forked from tboult/CS6000-F24-Gitassignment
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrcheruiyotrefs.bib
210 lines (210 loc) · 7.17 KB
/
rcheruiyotrefs.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
@inproceedings{kumar2020detecting,
title={Detecting malicious accounts on the Ethereum blockchain with supervised learning},
author={Kumar, Nitesh and Singh, Ajay and Handa, Anand and Shukla, Sandeep Kumar},
booktitle={International Symposium on Cyber Security Cryptography and Machine Learning},
pages={94--109},
year={2020},
organization={Springer}
}
@incollection{gurdgiev2021informational,
title={Informational Efficiency and Cybersecurity: Systemic Threats to Blockchain Applications},
author={Gurdgiev, Constantin and Fleming, Adam},
booktitle={Innovations in Social Finance},
pages={347--372},
year={2021},
publisher={Springer}
}
@article{berghout2022machine,
title={Machine Learning for Cybersecurity in Smart Grids: A Comprehensive Review-based Study on Methods, Solutions, and Prospects},
author={Berghout, Tarek and Benbouzid, Mohamed and Muyeen, SM},
journal={International Journal of Critical Infrastructure Protection},
pages={100547},
year={2022},
publisher={Elsevier}
}
@article{li2021deep,
title={Deep learning algorithms for cyber security applications: A survey},
author={Li, Guangjun and Sharma, Preetpal and Pan, Lei and Rajasegarar, Sutharshan and Karmakar, Chandan and Patterson, Nicholas},
journal={Journal of Computer Security},
number={Preprint},
pages={1--25},
year={2021},
publisher={IOS Press}
}
@article{podder2021artificial,
title={Artificial neural network for cybersecurity: a comprehensive review},
author={Podder, Prajoy and Bharati, Subrato and Mondal, M and Paul, Pinto Kumar and Kose, Utku},
journal={arXiv preprint arXiv:2107.01185},
year={2021}
}
@article{jain2004introduction,
title={An introduction to biometric recognition},
author={Jain, Anil K and Ross, Arun and Prabhakar, Salil},
journal={IEEE Transactions on circuits and systems for video technology},
volume={14},
number={1},
pages={4--20},
year={2004},
publisher={IEEE}
}
@article{jain2004introduction,
title={An introduction to biometric recognition},
author={Jain, Anil K and Ross, Arun and Prabhakar, Salil},
journal={IEEE Transactions on circuits and systems for video technology},
volume={14},
number={1},
pages={4--20},
year={2004},
publisher={IEEE}
}
@inproceedings{yu2003ga,
title={GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification},
author={Yu, Enzhe and Cho, Sungzoon},
booktitle={Proceedings of the international joint conference on neural networks},
volume={3},
pages={2253--2257},
year={2003},
organization={IEEE Press}
}
@inproceedings{roy2018protection,
title={Protection of kids from internet threats: a machine learning approach for classification of age-group based on typing pattern},
author={Roy, Soumen and Roy, Utpal and Sinha, D},
booktitle={Proceedings of the International MultiConference of Engineers and Computer Scientists},
volume={1},
year={2018}
}
@article{zhang2021research,
title={Research on network security situation awareness based on the LSTM-DT model},
author={Zhang, Haofang and Kang, Chunying and Xiao, Yao},
journal={Sensors},
volume={21},
number={14},
pages={4788},
year={2021},
publisher={MDPI}
}
@article{lecun2015deep,
title={Deep learning},
author={LeCun, Yann and Bengio, Yoshua and Hinton, Geoffrey},
journal={nature},
volume={521},
number={7553},
pages={436--444},
year={2015},
publisher={Nature Publishing Group}
}
@inproceedings{bai2021know,
title={I Know your keyboard input: a robust keystroke eavesdropper based-on acoustic signals},
author={Bai, Jia-Xuan and Liu, Bin and Song, Luchuan},
booktitle={Proceedings of the 29th ACM International Conference on Multimedia},
pages={1239--1247},
year={2021}
}
@article{yu2021information,
title={Information security field event detection technology based on SAtt-LSTM},
author={Yu, Wentao and Huang, Xiaohui and Yuan, Qingjun and Yi, Mianzhu and An, Sen and Li, Xiang},
journal={Security and Communication Networks},
volume={2021},
year={2021},
publisher={Hindawi}
}
@article{xu2018industry,
title={Industry 4.0: state of the art and future trends},
author={Xu, Li Da and Xu, Eric L and Li, Ling},
journal={International journal of production research},
volume={56},
number={8},
pages={2941--2962},
year={2018},
publisher={Taylor \& Francis}
}
@article{culot2019addressing,
title={Addressing industry 4.0 cybersecurity challenges},
author={Culot, Giovanna and Fattori, Fabio and Podrecca, Matteo and Sartor, Marco},
journal={IEEE Engineering Management Review},
volume={47},
number={3},
pages={79--86},
year={2019},
publisher={IEEE}
}
@article{meneghello2019iot,
title={IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices},
author={Meneghello, Francesca and Calore, Matteo and Zucchetto, Daniel and Polese, Michele and Zanella, Andrea},
journal={IEEE Internet of Things Journal},
volume={6},
number={5},
pages={8182--8201},
year={2019},
publisher={IEEE}
}
@article{wang2019blockchain,
title={Blockchain-enabled smart contracts: architecture, applications, and future trends},
author={Wang, Shuai and Ouyang, Liwei and Yuan, Yong and Ni, Xiaochun and Han, Xuan and Wang, Fei-Yue},
journal={IEEE Transactions on Systems, Man, and Cybernetics: Systems},
volume={49},
number={11},
pages={2266--2277},
year={2019},
publisher={IEEE}
}
@article{falco2018iiot,
title={IIoT cybersecurity risk modeling for SCADA systems},
author={Falco, Gregory and Caldera, Carlos and Shrobe, Howard},
journal={IEEE Internet of Things Journal},
volume={5},
number={6},
pages={4486--4495},
year={2018},
publisher={IEEE}
}
@article{pan2015classification,
title={Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data},
author={Pan, Shengyi and Morris, Thomas and Adhikari, Uttam},
journal={IEEE Transactions on Industrial Informatics},
volume={11},
number={3},
pages={650--662},
year={2015},
publisher={IEEE}
}
@article{zhang2003data,
title={Data preparation for data mining},
author={Zhang, Shichao and Zhang, Chengqi and Yang, Qiang},
journal={Applied artificial intelligence},
volume={17},
number={5-6},
pages={375--381},
year={2003},
publisher={Taylor \& Francis}
}
@article{demertzis2018next,
title={The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence},
author={Demertzis, Konstantinos and Kikiras, Panayiotis and Tziritas, Nikos and Sanchez, Salvador Llopis and Iliadis, Lazaros},
journal={Big Data and Cognitive Computing},
volume={2},
number={4},
pages={35},
year={2018},
publisher={MDPI}
}
@article{hao2016mining,
title={Mining $\lambda$-maximal cliques from a fuzzy graph},
author={Hao, Fei and Park, Doo-Soon and Li, Shuai and Lee, Hwa Min},
journal={Sustainability},
volume={8},
number={6},
pages={553},
year={2016},
publisher={MDPI}
}
@article{zhao2019blockchain,
title={Blockchain enabled industrial Internet of Things technology},
author={Zhao, Shanshan and Li, Shancang and Yao, Yufeng},
journal={IEEE Transactions on Computational Social Systems},
volume={6},
number={6},
pages={1442--1453},
year={2019},
publisher={IEEE}
}