Author:
Wang Yuantao,Chen Hai,Gong Lianghua,Wang Rui,Jia Gaopeng,Lu Hui
Publisher
Springer Nature Singapore
Reference11 articles.
1. Su, S., Tian, Z., Liang, S., Li, S., Du, S., Guizani, N.: A reputation management scheme for efficient malicious vehicle identification over 5G networks. IEEE Wirel. Commun. 27(3), 46–52 (2020)
2. Provos, N.: A virtual honeypot framework. In: Proceedings of the 13th USENIX Security Symposium. Berkeley: USENIX Association, vol. 173, pp. 1–14 (2004)
3. Li, M., Tian, Z., Du, X., Yuan, X., Shan, C., Guizani, M.: Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme. Neurocomputing 518, 165–173 (2023)
4. Tian, T.Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)
5. Hu, N., Tian, Z., Lu, H., Du, X., Guizani, M.: A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks. Int. J. Mach. Learn. Cybern. 12(11), 3129–3144 (2021). https://doi.org/10.1007/s13042-020-01253-w