This work is licensed under the Creative Commons Attribution 4.0 International License.
Shin, J., You, I., & Seo, J. T. (2020). Investment priority analysis of ICS information security resources in smart mobile IoT network environment using the analytic hierarchy process. Mobile Information Systems, 2020(3), 1-11.ShinJ.YouI.SeoJ. T. (2020). Investment priority analysis of ICS information security resources in smart mobile IoT network environment using the analytic hierarchy process. Mobile Information Systems, 2020(3), 1-11.Search in Google Scholar
Zhu, J., Huang, W., Miao, F., Su, C., Zhao, B., & Xiong, Y. (2020). A formal framework of shielding systems by stepwise refinement. International Journal of Network Security, 22(1), 54-67.ZhuJ.HuangW.MiaoF.SuC.ZhaoB.XiongY. (2020). A formal framework of shielding systems by stepwise refinement. International Journal of Network Security, 22(1), 54-67.Search in Google Scholar
Yamauchi, M., Ohsita, Y., Murata, M., Ueda, K., & Kato, Y. (2020). Anomaly detection in smart home operation from user behaviors and home conditions. IEEE Transactions on Consumer Electronics, 66(99), 183-192.YamauchiM.OhsitaY.MurataM.UedaK.KatoY. (2020). Anomaly detection in smart home operation from user behaviors and home conditions. IEEE Transactions on Consumer Electronics, 66(99), 183-192.Search in Google Scholar
Yang, W. H. (2020). Security detection of network intrusion: Application of cluster analysis method. Computer Optics, 44(4), 660-664.YangW. H. (2020). Security detection of network intrusion: Application of cluster analysis method. Computer Optics, 44(4), 660-664.Search in Google Scholar
Zhang, J. (2019). Detection of network protection security vulnerability intrusion based on data mining. International Journal of Network Security, 21(6), 979-984.ZhangJ. (2019). Detection of network protection security vulnerability intrusion based on data mining. International Journal of Network Security, 21(6), 979-984.Search in Google Scholar
Zhang, S., Xie, X., & Xu, Y. (2019). Intrusion detection method based on a deep convolutional neural network. Qinghua Daxue Xuebao/Journal of Tsinghua University, 59(1), 44-52.ZhangS.XieX.XuY. (2019). Intrusion detection method based on a deep convolutional neural network. Qinghua Daxue Xuebao/Journal of Tsinghua University, 59(1), 44-52.Search in Google Scholar
Wei, M., Rong, C., Liang, E., & Zhuang, Y. (2022). An intrusion detection mechanism for IPv6-based wireless sensor networks. International Journal of Distributed Sensor Networks, 18(3), 103053-33770.WeiM.RongC.LiangE.ZhuangY. (2022). An intrusion detection mechanism for IPv6-based wireless sensor networks. International Journal of Distributed Sensor Networks, 18(3), 103053-33770.Search in Google Scholar
Zhang, H., Li, Y., Lv, Z., Sangaiah, A. K., & Huang, T. (2020). A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica, 7(3), 790-799.ZhangH.LiY.LvZ.SangaiahA. K.HuangT. (2020). A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica, 7(3), 790-799.Search in Google Scholar
Zavrak, S., & Iskefiyeli, M. (2020). Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access, 8(99), 108346-108358.ZavrakS.IskefiyeliM. (2020). Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access, 8(99), 108346-108358.Search in Google Scholar
Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. V. N. S., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888-895.NancyP.MuthurajkumarS.GanapathyS.KumarS. V. N. S.SelviM.ArputharajK. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888-895.Search in Google Scholar
Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). KDD Cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41-51.SiddiqueK.AkhtarZ.KhanF. A.KimY. (2019). KDD Cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41-51.Search in Google Scholar
Liu, Y., Wang, J., He, H., Huang, G., & Shi, W. (2021). Identifying important nodes affecting network security in complex networks. International Journal of Distributed Sensor Networks, 17(2), 1560-1571.LiuY.WangJ.HeH.HuangG.ShiW. (2021). Identifying important nodes affecting network security in complex networks. International Journal of Distributed Sensor Networks, 17(2), 1560-1571.Search in Google Scholar
Zhu, B., Chen, Y., & Cai, Y. (2019). Three kinds of network security situation awareness model based on big data. International Journal of Network Security, 21(1), 115-121.ZhuB.ChenY.CaiY. (2019). Three kinds of network security situation awareness model based on big data. International Journal of Network Security, 21(1), 115-121.Search in Google Scholar
Lin, P., & Chen, Y. (2019). Network security situation assessment based on text SimHash in big data environment. International Journal of Network Security, 21(4), 699-708.LinP.ChenY. (2019). Network security situation assessment based on text SimHash in big data environment. International Journal of Network Security, 21(4), 699-708.Search in Google Scholar
Sharma, A., & Sahay, S. K. (2019). Group-wise classification approach to improve Android malicious apps detection accuracy. International Journal of Network Security, 21(3), 409-417.SharmaA.SahayS. K. (2019). Group-wise classification approach to improve Android malicious apps detection accuracy. International Journal of Network Security, 21(3), 409-417.Search in Google Scholar
Einy, S., Oz, C., & Navaei, Y. D. (2021). The anomaly- and signature-based IDS for network security using hybrid inference systems. Mathematical Problems in Engineering, 2021(9), 1-10.EinyS.OzC.NavaeiY. D. (2021). The anomaly- and signature-based IDS for network security using hybrid inference systems. Mathematical Problems in Engineering, 2021(9), 1-10.Search in Google Scholar
Yao, S., Li, Z., Guan, J., & Liu, Y. (2020). Stochastic cost minimization mechanism based on identifier network for IoT security. IEEE Internet of Things Journal, 7(5), 3923-3934.YaoS.LiZ.GuanJ.LiuY. (2020). Stochastic cost minimization mechanism based on identifier network for IoT security. IEEE Internet of Things Journal, 7(5), 3923-3934.Search in Google Scholar
Martini, B., Mori, P., Marino, F., Saracino, A., & Castoldi, P. (2020). Pushing forward security in network slicing by leveraging continuous usage control. IEEE Communications Magazine, 58(7), 65-71.MartiniB.MoriP.MarinoF.SaracinoA.CastoldiP. (2020). Pushing forward security in network slicing by leveraging continuous usage control. IEEE Communications Magazine, 58(7), 65-71.Search in Google Scholar
Liu, Q., & Zeng, M. (2020). Network security situation detection of Internet of Things for smart city based on fuzzy neural network. International Journal of Reasoning-Based Intelligent Systems, 12(3), 222.LiuQ.ZengM. (2020). Network security situation detection of Internet of Things for smart city based on fuzzy neural network. International Journal of Reasoning-Based Intelligent Systems, 12(3), 222.Search in Google Scholar
Huang, J., Huang, W., Meng, Z., Miao, F., & Xiong, Y. (2020). Static analysis of superfluous network transmissions in Android applications. International Journal of Network Security, 22(3), 411-420.HuangJ.HuangW.MengZ.MiaoF.XiongY. (2020). Static analysis of superfluous network transmissions in Android applications. International Journal of Network Security, 22(3), 411-420.Search in Google Scholar