{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:53:44Z","timestamp":1775145224030,"version":"3.50.1"},"reference-count":186,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,2,4]],"date-time":"2022-02-04T00:00:00Z","timestamp":1643932800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,4]],"date-time":"2022-02-04T00:00:00Z","timestamp":1643932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10462-022-10143-2","type":"journal-article","created":{"date-parts":[[2022,2,4]],"date-time":"2022-02-04T16:21:31Z","timestamp":1643991691000},"page":"5215-5261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":123,"title":["The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0814-7544","authenticated-orcid":false,"given":"Muhammad","family":"Waqas","sequence":"first","affiliation":[]},{"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Halim","sequence":"additional","affiliation":[]},{"given":"Sadaqat Ur","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Ghulam","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Ziaul Haq","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,4]]},"reference":[{"key":"10143_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed M, Shi H, Chen X, Li Y, Waqas M, Jin D (2018a) Socially aware secrecy-ensured resource allocation in D2D underlay communication: an overlapping coalitional game scheme. IEEE Trans Wirel Commun 17(6):4118\u20134133","DOI":"10.1109\/TWC.2018.2820693"},{"key":"10143_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed M, Li Y, Waqas M, Sheraz M, Jin D, Han Z (2018b) A survey on socially aware device-to-device communications. IEEE Commun Surv Tutor 20(3):2169\u20132197","DOI":"10.1109\/COMST.2018.2820069"},{"key":"10143_CR3","doi-asserted-by":"crossref","unstructured":"Ahuja R, Chug A, Gupta S, Ahuja P, Kohli S (2020) Classification and clustering algorithms of machine learning with their applications. In: Yang X-S, He X-S (eds) Nature-inspired computation in data mining and machine learning. Springer, pp 225\u2013248","DOI":"10.1007\/978-3-030-28553-1_11"},{"issue":"11","key":"10143_CR4","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s00521-016-2564-5","volume":"29","author":"M Alauthaman","year":"2018","unstructured":"Alauthaman M, Aslam N, Zhang L, Alasem R, Hossain MA (2018) A P2P botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput Appl 29(11):991\u20131004","journal-title":"Neural Comput Appl"},{"key":"10143_CR5","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152\u2013160","journal-title":"J Comput Sci"},{"key":"10143_CR6","doi-asserted-by":"crossref","unstructured":"Alom MZ, Bontupalli V, Taha TM (2015) Intrusion detection using deep belief networks. In: National aerospace and electronics conference (NAECON), pp 339\u2013344","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"10143_CR7","doi-asserted-by":"crossref","unstructured":"Ambekar A, Schotten HD (2014) Enhancing channel reciprocity for effective key management in wireless ad-hoc networks. In: IEEE 79th vehicular technology conference (VTC Spring), pp 1\u20135","DOI":"10.1109\/VTCSpring.2014.7022913"},{"key":"10143_CR8","doi-asserted-by":"publisher","first-page":"106184","DOI":"10.1016\/j.chb.2019.106184","volume":"104","author":"N Ameen","year":"2020","unstructured":"Ameen N, Tarhini A, Shah MH, Madichie NO (2020) Employees\u2019 behavioural intention to smartphone security: a gender-based. Cross-national study. Comput Hum Behav 104:106184","journal-title":"Comput Hum Behav"},{"issue":"4","key":"10143_CR9","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.1109\/TWC.2015.2510643","volume":"15","author":"S Amuru","year":"2016","unstructured":"Amuru S, Tekin C, v der Schaar M, Buehrer RM (2016) Jamming bandits: a novel learning method for optimal jamming. IEEE Trans Wirel Commun 15(4):2792\u20132808","journal-title":"IEEE Trans Wirel Commun"},{"key":"10143_CR10","doi-asserted-by":"crossref","unstructured":"Amuru S, Buehrer RM (2014) Optimal jamming strategies in digital communications impact of modulation. In: IEEE global communications conference, pp 1619\u20131624","DOI":"10.1109\/GLOCOM.2014.7037040"},{"key":"10143_CR11","doi-asserted-by":"crossref","unstructured":"Prasad R, Rohokale V (2020) Malware. In: Cyber security: the lifeline of information and communication technology. Springer, Berlin, pp\u00a067\u201381","DOI":"10.1007\/978-3-030-31703-4_5"},{"key":"10143_CR12","doi-asserted-by":"crossref","unstructured":"Anjomshoa F, Kantarci B, Erol-Kantarci M, Schuckers S (2017) Detection of spoofed identities on smartphones via sociability metrics. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2017.7997423"},{"key":"10143_CR13","unstructured":"Ayodeji O et al (2021) Security and privacy for artificial intelligence: opportunities and challenges. arXiv:2102.04661"},{"key":"10143_CR14","doi-asserted-by":"publisher","first-page":"122711","DOI":"10.1016\/j.physa.2019.122711","volume":"537","author":"L Batra","year":"2020","unstructured":"Batra L, Taneja H (2020) Evaluating volatile stock markets using information theoretic measures. Phys A Stat Mech Appl 537:122711","journal-title":"Phys A Stat Mech Appl"},{"key":"10143_CR15","doi-asserted-by":"crossref","unstructured":"Belciug S, Gorunescu F (2020) Era of intelligent systems in healthcare. In: Dorgham MA (ed) Intelligent decision support systems-a journey to smarter healthcare. Springer, Berlin, pp 1\u201355","DOI":"10.1007\/978-3-030-14354-1_1"},{"key":"10143_CR16","doi-asserted-by":"crossref","unstructured":"Bellet A, Liang Y, Garakani AB, Balcan MF, Sha F (2015) A distributed Frank\u2013Wolfe algorithm for communication efficient sparse learning. In: Proceedings of the 2015 SIAM international conference on data mining, pp 478\u2013486","DOI":"10.1137\/1.9781611974010.54"},{"key":"10143_CR17","doi-asserted-by":"publisher","DOI":"10.4135\/9781529712841","volume-title":"What do we know and what should we do about internet privacy?","author":"P Bernal","year":"2020","unstructured":"Bernal P (2020) What do we know and what should we do about internet privacy? SAGE Publications Limited, Thousand Oaks"},{"issue":"1","key":"10143_CR18","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2013","unstructured":"Bhuyan MH, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303\u2013336","journal-title":"IEEE Commun Surv Tutor"},{"key":"10143_CR19","doi-asserted-by":"crossref","unstructured":"Bill L, Curtis W, Bedford D, Iyer S (2019) The knowledge economy: implications for organizations. Work and workers, knowledge economies and knowledge work (Working methods for knowledge management), pp 41\u201364","DOI":"10.1108\/978-1-78973-775-220191003"},{"issue":"1","key":"10143_CR20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1137\/040615961","volume":"18","author":"D Blatt","year":"2007","unstructured":"Blatt D, Hero AO, Gauchman H (2007) A convergent incremental gradient method with a constant step size. SIAM J Optim 18(1):29\u201351","journal-title":"SIAM J Optim"},{"key":"10143_CR21","unstructured":"Boureau Y-L, Ponce J, LeCun Y (2010) A theoretical analysis of feature pooling in visual recognition. In: Proceedings of the 27th international conference on machine learning, pp 111\u2013118"},{"issue":"2","key":"10143_CR22","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commu Surv Tutor 18(2):1153\u20131176","journal-title":"IEEE Commu Surv Tutor"},{"key":"10143_CR23","doi-asserted-by":"crossref","unstructured":"Butt UJ, Abbod MF, Kumar A (2020) Cyber threat ransomware and marketing to networked consumers. In: Dadwal SS (ed) Handbook of research on innovations in technology and marketing for the connected consumer. IGI Global, pp 155\u2013185","DOI":"10.4018\/978-1-7998-0131-3.ch008"},{"key":"10143_CR24","doi-asserted-by":"crossref","unstructured":"Caravelli J, Jones N (2019) Cyber crime. In: Paige D (ed) Cyber security: threats and responses for government and business. ABC-CLIO, pp 23\u201343","DOI":"10.5040\/9798400636448.ch-002"},{"issue":"1","key":"10143_CR25","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/JIOT.2018.2849324","volume":"6","author":"B Chatterjee","year":"2019","unstructured":"Chatterjee B, Das D, Maity S, Sen S (2019) RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388\u2013398","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"10143_CR26","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.1109\/TAC.2011.2164014","volume":"56","author":"J Chen","year":"2011","unstructured":"Chen J, Yu Q, Cheng P, Sun Y, Fan Y, Shen X (2011) Game theoretical approach for channel allocation in wireless sensor and actuator networks. IEEE Trans Autom Control 56(10):2332\u20132344","journal-title":"IEEE Trans Autom Control"},{"key":"10143_CR27","unstructured":"Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. CoRR arxiv: abs\/1709.08025"},{"key":"10143_CR28","doi-asserted-by":"crossref","unstructured":"Chen G, Zhan Y, Chen Y, Xiao L, Wang Y, An N (2018a) Reinforcement learning based power control for in-body sensors in WBANS against jamming. IEEE Access 6:37403\u201337412","DOI":"10.1109\/ACCESS.2018.2850659"},{"key":"10143_CR29","doi-asserted-by":"crossref","unstructured":"Chen Y, Poskitt CM, Sun J (2018b) Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In: IEEE symposium on security and privacy, pp 648\u2013660","DOI":"10.1109\/SP.2018.00016"},{"key":"10143_CR30","doi-asserted-by":"crossref","unstructured":"Chen L, Yi Z, Chen X (2020) Research on network security technology based on artificial intelligence. In: Kacprzyk J (ed) Recent trends in intelligent computing, communication and devices. Springer, Berlin, pp 729\u2013735","DOI":"10.1007\/978-981-13-9406-5_87"},{"key":"10143_CR31","doi-asserted-by":"crossref","unstructured":"Chernov D, Sornette D (2020) Specific features of risk management in the industrial and agricultural sectors. In: Critical risks of different economic sectors. Springer, Berlin, pp 13\u2013145","DOI":"10.1007\/978-3-030-25034-8_2"},{"key":"10143_CR32","doi-asserted-by":"crossref","unstructured":"Conley WG, Miller AJ (2013) Cognitive jamming game for dynamically countering ad-hoc cognitive radio networks. In: MILCOM 2013\u20142013 IEEE military communications conference, pp 1176\u20131182","DOI":"10.1109\/MILCOM.2013.201"},{"issue":"4","key":"10143_CR33","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1093\/itnow\/bwz109","volume":"61","author":"OP Connor","year":"2019","unstructured":"Connor OP (2019) 2019 security lockdown or hacker bonanza. ITNOW 61(4):44\u201345","journal-title":"ITNOW"},{"issue":"5","key":"10143_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3337065","volume":"52","author":"HN Dai","year":"2019","unstructured":"Dai HN et al (2019) Big data analytics for large-scale wireless networks: challenges and opportunities. ACM Comput Surv (CSUR) 52(5):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"10143_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17648\/jisc.v7i1.76","volume":"7","author":"FL de Mello","year":"2020","unstructured":"de Mello FL (2020) A survey on machine learning adversarial attacks. J Inf Secur Cryptogr (Enigma) 7(1):1\u20137","journal-title":"J Inf Secur Cryptogr (Enigma)"},{"key":"10143_CR36","doi-asserted-by":"publisher","unstructured":"Dibaei M et al (2020) Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: a survey. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2020.3019101","DOI":"10.1109\/TITS.2020.3019101"},{"key":"10143_CR37","doi-asserted-by":"publisher","first-page":"101747","DOI":"10.1016\/j.cose.2020.101747","volume":"92","author":"R Diesch","year":"2020","unstructured":"Diesch R, Pfaff M, Krcmar H (2020) A comprehensive model of information security factors for decision-makers. Comput Secur 92:101747","journal-title":"Comput Secur"},{"key":"10143_CR38","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761\u2013768","journal-title":"Future Gener Comput Syst"},{"key":"10143_CR39","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407\u2013414","DOI":"10.5220\/0005740704070414"},{"key":"10143_CR40","doi-asserted-by":"crossref","unstructured":"Emami C, Smith RG, Jorna P (2019) Predicting online fraud victimisation in Australia. Trends Issues Crime Crim Justice no 577, p 1","DOI":"10.52922\/ti04015"},{"key":"10143_CR41","first-page":"39","volume":"10","author":"M Eslahi","year":"2016","unstructured":"Eslahi M, Yousefi M, Var Naseri M, Yussof YM, Tahir N, Hashim H (2016) Mobile botnet detection model based on retrospective pattern recognition. Int J Secur Appl 10:39\u201344","journal-title":"Int J Secur Appl"},{"issue":"1","key":"10143_CR42","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/13658816.2019.1654109","volume":"34","author":"S Fatma","year":"2020","unstructured":"Fatma S et al (2020) Modelling perceived risks to personal privacy from location disclosure on online social networks. Int J Geogr Inf Sci 34(1):150\u2013176","journal-title":"Int J Geogr Inf Sci"},{"key":"10143_CR43","doi-asserted-by":"crossref","unstructured":"Feng Q, Dou Z, Li C, Si G (2017a) Anomaly detection of spectrum in wireless communication via deep autoencoder. In: Advances in computer science and ubiquitous computing, pp 259\u2013265","DOI":"10.1007\/978-981-10-3023-9_42"},{"key":"10143_CR44","doi-asserted-by":"crossref","unstructured":"Feng C, Wu S, Liu N (2017b) A user-centric machine learning framework for cybersecurity operations center. In: IEEE international conference on intelligence and security informatics (ISI), pp 173\u2013175","DOI":"10.1109\/ISI.2017.8004902"},{"key":"10143_CR45","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.neucom.2012.11.050","volume":"122","author":"U Fiore","year":"2013","unstructured":"Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13\u201323","journal-title":"Neurocomputing"},{"key":"10143_CR46","unstructured":"Forecast CGMDT (2016) Update Report, 2014\u20132019, Cisco white paper"},{"key":"10143_CR47","first-page":"92","volume-title":"Mobile malware, securing the internet of things: concepts, methodologies, tools, and applications","author":"G Geogen","year":"2020","unstructured":"Geogen G, Poovammal E (2020) Mobile malware, securing the internet of things: concepts, methodologies, tools, and applications. IGI Global, Hershey, pp 92\u2013108"},{"key":"10143_CR48","doi-asserted-by":"crossref","unstructured":"Gopalsamy BN, Brindha G, Santhi B (2020) Implementation of machine learning in network security. In: Solanki A, Kumar S, Nayyar A (eds) Handbook of research on emerging trends and applications of machine learning. IGI Global, pp 276\u2013299","DOI":"10.4018\/978-1-5225-9643-1.ch013"},{"key":"10143_CR49","doi-asserted-by":"crossref","unstructured":"Gu X, Li X (2016) A detection method for network security based on the combination of support vector machine. In: Third international conference on artificial intelligence and pattern recognition (AIPR), pp 1\u20135","DOI":"10.1109\/ICAIPR.2016.7585222"},{"key":"10143_CR50","doi-asserted-by":"crossref","unstructured":"Gupta V, Sharma E (2018) Mitigating DNS amplification attacks using a set of geographically distributed SDN routers. In: IEEE international conference on advances in computing, communications and informatics (ICACCI), pp\u00a0392\u2013400","DOI":"10.1109\/ICACCI.2018.8554459"},{"issue":"2","key":"10143_CR51","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1137\/15M1049695","volume":"27","author":"M Gurbuzbalaban","year":"2017","unstructured":"Gurbuzbalaban M, Ozdaglar A, Parrilo PA (2017) On the convergence rate of incremental aggregated gradient algorithms. SIAM J Optim 27(2):1035\u20131048","journal-title":"SIAM J Optim"},{"key":"10143_CR52","unstructured":"Gwon YL, Kung H (2014) Inferring origin flow patterns in wi-fi with deep learning. In: 11th international conference on autonomic computing, pp 73\u201383"},{"key":"10143_CR53","doi-asserted-by":"crossref","unstructured":"Gwon Y, Dastangoo S, Fossa C, Kung H (2013) Competing mobile network game: embracing anti-jamming and jamming strategies with reinforcement learning. In: IEEE conference on communications and network security (CNS), pp 28\u201336","DOI":"10.1109\/CNS.2013.6682689"},{"key":"10143_CR54","doi-asserted-by":"crossref","unstructured":"Hajoary PK, Akhilesh K (2020) Role of government in tackling cybersecurity threat. In: Akhilesh KB, M\u00f6ller DPF (eds) Smart technologies. Springer, pp 79\u201396","DOI":"10.1007\/978-981-13-7139-4_6"},{"issue":"2","key":"10143_CR55","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TII.2017.2769106","volume":"14","author":"K Hamedani","year":"2018","unstructured":"Hamedani K, Liu L, Atat R, Wu J, Yi Y (2018) Reservoir computing meets smart grids: attack detection using delayed feedback networks. IEEE Trans Ind Inf 14(2):734\u2013743","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"10143_CR56","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TIFS.2015.2505680","volume":"11","author":"Y Han","year":"2016","unstructured":"Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BI (2016) A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556\u2013570","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10143_CR57","doi-asserted-by":"crossref","unstructured":"Hartong MW, Roddy SA (2020) An information theoretic approach to platform technology selection to aid influence operations. IEEE Syst J 14(4):5308\u20135319","DOI":"10.1109\/JSYST.2020.2966817"},{"issue":"2","key":"10143_CR58","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J (2017) Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun Surv Tutor 19(2):1054\u20131079","journal-title":"IEEE Commun Surv Tutor"},{"key":"10143_CR59","doi-asserted-by":"crossref","unstructured":"He P, Gan G (2020) Android malicious APP detection based on CNN deep learning algorithm. In: IOP conference series: earth and environmental science, vol 428, no\u00a01, p 012061","DOI":"10.1088\/1755-1315\/428\/1\/012061"},{"issue":"13","key":"10143_CR60","doi-asserted-by":"publisher","first-page":"3429","DOI":"10.1109\/TSP.2016.2548987","volume":"64","author":"X He","year":"2016","unstructured":"He X, Dai H, Ning P (2016) Faster learning and adaptation in security games by exploiting information asymmetry. IEEE Trans Signal Process 64(13):3429\u20133443","journal-title":"IEEE Trans Signal Process"},{"issue":"9","key":"10143_CR61","first-page":"62","volume":"35","author":"B Head","year":"2019","unstructured":"Head B (2019) Breach of faith. Co Dir 35(9):62","journal-title":"Co Dir"},{"key":"10143_CR62","unstructured":"Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv:1701.02145"},{"key":"10143_CR63","doi-asserted-by":"crossref","unstructured":"Hou S, Saas A, Chen L, Ye Y (2016) Deep4maldroid: a deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE\/WIC\/ACM international conference on web intelligence workshops (WIW), pp 104\u2013111","DOI":"10.1109\/WIW.2016.040"},{"key":"10143_CR64","doi-asserted-by":"publisher","first-page":"35 926","DOI":"10.1109\/ACCESS.2018.2851228","volume":"6","author":"X Huang","year":"2018","unstructured":"Huang X, Lu Y, Li D, Ma M (2018) A novel mechanism for fast detection of transformed data leakage. IEEE Access 6:35 926-35 936","journal-title":"IEEE Access"},{"key":"10143_CR65","doi-asserted-by":"crossref","unstructured":"Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar JD (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, pp 43\u201358","DOI":"10.1145\/2046684.2046692"},{"key":"10143_CR66","unstructured":"Jaggi M (2013) Revisiting Frank\u2013Wolfe: projection-free sparse convex optimization. In: ICML (1), pp 427\u2013435"},{"key":"10143_CR67","doi-asserted-by":"crossref","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies, pp 21\u201326","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"10143_CR68","doi-asserted-by":"crossref","unstructured":"Jiang Z, Zhao J, Li X-Y, Han J, Xi W (2013) Rejecting the attack: source authentication for wi-fi management frames using CSI information. In: Proceedings IEEE INFOCOM, pp 2544\u20132552","DOI":"10.1109\/INFCOM.2013.6567061"},{"issue":"2","key":"10143_CR69","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MWC.2016.1500356WC","volume":"24","author":"C Jiang","year":"2016","unstructured":"Jiang C, Zhang H, Ren Y, Han Z, Kwang KC, Lajos H (2016) Machine learning paradigms for next-generation wireless networks. IEEE Wirel Commun 24(2):98\u2013105","journal-title":"IEEE Wirel Commun"},{"key":"10143_CR70","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J et al (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20:2481\u20132501","journal-title":"Wirel Netw"},{"issue":"1","key":"10143_CR71","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","volume":"23","author":"OA Jonathan","year":"2020","unstructured":"Jonathan OA, Oeldorf-Hirsch A (2020) The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf Commun Soc 23(1):128\u2013147","journal-title":"Inf Commun Soc"},{"issue":"6","key":"10143_CR72","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781","journal-title":"PLoS ONE"},{"key":"10143_CR73","unstructured":"Keetharuth BS, Forbes AN, Simmons WP (2019) Increasing legal protections at the international, regional and national levels for human rights defenders working in Africa and Asia E-WEL-2016-5378, September 2016\u2013August 2019"},{"issue":"15","key":"10143_CR74","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1002\/sec.1204","volume":"9","author":"MA Khan","year":"2016","unstructured":"Khan MA, Khan S, Shams B, Lloret J (2016) Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Secur Commun Netw 9(15):2715\u20132729","journal-title":"Secur Commun Netw"},{"key":"10143_CR75","doi-asserted-by":"crossref","unstructured":"Kharraz A, Robertson W, Kirda E (2018) Surveylance: automatically detecting online survey scams. In: IEEE symposium on security and privacy, pp 70\u201386","DOI":"10.1109\/SP.2018.00044"},{"key":"10143_CR76","doi-asserted-by":"crossref","unstructured":"K\u00f6m\u00fcrc\u00fc G, D\u00fcndar G (2012) Determining the quality metrics for PUFs and performance evaluation of two RO-PUFs. In: 10th IEEE international NEWCAS conference, pp 73\u201376","DOI":"10.1109\/NEWCAS.2012.6328959"},{"key":"10143_CR77","doi-asserted-by":"crossref","unstructured":"Kwon D, Kim H, Kim J, Suh SC, Kim I, Kim KJ A (2017) Survey of deep learning-based network anomaly detection, cluster computing","DOI":"10.1007\/s10586-017-1117-8"},{"key":"10143_CR78","doi-asserted-by":"publisher","first-page":"9005","DOI":"10.1109\/ACCESS.2019.2963407","volume":"8","author":"XA Larriva-Novo","year":"2020","unstructured":"Larriva-Novo XA, Vega-Barbas M, Villagr\u00e1 VA, Rodrigo MS (2020) Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access 8:9005\u20139014","journal-title":"IEEE Access"},{"issue":"3","key":"10143_CR79","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCE.2017.2685019","volume":"6","author":"JH Lee","year":"2017","unstructured":"Lee JH, Kim H (2017) Security and privacy challenges in the Internet of Things [Security and privacy matters]. IEEE Consum Electron Mag 6(3):134\u2013136","journal-title":"IEEE Consum Electron Mag"},{"key":"10143_CR80","doi-asserted-by":"publisher","first-page":"7776","DOI":"10.1109\/ACCESS.2017.2696365","volume":"5","author":"A Lheureux","year":"2017","unstructured":"Lheureux A, Grolinger K, Elyamany HF, Capretz MA (2017) Machine learning with big data: challenges and approaches. IEEE Access 5:7776\u20137797","journal-title":"IEEE Access"},{"key":"10143_CR81","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"JH Li","year":"2019","unstructured":"Li JH (2019) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 19:1462\u20131474","journal-title":"Front Inf Technol Electron Eng"},{"issue":"14","key":"10143_CR82","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1049\/iet-com.2017.0829","volume":"12","author":"W Li","year":"2018","unstructured":"Li W, Huang J (2018) Mobile physical layer spoofing detection based on sparse representation. IET Commun 12(14):1709\u20131713","journal-title":"IET Commun"},{"key":"10143_CR83","doi-asserted-by":"crossref","unstructured":"Li P, Liu Q, Zhao W, Wang D, Wang S (2018) Chronic poisoning against machine learning based IDSS using edge pattern detection. In.:IEEE international conference on communications (ICC), pp 1\u20137","DOI":"10.1109\/ICC.2018.8422328"},{"issue":"13","key":"10143_CR84","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1049\/iet-com.2019.0306","volume":"13","author":"Q Lin","year":"2019","unstructured":"Lin Q, Tu S, Waqas M, ur Rehman S, Chang CC (2019) Tracking areas planning based on spectral clustering in small cell networks. IET Commun 13(13):1921\u20131927","journal-title":"IET Commun"},{"key":"10143_CR85","doi-asserted-by":"crossref","unstructured":"Liu FJ, Wang X, Primak SL (2013) A two dimensional quantization algorithm for CIR-based physical layer authentication. In: IEEE international conference on communications (ICC), pp 4724\u20134728","DOI":"10.1109\/ICC.2013.6655319"},{"key":"10143_CR86","doi-asserted-by":"crossref","unstructured":"Liu H, Wang Y, Liu J, Yang J, Chen Y (2014) Practical user authentication leveraging channel state information (csi). In: Proceedings of the 9th ACM symposium on information, computer and communications security, pp 389\u2013400","DOI":"10.1145\/2590296.2590321"},{"key":"10143_CR87","doi-asserted-by":"crossref","unstructured":"Liu M, Tu S, Xiao C, Waqas M, ur\u00a0Rehman S, Aamir M, Chang CC (2020a) The allocation and reuse scheme of physical cell identifications based on maximum degree first coloring algorithm. IEEE Syst J 14(1):582\u2013591","DOI":"10.1109\/JSYST.2019.2911273"},{"key":"10143_CR88","doi-asserted-by":"publisher","first-page":"101682","DOI":"10.1016\/j.cose.2019.101682","volume":"89","author":"X Liu","year":"2020","unstructured":"Liu X, Lin Y, Li H, Zhang J (2020b) A novel method for malware detection on ML-based visualization technique. Comput Secur 89:101682","journal-title":"Comput Secur"},{"key":"10143_CR89","doi-asserted-by":"publisher","first-page":"4566","DOI":"10.1109\/ACCESS.2020.3045078","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu X et al (2021) Privacy and security issues in deep learning: a survey. IEEE Access 9:4566\u20134593","journal-title":"IEEE Access"},{"key":"10143_CR90","doi-asserted-by":"crossref","unstructured":"Lobato AGP, Lopez MA, Sanz IJ, Cardenas AA, Duarte, OCM, Pujolle G (2018) An adaptive real-time architecture for zero-day threat detection. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2018.8422622"},{"key":"10143_CR91","unstructured":"Lohstroh M (2017) Why the equifax breach should not have mattered"},{"key":"10143_CR92","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2017","unstructured":"Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2017) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24:1999\u20132012","journal-title":"Soft Comput"},{"key":"10143_CR93","doi-asserted-by":"crossref","unstructured":"Lu Y, Huang X, Ma Y, Ma M (2018a) A weighted context graph model for fast data leak detection. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2018.8422280"},{"key":"10143_CR94","doi-asserted-by":"crossref","unstructured":"Lu X, Wan X, Xiao L, Tang Y, Zhuang W (2018b) Learning-based rogue edge detection in VANETs with ambient radio signals. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2018.8422831"},{"key":"10143_CR95","doi-asserted-by":"crossref","unstructured":"Mahfouz AM, Venugopal D, Shiva SG (2020) Comparative analysis of ML classifiers for network intrusion detection. In: 4th international congress on information and communication technology, pp 193\u2013207","DOI":"10.1007\/978-981-32-9343-4_16"},{"issue":"4","key":"10143_CR96","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1109\/COMST.2018.2846401","volume":"20","author":"Q Mao","year":"2018","unstructured":"Mao Q, Hu F, Hao Q (2018) Deep learning for intelligent wireless networks: a comprehensive survey. IEEE Commun Surv Tutor 20(4):2595\u20132621","journal-title":"IEEE Commun Surv Tutor"},{"key":"10143_CR97","unstructured":"Mart\u00edn ML, Carro B, S\u00e1nchez-Esguevillas AJ, Mauri JL (2017) Conditional variational auto-encoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 112:2372\u20132381"},{"key":"10143_CR98","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1016\/j.procs.2017.08.216","volume":"112","author":"F Martinelli","year":"2017","unstructured":"Martinelli F, Marulli F, Mercaldo F (2017) Evaluating convolutional neural network for effective mobile malware detection. Procedia Comput Sci 112:2372\u20132381","journal-title":"Procedia Comput Sci"},{"key":"10143_CR99","doi-asserted-by":"crossref","unstructured":"McLaughlin N, Martinez\u00a0del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doup\u00e9 A, Joon\u00a0Ahn G (2017) Deep android malware detection. In: Proceedings of the seventh ACM on data and application security and privacy, New York, NY, USA, pp 301\u2013308","DOI":"10.1145\/3029806.3029823"},{"key":"10143_CR100","doi-asserted-by":"crossref","unstructured":"Mizuno S, Hatada M, Mori T, Goto S (2017) Botdetector: a robust and scalable approach toward detecting malware-infected devices. In: IEEE international conference on communications (ICC), pp 1\u20137","DOI":"10.1109\/ICC.2017.7997372"},{"issue":"1","key":"10143_CR101","first-page":"103","volume":"13","author":"AW Moore","year":"1993","unstructured":"Moore AW, Atkeson CG (1993) Prioritized sweeping: reinforcement learning with less data and less time. Mach Learn 13(1):103\u2013130","journal-title":"Mach Learn"},{"issue":"1","key":"10143_CR102","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343\u2013357","journal-title":"Soft Comput"},{"key":"10143_CR103","unstructured":"Natalya VM (2019) Computer games to fill the gap in learning functional lexis at russian colleges and universities. In: International conference on quality management, transport and information security, information technologies, pp\u00a0639\u2013643"},{"issue":"3","key":"10143_CR104","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MWC.001.2000329","volume":"28","author":"J Ni","year":"2021","unstructured":"Ni J, Zhang K, Vasilakos AV (2021) Security and privacy for mobile edge caching: challenges and solutions. IEEE Wirel Commun 28(3):77\u201383","journal-title":"IEEE Wirel Commun"},{"issue":"2","key":"10143_CR105","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett 1(2):68\u201371","journal-title":"IEEE Netw Lett"},{"key":"10143_CR106","doi-asserted-by":"crossref","unstructured":"Oulehla M, Oplatkov\u00e1 ZK, Malanik D (2016) Detection of mobile botnets using neural networks. In: Future technologies conference (FTC), pp 1324\u20131326","DOI":"10.1109\/FTC.2016.7821774"},{"key":"10143_CR107","doi-asserted-by":"crossref","unstructured":"Ozcelik H (2020) An analysis of fraudulent financial reporting using the fraud diamond theory perspective: an empirical study on the manufacturing sector companies listed on the Borsa Istanbul. In: Grima S, Boztepe E, Baldacchino PJ (eds) Contemporary issues in audit management and forensic accounting. Emerald Publishing Limited","DOI":"10.1108\/S1569-375920200000102012"},{"key":"10143_CR108","doi-asserted-by":"crossref","unstructured":"Pan F, Wen H, Liao R, Jiang Y, Xu A, Ouyang K, Zhu X (2017) Physical layer authentication based on channel information and machine learning. In: IEEE conference on communications and network security (CNS), pp 364\u2013365","DOI":"10.1109\/CNS.2017.8228660"},{"issue":"1","key":"10143_CR109","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(20)30009-9","volume":"2020","author":"A Patel","year":"2020","unstructured":"Patel A, Tailor J (2020) A malicious activity monitoring mechanism to detect and prevent ransomware. Comput Fraud Secur 2020(1):14\u201319","journal-title":"Comput Fraud Secur"},{"key":"10143_CR110","doi-asserted-by":"crossref","unstructured":"Pei C, Zhang N, Shen XS, Mark JW (2014) Channel-based physical layer authentication. In: IEEE global communications conference, pp 4114\u20134119","DOI":"10.1109\/GLOCOM.2014.7037452"},{"key":"10143_CR111","unstructured":"Pihur UV, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the conference on computer and communications security. ACM, pp 1054\u20131067"},{"key":"10143_CR112","doi-asserted-by":"crossref","unstructured":"Prasad R, Rohokale V (eds) (2020) Artificial intelligence and machine learning in cyber security. In: Cyber security: the lifeline of information and communication technology. Springer, pp 231\u2013247","DOI":"10.1007\/978-3-030-31703-4_16"},{"key":"10143_CR113","first-page":"189","volume-title":"Security approaches in machine learning for satellite communication","author":"M Rath","year":"2020","unstructured":"Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. Springer, Berlin, pp 189\u2013204"},{"key":"10143_CR114","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2019.06.084","volume":"365","author":"S Rehman","year":"2019","unstructured":"Rehman S, Tu S, Waqas M, Huang Y, Rehman O, Ahmad B, Ahmad S (2019) Unsupervised pre-trained filter learning approach for efficient convolution neural networks. Neurocomputing 365:171\u2013190","journal-title":"Neurocomputing"},{"issue":"1","key":"10143_CR115","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10639-018-9765-8","volume":"24","author":"J Ricci","year":"2019","unstructured":"Ricci J, Breitinger F, Baggili I (2019) Survey results on adults and cybersecurity education. Educ Inf Technol 24(1):231\u2013249","journal-title":"Educ Inf Technol"},{"issue":"4","key":"10143_CR116","doi-asserted-by":"publisher","first-page":"45:1","DOI":"10.1145\/2501654.2501659","volume":"45","author":"RA Rodr\u00edguez-G\u00f3mez","year":"2013","unstructured":"Rodr\u00edguez-G\u00f3mez RA, Maci\u00e1-Fern\u00e1ndez G, Garc\u00eda-Teodoro P (2013) Survey and taxonomy of botnet research through life-cycle. ACM Comput Surv 45(4):45:1-45:33","journal-title":"ACM Comput Surv"},{"key":"10143_CR117","volume-title":"Physically unclonable functions: constructions, properties and applications","author":"M Roel","year":"2012","unstructured":"Roel M (2012) Physically unclonable functions: constructions, properties and applications. Katholieke Universiteit Leuven, Belgium"},{"key":"10143_CR118","unstructured":"Sagduyu YE, Shi Y, Erpek T, Headley W, Flowers B, Stantchev G, Lu Z (2020) When wireless security meets machine learning: motivation, challenges, and research directions. arXiv preprint arXiv:2001.08883"},{"key":"10143_CR119","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.neucom.2015.04.101","volume":"172","author":"A Saied","year":"2016","unstructured":"Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172:385\u2013393","journal-title":"Neurocomputing"},{"key":"10143_CR120","doi-asserted-by":"crossref","unstructured":"Shakiba-Herfeh M, Chorti A, Poor HV (2020) Physical layer security: authentication, integrity and confidentiality. arXiv:2001.07153","DOI":"10.1007\/978-3-030-55366-1_6"},{"key":"10143_CR121","doi-asserted-by":"crossref","unstructured":"Sharmeen S, Ahmed YA, Huda S, Ko\u00e7er B, Hassan MM (2020) Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches. IEEE Access 8:24522\u201324534","DOI":"10.1109\/ACCESS.2020.2970466"},{"key":"10143_CR122","doi-asserted-by":"crossref","unstructured":"Singar AV, Akhilesh K (2020) Role of cyber-security in higher education. In: Akhilesh KB, M\u00f6ller DPF (eds) Smart technologies. Springer, pp 249\u2013264","DOI":"10.1007\/978-981-13-7139-4_19"},{"key":"10143_CR123","doi-asserted-by":"publisher","first-page":"101617","DOI":"10.1016\/j.cose.2019.101617","volume":"88","author":"M Siponen","year":"2020","unstructured":"Siponen M, Puhakainen P, Vance A (2020) Can individuals\u2019 neutralization techniques be overcome? A field experiment on password policy. Comput Secur 88:101617","journal-title":"Comput Secur"},{"key":"10143_CR124","doi-asserted-by":"crossref","unstructured":"Smith SS (2020) Cybersecurity & insurance. In: Blockchain, artificial intelligence and financial services. Springer, Berlin, pp 193\u2013200","DOI":"10.1007\/978-3-030-29761-9_15"},{"key":"10143_CR125","doi-asserted-by":"crossref","unstructured":"Srinivas TAS, Somula R, Govinda K (2020) Privacy and security in Aadhaar. In: Howlett R, Jain LC (eds) Smart intelligent computing and applications. Springer, Berlin, pp 405\u2013410","DOI":"10.1007\/978-981-13-9282-5_38"},{"key":"10143_CR126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31780-5","volume-title":"Big data analytics in us courts: uses, challenges, and implications","author":"D Steward","year":"2019","unstructured":"Steward D, Cavazos R (2019) Big data analytics in us courts: uses, challenges, and implications. Springer Nature, Berlin"},{"key":"10143_CR127","doi-asserted-by":"crossref","unstructured":"Su X, Zhang D, Li W, Zhao K (2016) A deep learning approach to android malware feature learning and detection. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp 244\u2013251","DOI":"10.1109\/TrustCom.2016.0070"},{"issue":"1","key":"10143_CR128","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TEVC.2018.2808689","volume":"23","author":"Y Sun","year":"2018","unstructured":"Sun Y, Yen GG, Yi Z (2018) Evolving unsupervised deep neural networks for learning meaningful representations. IEEE Trans Evol Comput 23(1):89\u2013103","journal-title":"IEEE Trans Evol Comput"},{"key":"10143_CR129","unstructured":"Sutton RS, Barto AG (1998) Introduction to reinforcement learning, vol 135. MIT Press, Cambridge"},{"key":"10143_CR130","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.future.2019.11.034","volume":"105","author":"R Taheri","year":"2020","unstructured":"Taheri R, Ghahramani M, Javidan R, Shojafar M, Pooranian Z, Conti M (2020) Similarity-based android malware detection using Hamming distance of static binary features. Future Gener Comput Syst 105:230\u2013247","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"10143_CR131","doi-asserted-by":"publisher","first-page":"76:1","DOI":"10.1145\/3017427","volume":"49","author":"K Tam","year":"2017","unstructured":"Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L (2017) The evolution of android malware and android analysis techniques. ACM Comput Surv 49(4):76:1-76:41","journal-title":"ACM Comput Surv"},{"key":"10143_CR132","doi-asserted-by":"crossref","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: International conference on wireless networks and mobile communications (WINCOM), pp 258\u2013263","DOI":"10.1109\/WINCOM.2016.7777224"},{"issue":"9","key":"10143_CR133","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.3390\/s20092707","volume":"20","author":"M Tanveer","year":"2020","unstructured":"Tanveer M, Abbas G, Abbas ZH, Waqas M, Muhammad F, Kim S (2020) S6AE: securing 6LoWPAN using authenticated encryption scheme. Sensors 20(9):2707","journal-title":"Sensors"},{"key":"10143_CR134","doi-asserted-by":"crossref","unstructured":"Tello-Oquendo L, Pacheco-Paramo D, Pla V, Martinez-Bauset J (2018) Reinforcement learning-based ACB in LTE-A networks for handling massive M2M and H2H communications. In: IEEE international conference on communications (ICC), pp 1\u20137","DOI":"10.1109\/ICC.2018.8422167"},{"key":"10143_CR135","doi-asserted-by":"crossref","unstructured":"Thing VLL (2017) IEEE 802.11 network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC), pp 1\u20136","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"10143_CR136","doi-asserted-by":"crossref","unstructured":"Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Adversarial machine learning in cybersecurity. In: Machine learning approaches in cybersecurity analytics. Springer, Berlin, pp 185\u2013200","DOI":"10.1007\/978-981-15-1706-8_10"},{"issue":"9","key":"10143_CR137","doi-asserted-by":"publisher","first-page":"5700","DOI":"10.1109\/TWC.2018.2848937","volume":"17","author":"S Tomasin","year":"2018","unstructured":"Tomasin S (2018) Analysis of channel-based user authentication by key-less and key-based approaches. IEEE Trans Wirel Commun 17(9):5700\u20135712","journal-title":"IEEE Trans Wirel Commun"},{"key":"10143_CR138","doi-asserted-by":"crossref","unstructured":"Torres P, Catania C, Garcia S, Garino CG (2016) An analysis of recurrent neural networks for botnet detection behavior. In: IEEE Biennial Congress of Argentina (ARGENCON), pp 1\u20136","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"10143_CR139","doi-asserted-by":"crossref","unstructured":"Tu S, Liu M, Waqas M, Rehman S, Zhu R, Liu L (2018a) FHC-PCIA: a physical cell identification allocation method based on fuzzy hierarchical clustering for heterogeneous cellular network. IEEE Access 6:46976\u201346987","DOI":"10.1109\/ACCESS.2018.2867066"},{"key":"10143_CR140","doi-asserted-by":"crossref","unstructured":"Tu S, Huang X, Huang Y, Waqas M, Rehman SU (2018b) SSLSS: semi-supervised learning-based steganalysis scheme for instant voice communication network. IEEE Access 6:66 153-66 164","DOI":"10.1109\/ACCESS.2018.2879328"},{"key":"10143_CR141","doi-asserted-by":"crossref","unstructured":"Tu S, Waqas M, Rehman SU, Aamir M, Rehman OU, Jianbiao Z, Chang C-C (2018c) Security in fog computing: a novel technique to tackle an impersonation attack. IEEE Access 6:74 993-75 001","DOI":"10.1109\/ACCESS.2018.2884672"},{"key":"10143_CR142","doi-asserted-by":"crossref","unstructured":"Tu S, Waqas M, Meng Y, Rehman S, Ahmad I, Koubaa A, Halim Z, Hanif M, Chang CC, Shi C (2020a) Mobile fog computing security: a user-oriented smart attack defense strategy based on DQL. Comput Commun 160:790\u2013798","DOI":"10.1016\/j.comcom.2020.06.019"},{"key":"10143_CR143","doi-asserted-by":"crossref","unstructured":"Tu S, Rehman S, Waqas M, Rehman O, Yang Z, Ahmad B, Halim Z, Zhao W (2020b) Optimisation-based training of evolutionary convolution neural network for visual classification applications. IET Comput Vis 14(5):259\u2013267","DOI":"10.1049\/iet-cvi.2019.0506"},{"issue":"2","key":"10143_CR144","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1109\/TVT.2021.3053015","volume":"70","author":"S Tu","year":"2021","unstructured":"Tu S et al (2021) Reinforcement learning assisted impersonation attack detection in device-to-device communications. IEEE Trans Veh Technol 70(2):1474\u20131479","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"10143_CR145","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1109\/JSAC.2013.130912","volume":"31","author":"JK Tugnait","year":"2013","unstructured":"Tugnait JK (2013) Wireless user authentication via comparison of power spectral densities. IEEE J Sel Areas Commun 31(9):1791\u20131802","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"10143_CR146","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1556\/084.2019.20.1.4","volume":"20","author":"RA Valde\u00f3n","year":"2019","unstructured":"Valde\u00f3n RA (2019) Ad hoc corpora and journalistic translation research: BBC News and BBC Mundo\u2019s coverage of Margaret Thatcher\u2019s death and funeral. Across Lang Cult 20(1):79\u201395","journal-title":"Across Lang Cult"},{"key":"10143_CR147","doi-asserted-by":"crossref","unstructured":"Vigan\u00f2 E, Loi M, Yaghmaei E (2020) Cybersecurity of critical infrastructure. In: Christen M, Gordijn B, Loi M (eds) The ethics of cybersecurity. The international library of ethics, law and technology, vol 21. Springer, Cham","DOI":"10.1007\/978-3-030-29053-5_8"},{"key":"10143_CR148","doi-asserted-by":"crossref","unstructured":"Wan X, Xiao L, Li Q, Han Z (2017) Fhy-layer authentication with multiple landmarks with reduced communication overhead. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2017.7997250"},{"key":"10143_CR149","unstructured":"Wang Z (2015) The applications of deep learning on traffic identification, BlackHat USA, vol\u00a024"},{"issue":"12","key":"10143_CR150","doi-asserted-by":"publisher","first-page":"3395","DOI":"10.1109\/TKDE.2016.2606428","volume":"28","author":"H Wang","year":"2016","unstructured":"Wang H, Yeung DY (2016) Towards Bayesian deep learning: a framework and some existing methods. IEEE Trans Knowl Data Eng 28(12):3395\u20133408","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"7","key":"10143_CR151","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/LCOMM.2017.2690437","volume":"21","author":"N Wang","year":"2017","unstructured":"Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557\u20131560","journal-title":"IEEE Commun Lett"},{"key":"10143_CR152","doi-asserted-by":"crossref","unstructured":"Waqas M, Zeng M, Li Y (2017) Mobility-assisted device-to-device communications for content transmission. In: 13th international wireless communications and mobile computing conference (IWCMC), pp 206\u2013211","DOI":"10.1109\/IWCMC.2017.7986287"},{"key":"10143_CR153","doi-asserted-by":"crossref","unstructured":"Waqas M, Ahmed M, Li Y, Jin D, Chen S (2018a) Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans Wirel Commun 17(6):3918\u20133930","DOI":"10.1109\/TWC.2018.2817607"},{"key":"10143_CR154","doi-asserted-by":"crossref","unstructured":"Waqas M, Niu Y, Ahmed M, Li Y, Jin D, Han Z (2018b) Mobility-aware fog computing in dynamic environments: understandings and implementation. IEEE Access 7:38867\u201338879","DOI":"10.1109\/ACCESS.2018.2883662"},{"key":"10143_CR155","doi-asserted-by":"crossref","unstructured":"Waqas M, Zeng M, Li Y, Jin D, Han Z (2018c) Mobility assisted content transmission for device-to-device communication underlaying cellular networks. IEEE Trans Veh Technol 67(7):6410\u20136423","DOI":"10.1109\/TVT.2018.2802448"},{"key":"10143_CR156","doi-asserted-by":"crossref","unstructured":"Waqas M, Ahmed M, Zhang J, Li Y (2018d) Confidential information ensurance through physical layer security in device-to-device communication. In: IEEE global communications conference (GLOBECOM), pp 1\u20137","DOI":"10.1109\/GLOCOM.2018.8647343"},{"key":"10143_CR157","doi-asserted-by":"crossref","unstructured":"Waqas M, Niu Y, Li Y, Ahmed M, Jin D, Chen S, Han Z (2020a) A comprehensive survey on mobility-aware D2D communications: principles, practice and challenges. IEEE Commun Surv Tutor 22(3):1863\u20131886","DOI":"10.1109\/COMST.2019.2923708"},{"issue":"1","key":"10143_CR158","first-page":"359","volume":"64","author":"M Waqas","year":"2020","unstructured":"Waqas M, Tu S, Rehman S, Halim Z, Anwar S, Abbas G, Abbas ZH (2020b) Authentication of vehicles and road side units in intelligent transportation system. Comput Mater Contin: CMC 64(1):359\u2013371","journal-title":"Comput Mater Contin: CMC"},{"key":"10143_CR159","unstructured":"Weinand A, Karrenbauer M, Sattiraju R, Schotten H (2017) Application of machine learning for channel based message authentication in mission critical machine type communication. In: European wireless; 23th European wireless conference, pp 1\u20135"},{"issue":"2","key":"10143_CR160","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1038\/s41928-019-0213-6","volume":"2","author":"A Winfield","year":"2019","unstructured":"Winfield A (2019) Ethical standards in robotics and AI. Nat Electron 2(2):46","journal-title":"Nat Electron"},{"key":"10143_CR161","doi-asserted-by":"crossref","unstructured":"Wu P, Guo H, Moustafa N (2020) Pelican: a deep residual network for network intrusion detection. In: 50th annual IEEE\/IFIP international conference on dependable systems and networks workshops (DSN-W), pp 55\u201362","DOI":"10.1109\/DSN-W50199.2020.00018"},{"key":"10143_CR162","doi-asserted-by":"crossref","unstructured":"Xiao L, Greenstein L, Mandayam N, Trappe W (2007) Fingerprints in the ether: using the physical layer for wireless authentication. In: IEEE international conference on communications, pp 4646\u20134651","DOI":"10.1109\/ICC.2007.767"},{"key":"10143_CR163","doi-asserted-by":"crossref","unstructured":"Xiao L, Li Y, Liu G, Li Q, Zhuang W (2015) Spoofing detection with reinforcement learning in wireless networks. In: IEEE global communications conference (GLOBECOM), pp 1\u20135","DOI":"10.1109\/GLOCOM.2015.7417078"},{"key":"10143_CR164","doi-asserted-by":"crossref","unstructured":"Xiao L, Li Y, Han G, Liu G, Zhuang W (2016a) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037\u201310047","DOI":"10.1109\/TVT.2016.2524258"},{"key":"10143_CR165","doi-asserted-by":"crossref","unstructured":"Xiao L, Chen T, Han G, Zhuang W, Sun L (2016b) Channel-based authentication game in MIMO systems. In: IEEE global communications conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2016.7841657"},{"issue":"8","key":"10143_CR166","doi-asserted-by":"publisher","first-page":"7474","DOI":"10.1109\/TVT.2017.2652484","volume":"66","author":"L Xiao","year":"2017","unstructured":"Xiao L, Chen T, Han G, Zhuang W, Sun L (2017) Game theoretic study on channel-based authentication in MIMO systems. IEEE Trans Veh Technol 66(8):7474\u20137484","journal-title":"IEEE Trans Veh Technol"},{"key":"10143_CR167","doi-asserted-by":"crossref","unstructured":"Xiao L, Wan X, Han Z (2018a) Phy-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676\u20131687","DOI":"10.1109\/TWC.2017.2784431"},{"key":"10143_CR168","doi-asserted-by":"crossref","unstructured":"Xiao L, Li Y, Dai C, Dai H, Poor HV (2018b) Reinforcement learning-based NOME power allocation in the presence of smart jamming. IEEE Trans Veh Technol 67(4):3377\u20133389","DOI":"10.1109\/TVT.2017.2782726"},{"key":"10143_CR169","doi-asserted-by":"crossref","unstructured":"Xiao L, Wan X, Su W, Tang Y (2018c) Anti-jamming underwater transmission with mobility and learning. IEEE Commun Lett 22(3):542\u2013545","DOI":"10.1109\/LCOMM.2018.2792015"},{"key":"10143_CR170","doi-asserted-by":"crossref","unstructured":"Xiao L, Jiang D, Xu D, Zhu H, Zhang Y, Poor HV (2018d) Two-dimensional anti-jamming mobile communication based on reinforcement learning. IEEE Trans Veh Technol 67(10):9499\u20139512","DOI":"10.1109\/TVT.2018.2856854"},{"key":"10143_CR171","doi-asserted-by":"crossref","unstructured":"Xiao L, Zhuang W, Zhou S, Chen C (2019) Learning-based rogue edge detection in VANETs with ambient radio signals. In: Shen XS (ed) Learning-based VANET communication and security techniques. Springer, pp 13\u201347","DOI":"10.1007\/978-3-030-01731-6_2"},{"key":"10143_CR172","first-page":"8872586","volume":"2020","author":"Z Xu","year":"2020","unstructured":"Xu Z, Liu W, Huang J, Yang C, Lu J, Tan H (2020) Artificial intelligence for securing IoT services in edge computing: a survey. Secur Commun Netw 2020:8872586","journal-title":"Secur Commun Netw"},{"key":"10143_CR173","doi-asserted-by":"crossref","unstructured":"Yang L, Lau L, Gan H (2020) Investors\u2019 perceptions of the cybersecurity risk management reporting framework. Int J Account Inf Manag 28(1):167\u2013183","DOI":"10.1108\/IJAIM-02-2019-0022"},{"key":"10143_CR174","doi-asserted-by":"crossref","unstructured":"Yousefi-Azar M, Varadharajan V, Hamey L, Tupakula U (May 2017) Autoencoder-based feature learning for cybersecurity applications. In: International joint conference on neural networks (IJCNN), pp 3854\u20133861","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"10143_CR175","doi-asserted-by":"crossref","unstructured":"Yu M-D, Sowell R, Singh A, M\u2019Ra\u00efhi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: IEEE international symposium on hardware-oriented security and trust, pp 108\u2013115","DOI":"10.1109\/HST.2012.6224329"},{"issue":"4","key":"10143_CR176","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/2740070.2631434","volume":"44","author":"Z Yuan","year":"2014","unstructured":"Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: deep learning in android malware detection. SIGCOMM Comput Commun Rev 44(4):371\u2013372","journal-title":"SIGCOMM Comput Commun Rev"},{"issue":"1","key":"10143_CR177","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan Z, Lu Y, Xue Y (2016) Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci Technol 21(1):114\u2013123","journal-title":"Tsinghua Sci Technol"},{"key":"10143_CR178","doi-asserted-by":"crossref","unstructured":"Yuan S, Li L, Chigan C (2018) Maximum mean discrepancy based secure fusion strategy for robust cooperative spectrum sensing. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2018.8422509"},{"issue":"8","key":"10143_CR179","doi-asserted-by":"publisher","first-page":"6703","DOI":"10.1109\/TVT.2015.2480244","volume":"65","author":"K Zaidi","year":"2016","unstructured":"Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2016) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703\u20136714","journal-title":"IEEE Trans Veh Technol"},{"key":"10143_CR180","doi-asserted-by":"crossref","unstructured":"Zeng M, Li Y, Zhang K, Waqas M, Jin D (2018) Incentive mechanism design for computation offloading in heterogeneous fog computing: a contract-based approach. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2018.8422684"},{"key":"10143_CR181","doi-asserted-by":"crossref","unstructured":"Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo KKR (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev","DOI":"10.1007\/s10462-021-09976-0"},{"key":"10143_CR182","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng Z, Xie S, Dai H-N, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Future Gener Comput Syst 105:475\u2013491","journal-title":"Future Gener Comput Syst"},{"key":"10143_CR183","doi-asserted-by":"crossref","unstructured":"Zhou L, Pan S, Wang J, Vasilakos AV (2017a) Machine Learning on big data: opportunities and challenges. Neurocomputing 237:350\u2013361","DOI":"10.1016\/j.neucom.2017.01.026"},{"key":"10143_CR184","doi-asserted-by":"crossref","unstructured":"Zhou T, Cai Z, Xiao B, Chen Y, Xu M (2017b) Detecting rogue AP with the crowd wisdom. In: IEEE 37th international conference on distributed computing systems (ICDCS), pp 2327\u20132332","DOI":"10.1109\/ICDCS.2017.31"},{"key":"10143_CR185","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.future.2019.07.045","volume":"102","author":"W Zong","year":"2020","unstructured":"Zong W, Chow Y-W, Susilo W (2020) Interactive three-dimensional visualization of network intrusion detection data for machine learning. Future Gener Comput Syst 102:292\u2013306","journal-title":"Future Gener Comput Syst"},{"issue":"9","key":"10143_CR186","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou Y, Zhu J, Wang X, Hanzo L (2016) A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE 104(9):1727\u20131765","journal-title":"Proc IEEE"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-022-10143-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-022-10143-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-022-10143-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T23:41:12Z","timestamp":1700178072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-022-10143-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,4]]},"references-count":186,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["10143"],"URL":"https:\/\/doi.org\/10.1007\/s10462-022-10143-2","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,4]]},"assertion":[{"value":"4 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}