, May 1},
  pages        = {7850--7867},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3229411},
  doi          = {10.1109/JIOT.2022.3229411},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/IlliQBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiQDZDZP23,
  author       = {Xingwang Li and
                  Hongyan Qi and
                  Dinh{-}Thuan Do and
                  Hui Zhang and
                  Yuan Ding and
                  Mingfu Zhu and
                  Hongxing Peng},
  title        = {IQ-Impaired Wireless-Powered Modify-and-Forward Relaying for IoT Networks:
                  An In-Depth Physical-Layer Security Analysis},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {17},
  pages        = {14912--14924},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3249964},
  doi          = {10.1109/JIOT.2023.3249964},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiQDZDZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/NibouchaSKC23,
  author       = {Redouane Niboucha and
                  Sabra Ben Saad and
                  Adlen Ksentini and
                  Yacine Challal},
  title        = {Zero-Touch Security Management for mMTC Network Slices: DDoS Attack
                  Detection and Mitigation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {9, May 1},
  pages        = {7800--7812},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3230875},
  doi          = {10.1109/JIOT.2022.3230875},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/NibouchaSKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RaniBSGD23,
  author       = {Shalli Rani and
                  Himanshi Babbar and
                  Gautam Srivastava and
                  Thippa Reddy Gadekallu and
                  Gaurav Dhiman},
  title        = {Security Framework for Internet-of-Things-Based Software-Defined Networks
                  Using Blockchain},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {7},
  pages        = {6074--6081},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3223576},
  doi          = {10.1109/JIOT.2022.3223576},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/RaniBSGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SafavatR23,
  author       = {Sunitha Safavat and
                  Danda B. Rawat},
  title        = {Improved Multiresolution Neural Network for Mobility-Aware Security
                  and Content Caching for Internet of Vehicles},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {20},
  pages        = {17813--17823},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3279048},
  doi          = {10.1109/JIOT.2023.3279048},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SafavatR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShiSXH23,
  author       = {Guolong Shi and
                  Xinyi Shen and
                  Fuke Xiao and
                  Yigang He},
  title        = {{DANTD:} {A} Deep Abnormal Network Traffic Detection Model for Security
                  of Industrial Internet of Things Using High-Order Features},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {21143--21153},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3253777},
  doi          = {10.1109/JIOT.2023.3253777},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShiSXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WuNWNL23,
  author       = {Yixuan Wu and
                  Laisen Nie and
                  Shupeng Wang and
                  Zhaolong Ning and
                  Shengtao Li},
  title        = {Intelligent Intrusion Detection for Internet of Things Security: {A}
                  Deep Convolutional Generative Adversarial Network-Enabled Approach},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {4},
  pages        = {3094--3106},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2021.3112159},
  doi          = {10.1109/JIOT.2021.3112159},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WuNWNL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangWDDW23,
  author       = {Xiaodong Yang and
                  Haoqi Wen and
                  Runze Diao and
                  Xiaoni Du and
                  Caifen Wang},
  title        = {Improved Security of a Pairing-Free Certificateless Aggregate Signature
                  in Healthcare Wireless Medical Sensor Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {12},
  pages        = {10881--10892},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3240426},
  doi          = {10.1109/JIOT.2023.3240426},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangWDDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/BoualouacheBSE23,
  author       = {Abdelwahab Boualouache and
                  Bouziane Brik and
                  Sidi{-}Mohammed Senouci and
                  Thomas Engel},
  title        = {On-Demand Security Framework for 5GB Vehicular Networks},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {2},
  pages        = {26--31},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2200233},
  doi          = {10.1109/IOTM.001.2200233},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/BoualouacheBSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/SoodNQCKY23,
  author       = {Keshav Sood and
                  Dinh Duc Nha Nguyen and
                  Youyang Qu and
                  Lei Cui and
                  Kallol Krishna Karmakar and
                  Shui Yu},
  title        = {Security Challenges and Potential Solutions in Aerial-Terrestrial
                  Wireless Networking},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {4},
  pages        = {118--123},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2300024},
  doi          = {10.1109/IOTM.001.2300024},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/SoodNQCKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DadkhahDR23,
  author       = {Parichehr Dadkhah and
                  Mohammad Dakhilalian and
                  Parvin Rastegari},
  title        = {Security Analysis and Improvement of an Access Control Scheme for
                  Wireless Body Area Networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {15},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.22042/isecure.2023.180857},
  doi          = {10.22042/ISECURE.2023.180857},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/DadkhahDR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoWLC23,
  author       = {Mengnan Gao and
                  Lifa Wu and
                  Qi Li and
                  Wei Chen},
  title        = {Anomaly traffic detection in IoT security using graph neural networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103532},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103532},
  doi          = {10.1016/J.JISA.2023.103532},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoWLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SafdarM23,
  author       = {Ghazanfar Ali Safdar and
                  Ali Mansour},
  title        = {Security and Trust Issues in {BYOD} Networks},
  journal      = {{IT} Prof.},
  volume       = {25},
  number       = {4},
  pages        = {45--51},
  year         = {2023},
  url          = {https://doi.org/10.1109/MITP.2023.3293714},
  doi          = {10.1109/MITP.2023.3293714},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/SafdarM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/AlkhabetI23,
  author       = {Mohammed Majeed Alkhabet and
                  Mahamod Ismail},
  title        = {Security algorithms for distributed storage system for E-health application
                  over wireless body area network},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {12},
  pages        = {15781--15792},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-020-02733-1},
  doi          = {10.1007/S12652-020-02733-1},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/AlkhabetI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/IlavendhanS23,
  author       = {A. Ilavendhan and
                  K. Saruladha},
  title        = {Stackelberg security game to mitigate the DoS attack in vehicular
                  ad-hoc networks},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {6489--6496},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-03523-z},
  doi          = {10.1007/S12652-021-03523-Z},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/IlavendhanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/SahraouiH23,
  author       = {Somia Sahraoui and
                  Nabil Henni},
  title        = {{SAMP-RPL:} secure and adaptive multipath {RPL} for enhanced security
                  and reliability in heterogeneous IoT-connected low power and lossy
                  networks},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {409--429},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-03303-9},
  doi          = {10.1007/S12652-021-03303-9},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/SahraouiH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/BaiLYWLJ23,
  author       = {Rufan Bai and
                  Haoxing Lin and
                  Xinyu Yang and
                  Xiaowei Wu and
                  Minming Li and
                  Weijia Jia},
  title        = {Stackelberg Security Games with Contagious Attacks on a Network: Reallocation
                  to the Rescue},
  journal      = {J. Artif. Intell. Res.},
  volume       = {77},
  pages        = {487--515},
  year         = {2023},
  url          = {https://doi.org/10.1613/jair.1.14563},
  doi          = {10.1613/JAIR.1.14563},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jair/BaiLYWLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/AliKK23,
  author       = {Yasir Ali and
                  Habib Ullah Khan and
                  Muhammad Khalid},
  title        = {Engineering the advances of the artificial neural networks (ANNs)
                  for the security requirements of Internet of Things: a systematic
                  review},
  journal      = {J. Big Data},
  volume       = {10},
  number       = {1},
  pages        = {128},
  year         = {2023},
  url          = {https://doi.org/10.1186/s40537-023-00805-5},
  doi          = {10.1186/S40537-023-00805-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbd/AliKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcin/ShenHWLLL23,
  author       = {Zihao Shen and
                  Shuhan He and
                  Hui Wang and
                  Peiqian Liu and
                  Kun Liu and
                  Fangfang Lian},
  title        = {A Differential Privacy Budget Allocation Method Combining Privacy
                  Security Level},
  journal      = {J. Commun. Inf. Networks},
  volume       = {8},
  number       = {1},
  pages        = {90--98},
  year         = {2023},
  url          = {https://doi.org/10.23919/jcin.2023.10087251},
  doi          = {10.23919/JCIN.2023.10087251},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcin/ShenHWLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/KrishnanJAPB23,
  author       = {Prabhakar Krishnan and
                  Kurunandan Jain and
                  Amjad Aldweesh and
                  P. Prabu and
                  Rajkumar Buyya},
  title        = {OpenStackDP: a scalable network security framework for SDN-based OpenStack
                  cloud infrastructure},
  journal      = {J. Cloud Comput.},
  volume       = {12},
  number       = {1},
  pages        = {26},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13677-023-00406-w},
  doi          = {10.1186/S13677-023-00406-W},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/KrishnanJAPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/MahlakeMPM23,
  author       = {Ntebatseng Mahlake and
                  Topside E. Mathonsi and
                  Deon Du Plessis and
                  Tonderai Muchenje},
  title        = {A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network
                  Security on the Internet of Things},
  journal      = {J. Commun.},
  volume       = {18},
  number       = {1},
  pages        = {47--57},
  year         = {2023},
  url          = {https://doi.org/10.12720/jcm.18.1.47-57},
  doi          = {10.12720/JCM.18.1.47-57},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/MahlakeMPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/ihyaouiYME23,
  author       = {Abdelilah El ihyaoui and
                  My Abdelkader Youssefi and
                  Ahmed Mouhsen and
                  Abdelhafid ELfarnane},
  title        = {Evaluate the Security Models Performances and Limitations of the Vehicular
                  Network VANETcloudSim},
  journal      = {J. Commun.},
  volume       = {18},
  number       = {4},
  pages        = {221--227},
  year         = {2023},
  url          = {https://doi.org/10.12720/jcm.18.4.221-227},
  doi          = {10.12720/JCM.18.4.221-227},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/ihyaouiYME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/ZhangKB23,
  author       = {Hongwu Zhang and
                  Kai Kang and
                  Wei Bai},
  title        = {Hierarchical network security situation awareness data fusion method
                  in cloud computing environment},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {23},
  number       = {1},
  pages        = {237--251},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCM-226542},
  doi          = {10.3233/JCM-226542},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcmse/ZhangKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/WijethilakaL23,
  author       = {Shalitha Wijethilaka and
                  Madhusanka Liyanage},
  title        = {The role of security orchestrator in network slicing for future networks},
  journal      = {J. Commun. Networks},
  volume       = {25},
  number       = {3},
  pages        = {355--369},
  year         = {2023},
  url          = {https://doi.org/10.23919/jcn.2023.000030},
  doi          = {10.23919/JCN.2023.000030},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/WijethilakaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcondec/RajasekaranAA23,
  author       = {Arun Sekar Rajasekaran and
                  Maria Azees and
                  Fadi M. Al{-}Turjman},
  title        = {A comprehensive survey on security issues in vehicle-to-grid networks},
  journal      = {J. Control. Decis.},
  volume       = {10},
  number       = {2},
  pages        = {150--159},
  year         = {2023},
  url          = {https://doi.org/10.1080/23307706.2021.2021113},
  doi          = {10.1080/23307706.2021.2021113},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcondec/RajasekaranAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/GuptaSDS23,
  author       = {Koyel Datta Gupta and
                  Deepak Kumar Sharma and
                  Rinky Dwivedi and
                  Gautam Srivastava},
  title        = {{AHDNN:} Attention-Enabled Hierarchical Deep Neural Network Framework
                  for Enhancing Security of Connected and Autonomous Vehicles},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {32},
  number       = {4},
  pages        = {2350058:1--2350058:19},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218126623500585},
  doi          = {10.1142/S0218126623500585},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/GuptaSDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Chen23,
  author       = {Min Chen},
  title        = {Camera Network Topology Mapping Based on the Integration of Network
                  Information and Physical Distribution Under the Background of Communication
                  Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {733--756},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1256},
  doi          = {10.13052/JCSM2245-1439.1256},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Du23,
  author       = {Gaili Du},
  title        = {Security of Encrypted Images in Network Transmission Based on an Improved
                  Chaos Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {675--696},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1253},
  doi          = {10.13052/JCSM2245-1439.1253},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Du23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li23,
  author       = {Xingfeng Li},
  title        = {An Evaluation Model for Network Security Based on an Optimized Circular
                  Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {711--732},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1255},
  doi          = {10.13052/JCSM2245-1439.1255},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Xue23,
  author       = {Ying Xue},
  title        = {Machine Learning: Research on Detection of Network Security Vulnerabilities
                  by Extracting and Matching Features},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {697--710},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1254},
  doi          = {10.13052/JCSM2245-1439.1254},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Xue23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Zhang23,
  author       = {Zhihong Zhang},
  title        = {Analysis of Network Security Countermeasures From the Perspective
                  of Improved {FS} Algorithm and {ICT} Convergence},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1211},
  doi          = {10.13052/JCSM2245-1439.1211},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangL23,
  author       = {Liu Zhang and
                  Yanyu Liu},
  title        = {Network Security Prediction and Situational Assessment Using Neural
                  Network-based Method},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {547--568},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1245},
  doi          = {10.13052/JCSM2245-1439.1245},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jece/X23ak,
  title        = {Retracted: Intrusion Detection-Data Security Protection Scheme Based
                  on Particle Swarm-BP Network Algorithm in Cloud Computing Environment},
  journal      = {J. Electr. Comput. Eng.},
  volume       = {2023},
  pages        = {9853289:1--9853289:1},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/9853289},
  doi          = {10.1155/2023/9853289},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jece/X23ak.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jece/X23an,
  title        = {Retracted: Distribution Network Security Situation Awareness Method
                  Based on the Distribution Network Topology Layered Model},
  journal      = {J. Electr. Comput. Eng.},
  volume       = {2023},
  pages        = {9856346:1--9856346:1},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/9856346},
  doi          = {10.1155/2023/9856346},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jece/X23an.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/WangJABKA23,
  author       = {Bo Wang and
                  Hadi Jahanshahi and
                  Burak Aricioglu and
                  Baris Boru and
                  Sezgin Ka{\c{c}}ar and
                  Naif D. Alotaibi},
  title        = {A variable-order fractional neural network: Dynamical properties,
                  data security application, and synchronization using a novel control
                  algorithm with a finite-time estimator},
  journal      = {J. Frankl. Inst.},
  volume       = {360},
  number       = {17},
  pages        = {13648--13670},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jfranklin.2022.04.036},
  doi          = {10.1016/J.JFRANKLIN.2022.04.036},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfi/WangJABKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/NorouziAEB23,
  author       = {Monire Norouzi and
                  Zeynep G{\"{u}}rkas Aydin and
                  Sefer Ergen and
                  Mehmet Serif Bakir},
  title        = {Security-aware resource management approaches in software defined
                  networks: Comprehensive analysis, opportunities and challenges},
  journal      = {J. High Speed Networks},
  volume       = {29},
  number       = {3},
  pages        = {169--181},
  year         = {2023},
  url          = {https://doi.org/10.3233/JHS-230004},
  doi          = {10.3233/JHS-230004},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/NorouziAEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/RanaP23,
  author       = {Pragati Rana and
                  B. P. Patil},
  title        = {Cyber security threats in IoT: {A} review},
  journal      = {J. High Speed Networks},
  volume       = {29},
  number       = {2},
  pages        = {105--120},
  year         = {2023},
  url          = {https://doi.org/10.3233/JHS-222042},
  doi          = {10.3233/JHS-222042},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/RanaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/SongR23,
  author       = {Limin Song and
                  Seungmin Rho},
  title        = {Hidden target recognition method for high-speed network security threats
                  based on attack graph theory},
  journal      = {J. High Speed Networks},
  volume       = {29},
  number       = {4},
  pages        = {307--320},
  year         = {2023},
  url          = {https://doi.org/10.3233/JHS-222048},
  doi          = {10.3233/JHS-222048},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jhsn/SongR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiat/NguyenNT23,
  author       = {Quang{-}Sang Nguyen and
                  Tan N. Nguyen and
                  Lam{-}Thanh Tu},
  title        = {On the security and reliability performance of SWIPT-enabled full-duplex
                  relaying in the non-orthogonal multiple access networks},
  journal      = {J. Inf. Telecommun.},
  volume       = {7},
  number       = {4},
  pages        = {462--476},
  year         = {2023},
  url          = {https://doi.org/10.1080/24751839.2023.2218046},
  doi          = {10.1080/24751839.2023.2218046},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiat/NguyenNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/BhatnagarT23,
  author       = {Manisha Bhatnagar and
                  Dolly Thankachan},
  title        = {Enhancing security {\&} QoS of trust-enabled wireless networks
                  using machine learning powered transformable blockchain sharding},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {44},
  number       = {1},
  pages        = {41--58},
  year         = {2023},
  url          = {https://doi.org/10.3233/JIFS-213482},
  doi          = {10.3233/JIFS-213482},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/BhatnagarT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ChenLHLZ23,
  author       = {Ze Chen and
                  Ning Lu and
                  Botao Hou and
                  Xin Liu and
                  Xiaojun Zuo},
  title        = {A risk source identification model for network security of power {CPS}
                  system {(CPS)} based on fuzzy artificial neural network},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {6},
  pages        = {10675--10691},
  year         = {2023},
  url          = {https://doi.org/10.3233/jifs-224090},
  doi          = {10.3233/JIFS-224090},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/ChenLHLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ChenSX23,
  author       = {Hao Chen and
                  Ze Su and
                  Xiangqian Xu},
  title        = {A generalized integrated group decision-making framework for computer
                  network security evaluation with Interval Neutrosophic information},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {5},
  pages        = {8945--8957},
  year         = {2023},
  url          = {https://doi.org/10.3233/jifs-233181},
  doi          = {10.3233/JIFS-233181},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/ChenSX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/Qiao23,
  author       = {Wenbao Qiao},
  title        = {A novel {MADM} technique based on projection methods under q-rung
                  orthopair fuzzy setting and its application to computer network security
                  evaluation},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {1},
  pages        = {1029--1038},
  year         = {2023},
  url          = {https://doi.org/10.3233/JIFS-231351},
  doi          = {10.3233/JIFS-231351},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/Qiao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/TanZC23,
  author       = {Lirui Tan and
                  Qiuju Zheng and
                  Junji Chen},
  title        = {Providing an effective key management scheme to increase transaction
                  security of homogeneous mobile wireless sensor networks},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {6},
  pages        = {10451--10466},
  year         = {2023},
  url          = {https://doi.org/10.3233/jifs-233476},
  doi          = {10.3233/JIFS-233476},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/TanZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/Wang23,
  author       = {Hong Wang},
  title        = {A Network Intrusion Security Detection Method Using BiLSTM-CNN in
                  Big Data Environment},
  journal      = {J. Inf. Process. Syst.},
  volume       = {19},
  number       = {5},
  pages        = {688--701},
  year         = {2023},
  url          = {https://doi.org/10.3745/JIPS.01.0097},
  doi          = {10.3745/JIPS.01.0097},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChengMCTG23,
  author       = {Yunli Cheng and
                  Hainie Meng and
                  Yu{-}Qiang Chen and
                  Yan{-}Xian Tan and
                  Jian{-}Lan Guo},
  title        = {Research on Network Information Security Management System Based on
                  Face Recognition},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {39},
  number       = {4},
  pages        = {839--854},
  year         = {2023},
  url          = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=193\_2619},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChengMCTG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IftikharQSA23,
  author       = {Abeer Iftikhar and
                  Kashif Naseer Qureshi and
                  Muhammad Shiraz and
                  Saleh Albahli},
  title        = {Security, trust and privacy risks, responses, and solutions for high-speed
                  smart cities networks: {A} systematic literature review},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {9},
  pages        = {101788},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101788},
  doi          = {10.1016/J.JKSUCI.2023.101788},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/IftikharQSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/TangYPW23,
  author       = {Wei Tang and
                  Hui Yang and
                  Jinxiu Pi and
                  Chun Wang},
  title        = {Network virus propagation and security situation awareness based on
                  Hidden Markov Model},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {10},
  pages        = {101840},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101840},
  doi          = {10.1016/J.JKSUCI.2023.101840},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/TangYPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/XuAKARKMK23,
  author       = {Fang Xu and
                  Sajed Ahmad and
                  Muhammad Naveed Khan and
                  Manzoor Ahmed and
                  Salman Raza and
                  Feroz Khan and
                  Yi Ma and
                  Wali Ullah Khan},
  title        = {Beyond encryption: Exploring the potential of physical layer security
                  in {UAV} networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {8},
  pages        = {101717},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101717},
  doi          = {10.1016/J.JKSUCI.2023.101717},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/XuAKARKMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/0004M23,
  author       = {Bing Li and
                  Maode Ma},
  title        = {An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain
                  in Named Data Networking},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {31},
  number       = {1},
  pages        = {13},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10922-022-09689-x},
  doi          = {10.1007/S10922-022-09689-X},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/0004M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/LewisBRR23,
  author       = {Benjamin Lewis and
                  Matthew Broadbent and
                  Charalampos Rotsos and
                  Nicholas J. P. Race},
  title        = {4MIDable: Flexible Network Offloading For Security VNFs},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {31},
  number       = {3},
  pages        = {52},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10922-023-09744-1},
  doi          = {10.1007/S10922-023-09744-1},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/LewisBRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/MartinsWG23,
  author       = {Rafael de Jesus Martins and
                  Juliano Araujo Wickboldt and
                  Lisandro Zambenedetti Granville},
  title        = {Assisted Monitoring and Security Provisioning for 5G Microservices-Based
                  Network Slices with {SWEETEN}},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {31},
  number       = {2},
  pages        = {36},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10922-023-09728-1},
  doi          = {10.1007/S10922-023-09728-1},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/MartinsWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/CuginiSGSMCP22,
  author       = {Filippo Cugini and
                  Davide Scano and
                  Alessio Giorgetti and
                  Andrea Sgambelluri and
                  Lorenzo De Marinis and
                  Piero Castoldi and
                  Francesco Paolucci},
  title        = {Telemetry and AI-based security {P4} applications for optical networks
                  [Invited]},
  journal      = {{JOCN}},
  volume       = {15},
  number       = {1},
  pages        = {A1--A10},
  year         = {2023},
  url          = {https://doi.org/10.1364/jocn.470118},
  doi          = {10.1364/JOCN.470118},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocnet/CuginiSGSMCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/LiuWMXZWLTDZ23,
  author       = {Tianhe Liu and
                  Wei Wang and
                  Xiangkun Man and
                  Huifang Xiong and
                  Yongli Zhao and
                  Guangquan Wang and
                  Yajie Li and
                  Yanxia Tan and
                  Shan Dong and
                  Jie Zhang},
  title        = {Mapping sub-wavelength service with heterogenous security demand over
                  physical-layer secured optical transport networks},
  journal      = {J. Opt. Commun. Netw.},
  volume       = {15},
  number       = {5},
  pages        = {268--281},
  year         = {2023},
  url          = {https://doi.org/10.1364/JOCN.480207},
  doi          = {10.1364/JOCN.480207},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocnet/LiuWMXZWLTDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/NatalinoGMGVMMF23,
  author       = {Carlos Natalino and
                  Lluis Gifre and
                  Francisco{-}Javier Moreno{-}Muro and
                  Sergio Gonzalez{-}Diaz and
                  Ricard Vilalta and
                  Raul Mu{\~{n}}oz and
                  Paolo Monti and
                  Marija Furdek},
  title        = {Flexible and scalable ML-based diagnosis module for optical networks:
                  a security use case},
  journal      = {J. Opt. Commun. Netw.},
  volume       = {15},
  number       = {8},
  pages        = {C155--C165},
  year         = {2023},
  url          = {https://doi.org/10.1364/jocn.482932},
  doi          = {10.1364/JOCN.482932},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocnet/NatalinoGMGVMMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/WangZGLTHLCZ23,
  author       = {Yunwu Wang and
                  Min Zhu and
                  Jiahua Gu and
                  Xiang Liu and
                  Weidong Tong and
                  Bingchang Hua and
                  Mingzheng Lei and
                  Yuancheng Cai and
                  Jiao Zhang},
  title        = {Security-aware 5G {RAN} slice mapping with tiered isolation in physical-layer
                  secured metro-aggregation elastic optical networks using heuristic-assisted
                  {DRL}},
  journal      = {J. Opt. Commun. Netw.},
  volume       = {15},
  number       = {12},
  pages        = {969},
  year         = {2023},
  url          = {https://doi.org/10.1364/jocn.499551},
  doi          = {10.1364/JOCN.499551},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocnet/WangZGLTHLCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/join/BiradarM23,
  author       = {Mallanagouda Biradar and
                  Basavaraj Mathapathi},
  title        = {Security and Energy Aware Clustering-Based Routing in Wireless Sensor
                  Network: Hybrid Nature-Inspired Algorithm for Optimal Cluster Head
                  Selection},
  journal      = {J. Interconnect. Networks},
  volume       = {23},
  number       = {1},
  pages        = {2150039:1--2150039:24},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0219265921500390},
  doi          = {10.1142/S0219265921500390},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/join/BiradarM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/join/ManoharanBP23,
  author       = {Maravarman Manoharan and
                  S. Babu and
                  R. Pitchai},
  title        = {Wireless Sensor Network Security Analysis for Data and Aggregation},
  journal      = {J. Interconnect. Networks},
  volume       = {23},
  number       = {2},
  pages        = {2250002:1--2250002:28},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0219265922500025},
  doi          = {10.1142/S0219265922500025},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/join/ManoharanBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KhoeurtSMA23,
  author       = {Sopha Khoeurt and
                  Chakchai So{-}In and
                  Pakarat Musikawan and
                  Phet Aimtongkham},
  title        = {Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack
                  Detection in the {RPL} Routing Protocol for Internet of Things},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {48--76},
  year         = {2023},
  url          = {https://doi.org/10.58346/jowua.2023.i3.005},
  doi          = {10.58346/JOWUA.2023.I3.005},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KhoeurtSMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KumaranTVSV23,
  author       = {U. Kumaran and
                  S. Thangam and
                  Nidhin Prabhakar T. V and
                  Jana Selvaganesan and
                  H. N. Vishwas},
  title        = {Adversarial Defense: {A} {GAN-IF} Based Cyber-security Model for Intrusion
                  Detection in Software Piracy},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {96--114},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.008},
  doi          = {10.58346/JOWUA.2023.I4.008},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KumaranTVSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TelloASMA23,
  author       = {Alcides Bernardo Tello and
                  Sohaib Alam and
                  Archana Ravindra Salve and
                  Kusuma Kumari B. M and
                  Meena Arora},
  title        = {Quantitative Evaluation of Android Application Privacy Security Based
                  on Privacy Policy and Behaviour},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {253--266},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.019},
  doi          = {10.58346/JOWUA.2023.I3.019},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TelloASMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VladaSRCBHP23,
  author       = {Nikitina Vlada and
                  Ra{\'{u}}l A. S{\'{a}}nchez{-}Ancajima and
                  Miguel {\'{A}}ngel Torres Rubio and
                  Walter Antonio Campos{-}Ugaz and
                  An{\'{\i}}bal Mej{\'{\i}}a Benavides and
                  Mar{\'{\i}}a Del Roc{\'{\i}}o Hende{-}Santolaya and
                  Jacqueline C. Ponce{-}Meza},
  title        = {Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm
                  Optimization-driven Intrusion Detection and Secure Routing Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {77--88},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.006},
  doi          = {10.58346/JOWUA.2023.I3.006},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VladaSRCBHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/FerragMB23,
  author       = {Mohamed Amine Ferrag and
                  Leandros Maglaras and
                  Mohamed Benbouzid},
  title        = {Blockchain and Artificial Intelligence as Enablers of Cyber Security
                  in the Era of IoT and IIoT Applications},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {3},
  pages        = {40},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12030040},
  doi          = {10.3390/JSAN12030040},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/FerragMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/HammoudehEP23,
  author       = {Mohammad Hammoudeh and
                  Gregory Epiphaniou and
                  Pedro Pinto},
  title        = {Cyber-Physical Systems: Security Threats and Countermeasures},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {1},
  pages        = {18},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12010018},
  doi          = {10.3390/JSAN12010018},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/HammoudehEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/SaqibA23,
  author       = {Nazar Abbas Saqib and
                  Shahad Talla AL{-}Talla},
  title        = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain
                  Systems},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {2},
  pages        = {31},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12020031},
  doi          = {10.3390/JSAN12020031},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/SaqibA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jus/JoshiLD23,
  author       = {Apoorv Joshi and
                  Jaykumar Lachure and
                  Rajesh Doriya},
  title        = {Drone Security for Precision Agriculture by Using One-Dimensional
                  Convolutional Neural Network},
  journal      = {J. Uncertain Syst.},
  volume       = {16},
  number       = {4},
  pages        = {2350007:1--2350007:16},
  year         = {2023},
  url          = {https://doi.org/10.1142/S1752890923500071},
  doi          = {10.1142/S1752890923500071},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jus/JoshiLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/juspn/BascioL23,
  author       = {David Lo Bascio and
                  Flavio Lombardi},
  title        = {Segment Routing v6 - Security Issues and Experimental Results},
  journal      = {J. Ubiquitous Syst. Pervasive Networks},
  volume       = {18},
  number       = {1},
  pages        = {15--21},
  year         = {2023},
  url          = {https://doi.org/10.5383/juspn.18.01.003},
  doi          = {10.5383/JUSPN.18.01.003},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/juspn/BascioL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kes/ShenL23,
  author       = {Genhai Shen and
                  Xiaoyu Li},
  title        = {A fuzzy group decision-making framework for computer network security
                  evaluation with probabilistic linguistic information},
  journal      = {Int. J. Knowl. Based Intell. Eng. Syst.},
  volume       = {27},
  number       = {3},
  pages        = {355--365},
  year         = {2023},
  url          = {https://doi.org/10.3233/kes-230083},
  doi          = {10.3233/KES-230083},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kes/ShenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kes/WangC23,
  author       = {Hong Wang and
                  Gongping Chen},
  title        = {Improving computer network security evaluation with grey relational
                  analysis and probabilistic simplified neutrosophic sets},
  journal      = {Int. J. Knowl. Based Intell. Eng. Syst.},
  volume       = {27},
  number       = {4},
  pages        = {425--436},
  year         = {2023},
  url          = {https://doi.org/10.3233/KES-230103},
  doi          = {10.3233/KES-230103},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kes/WangC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/ChenWCK23,
  author       = {Yean{-}Ru Chen and
                  Tzu{-}Fan Wang and
                  Si{-}Han Chen and
                  Yi{-}Chun Kao},
  title        = {Empirical study on security verification and assessment of neural
                  network accelerator},
  journal      = {Microprocess. Microsystems},
  volume       = {99},
  pages        = {104845},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.micpro.2023.104845},
  doi          = {10.1016/J.MICPRO.2023.104845},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/ChenWCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/MarchisioNKHMS23,
  author       = {Alberto Marchisio and
                  Giorgio Nanfa and
                  Faiq Khalid and
                  Muhammad Abdullah Hanif and
                  Maurizio Martina and
                  Muhammad Shafique},
  title        = {SeVuc: {A} study on the Security Vulnerabilities of Capsule Networks
                  against adversarial attacks},
  journal      = {Microprocess. Microsystems},
  volume       = {96},
  pages        = {104738},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.micpro.2022.104738},
  doi          = {10.1016/J.MICPRO.2022.104738},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/MarchisioNKHMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mdpinetwork/ChauhanS23,
  author       = {Milan Chauhan and
                  Stavros Shiaeles},
  title        = {An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions},
  journal      = {Network},
  volume       = {3},
  number       = {3},
  pages        = {422--450},
  year         = {2023},
  url          = {https://doi.org/10.3390/network3030018},
  doi          = {10.3390/NETWORK3030018},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mdpinetwork/ChauhanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/AhmadMAKS23,
  author       = {Aakash Ahmad and
                  Asad Waqar Malik and
                  Abdulrahman A. Alshdadi and
                  Wilayat Khan and
                  Maryam Sajjad},
  title        = {Adaptive Security for Self-Protection of Mobile Computing Devices},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {2},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-019-01355-y},
  doi          = {10.1007/S11036-019-01355-Y},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/AhmadMAKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/GeZH23,
  title        = {Retraction Note: Complex IoT Control System Modeling from Perspectives
                  of Environment Perception and Information Security},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {1},
  pages        = {433},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-022-02064-9},
  doi          = {10.1007/S11036-022-02064-9},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/GeZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/HuangZWJ23,
  author       = {Baoqi Huang and
                  Long Zhao and
                  En Wang and
                  Bing Jia},
  title        = {Editorial: sensing, Service and Security in Mobile Internet (MobilWare
                  2020)},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {2},
  pages        = {437--438},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-022-02022-5},
  doi          = {10.1007/S11036-022-02022-5},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/HuangZWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/KsibiJB23,
  author       = {Sondes Ksibi and
                  Faouzi Ja{\"{\i}}di and
                  Adel Bouhoula},
  title        = {A Comprehensive Study of Security and Cyber-Security Risk Management
                  within e-Health Systems: Synthesis, Analysis and a Novel Quantified
                  Approach},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {1},
  pages        = {107--127},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-022-02042-1},
  doi          = {10.1007/S11036-022-02042-1},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/KsibiJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LinTLCC23,
  author       = {Chun{-}Cheng Lin and
                  Ching{-}Tsorng Tsai and
                  Yu{-}Liang Liu and
                  Tsai{-}Ting Chang and
                  Yung{-}Sheng Chang},
  title        = {Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches,
                  Trends, and Challenges},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {3},
  pages        = {1043--1058},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-023-02143-5},
  doi          = {10.1007/S11036-023-02143-5},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/LinTLCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/MarabissiAM23,
  author       = {Dania Marabissi and
                  Andrea Abrardo and
                  Lorenzo Mucchi},
  title        = {A new framework for Physical Layer Security in HetNets based on Radio
                  Resource Allocation and Reinforcement Learning},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {4},
  pages        = {1473--1481},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-023-02149-z},
  doi          = {10.1007/S11036-023-02149-Z},
  timestamp    = {Thu, 05 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/MarabissiAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SarkerKAA23,
  author       = {Iqbal H. Sarker and
                  Asif Irshad Khan and
                  Yoosef B. Abushark and
                  Fawaz Alsolami},
  title        = {Internet of Things (IoT) Security Intelligence: {A} Comprehensive
                  Overview, Machine Learning Solutions and Research Directions},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {1},
  pages        = {296--312},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-022-01937-3},
  doi          = {10.1007/S11036-022-01937-3},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SarkerKAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SharmaPYSGS23,
  author       = {Mehul Sharma and
                  Shrid Pant and
                  Priety Yadav and
                  Deepak Kumar Sharma and
                  Nitin Gupta and
                  Gautam Srivastava},
  title        = {Advancing Security in the Industrial Internet of Things Using Deep
                  Progressive Neural Networks},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {2},
  pages        = {782--794},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-023-02104-y},
  doi          = {10.1007/S11036-023-02104-Y},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/SharmaPYSGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/VijayakumarKUVMT23,
  title        = {Retraction Note: E-Health Cloud Security Using Timing Enabled Proxy
                  Re-Encryption},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {1},
  pages        = {432},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-022-02062-x},
  doi          = {10.1007/S11036-022-02062-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/VijayakumarKUVMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhangMLTLL23,
  author       = {Hao Zhang and
                  Yuandong Min and
                  Sanya Liu and
                  Hang Tong and
                  Yaopeng Li and
                  Zhihan Lv},
  title        = {Improve the Security of Industrial Control System: {A} Fine-Grained
                  Classification Method for DoS Attacks on Modbus/TCP},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {2},
  pages        = {839--852},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-023-02108-8},
  doi          = {10.1007/S11036-023-02108-8},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/ZhangMLTLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MohyEddineGBA23,
  author       = {Mouaad Mohy{-}Eddine and
                  Azidine Guezzaz and
                  Said Benkirane and
                  Mourade Azrour},
  title        = {An efficient network intrusion detection model for IoT security using
                  {K-NN} classifier and feature selection},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {15},
  pages        = {23615--23633},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-14795-2},
  doi          = {10.1007/S11042-023-14795-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MohyEddineGBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SaidAK23,
  author       = {Lal Said and
                  Ammar S. Alanazi and
                  Majid Khan},
  title        = {A novel dual-layer security scheme based on 3-cell cellular neural
                  network encryption and data hiding scheme for color images},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {4},
  pages        = {6127--6145},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-13621-5},
  doi          = {10.1007/S11042-022-13621-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SaidAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/LiZ23,
  author       = {Xingguo Li and
                  Yu Zhong},
  title        = {Exploration of a network security situational awareness model based
                  on multisource data fusion},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {36},
  pages        = {25083--25095},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08500-5},
  doi          = {10.1007/S00521-023-08500-5},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/LiZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/SelvarajanMKSMK23,
  author       = {Shitharth Selvarajan and
                  Hariprasath Manoharan and
                  Alaa O. Khadidos and
                  Achyut Shankar and
                  M. S. Mekala and
                  Adil Omar Khadidos},
  title        = {{RLIS:} Resource Limited Improved Security Beyond Fifth-Generation
                  Networks Using Deep Learning Algorithms},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {4},
  pages        = {2383--2396},
  year         = {2023},
  url          = {https://doi.org/10.1109/OJCOMS.2023.3318860},
  doi          = {10.1109/OJCOMS.2023.3318860},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/SelvarajanMKSMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/NawazIFKRAR23,
  author       = {Naeem A. Nawaz and
                  Kashif Ishaq and
                  Uzma Farooq and
                  Amna Khalil and
                  Saim Rasheed and
                  Adnan Abid and
                  Fadhilah Rosdi},
  title        = {A comprehensive review of security threats and solutions for the online
                  social networks industry},
  journal      = {PeerJ Comput. Sci.},
  volume       = {9},
  pages        = {e1143},
  year         = {2023},
  url          = {https://doi.org/10.7717/peerj-cs.1143},
  doi          = {10.7717/PEERJ-CS.1143},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/NawazIFKRAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/ZhangFAHL23,
  author       = {Shengcai Zhang and
                  Qiming Fu and
                  Dezhi An and
                  Zhenxiang He and
                  Zhenyu Liu},
  title        = {A novel network security situation assessment model based on multiple
                  strategies whale optimization algorithm and bidirectional {GRU}},
  journal      = {PeerJ Comput. Sci.},
  volume       = {9},
  pages        = {e1729},
  year         = {2023},
  url          = {https://doi.org/10.7717/peerj-cs.1729},
  doi          = {10.7717/PEERJ-CS.1729},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/ZhangFAHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/RibeiroMSRR23,
  author       = {David Augusto Ribeiro and
                  Dick Carrillo Melgarejo and
                  Muhammad Saadi and
                  Renata Lopes Rosa and
                  Dem{\'{o}}stenes Zegarra Rodr{\'{\i}}guez},
  title        = {A novel deep deterministic policy gradient model applied to intelligent
                  transportation system security problems in 5G and 6G network scenarios},
  journal      = {Phys. Commun.},
  volume       = {56},
  pages        = {101938},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.phycom.2022.101938},
  doi          = {10.1016/J.PHYCOM.2022.101938},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/RibeiroMSRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/SharmaK23,
  author       = {Himanshu Sharma and
                  Neeraj Kumar},
  title        = {Deep learning based physical layer security for terrestrial communications
                  in 5G and beyond networks: {A} survey},
  journal      = {Phys. Commun.},
  volume       = {57},
  pages        = {102002},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.phycom.2023.102002},
  doi          = {10.1016/J.PHYCOM.2023.102002},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/SharmaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ChoudharyP23,
  author       = {Deepak Choudhary and
                  Roop Pahuja},
  title        = {A blockchain-based cyber-security for connected networks},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {4},
  pages        = {1852--1867},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01506-9},
  doi          = {10.1007/S12083-023-01506-9},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ChoudharyP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MehtaPP23,
  author       = {Prarthana J. Mehta and
                  Balu L. Parne and
                  Sankita J. Patel},
  title        = {{SE-LAKAF:} Security enhanced lightweight authentication and key agreement
                  framework for smart grid network},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {3},
  pages        = {1513--1535},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01494-w},
  doi          = {10.1007/S12083-023-01494-W},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/MehtaPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/PengTXZ23,
  author       = {Shuangrong Peng and
                  Xiaohu Tang and
                  Ling Xiong and
                  Hui Zhu},
  title        = {{LGAAFS:} {A} lightweight group anonymous mutual authentication and
                  forward security scheme for wireless body area networks},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {5},
  pages        = {2474--2491},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01537-2},
  doi          = {10.1007/S12083-023-01537-2},
  timestamp    = {Tue, 10 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/PengTXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rairo/WangZ23,
  author       = {Yigang Wang and
                  Jianfeng Zhao},
  title        = {Security optimization method of high-power charging pile inter-group
                  communication network under trusted taboo particle swarm optimization},
  journal      = {{RAIRO} Oper. Res.},
  volume       = {57},
  number       = {3},
  pages        = {1329--1341},
  year         = {2023},
  url          = {https://doi.org/10.1051/ro/2023038},
  doi          = {10.1051/RO/2023038},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rairo/WangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/WangZLJTKSBH23,
  author       = {Yishan Wang and
                  Fei Zhang and
                  Xingyou Li and
                  Verner Carl Johnson and
                  Mou Leong Tan and
                  Hsiang{-}te Kung and
                  Jingchao Shi and
                  Jupar Bahtebay and
                  Xin He},
  title        = {Methodology for Mapping the Ecological Security Pattern and Ecological
                  Network in the Arid Region of Xinjiang, China},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {11},
  pages        = {2836},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15112836},
  doi          = {10.3390/RS15112836},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/WangZLJTKSBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saem/SinglaSS23,
  author       = {Sanjay Singla and
                  Purushottam Sharma and
                  Parveen Kumar Sharma},
  title        = {Enhanced security using proxy signcryption technique for wireless
                  mesh networks},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {474--482},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13198-022-01820-0},
  doi          = {10.1007/S13198-022-01820-0},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saem/SinglaSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BhattacharyaRCDS23,
  author       = {Munmun Bhattacharya and
                  Sandip Roy and
                  Samiran Chattopadhyay and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {A comprehensive survey on online social networks security and privacy
                  issues: Threats, machine learning-based solutions, and open challenges},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.275},
  doi          = {10.1002/SPY2.275},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BhattacharyaRCDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChandrakarBKDA23,
  author       = {Palak Chandrakar and
                  Rashi Bagga and
                  Yogesh Kumar and
                  Sanjeev Kumar Dwivedi and
                  Ruhul Amin},
  title        = {Blockchain based security protocol for device to device secure communication
                  in internet of things networks},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.267},
  doi          = {10.1002/SPY2.267},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ChandrakarBKDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DuOWH23,
  author       = {Zhuang Du and
                  Mohammad S. Obaidat and
                  Guowei Wu and
                  Kuei{-}Fang Hsiao},
  title        = {An efficient caching security approach for content-centric mobile
                  networks in internet of things systems},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.294},
  doi          = {10.1002/SPY2.294},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DuOWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FarooqCK23,
  author       = {Sameer Farooq and
                  Priyanka Chawla and
                  Neeraj Kumar},
  title        = {A cryptographic security framework for hybrid Cloud-Internet of Things
                  network},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.309},
  doi          = {10.1002/SPY2.309},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/FarooqCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumharB23,
  author       = {Malaram Kumhar and
                  Jitendra Bhatia},
  title        = {Software-defined networks-enabled fog computing for IoT-based healthcare:
                  Security, challenges and opportunities},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.291},
  doi          = {10.1002/SPY2.291},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumharB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AbualiNA23,
  author       = {Khadija M. Abuali and
                  Liyth Nissirat and
                  Aida Al{-}Samawi},
  title        = {Advancing Network Security with {AI:} SVM-Based Deep Learning for
                  Intrusion Detection},
  journal      = {Sensors},
  volume       = {23},
  number       = {21},
  pages        = {8959},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23218959},
  doi          = {10.3390/S23218959},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AbualiNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AllakanySMAIE23,
  author       = {Alaa M. Allakany and
                  Abeer Saber and
                  Samih Mohemmed Mostafa and
                  Maazen Alsabaan and
                  Mohamed I. Ibrahem and
                  Haitham Elwahsh},
  title        = {Enhancing Security in ZigBee Wireless Sensor Networks: {A} New Approach
                  and Mutual Authentication Scheme for {D2D} Communication},
  journal      = {Sensors},
  volume       = {23},
  number       = {12},
  pages        = {5703},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23125703},
  doi          = {10.3390/S23125703},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AllakanySMAIE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlmarazRiveraCB23,
  author       = {Josue Genaro Almaraz{-}Rivera and
                  Jose Antonio Cantoral{-}Ceballos and
                  Juan Felipe Botero},
  title        = {Enhancing IoT Network Security: Unveiling the Power of Self-Supervised
                  Learning against DDoS Attacks},
  journal      = {Sensors},
  volume       = {23},
  number       = {21},
  pages        = {8701},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23218701},
  doi          = {10.3390/S23218701},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AlmarazRiveraCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/BakarK23,
  author       = {Rana Abu Bakar and
                  Boonserm Kijsirikul},
  title        = {Enhancing Network Visibility and Security with Advanced Port Scanning
                  Techniques},
  journal      = {Sensors},
  volume       = {23},
  number       = {17},
  pages        = {7541},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23177541},
  doi          = {10.3390/S23177541},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/BakarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/CulticeCYT23,
  author       = {Tyler Cultice and
                  Joseph Clark and
                  Wu Yang and
                  Himanshu Thapliyal},
  title        = {A Novel Hierarchical Security Solution for Controller-Area-Network-Based
                  3D Printing in a Post-Quantum World},
  journal      = {Sensors},
  volume       = {23},
  number       = {24},
  pages        = {9886},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23249886},
  doi          = {10.3390/S23249886},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/CulticeCYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/DuDT23,
  author       = {Xiuli Du and
                  Xiaohui Ding and
                  Fan Tao},
  title        = {Network Security Situation Prediction Based on Optimized Clock-Cycle
                  Recurrent Neural Network for Sensor-Enabled Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {13},
  pages        = {6087},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23136087},
  doi          = {10.3390/S23136087},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/DuDT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FrimpongOKB23,
  author       = {Emmanuel Obeng Frimpong and
                  BongHwan Oh and
                  Taehoon Kim and
                  Inkyu Bang},
  title        = {Physical-Layer Security with Irregular Reconfigurable Intelligent
                  Surfaces for 6G Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {4},
  pages        = {1881},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23041881},
  doi          = {10.3390/S23041881},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FrimpongOKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HammadJUNTKS23,
  author       = {Muhammad Hammad and
                  Rashad Maqbool Jillani and
                  Sami Ullah and
                  Abdallah Namoun and
                  Ali Tufail and
                  Ki{-}Hyung Kim and
                  Habib Shah},
  title        = {Security Framework for Network-Based Manufacturing Systems with Personalized
                  Customization: An Industry 4.0 Approach},
  journal      = {Sensors},
  volume       = {23},
  number       = {17},
  pages        = {7555},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23177555},
  doi          = {10.3390/S23177555},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HammadJUNTKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KrishnasamyAAA23,
  author       = {Sundaramoorthy Krishnasamy and
                  Mutlaq B. Alotaibi and
                  Lolwah I. Alehaideb and
                  Qaisar Abbas},
  title        = {Development and Validation of a Cyber-Physical System Leveraging {EFDPN}
                  for Enhanced WSN-IoT Network Security},
  journal      = {Sensors},
  volume       = {23},
  number       = {22},
  pages        = {9294},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23229294},
  doi          = {10.3390/S23229294},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KrishnasamyAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LinQJJLW23,
  author       = {Ruiquan Lin and
                  Hangding Qiu and
                  Weibin Jiang and
                  Zhenglong Jiang and
                  Zhili Li and
                  Jun Wang},
  title        = {Deep Reinforcement Learning for Physical Layer Security Enhancement
                  in Energy Harvesting Based Cognitive Radio Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {2},
  pages        = {807},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23020807},
  doi          = {10.3390/S23020807},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LinQJJLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiuRJZ23,
  author       = {Zhiguo Liu and
                  Junlin Rong and
                  Yingru Jiang and
                  Luxi Zhang},
  title        = {Satellite Network Security Routing Technology Based on Deep Learning
                  and Trust Management},
  journal      = {Sensors},
  volume       = {23},
  number       = {20},
  pages        = {8474},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23208474},
  doi          = {10.3390/S23208474},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LiuRJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NguyenVTLLNL23,
  author       = {Tan N. Nguyen and
                  Minh Bui Vu and
                  Dinh Hieu Tran and
                  Thanh{-}Lanh Le and
                  Anh{-}Tu Le and
                  Quang{-}Sang Nguyen and
                  Byung Moo Lee},
  title        = {Security-Reliability Analysis of {AF} Full-Duplex Relay Networks Using
                  Self-Energy Recycling and Deep Neural Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {17},
  pages        = {7618},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23177618},
  doi          = {10.3390/S23177618},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/NguyenVTLLNL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RamachandranNPA23,
  author       = {Divya Ramachandran and
                  Syed Muhammad Naqi and
                  Ganeshkumar Perumal and
                  Qaisar Abbas},
  title        = {{DLTN-LOSP:} {A} Novel Deep-Linear-Transition-Network-Based Resource
                  Allocation Model with the Logic Overhead Security Protocol for Cloud
                  Systems},
  journal      = {Sensors},
  volume       = {23},
  number       = {20},
  pages        = {8448},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23208448},
  doi          = {10.3390/S23208448},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/RamachandranNPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShinY23a,
  author       = {Soohyun Shin and
                  Hyosik Yang},
  title        = {Performance Analysis of Routable {GOOSE} Security Algorithm for Substation
                  Communication through Public Internet Network},
  journal      = {Sensors},
  volume       = {23},
  number       = {12},
  pages        = {5396},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23125396},
  doi          = {10.3390/S23125396},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ShinY23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SirimorokPAK23,
  author       = {Nurdiansyah Sirimorok and
                  Rio Mukhtarom Paweroi and
                  Andi Arniaty Arsyad and
                  Mario K{\"{o}}ppen},
  title        = {Smart Farm Security by Combining IoT Sensor Network and Virtualized
                  Mycelium Network},
  journal      = {Sensors},
  volume       = {23},
  number       = {21},
  pages        = {8689},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23218689},
  doi          = {10.3390/S23218689},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SirimorokPAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WanC23,
  author       = {Ying Wan and
                  Jinde Cao},
  title        = {A Brief Survey of Recent Advances and Methodologies for the Security
                  Control of Complex Cyber-Physical Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {8},
  pages        = {4013},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23084013},
  doi          = {10.3390/S23084013},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WanC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangFLZ23,
  author       = {Junwei Zhang and
                  Huamin Feng and
                  Biao Liu and
                  Dongmei Zhao},
  title        = {Survey of Technology in Network Security Situation Awareness},
  journal      = {Sensors},
  volume       = {23},
  number       = {5},
  pages        = {2608},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23052608},
  doi          = {10.3390/S23052608},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangFLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/KumarKM23,
  author       = {Nitesh Kumar and
                  Gaurav S. Kasbekar and
                  D. Manjunath},
  title        = {Application of Data Collected by Endpoint Detection and Response Systems
                  for Implementation of a Network Security System based on Zero Trust
                  Principles and the EigenTrust Algorithm},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {50},
  number       = {4},
  pages        = {5--7},
  year         = {2023},
  url          = {https://doi.org/10.1145/3595244.3595247},
  doi          = {10.1145/3595244.3595247},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/KumarKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/HuaM23,
  author       = {Yingbo Hua and
                  Ahmed Maksud},
  title        = {Continuous Encryption Functions for Security Over Networks},
  journal      = {Signal Process.},
  volume       = {203},
  pages        = {108807},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sigpro.2022.108807},
  doi          = {10.1016/J.SIGPRO.2022.108807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/HuaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/JiangYJHY23,
  author       = {Wenyu Jiang and
                  Jie Yang and
                  Xinsheng Ji and
                  Kaizhi Huang and
                  Jinmei Yang},
  title        = {Robust Security Transmission Scheme for SWIPT-Enable Heterogeneous
                  Networks With {RIS}},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {5417--5428},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3304314},
  doi          = {10.1109/JSYST.2023.3304314},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/JiangYJHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/KhoshafaNA23,
  author       = {Majid H. Khoshafa and
                  Telex M. N. Nkouatchah and
                  Mohamed Hossam Ahmed},
  title        = {RIS-Aided Physical Layer Security Improvement in Underlay Cognitive
                  Radio Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {6437--6448},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3296012},
  doi          = {10.1109/JSYST.2023.3296012},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/KhoshafaNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiYMCE23,
  author       = {Meiling Li and
                  Hu Yuan and
                  Carsten Maple and
                  Wenjie Cheng and
                  Gregory Epiphaniou},
  title        = {Physical Layer Security Analysis of Cognitive {NOMA} Internet of Things
                  Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {1},
  pages        = {1045--1055},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2022.3190297},
  doi          = {10.1109/JSYST.2022.3190297},
  timestamp    = {Sat, 30 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/LiYMCE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/NguyenHCPVC23,
  author       = {Tan Nhat Nguyen and
                  Tran Dinh Hieu and
                  Trinh Van Chien and
                  Van{-}Duc Phan and
                  Miroslav Vozn{\'{a}}k and
                  Symeon Chatzinotas},
  title        = {Security and Reliability Analysis of Satellite-Terrestrial Multirelay
                  Networks With Imperfect {CSI}},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {2},
  pages        = {2824--2835},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2022.3201128},
  doi          = {10.1109/JSYST.2022.3201128},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/NguyenHCPVC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/QiGX23,
  author       = {Yiwen Qi and
                  Honglin Geng and
                  Ning Xing},
  title        = {Adaptive Learning Security Control for Networked Switched Systems
                  Subject to Resource Constraints and Attacks},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {6069--6080},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3268710},
  doi          = {10.1109/JSYST.2023.3268710},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/QiGX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhengLZPF23,
  author       = {Hangcheng Zheng and
                  Min Luo and
                  Yunru Zhang and
                  Cong Peng and
                  Qi Feng},
  title        = {A Security-Enhanced Pairing-Free Certificateless Aggregate Signature
                  for Vehicular Ad-Hoc Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {3},
  pages        = {3822--3833},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2022.3220869},
  doi          = {10.1109/JSYST.2022.3220869},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhengLZPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/Barati23,
  author       = {Ramin Barati},
  title        = {Security Threats and Dealing with Social Networks},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-022-01434-0},
  doi          = {10.1007/S42979-022-01434-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/Barati23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/BhardwajKKC23,
  author       = {Manish Bhardwaj and
                  Upma Kumari and
                  Sumit Kumar and
                  Sanju Choudhary},
  title        = {An Efficient User Authentication and Key Agreement Scheme Wireless
                  Sensor Network and {IOT} Using Various Security Approaches},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {5},
  pages        = {574},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-01964-1},
  doi          = {10.1007/S42979-023-01964-1},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/BhardwajKKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/BharanidharanS23,
  title        = {Retraction Note: Group hash function-based enhancing network security
                  for network service providence},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {3},
  pages        = {1835},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-022-07762-w},
  doi          = {10.1007/S00500-022-07762-W},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/BharanidharanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/SugiR23,
  title        = {Retraction Note: {A} novel distributed training on fog node in IoT
                  backbone networks for security},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {3},
  pages        = {1841},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-022-07781-7},
  doi          = {10.1007/S00500-022-07781-7},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/SugiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/GuoG23,
  author       = {Jian Guo and
                  Hua Guo},
  title        = {Real-Time Risk Detection Method and Protection Strategy for Intelligent
                  Ship Network Security Based on Cloud Computing},
  journal      = {Symmetry},
  volume       = {15},
  number       = {5},
  pages        = {988},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15050988},
  doi          = {10.3390/SYM15050988},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/GuoG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ShahMWAMAS23,
  author       = {Sabir Shah and
                  Asim Munir and
                  Abdul Waheed and
                  Amerah A. Alabrah and
                  Muaadh Mukred and
                  Farhan Amin and
                  Abdu Salam},
  title        = {Enhancing Security and Efficiency in Underwater Wireless Sensor Networks:
                  {A} Lightweight Key Management Framework},
  journal      = {Symmetry},
  volume       = {15},
  number       = {8},
  pages        = {1484},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15081484},
  doi          = {10.3390/SYM15081484},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/ShahMWAMAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/systems/PerumalSANQ23,
  author       = {Ganeshkumar Perumal and
                  Gopalakrishnan Subburayalu and
                  Qaisar Abbas and
                  Syed Muhammad Naqi and
                  Imran Qureshi},
  title        = {VBQ-Net: {A} Novel Vectorization-Based Boost Quantized Network Model
                  for Maximizing the Security Level of IoT System to Prevent Intrusions},
  journal      = {Syst.},
  volume       = {11},
  number       = {8},
  pages        = {436},
  year         = {2023},
  url          = {https://doi.org/10.3390/systems11080436},
  doi          = {10.3390/SYSTEMS11080436},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/systems/PerumalSANQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/BankeySSM23,
  author       = {Vinay Bankey and
                  Shubha Sharma and
                  R. Swaminathan and
                  A. S. Madhukumar},
  title        = {Physical Layer Security of HAPS-Based Space-Air-Ground-Integrated
                  Network With Hybrid {FSO/RF} Communication},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {59},
  number       = {4},
  pages        = {4680--4688},
  year         = {2023},
  url          = {https://doi.org/10.1109/TAES.2022.3233339},
  doi          = {10.1109/TAES.2022.3233339},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/BankeySSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/NguyenCTPVCDP23,
  author       = {Tan Nhat Nguyen and
                  Trinh Van Chien and
                  Dinh Hieu Tran and
                  Van{-}Duc Phan and
                  Miroslav Vozn{\'{a}}k and
                  Symeon Chatzinotas and
                  Zhiguo Ding and
                  H. Vincent Poor},
  title        = {Security-Reliability Tradeoffs for Satellite-Terrestrial Relay Networks
                  With a Friendly Jammer and Imperfect {CSI}},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {59},
  number       = {5},
  pages        = {7004--7019},
  year         = {2023},
  url          = {https://doi.org/10.1109/TAES.2023.3282934},
  doi          = {10.1109/TAES.2023.3282934},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/NguyenCTPVCDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/AlrahisPHSS23,
  author       = {Lilas Alrahis and
                  Satwik Patnaik and
                  Muhammad Abdullah Hanif and
                  Muhammad Shafique and
                  Ozgur Sinanoglu},
  title        = {{\textdollar}{\textbackslash}tt\{PoisonedGNN\}{\textdollar}: Backdoor
                  Attack on Graph Neural Networks-Based Hardware Security Systems},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {10},
  pages        = {2822--2834},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2023.3271126},
  doi          = {10.1109/TC.2023.3271126},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/AlrahisPHSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/IslamAK23,
  author       = {Md. Shohidul Islam and
                  Ihsen Alouani and
                  Khaled N. Khasawneh},
  title        = {SecureVolt: Enhancing Deep Neural Networks Security via Undervolting},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {42},
  number       = {12},
  pages        = {4922--4933},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCAD.2023.3296379},
  doi          = {10.1109/TCAD.2023.3296379},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/IslamAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tccn/LiJWHCDHM23,
  author       = {Xingwang Li and
                  Junjie Jiang and
                  Hao Wang and
                  Congzheng Han and
                  Gaojie Chen and
                  Jianhe Du and
                  Chunqiang Hu and
                  Shahid Mumtaz},
  title        = {Physical Layer Security for Wireless-Powered Ambient Backscatter Cooperative
                  Communication Networks},
  journal      = {{IEEE} Trans. Cogn. Commun. Netw.},
  volume       = {9},
  number       = {4},
  pages        = {927--939},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCCN.2023.3270425},
  doi          = {10.1109/TCCN.2023.3270425},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tccn/LiJWHCDHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/LiuGZXT23,
  author       = {Jinliang Liu and
                  Enyu Gong and
                  Lijuan Zha and
                  Xiangpeng Xie and
                  Engang Tian},
  title        = {Outlier-Resistant Recursive Security Filtering for Multirate Networked
                  Systems Under Fading Measurements and Round-Robin Protocol},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {1962--1974},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCNS.2023.3256299},
  doi          = {10.1109/TCNS.2023.3256299},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/LiuGZXT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcst/ShuklaACD23,
  author       = {Pratishtha Shukla and
                  Lu An and
                  Aranya Chakrabortty and
                  Alexandra Duel{-}Hallen},
  title        = {A Robust Stackelberg Game for Cyber-Security Investment in Networked
                  Control Systems},
  journal      = {{IEEE} Trans. Control. Syst. Technol.},
  volume       = {31},
  number       = {2},
  pages        = {856--871},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCST.2022.3207671},
  doi          = {10.1109/TCST.2022.3207671},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcst/ShuklaACD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/Alanazi23,
  author       = {Faisal S. Alanazi},
  title        = {Physical layer security of cognitive radio networks with adaptive
                  transmit power and multi-antenna energy harvesting},
  journal      = {Telecommun. Syst.},
  volume       = {83},
  number       = {1},
  pages        = {91--99},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11235-023-01011-7},
  doi          = {10.1007/S11235-023-01011-7},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/Alanazi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/BarikMSK23,
  author       = {Kousik Barik and
                  Sanjay Misra and
                  Luis Fern{\'{a}}ndez Sanz and
                  Murat Koyuncu},
  title        = {{RONSI:} a framework for calculating return on network security investment},
  journal      = {Telecommun. Syst.},
  volume       = {84},
  number       = {4},
  pages        = {533--548},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11235-023-01039-9},
  doi          = {10.1007/S11235-023-01039-9},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/BarikMSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/LiuGZTX23,
  author       = {Jinliang Liu and
                  Enyu Gong and
                  Lijuan Zha and
                  Engang Tian and
                  Xiangpeng Xie},
  title        = {Observer-Based Security Fuzzy Control for Nonlinear Networked Systems
                  Under Weighted Try-Once-Discard Protocol},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {31},
  number       = {11},
  pages        = {3853--3865},
  year         = {2023},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3269786},
  doi          = {10.1109/TFUZZ.2023.3269786},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/LiuGZTX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/LuoWHDY23,
  author       = {Yuqiang Luo and
                  Zidong Wang and
                  Jun Hu and
                  Hongli Dong and
                  Dong Yue},
  title        = {Security-Guaranteed Fuzzy Networked State Estimation for 2-D Systems
                  With Multiple Sensor Arrays Subject to Deception Attacks},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {31},
  number       = {10},
  pages        = {3624--3638},
  year         = {2023},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3262609},
  doi          = {10.1109/TFUZZ.2023.3262609},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tfs/LuoWHDY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/Xing0C023,
  author       = {Jing{-}Wen Xing and
                  Chen Peng and
                  Zhiru Cao and
                  Wen{-}Bo Xie},
  title        = {Security-Based Control for Networked Interval Type-2 Fuzzy Systems
                  With Multiple Cyber-Attacks: An Improved Dynamic Event-Triggered Scheme},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {31},
  number       = {8},
  pages        = {2747--2760},
  year         = {2023},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3235441},
  doi          = {10.1109/TFUZZ.2023.3235441},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/Xing0C023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/NgoPMX23,
  author       = {Quynh Tu Ngo and
                  Khoa Tran Phan and
                  Abdun Mahmood and
                  Wei Xiang},
  title        = {Physical Layer Security in IRS-Assisted Cache-Enabled Satellite Communication
                  Networks},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {7},
  number       = {4},
  pages        = {1920--1931},
  year         = {2023},
  url          = {https://doi.org/10.1109/TGCN.2023.3280118},
  doi          = {10.1109/TGCN.2023.3280118},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgcn/NgoPMX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuTWWFCT23,
  author       = {Lin Hu and
                  Shuai Tan and
                  Hong Wen and
                  Jinsong Wu and
                  Jiabing Fan and
                  Songlin Chen and
                  Jie Tang},
  title        = {Interference Alignment for Physical Layer Security in Multi-User Networks
                  With Passive Eavesdroppers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3692--3705},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3286711},
  doi          = {10.1109/TIFS.2023.3286711},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuTWWFCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MankaliAPKS23,
  author       = {Likhitha Mankali and
                  Lilas Alrahis and
                  Satwik Patnaik and
                  Johann Knechtel and
                  Ozgur Sinanoglu},
  title        = {Titan: Security Analysis of Large-Scale Hardware Obfuscation Using
                  Graph Neural Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {304--318},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3218429},
  doi          = {10.1109/TIFS.2022.3218429},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MankaliAPKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YinCLSW23,
  author       = {Zhisheng Yin and
                  Nan Cheng and
                  Tom H. Luan and
                  Yunchao Song and
                  Wei Wang},
  title        = {DT-Assisted Multi-Point Symbiotic Security in Space-Air-Ground Integrated
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5721--5734},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3313326},
  doi          = {10.1109/TIFS.2023.3313326},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YinCLSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/AhmedNAJM23,
  author       = {Junaid Ahmed and
                  Tu N. Nguyen and
                  Bakhtiar Ali and
                  Muhammad Awais Javed and
                  Jawad Mirza},
  title        = {On the Physical Layer Security of Federated Learning Based IoMT Networks},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {27},
  number       = {2},
  pages        = {691--697},
  year         = {2023},
  url          = {https://doi.org/10.1109/JBHI.2022.3173947},
  doi          = {10.1109/JBHI.2022.3173947},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/AhmedNAJM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/DiaoZLLHG23,
  author       = {Chunyan Diao and
                  Dafang Zhang and
                  Wei Liang and
                  Kuan{-}Ching Li and
                  Yujie Hong and
                  Jean{-}Luc Gaudiot},
  title        = {A Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network
                  Security Model for Vehicles Prediction},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {904--914},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3140229},
  doi          = {10.1109/TITS.2022.3140229},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/DiaoZLLHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/GyamfiAKTJ23,
  author       = {Eric Gyamfi and
                  James Adu Ansere and
                  Mohsin Kamal and
                  Muhammad Tariq and
                  Anca Jurcut},
  title        = {An Adaptive Network Security System for IoT-Enabled Maritime Transportation},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2538--2547},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3159450},
  doi          = {10.1109/TITS.2022.3159450},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/GyamfiAKTJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/HeWLDHWNW23,
  author       = {Xudong He and
                  Jian Wang and
                  Jiqiang Liu and
                  Weiping Ding and
                  Zhen Han and
                  Bin Wang and
                  Jamel Nebhen and
                  Wei Wang},
  title        = {{DNS} Rebinding Threat Modeling and Security Analysis for Local Area
                  Network of Maritime Transportation Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2643--2655},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2021.3135197},
  doi          = {10.1109/TITS.2021.3135197},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/HeWLDHWNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiZAHBZN23,
  author       = {Xingwang Li and
                  Yike Zheng and
                  Mohammad Dahman Alshehri and
                  Linpeng Hai and
                  Venki Balasubramanian and
                  Ming Zeng and
                  Gaofeng Nie},
  title        = {Cognitive AmBC-NOMA IoV-MTS Networks With {IQI:} Reliability and Security
                  Analysis},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2596--2607},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2021.3113995},
  doi          = {10.1109/TITS.2021.3113995},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/LiZAHBZN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangWBXH23,
  author       = {Zhaoyang Wang and
                  Song Wang and
                  Md. Zakirul Alam Bhuiyan and
                  Jiping Xu and
                  Yanzhu Hu},
  title        = {Cooperative Location-Sensing Network Based on Vehicular Communication
                  Security Against Attacks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {942--952},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3160453},
  doi          = {10.1109/TITS.2022.3160453},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangWBXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangXCSW23,
  author       = {Zhongru Wang and
                  Xinzhou Xie and
                  Lei Chen and
                  Shouyou Song and
                  Zhongjie Wang},
  title        = {Intrusion Detection and Network Information Security Based on Deep
                  Learning Algorithm in Urban Rail Transit Management System},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2135--2143},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2021.3127681},
  doi          = {10.1109/TITS.2021.3127681},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangXCSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhangGWTC23,
  author       = {Jiangjiang Zhang and
                  Bei Gong and
                  Muhammad Waqas and
                  Shanshan Tu and
                  Sheng Chen},
  title        = {Many-Objective Optimization Based Intrusion Detection for in-Vehicle
                  Network Security},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {12},
  pages        = {15051--15065},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3296002},
  doi          = {10.1109/TITS.2023.3296002},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/ZhangGWTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhuYAKHX23,
  author       = {Fei Zhu and
                  Xun Yi and
                  Alsharif Abuadbba and
                  Ibrahim Khalil and
                  Xinyi Huang and
                  Feihong Xu},
  title        = {A Security-Enhanced Certificateless Conditional Privacy-Preserving
                  Authentication Scheme for Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {10},
  pages        = {10456--10466},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3275077},
  doi          = {10.1109/TITS.2023.3275077},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/ZhuYAKHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KaurKAK23,
  author       = {Jasleen Kaur and
                  Rajeev Kumar and
                  Alka Agrawal and
                  Raees Ahmad Khan},
  title        = {A neutrosophic AHP-based computational technique for security management
                  in a fog computing network},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {1},
  pages        = {295--320},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-04674-2},
  doi          = {10.1007/S11227-022-04674-2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/KaurKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KumarA23,
  author       = {Rohit Kumar and
                  Neha Agrawal},
  title        = {A survey on software-defined vehicular networks (SDVNs): a security
                  perspective},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {8},
  pages        = {8368--8400},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-05008-y},
  doi          = {10.1007/S11227-022-05008-Y},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KumarA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WangF23,
  title        = {Retraction Note: Application of combined kernel function artificial
                  intelligence algorithm in mobile communication network security authentication
                  mechanism},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {5},
  pages        = {5843},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-04862-0},
  doi          = {10.1007/S11227-022-04862-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/WangF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WuH23,
  author       = {Bin Wu and
                  Sean He},
  title        = {Self-learning and explainable deep learning network toward the security
                  of artificial intelligence of things},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {4},
  pages        = {4436--4467},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-04818-4},
  doi          = {10.1007/S11227-022-04818-4},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/WuH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/NguyenR23,
  author       = {Thanh Thi Nguyen and
                  Vijay Janapa Reddi},
  title        = {Deep Reinforcement Learning for Cyber Security},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {34},
  number       = {8},
  pages        = {3779--3795},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNNLS.2021.3121870},
  doi          = {10.1109/TNNLS.2021.3121870},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/NguyenR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiuGSLY23,
  author       = {Yating Liu and
                  Yuantao Gu and
                  Xinyue Shen and
                  Qingmin Liao and
                  Quan Yu},
  title        = {{MSCA:} An Unsupervised Anomaly Detection System for Network Security
                  in Backbone Network},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {223--238},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3206353},
  doi          = {10.1109/TNSE.2022.3206353},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/LiuGSLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/TaoLZLLFO23,
  author       = {Xiaoling Tao and
                  Zi{-}yi Liu and
                  Feng Zhao and
                  Rushi Lan and
                  Runrong Liu and
                  Lianyou Fu and
                  Yifu Ouyang},
  title        = {An {SSA-LC-DAE} Method for Extracting Network Security Elements},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {1175--1185},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2023.3233986},
  doi          = {10.1109/TNSE.2023.3233986},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/TaoLZLLFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/WangWL23,
  author       = {Liqing Wang and
                  Zheng{-}Guang Wu and
                  James Lam},
  title        = {Necessary and Sufficient Conditions for Security of Hidden Markov
                  Boolean Control Networks Under Shifting Attacks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {321--330},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3208335},
  doi          = {10.1109/TNSE.2022.3208335},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/WangWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhouXTA23,
  author       = {Jianping Zhou and
                  Dong Xu and
                  Weipeng Tai and
                  Choon Ki Ahn},
  title        = {Switched Event-Triggered H\({}_{\mbox{{\(\infty\)}}}\) Security Control
                  for Networked Systems Vulnerable to Aperiodic DoS Attacks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {2109--2123},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2023.3243095},
  doi          = {10.1109/TNSE.2023.3243095},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhouXTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/NowrooziMSMC23,
  author       = {Ehsan Nowroozi and
                  Mohammadreza Mohammadi and
                  Erkay Savas and
                  Yassine Mekdad and
                  Mauro Conti},
  title        = {Employing Deep Ensemble Learning for Improving the Security of Computer
                  Networks Against Adversarial Attacks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {2096--2105},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3267831},
  doi          = {10.1109/TNSM.2023.3267831},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/NowrooziMSMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ParkPW23,
  author       = {Chang{-}Seop Park and
                  Wang{-}Seok Park and
                  Samuel Woo},
  title        = {Security Bootstrapping for Securing Data Plane and Control Plane in
                  Named Data Networking},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {3765--3781},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2022.3232359},
  doi          = {10.1109/TNSM.2022.3232359},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ParkPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/VergutzSKN23,
  author       = {Andressa Verg{\"{u}}tz and
                  Bruna V. Dos Santos and
                  Burak Kantarci and
                  Michele Nogueira},
  title        = {Data Instrumentation From IoT Network Traffic as Support for Security
                  Management},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {1392--1404},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2022.3233673},
  doi          = {10.1109/TNSM.2022.3233673},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/VergutzSKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YuYL23,
  author       = {Kan Yu and
                  Jiguo Yu and
                  Chuanwen Luo},
  title        = {The Impact of Mobility on Physical Layer Security of 5G IoT Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {31},
  number       = {3},
  pages        = {1042--1055},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNET.2022.3208212},
  doi          = {10.1109/TNET.2022.3208212},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YuYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HossainSBKA23,
  author       = {Tamanna Hossain and
                  Sarjana Shabab and
                  A. S. M. Badrudduza and
                  Milton Kumar Kundu and
                  Imran Shafique Ansari},
  title        = {On the Physical Layer Security Performance Over RIS-Aided Dual-Hop
                  {RF-UOWC} Mixed Network},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {2},
  pages        = {2246--2257},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3214112},
  doi          = {10.1109/TVT.2022.3214112},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HossainSBKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/JiYQY23,
  author       = {Yahui Ji and
                  Kan Yu and
                  Jing Qiu and
                  Jiguo Yu},
  title        = {Massive {MIMO} and Secrecy Guard Zone Based Improving Physical Layer
                  Security in UAV-Enabled uRLLC Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {4},
  pages        = {4553--4567},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3221866},
  doi          = {10.1109/TVT.2022.3221866},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/JiYQY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WuDHZZL23,
  author       = {Wufei Wu and
                  Junhao Dai and
                  Huijuan Huang and
                  Qinmin Zhao and
                  Gang Zeng and
                  Renfa Li},
  title        = {A Digital Watermark Method for In-Vehicle Network Security Enhancement},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {7},
  pages        = {8398--8408},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3247180},
  doi          = {10.1109/TVT.2023.3247180},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WuDHZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhangWLHLC23,
  author       = {Zheng Zhang and
                  Zhaolin Wang and
                  Yuanwei Liu and
                  Bingtao He and
                  Lu Lv and
                  Jian Chen},
  title        = {Security Enhancement for Coupled Phase-Shift {STAR-RIS} Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {6},
  pages        = {8210--8215},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3243545},
  doi          = {10.1109/TVT.2023.3243545},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhangWLHLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/LuoLCG23,
  author       = {Xuewen Luo and
                  Yiliang Liu and
                  Hsiao{-}Hwa Chen and
                  Qing Guo},
  title        = {{PHY} Security Design for Mobile Crowd Computing in {ICV} Networks
                  Based on Multi-Agent Reinforcement Learning},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {10},
  pages        = {6810--6825},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2023.3245637},
  doi          = {10.1109/TWC.2023.3245637},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/LuoLCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/OrlandoBPBB23,
  author       = {Danilo Orlando and
                  Stefania Bartoletti and
                  Ivan Palam{\`{a}} and
                  Giuseppe Bianchi and
                  Nicola Blefari{-}Melazzi},
  title        = {Innovative Attack Detection Solutions for Wireless Networks With Application
                  to Location Security},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {1},
  pages        = {205--219},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2022.3192225},
  doi          = {10.1109/TWC.2022.3192225},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/OrlandoBPBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangHYLL23,
  author       = {Yuhang Wang and
                  Ying He and
                  F. Richard Yu and
                  Qiuzhen Lin and
                  Victor C. M. Leung},
  title        = {Efficient Resource Allocation in Multi-UAV Assisted Vehicular Networks
                  With Security Constraint and Attention Mechanism},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {7},
  pages        = {4802--4813},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2022.3229013},
  doi          = {10.1109/TWC.2022.3229013},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangHYLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/RameshNMRA23,
  author       = {S. Ramesh and
                  S. Nirmalraj and
                  S. Murugan and
                  Manikandan Ramachandran and
                  Fadi Al{-}Turjman},
  title        = {Optimization of Energy and Security in Mobile Sensor Network Using
                  Classification Based Signal Processing in Heterogeneous Network},
  journal      = {J. Signal Process. Syst.},
  volume       = {95},
  number       = {2-3},
  pages        = {153--160},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11265-021-01690-y},
  doi          = {10.1007/S11265-021-01690-Y},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/RameshNMRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/ZhengYZ23,
  author       = {Li Zheng and
                  Gang Yu and
                  Yuntian Zheng},
  title        = {An Interactive Visualization System for Network Security Data},
  journal      = {J. Signal Process. Syst.},
  volume       = {95},
  number       = {2-3},
  pages        = {393--405},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11265-023-01836-0},
  doi          = {10.1007/S11265-023-01836-0},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/ZhengYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeLLSD23,
  author       = {Chao He and
                  Tom H. Luan and
                  Rongxing Lu and
                  Zhou Su and
                  Mianxiong Dong},
  title        = {Security and Privacy in Vehicular Digital Twin Networks: Challenges
                  and Solutions},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {30},
  number       = {4},
  pages        = {154--160},
  year         = {2023},
  url          = {https://doi.org/10.1109/MWC.002.2200015},
  doi          = {10.1109/MWC.002.2200015},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/HeLLSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/Rong23,
  author       = {Bo Rong},
  title        = {Security in Wireless Communication Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {30},
  number       = {1},
  pages        = {10--11},
  year         = {2023},
  url          = {https://doi.org/10.1109/MWC.2023.10077227},
  doi          = {10.1109/MWC.2023.10077227},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/Rong23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/BalamuruganKSC23,
  author       = {Venkatachalam Balamurugan and
                  Ramamoorthy Karthikeyan and
                  B. Sundaravadivazhagan and
                  Robin Cyriac},
  title        = {Enhanced Elman spike neural network based fractional order discrete
                  Tchebyshev encryption fostered big data analytical method for enhancing
                  cloud data security},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {2},
  pages        = {523--537},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-022-03142-2},
  doi          = {10.1007/S11276-022-03142-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/BalamuruganKSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/DeviB23,
  author       = {Parmila Devi and
                  Manoranjan Rai Bharti},
  title        = {Physical layer security for IoT over Nakagami-m and mixed Rayleigh-Nakagami-m
                  fading channels},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {8},
  pages        = {3479--3491},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-023-03422-5},
  doi          = {10.1007/S11276-023-03422-5},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/DeviB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/KavaiyaP23,
  author       = {Sagar Kavaiya and
                  Dhaval K. Patel},
  title        = {Restricting passive attacks in 6G vehicular networks: a physical layer
                  security perspective},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {3},
  pages        = {1355--1365},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-022-03189-1},
  doi          = {10.1007/S11276-022-03189-1},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/KavaiyaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/MahamatJB23,
  author       = {Micha{\"{e}}l Mahamat and
                  Ghada Jaber and
                  Abdelmadjid Bouabdallah},
  title        = {Achieving efficient energy-aware security in IoT networks: a survey
                  of recent solutions and research challenges},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {2},
  pages        = {787--808},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-022-03170-y},
  doi          = {10.1007/S11276-022-03170-Y},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/MahamatJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/PatonicoBS23,
  author       = {Simone Patonico and
                  An Braeken and
                  Kris Steenhaut},
  title        = {Identity-based and anonymous key agreement protocol for fog computing
                  resistant in the Canetti-Krawczyk security model},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {3},
  pages        = {1017--1029},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-019-02084-6},
  doi          = {10.1007/S11276-019-02084-6},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/PatonicoBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/Zhao23,
  author       = {Xuemin Zhao},
  title        = {A network security algorithm using {SVC} and sliding window},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {1},
  pages        = {345--351},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-022-03064-z},
  doi          = {10.1007/S11276-022-03064-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/Zhao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GaikwadA23,
  author       = {V. D. Gaikwad and
                  S. Ananthakumaran},
  title        = {A Review: Security and Privacy for Health Care Application in Wireless
                  Body Area Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {130},
  number       = {1},
  pages        = {673--691},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10305-7},
  doi          = {10.1007/S11277-023-10305-7},
  timestamp    = {Thu, 04 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GaikwadA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/HemanandRJ23,
  author       = {Duraivelu Hemanand and
                  N. Sankar Ram and
                  D. S. Jayalakshmi},
  title        = {{FSSAM:} {A} Five Stage Security Analysis Model for Detecting and
                  Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive
                  Atom Search Algorithm},
  journal      = {Wirel. Pers. Commun.},
  volume       = {128},
  number       = {1},
  pages        = {487--506},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-022-09964-9},
  doi          = {10.1007/S11277-022-09964-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/HemanandRJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KumarSHV23,
  author       = {N. M. Saravana Kumar and
                  E. Suryaprabha and
                  K. Hariprasath and
                  V. Vijayakumar},
  title        = {Deep Learning Based Hybrid Security Model in Wireless Sensor Network},
  journal      = {Wirel. Pers. Commun.},
  volume       = {129},
  number       = {3},
  pages        = {1789--1805},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10208-7},
  doi          = {10.1007/S11277-023-10208-7},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KumarSHV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LeN23,
  author       = {Chi{-}Bao Le and
                  Sang Quang Nguyen},
  title        = {Evaluation of Physical Layer Security for UAV-Enabled Wireless Networks
                  over {\(\alpha\)} -{\(\kappa\)} -{\(\mu\)} Fading Channels},
  journal      = {Wirel. Pers. Commun.},
  volume       = {128},
  number       = {3},
  pages        = {1671--1687},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-022-10014-7},
  doi          = {10.1007/S11277-022-10014-7},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/LeN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/PriyaSAB23,
  title        = {Retraction Note: Security Aware Trusted Cluster Based Routing Protocol
                  for Wireless Body Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {128},
  number       = {2},
  pages        = {1501},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-022-10142-0},
  doi          = {10.1007/S11277-022-10142-0},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/PriyaSAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/TandonG23,
  author       = {Righa Tandon and
                  P. K. Gupta},
  title        = {A Hybrid Security Scheme for Inter-vehicle Communication in Content
                  Centric Vehicular Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {129},
  number       = {2},
  pages        = {1083--1096},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10175-z},
  doi          = {10.1007/S11277-023-10175-Z},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/TandonG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/6gnet/DjuitcheuMHKS23,
  author       = {Hubert Djuitcheu and
                  Sachinkumar Bavikatti Mallikarjun and
                  Mohammad Asif Habibi and
                  Nandish P. Kuruvatti and
                  Hans D. Schotten},
  title        = {Securing Private 5G Campus Networks: Abstract Survey on Current Status,
                  Security Threats, and Research Landscape},
  booktitle    = {2nd International Conference on 6G Networking, 6GNet 2023, Paris,
                  France, October 18-20, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/6GNet58894.2023.10317752},
  doi          = {10.1109/6GNET58894.2023.10317752},
  timestamp    = {Tue, 28 Nov 2023 14:39:09 +0100},
  biburl       = {https://dblp.org/rec/conf/6gnet/DjuitcheuMHKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/InukondaTATM23,
  author       = {Maruthi Seshidhar Inukonda and
                  Jatin Tarachandani and
                  Imtiaz Ahmed and
                  Bheemarjuna Reddy Tamma and
                  Sparsh Mittal},
  title        = {{ZETA:} {A} Zero-Trust Security based Forensic-Ready Solution for
                  Perimeter-less Enterprise Networks},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2023, Jaipur, India, December 17-20, 2023},
  pages        = {189--194},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ANTS59832.2023.10469629},
  doi          = {10.1109/ANTS59832.2023.10469629},
  timestamp    = {Mon, 08 Apr 2024 20:48:41 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/InukondaTATM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/SiddiquiKQAKABC23,
  author       = {Shams Tabrez Siddiqui and
                  Mohammad Shahid Kamal and
                  Khalid Ali Qidwai and
                  Md Imran Alam and
                  Haneef Khan and
                  Malik Zaib Alam and
                  Ishan Budhiraja and
                  Sandeep Chintham},
  title        = {Uncovering Network Vulnerabilities and Conducting Digital Forensics
                  Analysis for IoT Device Security in 6G},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2023, Jaipur, India, December 17-20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ANTS59832.2023.10469094},
  doi          = {10.1109/ANTS59832.2023.10469094},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/SiddiquiKQAKABC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Mancini023,
  author       = {Francesco Mancini and
                  Giuseppe Bianchi},
  title        = {ScasDK - {A} Development Kit for Security Assurance test in Multi-Network-Function
                  5G},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {48:1--48:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605044},
  doi          = {10.1145/3600160.3605044},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Mancini023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MessaiS23,
  author       = {Mohamed{-}Lamine Messai and
                  Hamida Seba},
  title        = {IoT Network Attack Detection: Leveraging Graph Learning for Enhanced
                  Security},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {84:1--84:7},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605053},
  doi          = {10.1145/3600160.3605053},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MessaiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BurtPK23,
  author       = {Timothy A. Burt and
                  Nikos I. Passas and
                  Ioannis A. Kakadiaris},
  editor       = {Brian Williams and
                  Yiling Chen and
                  Jennifer Neville},
  title        = {{AI-SNIPS:} {A} Platform for Network Intelligence-Based Pharmaceutical
                  Security},
  booktitle    = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2023, Thirty-Fifth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February
                  7-14, 2023},
  pages        = {16407--16409},
  publisher    = {{AAAI} Press},
  year         = {2023},
  url          = {https://doi.org/10.1609/aaai.v37i13.27061},
  doi          = {10.1609/AAAI.V37I13.27061},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BurtPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/LuL23,
  author       = {Xiaozhen Lu and
                  Zhibo Liu},
  title        = {Safety Guide-Based Deep Reinforcement Learning for Network Security
                  Applications},
  booktitle    = {Proceedings of the {ACM} Turing Award Celebration Conference - China
                  2023, {ACM} {TURC} 2023, Wuhan, China, July 28-30, 2023},
  pages        = {136--137},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603165.3607439},
  doi          = {10.1145/3603165.3607439},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acmturc/LuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GengMX23,
  author       = {Guining Geng and
                  Junfeng Miao and
                  Nan Xiao},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Round-Efficient Security Authentication Protocol for 5G Network},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {269--283},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_15},
  doi          = {10.1007/978-3-031-41181-6\_15},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GengMX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhip/ChenQL23,
  author       = {Qiang Chen and
                  Fang Qian and
                  Yukang Liu},
  editor       = {Lin Yun and
                  Jiang Han and
                  Yu Han},
  title        = {Dynamic Mining of Wireless Network Information Transmission Security
                  Vulnerabilities Based on Spatiotemporal Dimension},
  booktitle    = {Advanced Hybrid Information Processing - 7th {EAI} International Conference,
                  {ADHIP} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {548},
  pages        = {403--417},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50546-1\_27},
  doi          = {10.1007/978-3-031-50546-1\_27},
  timestamp    = {Mon, 29 Apr 2024 16:23:54 +0200},
  biburl       = {https://dblp.org/rec/conf/adhip/ChenQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhip/HuangL23,
  author       = {Zhiyu Huang and
                  Chenyang Li},
  editor       = {Lin Yun and
                  Jiang Han and
                  Yu Han},
  title        = {A Machine Learning Based Security Detection Method for Privacy Data
                  in Social Networks},
  booktitle    = {Advanced Hybrid Information Processing - 7th {EAI} International Conference,
                  {ADHIP} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {547},
  pages        = {350--365},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50543-0\_24},
  doi          = {10.1007/978-3-031-50543-0\_24},
  timestamp    = {Mon, 22 Apr 2024 17:37:39 +0200},
  biburl       = {https://dblp.org/rec/conf/adhip/HuangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhip/QianCL23,
  author       = {Fang Qian and
                  Qiang Chen and
                  Lincheng Li},
  editor       = {Lin Yun and
                  Jiang Han and
                  Yu Han},
  title        = {Design of Adaptive Detection Algorithm for Mobile Social Network Security
                  Vulnerability Based on Static Analysis},
  booktitle    = {Advanced Hybrid Information Processing - 7th {EAI} International Conference,
                  {ADHIP} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {548},
  pages        = {389--402},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50546-1\_26},
  doi          = {10.1007/978-3-031-50546-1\_26},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhip/QianCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/KholidyBBJ23,
  author       = {Hisham A. Kholidy and
                  Abdelkader Berrouachedi and
                  Elhadj Benkhelifa and
                  Rakia Jaziri},
  title        = {Enhancing Security in 5G Networks: {A} Hybrid Machine Learning Approach
                  for Attack Classification},
  booktitle    = {20th {ACS/IEEE} International Conference on Computer Systems and Applications,
                  {AICCSA} 2023, Giza, Egypt, December 4-7, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AICCSA59173.2023.10479294},
  doi          = {10.1109/AICCSA59173.2023.10479294},
  timestamp    = {Wed, 10 Apr 2024 20:58:44 +0200},
  biburl       = {https://dblp.org/rec/conf/aiccsa/KholidyBBJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aics/WijenayakeHF23,
  author       = {D. S. Wijenayake and
                  Shagufta Henna and
                  William Farrelly},
  title        = {A Graph Neural Network-based Security Posture-aware Cloud Service
                  Provider Selection for Multi-cloud},
  booktitle    = {31st Irish Conference on Artificial Intelligence and Cognitive Science,
                  {AICS} 2023, Letterkenny, Ireland, December 7-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AICS60730.2023.10470882},
  doi          = {10.1109/AICS60730.2023.10470882},
  timestamp    = {Mon, 08 Apr 2024 20:48:41 +0200},
  biburl       = {https://dblp.org/rec/conf/aics/WijenayakeHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aimscm/LiYYZA23,
  author       = {Siwei Li and
                  Long Yu and
                  Liang Yue and
                  Xirun Zhang and
                  Dengxin Ai},
  title        = {Homomorphic Encryption-Based Privacy and Security Protection Method
                  for Multi-Objective Electric Heat Network Collaborative Data},
  booktitle    = {Proceedings of the 2023 International Conference on {AI} and Metaverse
                  in Supply Chain Management, {AIMSCM} 2023, Bhubaneswar, India, November
                  18-19, 2023},
  pages        = {13},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3648050.3648052},
  doi          = {10.1145/3648050.3648052},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aimscm/LiYYZA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisns/LiTW23,
  author       = {Wei Li and
                  Kuang Tian and
                  Wei Wang},
  title        = {Research and Practice on Network Security Vulnerability Management
                  Methods in the Transportation Industry},
  booktitle    = {Proceedings of the 2023 International Conference on Artificial Intelligence,
                  Systems and Network Security, {AISNS} 2023, Mianyang, China, December
                  22-24, 2023},
  pages        = {318--322},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3661638.3661699},
  doi          = {10.1145/3661638.3661699},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aisns/LiTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisns/WangZDLZFC23,
  author       = {Xiaohui Wang and
                  Li Zhao and
                  Jinbao Du and
                  Jingang Liu and
                  Wei Zhang and
                  Baozhan Feng and
                  Hua Chen},
  title        = {Dynamic Evaluation of Information Security in Self-organizing Network
                  Based on Knowledge Map Driving},
  booktitle    = {Proceedings of the 2023 International Conference on Artificial Intelligence,
                  Systems and Network Security, {AISNS} 2023, Mianyang, China, December
                  22-24, 2023},
  pages        = {409--414},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3661638.3661715},
  doi          = {10.1145/3661638.3661715},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aisns/WangZDLZFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/LiCMWHC23,
  author       = {Zhihao Li and
                  Qi Chen and
                  Weichuan Mo and
                  Xiaolin Wang and
                  Li Hu and
                  Yongzhi Cao},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Converging Blockchain and Deep Learning in {UAV} Network Defense Strategy:
                  Ensuring Data Security During Flight},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_12},
  doi          = {10.1007/978-981-99-9785-5\_12},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/aisp/LiCMWHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LamprechtHE23,
  author       = {Robert Lamprecht and
                  Franziska Haid and
                  Andreas Eckhardt},
  editor       = {Paul A. Pavlou and
                  Vishal Midha and
                  Animesh Animesh and
                  Traci A. Carte and
                  Alexandre R. Graeml and
                  Alanah Mitchell},
  title        = {Security Networks as an Effective Means to Reduce Spear Phishing Susceptibility},
  booktitle    = {29th Americas Conference on Information Systems, {AMCIS} 2023, Panama
                  City, Panama, August 10-12, 2023},
  publisher    = {Association for Information Systems},
  year         = {2023},
  url          = {https://aisel.aisnet.org/amcis2023/sig\_sec/sig\_sec/21},
  timestamp    = {Wed, 19 Jul 2023 08:55:10 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/LamprechtHE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/ElhalouiTEB23,
  author       = {Loubna Elhaloui and
                  Mohamed Tabaa and
                  Sanaa Elfilali and
                  Elhabib Benlahmer},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Dynamic security of IoT network traffic using {SDN}},
  booktitle    = {The 14th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2023) / The 6th International Conference on Emerging
                  Data and Industry 4.0 {(EDI40} 2023) / Affiliated Workshops, March
                  15-17, 2023, Leuven, Belgium},
  series       = {Procedia Computer Science},
  volume       = {220},
  pages        = {356--363},
  publisher    = {Elsevier},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.procs.2023.03.046},
  doi          = {10.1016/J.PROCS.2023.03.046},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/ElhalouiTEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/TsaiLW23,
  author       = {Pang{-}Wei Tsai and
                  Chao{-}Wei Lee and
                  Ting{-}Wen Wang},
  title        = {Design and Development of a Trust Mechanism to Enhance Security Protection
                  on SDN-based IoT Network},
  booktitle    = {24st Asia-Pacific Network Operations and Management Symposium, {APNOMS}
                  2023, Sejong, Korea, Republic of, September 6-8, 2023},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://ieeexplore.ieee.org/document/10258177},
  timestamp    = {Mon, 02 Oct 2023 20:30:43 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/TsaiLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/MengOL023,
  author       = {Qiaoran Meng and
                  Nay Oo and
                  Hoon Wei Lim and
                  Biplab Sikdar},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {{POSTER:} Security Logs Graph Analytics for Industry Network System},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {1043--1045},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3592830},
  doi          = {10.1145/3579856.3592830},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/MengOL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asicon/ChenL23,
  author       = {Guang Chen and
                  Binglong Li},
  title        = {Design and Implementation of High-speed Reconfigurable Multi-core
                  Network Security Protocol Analyse Processor},
  booktitle    = {15th {IEEE} International Conference on ASIC, {ASICON} 2023, Nanjing,
                  China, October 24-27, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ASICON58565.2023.10396112},
  doi          = {10.1109/ASICON58565.2023.10396112},
  timestamp    = {Fri, 16 Feb 2024 14:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/asicon/ChenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/AlrahisKS23,
  author       = {Lilas Alrahis and
                  Johann Knechtel and
                  Ozgur Sinanoglu},
  editor       = {Atsushi Takahashi},
  title        = {Graph Neural Networks: {A} Powerful and Versatile Tool for Advancing
                  Design, Reliability, and Security of ICs},
  booktitle    = {Proceedings of the 28th Asia and South Pacific Design Automation Conference,
                  {ASPDAC} 2023, Tokyo, Japan, January 16-19, 2023},
  pages        = {83--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3566097.3568345},
  doi          = {10.1145/3566097.3568345},
  timestamp    = {Mon, 26 Jun 2023 20:46:40 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/AlrahisKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asse/BalaisAMTV23,
  author       = {Maricel A. Balais and
                  Zyrus Kyle T. Alcazar and
                  Ryan Patrick V. Martin and
                  Vonn Eric M. Tulabot and
                  Charles Anrei Z. Valerio},
  title        = {Wireless Network Infrastructure and Security Enhancement for St. Joseph
                  School},
  booktitle    = {Proceedings of the 4th Asia Service Sciences and Software Engineering
                  Conference, {ASSE} 2023, Aizu-Wakamatsu City, Japan, October 27-29,
                  2023},
  pages        = {249--259},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3634814.3634846},
  doi          = {10.1145/3634814.3634846},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asse/BalaisAMTV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ats/KumarRPA23,
  author       = {Gaurav Kumar and
                  Anjum Riaz and
                  Yamuna Prasad and
                  Satyadev Ahlawat},
  title        = {On Enhancing the Security of Streaming Scan Network Architecture},
  booktitle    = {32nd {IEEE} Asian Test Symposium, {ATS} 2023, Beijing, China, October
                  14-17, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ATS59501.2023.10317941},
  doi          = {10.1109/ATS59501.2023.10317941},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ats/KumarRPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/WangL23,
  author       = {Huan Wang and
                  Xiaoyang Lai},
  title        = {Quantum Information Technology for Network Security: An Application-Focused
                  Overview},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom,
                  2023, Wuhan, China, December 21-24, 2023},
  pages        = {881--886},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00148},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00148},
  timestamp    = {Thu, 18 Apr 2024 16:12:26 +0200},
  biburl       = {https://dblp.org/rec/conf/bdcloud/WangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdiot/HuTCZ23,
  author       = {Zhiyuan Hu and
                  Yuan Tan and
                  Anchao Cheng and
                  Guangjun Zeng},
  title        = {Research on Network Dynamic Security Policy Model Based on Neural
                  Network},
  booktitle    = {Proceedings of the 7th International Conference on Big Data and Internet
                  of Things, {BDIOT} 2023, Beijing, China, August 11-13, 2023},
  pages        = {135--141},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617695.3617720},
  doi          = {10.1145/3617695.3617720},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bdiot/HuTCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdmip/XuZL23,
  author       = {Xiangsen Xu and
                  Shijun Zhang and
                  Ji Lai},
  title        = {Application of Internet Big Data in Network Security Situation Assessment},
  booktitle    = {Proceedings of the International Conference on Big Data Mining and
                  Information Processing, {BDMIP} 2023, Xiamen City, China, China, November
                  17-19, 2023},
  pages        = {77--81},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3645279.3645293},
  doi          = {10.1145/3645279.3645293},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdmip/XuZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdmip/ZengLX23,
  author       = {Jing Zeng and
                  Shuo Li and
                  Xiangsen Xu},
  title        = {Simulation Design of a Network Security Intrusion Detection Model
                  for Cloud Computing Based on Neural Network Model},
  booktitle    = {Proceedings of the International Conference on Big Data Mining and
                  Information Processing, {BDMIP} 2023, Xiamen City, China, China, November
                  17-19, 2023},
  pages        = {111--115},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3645279.3645299},
  doi          = {10.1145/3645279.3645299},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdmip/ZengLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/AkterRSCW23,
  author       = {Mst. Shapna Akter and
                  Juanjose Rodriguez{-}Cardenas and
                  Hossain Shahriar and
                  Alfredo Cuzzocrea and
                  Fan Wu},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {Quantum Cryptography for Enhanced Network Security: {A} Comprehensive
                  Survey of Research, Developments, and Future Directions},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {5408--5417},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386889},
  doi          = {10.1109/BIGDATA59044.2023.10386889},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/AkterRSCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bisec/AlexandrovM23,
  author       = {Alexander K. Alexandrov and
                  Anastass N. Madzharov},
  editor       = {Nemanja Zdravkovic and
                  Dragan Domazet and
                  Sonsoles L{\'{o}}pez{-}Pernas and
                  Miguel {\'{A}}ngel Conde and
                  Ponnusamy Vijayakumar},
  title        = {Energy-Efficient Routing in UAVs Supported Perimeter Security Networks},
  booktitle    = {Proceedings of the 14th International Conference on Business Information
                  Security {(BISEC} 2023), City of Ni{\v{s}}, Serbia, November 24th,
                  2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3676},
  pages        = {44--49},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3676/short\_06.pdf},
  timestamp    = {Mon, 13 May 2024 08:44:02 +0200},
  biburl       = {https://dblp.org/rec/conf/bisec/AlexandrovM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/brains/SurmontWC23,
  author       = {Jasper Surmont and
                  Weihong Wang and
                  Tom Van Cutsem},
  title        = {Static Application Security Testing of Consensus-Critical Code in
                  the Cosmos Network},
  booktitle    = {5th Conference on Blockchain Research {\&} Applications for Innovative
                  Networks and Services, {BRAINS} 2023, Paris, France, October 11-13,
                  2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BRAINS59668.2023.10316912},
  doi          = {10.1109/BRAINS59668.2023.10316912},
  timestamp    = {Tue, 05 Dec 2023 20:47:36 +0100},
  biburl       = {https://dblp.org/rec/conf/brains/SurmontWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/JafarA23,
  author       = {Imran Bin Jafar and
                  Irfan S. Al{-}Anbagi},
  title        = {{RSM:} {A} Real-time Security Monitoring Platform for IoT Networks},
  booktitle    = {{IEEE} Canadian Conference on Electrical and Computer Engineering,
                  {CCECE} 2023, Regina, SK, Canada, September 24-27, 2023},
  pages        = {393--398},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCECE58730.2023.10289023},
  doi          = {10.1109/CCECE58730.2023.10289023},
  timestamp    = {Thu, 09 Nov 2023 15:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ccece/JafarA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/HussainRYDTS23,
  author       = {Lasani Hussain and
                  Mayank Rawat and
                  Neeraj Kumar Yadav and
                  Sumit Darak and
                  Praveen Tammana and
                  Rinku Shah},
  editor       = {Yogesh Simmhan and
                  Ilkay Altintas and
                  Ana Lucia Varbanescu and
                  Pavan Balaji and
                  Abhinandan S. Prasad and
                  Lorenzo Carnevale},
  title        = {Microservice-based in-network security framework for {FPGA} NICs},
  booktitle    = {23rd {IEEE/ACM} International Symposium on Cluster, Cloud and Internet
                  Computing, CCGrid 2023 - Workshops, Bangalore, India, May 1-4, 2023},
  pages        = {328--330},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCGridW59191.2023.00074},
  doi          = {10.1109/CCGRIDW59191.2023.00074},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgrid/HussainRYDTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/Qian23,
  author       = {Shen Qian},
  title        = {Physical Layer Security in Untrusted Lossy Decode-and-Forward Relay
                  Networks with Finite Blocklength},
  booktitle    = {20th {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023},
  pages        = {218--223},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCNC51644.2023.10060369},
  doi          = {10.1109/CCNC51644.2023.10060369},
  timestamp    = {Tue, 21 Mar 2023 13:49:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/Qian23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/RanjiJBBH23,
  author       = {Ramtin Ranji and
                  Uzzam Javed and
                  Bert Boltjes and
                  Fay{\c{c}}al Bouhafs and
                  Frank T. H. den Hartog},
  title        = {Optimizing wireless network throughput under the condition of Physical
                  Layer Security using Software-Defined Networking enabled collaboration},
  booktitle    = {20th {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCNC51644.2023.10060341},
  doi          = {10.1109/CCNC51644.2023.10060341},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/RanjiJBBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/LinZHW23,
  author       = {Xubin Lin and
                  Situo Zhang and
                  Feifei Hu and
                  Liu Wu},
  title        = {Research on Security Audit Technology of Smart Grid Database Based
                  on Neural Networks},
  booktitle    = {8th International Conference on Computer and Communication Systems,
                  {ICCCS} 2023, Guangzhou, China, April 21-23, 2023},
  pages        = {1142--1146},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCS57501.2023.10151001},
  doi          = {10.1109/ICCCS57501.2023.10151001},
  timestamp    = {Mon, 10 Jul 2023 15:09:46 +0200},
  biburl       = {https://dblp.org/rec/conf/ccoms/LinZHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Beltiukov0GW23,
  author       = {Roman Beltiukov and
                  Wenbo Guo and
                  Arpit Gupta and
                  Walter Willinger},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {In Search of netUnicorn: {A} Data-Collection Platform to Develop Generalizable
                  {ML} Models for Network Security Problems},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2217--2231},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623075},
  doi          = {10.1145/3576915.3623075},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Beltiukov0GW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShiSYZ023,
  author       = {Qingkai Shi and
                  Junyang Shao and
                  Yapeng Ye and
                  Mingwei Zheng and
                  Xiangyu Zhang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Lifting Network Protocol Implementation to Precise Format Specification
                  with Security Applications},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1287--1301},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616614},
  doi          = {10.1145/3576915.3616614},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShiSYZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecct/ZhaiYZHYZ23,
  author       = {Chenggong Zhai and
                  Xinguang Yuan and
                  Liyong Zhou and
                  Yang Huang and
                  Chaoshan Yang and
                  Peng Zhou},
  title        = {Research on Network Security in Material Support},
  booktitle    = {Proceedings of the International Conference on Electronics, Computers
                  and Communication Technology, {CECCT} 2023, Guilin, China, November
                  17-19, 2023},
  pages        = {6--10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3637494.3637496},
  doi          = {10.1145/3637494.3637496},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cecct/ZhaiYZHYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecnet/FuLGZ23,
  author       = {Yunxi Fu and
                  Zesan Liu and
                  Ziting Gao and
                  Wenjuan Zhang},
  editor       = {Antonio J. Tall{\'{o}}n{-}Ballesteros and
                  Estefan{\'{\i}}a Cort{\'{e}}s{-}Ancos and
                  Diego A. L{\'{o}}pez Garc{\'{\i}}a},
  title        = {Research on Network Security Access Based on Intelligent Active Defense},
  booktitle    = {Electronics, Communications and Networks - Proceedings of the 13th
                  International Conference (CECNet 2023), Macao, China, 17-20 November
                  2023},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {381},
  pages        = {327--332},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/FAIA231209},
  doi          = {10.3233/FAIA231209},
  timestamp    = {Wed, 31 Jan 2024 15:27:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cecnet/FuLGZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/HellemansRPM23,
  author       = {Wouter Hellemans and
                  Md Masoom Rabbani and
                  Bart Preneel and
                  Nele Mentens},
  editor       = {Andrea Bartolini and
                  Kristian F. D. Rietveld and
                  Catherine D. Schuman and
                  Jose Moreira},
  title        = {Yes we CAN!: Towards bringing security to legacy-restricted Controller
                  Area Networks. {A} review},
  booktitle    = {Proceedings of the 20th {ACM} International Conference on Computing
                  Frontiers, {CF} 2023, Bologna, Italy, May 9-11, 2023},
  pages        = {352--357},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3587135.3592818},
  doi          = {10.1145/3587135.3592818},
  timestamp    = {Sat, 30 Sep 2023 09:36:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/HellemansRPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cipae/Yun23,
  author       = {Feng Yun},
  title        = {Research on Network Security Image Cryptosystem Based on Computer
                  Vision Technology},
  booktitle    = {International Conference on Computers, Information Processing and
                  Advanced Education, {CIPAE} 2023, Ottawa, ON, Canada, August 26-28,
                  2023},
  pages        = {698--702},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CIPAE60493.2023.00135},
  doi          = {10.1109/CIPAE60493.2023.00135},
  timestamp    = {Thu, 25 Jan 2024 09:25:30 +0100},
  biburl       = {https://dblp.org/rec/conf/cipae/Yun23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/KumarA23,
  author       = {Rohit Kumar and
                  Neha Agrawal},
  title        = {{ACL} Assisted Security Mechanism Against Low-Rate DDoS Attack in
                  SDN-Cloud-IoT Networks},
  booktitle    = {{OITS} International Conference on Information Technology, {OCIT}
                  2023, Raipur, India, December 13-15, 2023},
  pages        = {823--828},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/OCIT59427.2023.10431284},
  doi          = {10.1109/OCIT59427.2023.10431284},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cit/KumarA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cits/DikLB23,
  author       = {Daniel Dik and
                  Iacob Larsen and
                  Michael St{\"{u}}bert Berger},
  editor       = {Mohammad S. Obaidat and
                  Franco Davoli and
                  Kuei{-}Fang Hsiao and
                  Petros Nicopolitidis and
                  Yu Guo},
  title        = {MACsec and {AES-GCM} Hardware Architecture with Frame Preemption Support
                  for Transport Security in Time Sensitive Networking},
  booktitle    = {International Conference on Computer, Information and Telecommunication
                  Systems, {CITS} 2023, Genoa, Italy, July 10-12, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CITS58301.2023.10188711},
  doi          = {10.1109/CITS58301.2023.10188711},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cits/DikLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/IvkicTRBG23,
  author       = {Igor Ivkic and
                  Dominik Thiede and
                  Nicholas J. P. Race and
                  Matthew Broadbent and
                  Antonios Gouglidis},
  editor       = {Maarten van Steen and
                  Claus Pahl},
  title        = {A Security Evaluation Framework for Software-Defined Network Architectures
                  in Data Center Environments},
  booktitle    = {Proceedings of the 13th International Conference on Cloud Computing
                  and Services Science, {CLOSER} 2023, Prague, Czech Republic, April
                  26-28, 2023},
  pages        = {277--288},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011988300003488},
  doi          = {10.5220/0011988300003488},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/IvkicTRBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/YouNSS23,
  author       = {Myoungsung You and
                  Jaehyun Nam and
                  Minjae Seo and
                  Seungwon Shin},
  title        = {{HELIOS:} Hardware-assisted High-performance Security Extension for
                  Cloud Networking},
  booktitle    = {Proceedings of the 2023 {ACM} Symposium on Cloud Computing, SoCC 2023,
                  Santa Cruz, CA, USA, 30 October 2023 - 1 November 2023},
  pages        = {486--501},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3620678.3624786},
  doi          = {10.1145/3620678.3624786},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/YouNSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/GarrigaZS23,
  author       = {Rodrigo Asensio Garriga and
                  Alejandro Molina Zarca and
                  Antonio F. Skarmeta},
  title        = {A Multi-stakeholder Cloud-continuum framework for 6G Networks security
                  {\&} service management},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {466--471},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490020},
  doi          = {10.1109/CLOUDNET59005.2023.10490020},
  timestamp    = {Sun, 28 Apr 2024 20:40:19 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/GarrigaZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncit/WangWBHGQ23,
  author       = {Yuman Wang and
                  Wenhui Wang and
                  Xiaoxue Bai and
                  Bo Hu and
                  Guangkai Ge and
                  Kexiang Qian},
  title        = {{RRDD:} An ATT{\&}CK-based {ICS} Network Security Risk Assessment
                  Method},
  booktitle    = {Proceedings of the 2nd International Conference on Networks, Communications
                  and Information Technology, {CNCIT} 2023, Qinghai, China, June 16-18,
                  2023},
  pages        = {186--192},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605801.3605837},
  doi          = {10.1145/3605801.3605837},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncit/WangWBHGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/JinSZLD23,
  author       = {Kai Jin and
                  Xin Shan and
                  Yuan Zhou and
                  Jing Li and
                  Haidi Dong},
  title        = {Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network
                  Security System},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {255--258},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640962},
  doi          = {10.1145/3640912.3640962},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/JinSZLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/LiLZ23,
  author       = {Yimeng Li and
                  Xi Li and
                  Yichao Zhang},
  title        = {Traffic Classification of Network Security Agents Based on Feature
                  Fusion Convolutional Neural Network},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {196--200},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640951},
  doi          = {10.1145/3640912.3640951},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/LiLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/XiongLCC23,
  author       = {Zihan Xiong and
                  Yuxuan Li and
                  Jun Chen and
                  Dabei Chen},
  title        = {FusedCNN-LSTM-AttNet: {A} Neural Network Model for Cyber Security
                  Situation Prediction},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {207--210},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640953},
  doi          = {10.1145/3640912.3640953},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/XiongLCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/ZengFWXHL23,
  author       = {Weijie Zeng and
                  Rui Fan and
                  Zhi Wang and
                  Yu Xiao and
                  Rui Huang and
                  Mouhai Liu},
  title        = {Research on Docker Container Network Isolation and Security Management
                  for Multi-Tenant Environments},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {179--185},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640948},
  doi          = {10.1145/3640912.3640948},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/ZengFWXHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MensiR23,
  author       = {Neji Mensi and
                  Danda B. Rawat},
  title        = {Enhancing Security in NOMA-Based Networks: An Effective Deceptive
                  Approach to Thwart Multiple Eavesdroppers},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288993},
  doi          = {10.1109/CNS59707.2023.10288993},
  timestamp    = {Mon, 13 Nov 2023 09:18:17 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/MensiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/FangYYDL23,
  author       = {Cheng Fang and
                  Peng Yang and
                  Meng Yi and
                  Miao Du and
                  Bing Li},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Nikolaos S. Voros},
  title        = {Resource Cooperative Scheduling Optimization Considering Security
                  in Edge Mobile Networks},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 19th {EAI} International Conference, CollaborateCom 2023, Corfu
                  Island, Greece, October 4-6, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {561},
  pages        = {54--74},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54521-4\_4},
  doi          = {10.1007/978-3-031-54521-4\_4},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/FangYYDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/commnet/AhmedHS23,
  author       = {Soumaya Marfoun{-}Dini Ahmed and
                  Anne{-}Carole Honfoga and
                  Patrick Sotindjo},
  title        = {Security of digital agriculture networks: {A} review and bibliometric
                  analysis},
  booktitle    = {6th International Conference on Advanced Communication Technologies
                  and Networking, CommNet 2023, Rabat, Morocco, December 11-13, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CommNet60167.2023.10365311},
  doi          = {10.1109/COMMNET60167.2023.10365311},
  timestamp    = {Thu, 18 Jan 2024 08:27:09 +0100},
  biburl       = {https://dblp.org/rec/conf/commnet/AhmedHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/commnet/LeeSKG23,
  author       = {Cheng{-}Yen Lee and
                  Kyler R. Scott and
                  Sunil P. Khatri and
                  Ali Ghrayeb},
  title        = {A Hardware Validation Framework for a Networked Dynamic Multi-factor
                  Security Protocol},
  booktitle    = {6th International Conference on Advanced Communication Technologies
                  and Networking, CommNet 2023, Rabat, Morocco, December 11-13, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CommNet60167.2023.10365286},
  doi          = {10.1109/COMMNET60167.2023.10365286},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/commnet/LeeSKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/WangZLZ23,
  author       = {Yixuan Wang and
                  Bo Zhao and
                  Weidong Li and
                  Lingzi Zhu},
  editor       = {Hossain Shahriar and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Moushumi Sharmin and
                  Dave Towey and
                  A. K. M. Jahangir Alam Majumder and
                  Hiroki Kashiwazaki and
                  Ji{-}Jiang Yang and
                  Michiharu Takemoto and
                  Nazmus Sakib and
                  Ryohei Banno and
                  Sheikh Iqbal Ahamed},
  title        = {An Ontology-Centric Approach for Network Security Situation Awareness},
  booktitle    = {47th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2023, Torino, Italy, June 26-30, 2023},
  pages        = {777--787},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMPSAC57700.2023.00107},
  doi          = {10.1109/COMPSAC57700.2023.00107},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/WangZLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coms2/PatelPJ23,
  author       = {Nisarg Patel and
                  Viral Parekh and
                  Kaushal Jani},
  editor       = {Nirbhay Chaubey and
                  Sabu M. Thampi and
                  Noor Zaman Jhanjhi and
                  Satyen Parikh and
                  Kiran Amin},
  title        = {Improvement of Network Protocol and Analysis of Security Using Aspect
                  of Cryptography},
  booktitle    = {Computing Science, Communication and Security - 4th International
                  Conference, {COMS2} 2023, Mehsana, Gujarat, India, February 6-7, 2023,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1861},
  pages        = {103--116},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-40564-8\_8},
  doi          = {10.1007/978-3-031-40564-8\_8},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coms2/PatelPJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/IhitaAKCM23,
  author       = {Gangavarapu Vigneswara Ihita and
                  Vybhav. K. Acharya and
                  Likhith Kanigolla and
                  Sachin Chaudhari and
                  Thierry Monteil},
  title        = {Security for oneM2M-Based Smart City Network: An {OM2M} Implementation},
  booktitle    = {15th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2023, Bangalore, India, January 3-8, 2023},
  pages        = {808--813},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMSNETS56262.2023.10041334},
  doi          = {10.1109/COMSNETS56262.2023.10041334},
  timestamp    = {Fri, 24 Feb 2023 15:04:53 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/IhitaAKCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/MishraB23,
  author       = {Ayushi Mishra and
                  Priyanka Bagade},
  title        = {Investigating IoT Systems Security Attacks using Network Forensics},
  booktitle    = {15th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2023, Bangalore, India, January 3-8, 2023},
  pages        = {72--77},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMSNETS56262.2023.10041322},
  doi          = {10.1109/COMSNETS56262.2023.10041322},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/MishraB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/VenkateswaranHR23,
  author       = {Venkat Venkateswaran and
                  Chin{-}Tser Huang and
                  Kaliappa Ravindran},
  title        = {Security Management in Content Distribution Networks: a delay-variance
                  reduction approach for content mirror site placement},
  booktitle    = {15th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2023, Bangalore, India, January 3-8, 2023},
  pages        = {505--512},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMSNETS56262.2023.10041417},
  doi          = {10.1109/COMSNETS56262.2023.10041417},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/VenkateswaranHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/contel/DreibholzBA23,
  author       = {Thomas Dreibholz and
                  Steinar Bj{\o}rnstad and
                  Jameel Ali},
  title        = {A Scalable Infrastructure for Continuous State of Polarisation Monitoring
                  for Revealing Security and Vulnerability Impacts in Optical Networks},
  booktitle    = {17th International Conference on Telecommunications, ConTEL 2023,
                  Graz, Austria, July 11-13, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ConTEL58387.2023.10198969},
  doi          = {10.1109/CONTEL58387.2023.10198969},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/contel/DreibholzBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coopis/SoveiziK23,
  author       = {Nafiseh Soveizi and
                  Dimka Karastoyanova},
  editor       = {Mohamed Sellami and
                  Maria{-}Esther Vidal and
                  Boudewijn F. van Dongen and
                  Walid Gaaloul and
                  Herv{\'{e}} Panetto},
  title        = {Enhancing Workflow Security in Multi-cloud Environments Through Monitoring
                  and Adaptation upon Cloud Service and Network Security Violations},
  booktitle    = {Cooperative Information Systems - 29th International Conference, CoopIS
                  2023, Groningen, The Netherlands, October 30 - November 3, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14353},
  pages        = {157--175},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-46846-9\_9},
  doi          = {10.1007/978-3-031-46846-9\_9},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coopis/SoveiziK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/DovzhenkoBAIO23,
  author       = {Nadiia Dovzhenko and
                  Oleg Barabash and
                  Nataliia Ausheva and
                  Yevhen Ivanichenko and
                  Sergiy Obushnyi},
  editor       = {Volodymyr Sokolov and
                  Tamara Radivilova and
                  Vasyl Ustimenko and
                  Mariya Nazarkevych},
  title        = {Comprehensive Analysis of Efficiency and Security Challenges in Sensor
                  Network Routing (short paper)},
  booktitle    = {Proceedings of the Cybersecurity Providing in Information and Telecommunication
                  Systems {II} co-located with International Conference on Problems
                  of Infocommunications. Science and Technology {(PICST} 2023), Kyiv,
                  Ukraine, October 26, 2023 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3550},
  pages        = {275--280},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3550/short12.pdf},
  timestamp    = {Fri, 24 Nov 2023 12:33:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cpits/DovzhenkoBAIO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/ToliupaSBPK23,
  author       = {Serhii Toliupa and
                  Anatolii Shevchenko and
                  Serhii Buchyk and
                  Ihor Pampukha and
                  Andrii Kulko},
  editor       = {Volodymyr Sokolov and
                  Tamara Radivilova and
                  Vasyl Ustimenko and
                  Mariya Nazarkevych},
  title        = {Managing the Security of the Critical Infrastructure Information Network},
  booktitle    = {Proceedings of the Cybersecurity Providing in Information and Telecommunication
                  Systems {II} co-located with International Conference on Problems
                  of Infocommunications. Science and Technology {(PICST} 2023), Kyiv,
                  Ukraine, October 26, 2023 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3550},
  pages        = {131--142},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3550/paper11.pdf},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpits/ToliupaSBPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BachoCLL23,
  author       = {Renas Bacho and
                  Daniel Collins and
                  Chen{-}Da Liu{-}Zhang and
                  Julian Loss},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Network-Agnostic Security Comes (Almost) for Free in {DKG} and {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {71--106},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_3},
  doi          = {10.1007/978-3-031-38557-5\_3},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BachoCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscn/AhmadMCPKS23,
  author       = {Ijaz Ahmad and
                  Jere Malinen and
                  Filippos Christou and
                  Pawani Porambage and
                  Andreas Kirst{\"{a}}dter and
                  Jani Suomalainen},
  title        = {Security in Intent-Based Networking: Challenges and Solutions},
  booktitle    = {{IEEE} Conference on Standards for Communications and Networking,
                  {CSCN} 2023, Munich, Germany, November 6-8, 2023},
  pages        = {296--301},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSCN60443.2023.10453125},
  doi          = {10.1109/CSCN60443.2023.10453125},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscn/AhmadMCPKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csit/RiznykKKK23,
  author       = {Oleg Riznyk and
                  Yurii Kynash and
                  Natalya Kustra and
                  Roman Kuharchuk},
  title        = {Construction of security smart systems using wireless sensor networks},
  booktitle    = {18th {IEEE} International Conference on Computer Science and Information
                  Technologies, {CSIT} 2023, Lviv, Ukraine, October 19-21, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSIT61576.2023.10324230},
  doi          = {10.1109/CSIT61576.2023.10324230},
  timestamp    = {Mon, 11 Dec 2023 15:24:42 +0100},
  biburl       = {https://dblp.org/rec/conf/csit/RiznykKKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/AhmadT23,
  author       = {Tanwir Ahmad and
                  Dragos Truscan},
  title        = {Efficient Early Anomaly Detection of Network Security Attacks Using
                  Deep Learning},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {154--159},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224923},
  doi          = {10.1109/CSR57506.2023.10224923},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/AhmadT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/DuanWMYXL23,
  author       = {Luwen Duan and
                  Min Wu and
                  Lijian Mao and
                  Jun Yin and
                  Jianping Xiong and
                  Xi Li},
  title        = {RWSC-Fusion: Region-Wise Style-Controlled Fusion Network for the Prohibited
                  X-ray Security Image Synthesis},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {22398--22407},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPR52729.2023.02145},
  doi          = {10.1109/CVPR52729.2023.02145},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/DuanWMYXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/YahiaLS23,
  author       = {Selma Yahia and
                  Valeria Loscr{\`{\i}} and
                  Prakriti Saxena},
  title        = {Enhancing Security in 6G Vehicular Networks: Leveraging {VLC} and
                  {MMW} Integration and Cooperative Relaying Technique},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates,
                  November 14-17, 2023},
  pages        = {711--716},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361417},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361417},
  timestamp    = {Tue, 23 Jan 2024 20:30:56 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/YahiaLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/AhmadSH23,
  author       = {Syed Tihaam Ahmad and
                  Ayesha Siddique and
                  Khaza Anuarul Hoque},
  title        = {Security-Aware Approximate Spiking Neural Networks},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2023, Antwerp, Belgium, April 17-19, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/DATE56975.2023.10137269},
  doi          = {10.23919/DATE56975.2023.10137269},
  timestamp    = {Wed, 07 Jun 2023 22:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/date/AhmadSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcai/GarciaROM23,
  author       = {Carlos Rubio Garcia and
                  Simon Rommel and
                  Juan Jose Vegas Olmos and
                  Idelfonso Tafur Monroy},
  editor       = {Rashid Mehmood and
                  Victor Alves and
                  Isabel Pra{\c{c}}a and
                  Jaroslaw Wikarek and
                  Javier Parra{-}Dom{\'{\i}}nguez and
                  Roussanka Loukanova and
                  Ignacio de Miguel and
                  Tiago Pinto and
                  Ricardo Nunes and
                  Michela Ricca},
  title        = {Enhancing the Security of Software Defined Networks via Quantum Key
                  Distribution and Post-Quantum Cryptography},
  booktitle    = {Distributed Computing and Artificial Intelligence, Special Sessions
                  I, 20th International Conference, Guimaraes, Portugal, 12-14 July
                  2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {741},
  pages        = {428--437},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38318-2\_42},
  doi          = {10.1007/978-3-031-38318-2\_42},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dcai/GarciaROM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dese/AcostaHP23,
  author       = {Lyracelle Acosta and
                  Seyed Ebrahim Hosseini and
                  Shahbaz Pervez},
  title        = {Ethical Challenges Associated with Security Vulnerabilities and Data
                  Privacy in Social Networking},
  booktitle    = {16th International Conference on Developments in eSystems Engineering,
                  DeSE 2023, Istanbul, Turkiye, December 18-20, 2023},
  pages        = {647--652},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DeSE60595.2023.10469464},
  doi          = {10.1109/DESE60595.2023.10469464},
  timestamp    = {Tue, 02 Apr 2024 12:53:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dese/AcostaHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/GuhaB23,
  author       = {Krishnendu Guha and
                  Gouriprasad Bhattacharyya},
  editor       = {Luca Cassano and
                  Mihalis Psarakis and
                  Marcello Traiola and
                  Alberto Bosio},
  title        = {A Self Aware Security Approach for Real Time Neural Network Applications
                  from Row Hammer Attacks in Multi {FPGA} Multi User Environment},
  booktitle    = {{IEEE} International Symposium on Defect and Fault Tolerance in {VLSI}
                  and Nanotechnology Systems, {DFT} 2023, Juan-Les-Pins, France, October
                  3-5, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DFT59622.2023.10313547},
  doi          = {10.1109/DFT59622.2023.10313547},
  timestamp    = {Tue, 21 Nov 2023 12:38:06 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/GuhaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/KoufopoulouPPPH23,
  author       = {Amalia{-}Artemis Koufopoulou and
                  Athanasios Papadimitriou and
                  Aggelos Pikrakis and
                  Mihalis Psarakis and
                  David H{\'{e}}ly},
  editor       = {Luca Cassano and
                  Mihalis Psarakis and
                  Marcello Traiola and
                  Alberto Bosio},
  title        = {On the Prediction of Hardware Security Properties of {HLS} Designs
                  Using Graph Neural Networks},
  booktitle    = {{IEEE} International Symposium on Defect and Fault Tolerance in {VLSI}
                  and Nanotechnology Systems, {DFT} 2023, Juan-Les-Pins, France, October
                  3-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DFT59622.2023.10313544},
  doi          = {10.1109/DFT59622.2023.10313544},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/KoufopoulouPPPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dis/Hamouda23,
  author       = {Essia Hamouda},
  editor       = {Hossein Moosaei and
                  Milan Hlad{\'{\i}}k and
                  Panos M. Pardalos},
  title        = {A Critical Node-Centric Approach to Enhancing Network Security},
  booktitle    = {Dynamics of Information Systems - 6th International Conference, {DIS}
                  2023, Prague, Czech Republic, September 3-6, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14321},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50320-7\_9},
  doi          = {10.1007/978-3-031-50320-7\_9},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dis/Hamouda23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drcn/BermejoDB23,
  author       = {{\'{O}}scar Gotor Bermejo and
                  Daniel Dik and
                  Michael St{\"{u}}bert Berger},
  title        = {Risk Assessment on Hardware Offloading Architecture of Network Security
                  Protocols with Linux-based Control Plane},
  booktitle    = {19th International Conference on the Design of Reliable Communication
                  Networks, {DRCN} 2023, Vilanova i la Geltru, Spain, April 17-20, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DRCN57075.2023.10108289},
  doi          = {10.1109/DRCN57075.2023.10108289},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drcn/BermejoDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ChenZYL23,
  author       = {Zhuoran Chen and
                  Hongyu Zhu and
                  Chen Yi and
                  Zhen Liu},
  title        = {Research Ideas on Network Security Experiment and Appraisal of Avionics
                  System},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {383--390},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00061},
  doi          = {10.1109/DSC59305.2023.00061},
  timestamp    = {Fri, 09 Feb 2024 20:38:47 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ChenZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiWYZ23,
  author       = {Bokai Li and
                  Shenglong Wu and
                  Yuke Yang and
                  Geyao Zhang},
  title        = {Analysis and Research of Neural Network Adversarial Samples for Power
                  Grid Security},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {520--525},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00081},
  doi          = {10.1109/DSC59305.2023.00081},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiWYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/YeZTW23,
  author       = {Haibo Ye and
                  Lei Zhao and
                  Leiting Tao and
                  Xiaofeng Wang},
  title        = {Network Security Evaluation for Space-Ground Integrated Networks Based
                  on Network Simulation},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {245--252},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00043},
  doi          = {10.1109/DSC59305.2023.00043},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/YeZTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtesi/AliRYNAK23,
  author       = {Mohsin Ali and
                  Abdul Razaque and
                  Damelya M. Yeskendirova and
                  Talgat A. Nurlybayev and
                  Nessibeli Y. Askarbekova and
                  Zarina A. Kashaganova},
  editor       = {Askar Khikmetov and
                  Kateryna Kolesnikova and
                  Madina T. Ipalakova},
  title        = {Enhancing Cloud Computing Security through AI-Based Intelligent Intrusion
                  Detection Leveraging Neural Networks and Artificial Bee Colony Optimization},
  booktitle    = {Workshops and Short Paper Proceedings of the 8th International Conference
                  on Digital Technologies in Education, Science and Industry 2023, Almaty,
                  Kazakhstan, December 6-7, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3680},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3680/S4Paper5.pdf},
  timestamp    = {Tue, 21 May 2024 17:19:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dtesi/AliRYNAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/elinfocom/ChoiKLLK23,
  author       = {Hojin Choi and
                  Hyuk Kwon and
                  Junghee Lee and
                  Yonghee Lee and
                  Kijoong Kim},
  title        = {Hardware-Based Isolation Technique to Guarantee Availability of Security
                  Controls in a Gateway for Industrial Networks},
  booktitle    = {International Conference on Electronics, Information, and Communication,
                  {ICEIC} 2023, Singapore, February 5-8, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICEIC57457.2023.10049871},
  doi          = {10.1109/ICEIC57457.2023.10049871},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/elinfocom/ChoiKLLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23,
  author       = {Md. Nazmul Hoq and
                  Jia Wei Yao and
                  Suryadipta Majumdar and
                  Luis Su{\'{a}}rez and
                  Lingyu Wang and
                  Amine Boukhtouta and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Evaluating the Security Posture of 5G Networks by Combining State
                  Auditing and Event Monitoring},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {123--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_7},
  doi          = {10.1007/978-3-031-51476-0\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/LeanderJLHNP23,
  author       = {Bj{\"{o}}rn Leander and
                  Bjarne Johansson and
                  Tomas Lindstr{\"{o}}m and
                  Olof Holmgren and
                  Thomas Nolte and
                  Alessandro V. Papadopoulos},
  title        = {Dependability and Security Aspects of Network-Centric Control},
  booktitle    = {28th {IEEE} International Conference on Emerging Technologies and
                  Factory Automation, {ETFA} 2023, Sinaia, Romania, September 12-15,
                  2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ETFA54631.2023.10275344},
  doi          = {10.1109/ETFA54631.2023.10275344},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/etfa/LeanderJLHNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/AjayiMMOK23,
  author       = {Idowu Ajayi and
                  Yahia Medjahdi and
                  Lina Mroueh and
                  Olumide Okubadejo and
                  Fatima Zohra Kaddour},
  title        = {Low-Complexity Neural Networks for Denoising Imperfect {CSI} in Physical
                  Layer Security},
  booktitle    = {2023 Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188372},
  doi          = {10.1109/EUCNC/6GSUMMIT58263.2023.10188372},
  timestamp    = {Mon, 31 Jul 2023 13:56:43 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/AjayiMMOK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/PorambagePRTH23,
  author       = {Pawani Porambage and
                  Jarno Pinola and
                  Yasintha Rumesh and
                  Chen Tao and
                  Jyrki Huusko},
  title        = {XcARet: {XAI} based Green Security Architecture for Resilient Open
                  Radio Access Networks in 6G},
  booktitle    = {2023 Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023},
  pages        = {699--704},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188316},
  doi          = {10.1109/EUCNC/6GSUMMIT58263.2023.10188316},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/PorambagePRTH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/SinghAH23,
  author       = {Rupender Singh and
                  Ijaz Ahmad and
                  Jyrki Huusko},
  title        = {The Role of Physical Layer Security in Satellite-Based Networks},
  booktitle    = {2023 Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023},
  pages        = {36--41},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188370},
  doi          = {10.1109/EUCNC/6GSUMMIT58263.2023.10188370},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/SinghAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/SnyderHMRK23,
  author       = {Jacob Snyder and
                  Lucas Hoffer and
                  Bryan Martin and
                  Darren Rogers and
                  Vikram Kanth},
  title        = {Comparing 5G Network Latency Utilizing Native Security Algorithms},
  booktitle    = {2023 Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023},
  pages        = {532--537},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188309},
  doi          = {10.1109/EUCNC/6GSUMMIT58263.2023.10188309},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/SnyderHMRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/ChirivellaCiruelosG23,
  author       = {Alejandro M. Chirivella{-}Ciruelos and
                  Marisol Garc{\'{\i}}a{-}Valls},
  title        = {Automating the verification of smart contracts in blockchain networks
                  for improving security},
  booktitle    = {49th Euromicro Conference on Software Engineering and Advanced Applications,
                  {SEAA} 2023, Durres, Albania, September 6-8, 2023},
  pages        = {128--131},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SEAA60479.2023.00028},
  doi          = {10.1109/SEAA60479.2023.00028},
  timestamp    = {Tue, 16 Jan 2024 21:08:29 +0100},
  biburl       = {https://dblp.org/rec/conf/euromicro/ChirivellaCiruelosG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MillerBWSZ23,
  author       = {Rhys Miller and
                  Ioana Boureanu and
                  Stephan Wesemeyer and
                  Zhili Sun and
                  Hemant Zope},
  title        = {Systematic Improvement of Access-Stratum Security in Mobile Networks},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {542--557},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00039},
  doi          = {10.1109/EUROSP57164.2023.00039},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MillerBWSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoapps/HassanSVPM13,
  author       = {Mujtaba Hassan and
                  Arish Sateesan and
                  Jo Vliegen and
                  Stjepan Picek and
                  Nele Mentens},
  editor       = {Jo{\~{a}}o Correia and
                  Stephen L. Smith and
                  Raneem Qaddoura},
  title        = {Evolving Non-cryptographic Hash Functions Using Genetic Programming
                  for High-speed Lookups in Network Security Applications},
  booktitle    = {Applications of Evolutionary Computation - 26th European Conference,
                  EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic,
                  April 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13989},
  pages        = {302--318},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30229-9\_20},
  doi          = {10.1007/978-3-031-30229-9\_20},
  timestamp    = {Tue, 29 Aug 2023 15:18:02 +0200},
  biburl       = {https://dblp.org/rec/conf/evoapps/HassanSVPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/ShresthaLL23,
  author       = {Selina Shrestha and
                  Willian T. Lunardi and
                  Martin Andreoni Lopez},
  editor       = {Giancarlo Fortino and
                  Valeria Loscr{\`{\i}} and
                  Fabrizio Granelli and
                  Tarek F. Abdelzaher and
                  Antonella Guzzo and
                  Claudio Savaglio},
  title        = {An Empirical Analysis of MeshShield: a Network Security System for
                  Fully Distributed Networks},
  booktitle    = {Proceedings of the 2023 International Conference on embedded Wireless
                  Systems and Networks, {EWSN} 2023, Rende, Italy, September 25-27,
                  2023},
  pages        = {403--408},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://dl.acm.org/doi/10.5555/3639940.3640004},
  doi          = {10.5555/3639940.3640004},
  timestamp    = {Thu, 16 May 2024 19:19:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/ShresthaLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/RashidCLPHK23,
  author       = {Md. Mamunur Rashid and
                  Piljoo Choi and
                  Suk{-}Hwan Lee and
                  Jan Platos and
                  Young Huh and
                  Ki{-}Ryong Kwon},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Markus Aleksy},
  title        = {Ensuring Privacy and Security of IoT Networks Utilizing Blockchain
                  and Federated Learning},
  booktitle    = {10th International Conference on Future Internet of Things and Cloud,
                  FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023},
  pages        = {298--305},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FiCloud58648.2023.00051},
  doi          = {10.1109/FICLOUD58648.2023.00051},
  timestamp    = {Tue, 07 May 2024 20:09:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ficloud/RashidCLPHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/JeyasheeliDS23,
  author       = {P. Golda Jeyasheeli and
                  J. Deepika and
                  R. R. Sathya},
  editor       = {Vikrant Bhateja and
                  Xin{-}She Yang and
                  Marta Campos Ferreira and
                  Sandeep Singh Sengar and
                  Carlos M. Travieso{-}Gonz{\'{a}}lez},
  title        = {Security for Software Defined Vehicular Networks},
  booktitle    = {Evolution in Computational Intelligence - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {370},
  pages        = {529--545},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6702-5\_43},
  doi          = {10.1007/978-981-99-6702-5\_43},
  timestamp    = {Tue, 28 Nov 2023 13:56:20 +0100},
  biburl       = {https://dblp.org/rec/conf/ficta/JeyasheeliDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/ManasaKSS23,
  author       = {N. Manasa and
                  Kotha Sita Kumari and
                  P. Bhavya Sri and
                  D. Sadhrusya},
  editor       = {Vikrant Bhateja and
                  Xin{-}She Yang and
                  Marta Campos Ferreira and
                  Sandeep Singh Sengar and
                  Carlos M. Travieso{-}Gonz{\'{a}}lez},
  title        = {Artificial Neural Network-Based Malware Detection Model Among Shopping
                  Apps to Increase the App Security},
  booktitle    = {Evolution in Computational Intelligence - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {370},
  pages        = {267--275},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6702-5\_22},
  doi          = {10.1007/978-981-99-6702-5\_22},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficta/ManasaKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/QaderMAAMHR23,
  author       = {Aryan Abdlwhab Qader and
                  Mohammed Hasan Mutar and
                  Sameer Alani and
                  Waleed Khalid Al{-}Azzawi and
                  Sarmad Nozad Mahmood and
                  Hussein Muhi Hariz and
                  Mustafa Asaad Rasol},
  editor       = {Vikrant Bhateja and
                  Fiona Carroll and
                  Jo{\~{a}}o Manuel R. S. Tavares and
                  Sandeep Singh Sengar and
                  Peter Peer},
  title        = {Hybrid Security Against Black Hole and Sybil Attacks in Drone-Assisted
                  Vehicular Ad Hoc Networks},
  booktitle    = {Intelligent Data Engineering and Analytics - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {371},
  pages        = {399--413},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6706-3\_34},
  doi          = {10.1007/978-981-99-6706-3\_34},
  timestamp    = {Sun, 04 Aug 2024 19:42:19 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/QaderMAAMHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/VeerasamyNKSSM23,
  author       = {B. Veerasamy and
                  D. Nageswari and
                  S. N. Kumar and
                  Anil Shirgire and
                  Ramachandran Sitharthan and
                  A. Jasmine Gnana Malar},
  editor       = {Vikrant Bhateja and
                  Fiona Carroll and
                  Jo{\~{a}}o Manuel R. S. Tavares and
                  Sandeep Singh Sengar and
                  Peter Peer},
  title        = {An Optimized Cyber Security Framework for Network Applications},
  booktitle    = {Intelligent Data Engineering and Analytics - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {371},
  pages        = {511--518},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6706-3\_45},
  doi          = {10.1007/978-981-99-6706-3\_45},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/VeerasamyNKSSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/FakhouriAAHAA23,
  author       = {Hussam N. Fakhouri and
                  Sadi Alawadi and
                  Feras M. Awaysheh and
                  Faten Hamad and
                  Sawsan Al{-}Zubi and
                  Mohammad Aladwan},
  title        = {An Overview of using of Artificial Intelligence in Enhancing Security
                  and Privacy in Mobile Social Networks},
  booktitle    = {Eighth International Conference on Fog and Mobile Edge Computing,
                  {FMEC} 2023, Tartu, Estonia, September 18-20, 2023},
  pages        = {42--51},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FMEC59375.2023.10305886},
  doi          = {10.1109/FMEC59375.2023.10305886},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fmec/FakhouriAAHAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/YataghaWSK23,
  author       = {Romarick Yatagha and
                  Karl Waedt and
                  Josef Schindler and
                  Erkin Kirdan},
  editor       = {Maike Klein and
                  Daniel Krupka and
                  Cornelia Winter and
                  Volker Wohlgemuth},
  title        = {Security challenges and best practices for resilient IIoT Networks:
                  Network Segmentation},
  booktitle    = {53. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, {INFORMATIK}
                  2023, Designing Future - Zuk{\"{u}}nfte gestalten, Berlin, Germany
                  September 26-29, 2023},
  series       = {{LNI}},
  volume       = {{P-337}},
  pages        = {2051--2070},
  publisher    = {Gesellschaft f{\"{u}}r Informatik, Bonn},
  year         = {2023},
  url          = {https://doi.org/10.18420/inf2023\_204},
  doi          = {10.18420/INF2023\_204},
  timestamp    = {Fri, 08 Mar 2024 15:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/gi/YataghaWSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AbasiAGD23,
  author       = {Ammar Kamal Abasi and
                  Moayad Aloqaily and
                  Mohsen Guizani and
                  M{\'{e}}rouane Debbah},
  title        = {Mitigating Security Risks in 6G Networks-Based Optimization of Deep
                  Learning},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {7249--7254},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437026},
  doi          = {10.1109/GLOBECOM54140.2023.10437026},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AbasiAGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BoualouacheKSGE23,
  author       = {Abdelwahab Boualouache and
                  Abdelaziz Amara Korba and
                  Sidi{-}Mohammed Senouci and
                  Yacine Ghamri{-}Doudane and
                  Thomas Engel},
  title        = {Reinforcement Learning-Based Security Orchestration for 5G-V2X Network
                  Slicing at Cross-Borders},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {2949--2954},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437953},
  doi          = {10.1109/GLOBECOM54140.2023.10437953},
  timestamp    = {Sun, 10 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/BoualouacheKSGE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MaXTZDB23,
  author       = {Yuanyuan Ma and
                  Zhan Xu and
                  Lu Tian and
                  Ruxin Zhi and
                  Xuhui Ding and
                  Xiangyuan Bu},
  title        = {Uplink Security Analysis of Hybrid {RF-FSO} Cooperative Satellite-Aerial-Terrestrial
                  Networks},
  booktitle    = {{IEEE} Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8,
                  2023},
  pages        = {2140--2145},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GCWkshps58843.2023.10465173},
  doi          = {10.1109/GCWKSHPS58843.2023.10465173},
  timestamp    = {Tue, 26 Mar 2024 22:14:40 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/MaXTZDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/SangaiahCW23,
  author       = {Arun Kumar Sangaiah and
                  Mu Yen Chen and
                  Hsin{-}Te Wu},
  title        = {Building a Smart Agricultural Product Classification System with Security
                  Mechanism Using 5G Network},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {6407--6413},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10436921},
  doi          = {10.1109/GLOBECOM54140.2023.10436921},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/SangaiahCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/SebbarCCB23,
  author       = {Anass Sebbar and
                  Othmane Cherqi and
                  Khalid Chougdali and
                  Mohammed Boulmalf},
  title        = {Real-Time Anomaly Detection in {SDN} Architecture Using Integrated
                  {SIEM} and Machine Learning for Enhancing Network Security},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {1795--1800},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10436884},
  doi          = {10.1109/GLOBECOM54140.2023.10436884},
  timestamp    = {Sun, 10 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/SebbarCCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AdeyemoH23,
  author       = {Adewale Adeyemo and
                  Syed Rafay Hasan},
  editor       = {Himanshu Thapliyal and
                  Ronald F. DeMara and
                  Inna Partin{-}Vaisband and
                  Srinivas Katkoori},
  title        = {Enhancing the Security of Collaborative Deep Neural Networks: An Examination
                  of the Effect of Low Pass Filters},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI}
                  2023, Knoxville, TN, USA, June 5-7, 2023},
  pages        = {461--465},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583781.3590299},
  doi          = {10.1145/3583781.3590299},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AdeyemoH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/ZhaoLWCLL23,
  author       = {Xinjian Zhao and
                  Qianmu Li and
                  Qi Wang and
                  Shi Chen and
                  Tengfei Li and
                  Nianzhe Li},
  editor       = {Hai Jin and
                  Zhiwen Yu and
                  Chen Yu and
                  Xiaokang Zhou and
                  Zeguang Lu and
                  Xianhua Song},
  title        = {A Data Security Protection Method for Deep Neural Network Model Based
                  on Mobility and Sharing},
  booktitle    = {Green, Pervasive, and Cloud Computing - 18th International Conference,
                  {GPC} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14503},
  pages        = {14--29},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9893-7\_2},
  doi          = {10.1007/978-981-99-9893-7\_2},
  timestamp    = {Tue, 20 Aug 2024 07:54:45 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/ZhaoLWCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/healthcom/JiaZJ23,
  author       = {Ruchun Jia and
                  Jianwei Zhang and
                  Zekun Jiang},
  title        = {Research on Clustering Detection Method for Security Attack Behaviors
                  Based on Air Traffic Control Network},
  booktitle    = {{IEEE} International Conference on E-health Networking, Application
                  {\&} Services, Healthcom 2023, Chongqing, China, December 15-17,
                  2023},
  pages        = {282--287},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/Healthcom56612.2023.10472388},
  doi          = {10.1109/HEALTHCOM56612.2023.10472388},
  timestamp    = {Wed, 11 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/healthcom/JiaZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaic/DuYKZ23,
  author       = {Jia Du and
                  Junqiang Yang and
                  Wanli Kou and
                  Huaizhe Zhou},
  title        = {Research and Implementation of Cooperative Utilization of Network
                  Security Devices for Typical Security Events},
  booktitle    = {{IAIC} {(1)}},
  pages        = {333--339},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1277-9\_25},
  doi          = {10.1007/978-981-97-1277-9\_25},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaic/DuYKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaic/ZhangCC23,
  author       = {Kun{-}Shan Zhang and
                  Chiu{-}Mei Chen and
                  Wen{-}Yu Chang},
  title        = {Research on the Regulation and Network Security of Smart Tourism Public
                  Information Service Platform},
  booktitle    = {{IAIC} {(2)}},
  pages        = {209--218},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1280-9\_16},
  doi          = {10.1007/978-981-97-1280-9\_16},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaic/ZhangCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/IslamOUY23,
  author       = {Md Rezanur Islam and
                  Insu Oh and
                  Muminov Ibrokhim Botir Ugli and
                  Kangbin Yim},
  title        = {Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based
                  Intrusion Detection},
  booktitle    = {Proceedings of the 2023 Fifteenth International Conference on Contemporary
                  Computing, IC3-2023, Noida, India, August 3-5, 2023},
  pages        = {224--229},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607947.3607989},
  doi          = {10.1145/3607947.3607989},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/IslamOUY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/NishaPS23,
  author       = {T. N. Nisha and
                  Dhanya Pramod and
                  Ravi Singh},
  title        = {Zero trust security model: Defining new boundaries to organizational
                  network},
  booktitle    = {Proceedings of the 2023 Fifteenth International Conference on Contemporary
                  Computing, IC3-2023, Noida, India, August 3-5, 2023},
  pages        = {603--609},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607947.3608067},
  doi          = {10.1145/3607947.3608067},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/NishaPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/GuptaRFP23,
  author       = {Manish Kumar Gupta and
                  Ashok Kumar Rai and
                  Mansoor Farooq and
                  Santhiya P.},
  title        = {Network Security and Protection Strategies for Big Data: Challenges
                  and Innovations},
  booktitle    = {6th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023},
  pages        = {705--709},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC3I59117.2023.10398011},
  doi          = {10.1109/IC3I59117.2023.10398011},
  timestamp    = {Tue, 13 Feb 2024 08:24:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3i/GuptaRFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/KumarPRMKKR23,
  author       = {Rakesh Kumar and
                  Hemant Singh Pokhariya and
                  A Kakoli Rao and
                  K. Mayuri and
                  Amit Kumar and
                  Sajeev Kumar and
                  Ajay Rana},
  title        = {Role of Neural Network, Fuzzy, and loT in Integrating Artificial Intelligence
                  as a Cyber Security System},
  booktitle    = {6th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023},
  pages        = {2599--2609},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC3I59117.2023.10397654},
  doi          = {10.1109/IC3I59117.2023.10397654},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3i/KumarPRMKKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/SharmaVRCKK23,
  author       = {Himanshu Sharma and
                  Devvret Verma and
                  Aditya Rana and
                  S. Lakshmana Chari and
                  Rohit Kumar and
                  Naveen Kumar},
  title        = {Enhancing Network Security in IoT Using Machine Learning- Based Anomaly
                  Detection},
  booktitle    = {6th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023},
  pages        = {2650--2654},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC3I59117.2023.10397636},
  doi          = {10.1109/IC3I59117.2023.10397636},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3i/SharmaVRCKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangZSHLWL23,
  author       = {Yixuan Wang and
                  Bo Zhao and
                  Zhonghao Sun and
                  Zhihui Huo and
                  Xueying Li and
                  Yabiao Wu and
                  Jiao Li},
  editor       = {Zahir Tari and
                  Keqiu Li and
                  Hongyi Wu},
  title        = {A Novel Network Topology Sensing Method for Network Security Situation
                  Awareness},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 23rd International
                  Conference, {ICA3PP} 2023, Tianjin, China, October 20-22, 2023, Proceedings,
                  Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14490},
  pages        = {82--101},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0859-8\_5},
  doi          = {10.1007/978-981-97-0859-8\_5},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangZSHLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaice/LiZLCLH23,
  author       = {Junhao Li and
                  Jiacheng Zhou and
                  Lei Li and
                  Baowei Cheng and
                  Shengfei Li and
                  Wenhao He},
  title        = {Robust Detection for Adversarial Attacks - Based on a Graph Neural
                  Network for Web Application Security Protection System},
  booktitle    = {Proceedings of the 4th International Conference on Artificial Intelligence
                  and Computer Engineering, {ICAICE} 2023, Dalian, China, November 17-19,
                  2023},
  pages        = {927--932},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3652628.3652782},
  doi          = {10.1145/3652628.3652782},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaice/LiZLCLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaiic/PramitariniPSA23,
  author       = {Yushintia Pramitarini and
                  Ridho Hendra Yoga Perdana and
                  Kyusung Shim and
                  Beongku An},
  title        = {Exploiting {TAS} schemes to Enhance the PHY-security in Cooperative
                  {NOMA} Networks: {A} Deep Learning Approach},
  booktitle    = {International Conference on Artificial Intelligence in Information
                  and Communication, {ICAIIC} 2023, Bali, Indonesia, February 20-23,
                  2023},
  pages        = {199--204},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIIC57133.2023.10067050},
  doi          = {10.1109/ICAIIC57133.2023.10067050},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaiic/PramitariniPSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}