• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Strickland C, Zakar M, Saha C, Soltani Nejad S, Tasnim N, Lizotte DJ, Haque A. DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection. Sensors (Basel) 2024;24:2746. [PMID: 38732852 PMCID: PMC11086058 DOI: 10.3390/s24092746] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/01/2024] [Revised: 04/19/2024] [Accepted: 04/23/2024] [Indexed: 05/13/2024]
2
Dhiman P, Saini N, Gulzar Y, Turaev S, Kaur A, Nisa KU, Hamid Y. A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model. Sensors (Basel) 2024;24:1328. [PMID: 38400486 PMCID: PMC10892953 DOI: 10.3390/s24041328] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/17/2023] [Revised: 11/20/2023] [Accepted: 12/21/2023] [Indexed: 02/25/2024]
3
Kang H, Liu G, Wang Q, Meng L, Liu J. Theory and Application of Zero Trust Security: A Brief Survey. Entropy (Basel) 2023;25:1595. [PMID: 38136475 PMCID: PMC10742574 DOI: 10.3390/e25121595] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/18/2023] [Revised: 11/18/2023] [Accepted: 11/24/2023] [Indexed: 12/24/2023]
4
Cassottana B, Roomi MM, Mashima D, Sansavini G. Resilience analysis of cyber-physical systems: A review of models and methods. Risk Anal 2023;43:2359-2379. [PMID: 36646448 DOI: 10.1111/risa.14089] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/17/2023]
5
Ramzan M, Shoaib M, Altaf A, Arshad S, Iqbal F, Castilla ÁK, Ashraf I. Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm. Sensors (Basel) 2023;23:8642. [PMID: 37896735 PMCID: PMC10611275 DOI: 10.3390/s23208642] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/13/2023] [Revised: 10/09/2023] [Accepted: 10/19/2023] [Indexed: 10/29/2023]
6
Alrayes FS, Zakariah M, Driss M, Boulila W. Deep Neural Decision Forest (DNDF): A Novel Approach for Enhancing Intrusion Detection Systems in Network Traffic Analysis. Sensors (Basel) 2023;23:8362. [PMID: 37896456 PMCID: PMC10610875 DOI: 10.3390/s23208362] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/31/2023] [Revised: 10/02/2023] [Accepted: 10/06/2023] [Indexed: 10/29/2023]
7
Mahalingam A, Perumal G, Subburayalu G, Albathan M, Altameem A, Almakki RS, Hussain A, Abbas Q. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks. Sensors (Basel) 2023;23:8044. [PMID: 37836874 PMCID: PMC10575244 DOI: 10.3390/s23198044] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2023] [Revised: 09/17/2023] [Accepted: 09/22/2023] [Indexed: 10/15/2023]
8
Abu Bakar R, Kijsirikul B. Enhancing Network Visibility and Security with Advanced Port Scanning Techniques. Sensors (Basel) 2023;23:7541. [PMID: 37687997 PMCID: PMC10490701 DOI: 10.3390/s23177541] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/13/2023] [Revised: 08/17/2023] [Accepted: 08/27/2023] [Indexed: 09/10/2023]
9
Yang J, Jiang X, Liang G, Li S, Ma Z. Malicious Traffic Identification with Self-Supervised Contrastive Learning. Sensors (Basel) 2023;23:7215. [PMID: 37631752 PMCID: PMC10459182 DOI: 10.3390/s23167215] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/16/2023] [Revised: 08/04/2023] [Accepted: 08/10/2023] [Indexed: 08/27/2023]
10
Guo Y, Wang Y, Khan F, Al-Atawi AA, Abdulwahid AA, Lee Y, Marapelli B. Traffic Management in IoT Backbone Networks Using GNN and MAB with SDN Orchestration. Sensors (Basel) 2023;23:7091. [PMID: 37631627 PMCID: PMC10458845 DOI: 10.3390/s23167091] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/13/2023] [Revised: 08/05/2023] [Accepted: 08/08/2023] [Indexed: 08/27/2023]
11
Du X, Ding X, Tao F. Network Security Situation Prediction Based on Optimized Clock-Cycle Recurrent Neural Network for Sensor-Enabled Networks. Sensors (Basel) 2023;23:6087. [PMID: 37447936 DOI: 10.3390/s23136087] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/06/2023] [Revised: 06/28/2023] [Accepted: 06/28/2023] [Indexed: 07/15/2023]
12
Paracha MA, Sadiq M, Liang J, Durad MH, Sheeraz M. Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning. Sensors (Basel) 2023;23:5829. [PMID: 37447678 DOI: 10.3390/s23135829] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/10/2023] [Revised: 06/12/2023] [Accepted: 06/13/2023] [Indexed: 07/15/2023]
13
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. Sensors (Basel) 2023;23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
14
Farooq H, Altaf A, Iqbal F, Galán JC, Aray DG, Ashraf I. DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents. Sensors (Basel) 2023;23:5388. [PMID: 37420557 DOI: 10.3390/s23125388] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/10/2023] [Revised: 06/01/2023] [Accepted: 06/05/2023] [Indexed: 07/09/2023]
15
Xing L, Wang K, Wu H, Ma H, Zhang X. Intrusion Detection Method for Internet of Vehicles Based on Parallel Analysis of Spatio-Temporal Features. Sensors (Basel) 2023;23:s23094399. [PMID: 37177603 PMCID: PMC10181641 DOI: 10.3390/s23094399] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/06/2023] [Revised: 04/26/2023] [Accepted: 04/26/2023] [Indexed: 05/15/2023]
16
Tariq U, Ahmed I, Bashir AK, Shaukat K. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors (Basel) 2023;23:4117. [PMID: 37112457 PMCID: PMC10142206 DOI: 10.3390/s23084117] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/28/2023] [Revised: 04/04/2023] [Accepted: 04/14/2023] [Indexed: 06/19/2023]
17
Malone M, Walton R. Comparing Canada’s proposed Critical Cyber Systems Protection Act with cybersecurity legal requirements in the EU. Int Cybersecur Law Rev 2023;4:165-196. [PMID: 37153843 PMCID: PMC9975875 DOI: 10.1365/s43439-023-00082-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/29/2022] [Accepted: 01/23/2023] [Indexed: 03/05/2023]
18
D’hooge L, Verkerken M, Wauters T, De Turck F, Volckaert B. Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection. Sensors (Basel) 2023;23:1846. [PMID: 36850444 PMCID: PMC9960990 DOI: 10.3390/s23041846] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/17/2022] [Revised: 02/02/2023] [Accepted: 02/03/2023] [Indexed: 06/18/2023]
19
Fang Z, Xu Z. Network Delay and Cache Overflow: A Parameter Estimation Method for Time Window Based Hopping Network. Entropy (Basel) 2023;25:116. [PMID: 36673257 PMCID: PMC9858253 DOI: 10.3390/e25010116] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/17/2022] [Revised: 12/24/2022] [Accepted: 01/03/2023] [Indexed: 06/17/2023]
20
Muthuvel S, Rajagopal S, Subramaniam SK. Analysis of Security Issues in Wireless Body Area Networks in Heterogeneous Networks. Sensors (Basel) 2022;22:7588. [PMID: 36236687 PMCID: PMC9571783 DOI: 10.3390/s22197588] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/24/2022] [Revised: 09/26/2022] [Accepted: 09/28/2022] [Indexed: 06/16/2023]
21
Nasir MU, Khan S, Mehmood S, Khan MA, Zubair M, Hwang SO. Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology. Sensors (Basel) 2022;22:6755. [PMID: 36146104 PMCID: PMC9500681 DOI: 10.3390/s22186755] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/16/2022] [Revised: 09/01/2022] [Accepted: 09/04/2022] [Indexed: 06/16/2023]
22
Chen CM, Chen Z, Kumari S, Lin MC. LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things. Sensors (Basel) 2022;22:5401. [PMID: 35891080 PMCID: PMC9320153 DOI: 10.3390/s22145401] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/26/2022] [Revised: 07/02/2022] [Accepted: 07/13/2022] [Indexed: 06/15/2023]
23
Akshay Kumaar M, Samiayya D, Vincent PMDR, Srinivasan K, Chang CY, Ganesh H. A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning. Front Public Health 2022;9:824898. [PMID: 35096763 PMCID: PMC8790147 DOI: 10.3389/fpubh.2021.824898] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/29/2021] [Accepted: 12/16/2021] [Indexed: 12/01/2022]  Open
24
Aslam M, Ye D, Tariq A, Asad M, Hanif M, Ndzi D, Chelloug SA, Elaziz MA, Al-Qaness MAA, Jilani SF. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Sensors (Basel) 2022;22:s22072697. [PMID: 35408312 PMCID: PMC9002783 DOI: 10.3390/s22072697] [Citation(s) in RCA: 10] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/18/2022] [Revised: 03/25/2022] [Accepted: 03/25/2022] [Indexed: 11/16/2022]
25
Majid M, Habib S, Javed AR, Rizwan M, Srivastava G, Gadekallu TR, Lin JCW. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors (Basel) 2022;22:s22062087. [PMID: 35336261 PMCID: PMC8950945 DOI: 10.3390/s22062087] [Citation(s) in RCA: 46] [Impact Index Per Article: 23.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Revised: 02/27/2022] [Accepted: 03/02/2022] [Indexed: 11/30/2022]
26
Malik A, Khan MZ, Faisal M, Khan F, Seo JT. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors (Basel) 2022;22:1897. [PMID: 35271043 DOI: 10.3390/s22051897] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/19/2021] [Revised: 01/21/2022] [Accepted: 02/23/2022] [Indexed: 11/17/2022]
27
Desnitsky V, Chechulin A, Kotenko I. Multi-Aspect Based Approach to Attack Detection in IoT Clouds. Sensors (Basel) 2022;22:1831. [PMID: 35270979 DOI: 10.3390/s22051831] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/30/2021] [Revised: 02/21/2022] [Accepted: 02/22/2022] [Indexed: 02/04/2023]
28
Verkerken M, D’hooge L, Wauters T, Volckaert B, De Turck F. Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques. J Netw Syst Manage 2022. [PMCID: PMC8520582 DOI: 10.1007/s10922-021-09615-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/14/2023]
29
Akram F, Liu D, Zhao P, Kryvinska N, Abbas S, Rizwan M. Trustworthy Intrusion Detection in E-Healthcare Systems. Front Public Health 2021;9:788347. [PMID: 34926397 PMCID: PMC8678532 DOI: 10.3389/fpubh.2021.788347] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/02/2021] [Accepted: 10/25/2021] [Indexed: 11/19/2022]  Open
30
Kotecha K, Verma R, Rao PV, Prasad P, Mishra VK, Badal T, Jain D, Garg D, Sharma S. Enhanced Network Intrusion Detection System. Sensors (Basel) 2021;21:7835. [PMID: 34883839 DOI: 10.3390/s21237835] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/12/2021] [Revised: 11/11/2021] [Accepted: 11/19/2021] [Indexed: 12/03/2022]
31
Yang J, Wang L. Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection. Sensors (Basel) 2021;21:s21227464. [PMID: 34833539 PMCID: PMC8618504 DOI: 10.3390/s21227464] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/15/2021] [Revised: 11/05/2021] [Accepted: 11/08/2021] [Indexed: 11/16/2022]
32
Peppes N, Daskalakis E, Alexakis T, Adamopoulou E, Demestichas K. Performance of Machine Learning-Based Multi-Model Voting Ensemble Methods for Network Threat Detection in Agriculture 4.0. Sensors (Basel) 2021;21:7475. [PMID: 34833551 DOI: 10.3390/s21227475] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/08/2021] [Revised: 10/22/2021] [Accepted: 11/08/2021] [Indexed: 11/28/2022]
33
Aljabri M, Aljameel SS, Mohammad RMA, Almotiri SH, Mirza S, Anis FM, Aboulnour M, Alomari DM, Alhamed DH, Altamimi HS. Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. Sensors (Basel) 2021;21:7070. [PMID: 34770375 DOI: 10.3390/s21217070] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/12/2021] [Revised: 10/20/2021] [Accepted: 10/21/2021] [Indexed: 11/17/2022]
34
Sawicki K, Bieszczad G, Piotrowski Z. StegoFrameOrder-MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks. Sensors (Basel) 2021;21:6268. [PMID: 34577475 DOI: 10.3390/s21186268] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/04/2021] [Revised: 09/03/2021] [Accepted: 09/16/2021] [Indexed: 11/18/2022]
35
Zhi L, Yin P, Ren J, Wei G, Zhou J, Wu J, Shen Q. Running an Internet Hospital in China: Perspective Based on a Case Study. J Med Internet Res 2021;23:e18307. [PMID: 34342267 PMCID: PMC8485192 DOI: 10.2196/18307] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/19/2020] [Revised: 11/25/2020] [Accepted: 08/02/2021] [Indexed: 11/13/2022]  Open
36
Kraft MA. Alternatives to Google Suite Applications. Med Ref Serv Q 2021;40:303-310. [PMID: 34495800 DOI: 10.1080/02763869.2021.1945865] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
37
Sikora M, Fujdiak R, Kuchar K, Holasova E, Misurec J. Generator of Slow Denial-of-Service Cyber Attacks. Sensors (Basel) 2021;21:5473. [PMID: 34450915 DOI: 10.3390/s21165473] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 07/29/2021] [Accepted: 08/05/2021] [Indexed: 11/18/2022]
38
Haenel A, Haddad Y, Laurent M, Zhang Z. Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things. Sensors (Basel) 2021;21:s21124034. [PMID: 34208142 PMCID: PMC8230913 DOI: 10.3390/s21124034] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/02/2021] [Revised: 06/06/2021] [Accepted: 06/09/2021] [Indexed: 11/16/2022]
39
Wang P, Zhou M, Ding Z. A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks. Sensors (Basel) 2021;21:2355. [PMID: 33800676 DOI: 10.3390/s21072355] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/18/2021] [Revised: 03/25/2021] [Accepted: 03/26/2021] [Indexed: 11/16/2022]
40
Ge M, Yu X, Liu L. Robot Communication: Network Traffic Classification Based on Deep Neural Network. Front Neurorobot 2021;15:648374. [PMID: 33815085 PMCID: PMC8018276 DOI: 10.3389/fnbot.2021.648374] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/31/2020] [Accepted: 02/18/2021] [Indexed: 11/13/2022]  Open
41
Hsu FH, Lee CH, Wang CY, Hung RY, Zhuang Y. DDoS Flood and Destination Service Changing Sensor. Sensors (Basel) 2021;21:s21061980. [PMID: 33799796 PMCID: PMC7998187 DOI: 10.3390/s21061980] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/10/2021] [Revised: 03/05/2021] [Accepted: 03/08/2021] [Indexed: 11/16/2022]
42
Kim P, Lee Y, Hong YS, Kwon T. A Password Meter without Password Exposure. Sensors (Basel) 2021;21:s21020345. [PMID: 33419094 PMCID: PMC7825399 DOI: 10.3390/s21020345] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/24/2020] [Revised: 12/25/2020] [Accepted: 01/04/2021] [Indexed: 11/22/2022]
43
You X, Wang CX, Huang J, Gao X, Zhang Z, Wang M, Huang Y, Zhang C, Jiang Y, Wang J, Zhu M, Sheng B, Wang D, Pan Z, Zhu P, Yang Y, Liu Z, Zhang P, Tao X, Li S, Chen Z, Ma X, I CL, Han S, Li K, Pan C, Zheng Z, Hanzo L, Shen X(S, Guo YJ, Ding Z, Haas H, Tong W, Zhu P, Yang G, Wang J, Larsson EG, Ngo HQ, Hong W, Wang H, Hou D, Chen J, Chen Z, Hao Z, Li GY, Tafazolli R, Gao Y, Poor HV, Fettweis GP, Liang YC. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 2021;64:110301. [PMCID: PMC7714900 DOI: 10.1007/s11432-020-2955-6] [Citation(s) in RCA: 70] [Impact Index Per Article: 23.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/17/2020] [Revised: 06/08/2020] [Accepted: 06/17/2020] [Indexed: 05/27/2023]
44
Rytel M, Felkner A, Janiszewski M. Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources. Sensors (Basel) 2020;20:s20215969. [PMID: 33105564 PMCID: PMC7659474 DOI: 10.3390/s20215969] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/16/2020] [Revised: 10/15/2020] [Accepted: 10/20/2020] [Indexed: 11/16/2022]
45
Nazih W, Hifny Y, Elkilani WS, Dhahri H, Abdelkader T. Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks. Sensors (Basel) 2020;20:E5875. [PMID: 33080829 DOI: 10.3390/s20205875] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/10/2020] [Revised: 10/10/2020] [Accepted: 10/13/2020] [Indexed: 11/17/2022]
46
Kalbo N, Mirsky Y, Shabtai A, Elovici Y. The Security of IP-Based Video Surveillance Systems. Sensors (Basel) 2020;20:s20174806. [PMID: 32858840 PMCID: PMC7506579 DOI: 10.3390/s20174806] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/18/2020] [Revised: 08/13/2020] [Accepted: 08/20/2020] [Indexed: 11/16/2022]
47
Vaccari I, Aiello M, Cambiaso E. SlowITe, a Novel Denial of Service Attack Affecting MQTT. Sensors (Basel) 2020;20:E2932. [PMID: 32455752 DOI: 10.3390/s20102932] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/16/2020] [Revised: 05/14/2020] [Accepted: 05/19/2020] [Indexed: 11/29/2022]
48
Bohara B, Bhuyan J, Wu F, Ding J. A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY. ACTA ACUST UNITED AC 2020;12:1-18. [PMID: 34290487 DOI: 10.5121/ijnsa.2020.12101] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
49
Wee J, Choi JG, Pak W. Wildcard Fields-Based Partitioning for Fast and Scalable Packet Classification in Vehicle-to-Everything. Sensors (Basel) 2019;19:s19112563. [PMID: 31195635 PMCID: PMC6603548 DOI: 10.3390/s19112563] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/19/2019] [Revised: 05/31/2019] [Accepted: 06/03/2019] [Indexed: 11/16/2022]
50
Liu L, Chen W, Li T, Liu Y. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks. Sensors (Basel) 2019;19:E2452. [PMID: 31146365 DOI: 10.3390/s19112452] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/13/2019] [Revised: 05/26/2019] [Accepted: 05/27/2019] [Indexed: 01/10/2023]
PrevPage 1 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA