{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:49Z","timestamp":1750306129973,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T00:00:00Z","timestamp":1500422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,19]]},"DOI":"10.1145\/3102304.3105573","type":"proceedings-article","created":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T19:50:15Z","timestamp":1504900215000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access Control"],"prefix":"10.1145","author":[{"given":"Musa Abubakar","family":"Muhammad","sequence":"first","affiliation":[{"name":"Cyber Technology Institute, De Montfort University, Leicester, Leicestershire"}]},{"given":"Aladdin","family":"Ayesh","sequence":"additional","affiliation":[{"name":"Cyber Technology Institute, De Montfort University, Leicester, Leicestershire"}]},{"given":"Pooneh Bagheri","family":"Zadeh","sequence":"additional","affiliation":[{"name":"School of Computing, Creative Technologies and Engineering, Leeds Beckett University, Leeds"}]}],"member":"320","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.121"},{"key":"e_1_3_2_1_2_1","volume-title":"iOS Security. September","author":"Apple Inc. 2015.","year":"2015","unstructured":"Apple Inc. 2015. iOS Security. September ( 2015 ), 21. https:\/\/www.apple.com\/business\/docs\/iOS Apple Inc. 2015. iOS Security. September (2015), 21. https:\/\/www.apple.com\/business\/docs\/iOS"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480707"},{"key":"e_1_3_2_1_4_1","unstructured":"M Azhagiri A Rajesh and S Karthik. Intrusion Detection and Prevention System: Technologies and Challenges. International Journal of Computer Networks and Communications Security (????).  M Azhagiri A Rajesh and S Karthik. Intrusion Detection and Prevention System: Technologies and Challenges. International Journal of Computer Networks and Communications Security (????)."},{"volume-title":"Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308--0313","author":"Bhat A.","key":"e_1_3_2_1_5_1","unstructured":"A. Bhat , V. Gojanur , and R. Hegde . 2015. 4G protocol and architecture for BYOD over Cloud Computing . In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308--0313 . A. Bhat, V. Gojanur, and R. Hegde. 2015. 4G protocol and architecture for BYOD over Cloud Computing. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308--0313."},{"key":"e_1_3_2_1_6_1","volume-title":"BYOD trend pressures corporate networks. eweek 28, 14","author":"Burt Jeffrey","year":"2011","unstructured":"Jeffrey Burt . 2011. BYOD trend pressures corporate networks. eweek 28, 14 ( 2011 ), 30--31. Jeffrey Burt. 2011. BYOD trend pressures corporate networks. eweek 28, 14 (2011), 30--31."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.21"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2279640"},{"volume-title":"Intelligence in Next Generation Networks (ICIN), 2012 16th International Conference on. 187--193","author":"Copeland R.","key":"e_1_3_2_1_9_1","unstructured":"R. Copeland and N. Crespi . 2012. Analyzing consumerization - Should enterprise business context determine session policy? . In Intelligence in Next Generation Networks (ICIN), 2012 16th International Conference on. 187--193 . R. Copeland and N. Crespi. 2012. Analyzing consumerization - Should enterprise business context determine session policy?. In Intelligence in Next Generation Networks (ICIN), 2012 16th International Conference on. 187--193."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.09.083"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.07.019"},{"key":"e_1_3_2_1_12_1","volume-title":"Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. arXiv preprint arXiv:1502.03552","author":"Dilek Selma","year":"2015","unstructured":"Selma Dilek , H\u00fcseyin \u00c7ak\u0131r , and Mustafa Ayd\u0131n . 2015. Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. arXiv preprint arXiv:1502.03552 ( 2015 ). Selma Dilek, H\u00fcseyin \u00c7ak\u0131r, and Mustafa Ayd\u0131n. 2015. Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. arXiv preprint arXiv:1502.03552 (2015)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03340800"},{"key":"e_1_3_2_1_14_1","volume-title":"BYOD Security: A New Business Challenge. arXiv preprint arXiv:1601.01230","author":"Downer Kathleen","year":"2016","unstructured":"Kathleen Downer and Maumita Bhattacharya . 2016. BYOD Security: A New Business Challenge. arXiv preprint arXiv:1601.01230 ( 2016 ). Kathleen Downer and Maumita Bhattacharya. 2016. BYOD Security: A New Business Challenge. arXiv preprint arXiv:1601.01230 (2016)."},{"volume-title":"Data mining and machine learning in cybersecurity","author":"Dua Sumeet","key":"e_1_3_2_1_15_1","unstructured":"Sumeet Dua and Xian Du. 2011. Data mining and machine learning in cybersecurity . CRC press . Sumeet Dua and Xian Du. 2011. Data mining and machine learning in cybersecurity. CRC press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2014.7010235"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30027-0"},{"key":"e_1_3_2_1_18_1","volume-title":"Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016","author":"Goel Lavika","year":"2017","unstructured":"Lavika Goel , Nilay Jain , and Shivin Srivastava . 2017 . A novel PSO based algorithm to find initial seeds for the k-means clustering algorithm . In Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016 ), Gurgaon, India, 9- -11 September, 2016. CRC Press, 159. Lavika Goel, Nilay Jain, and Shivin Srivastava. 2017. A novel PSO based algorithm to find initial seeds for the k-means clustering algorithm. In Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), Gurgaon, India, 9--11 September, 2016. CRC Press, 159."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2762"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1514"},{"key":"e_1_3_2_1_21_1","volume-title":"Network traffic anomaly detection. arXiv preprint arXiv:1402.0856","author":"Huang Hong","year":"2014","unstructured":"Hong Huang , Hussein Al-Azzawi , and Hajar Brani . 2014. Network traffic anomaly detection. arXiv preprint arXiv:1402.0856 ( 2014 ). Hong Huang, Hussein Al-Azzawi, and Hajar Brani. 2014. Network traffic anomaly detection. arXiv preprint arXiv:1402.0856 (2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2014.1108"},{"key":"e_1_3_2_1_23_1","volume-title":"A filtering approach to anomaly and masquerade detection","author":"Jha S","year":"2004","unstructured":"S Jha , L Kruger , T Kurtx , Y Lee , and A Smith . 2004. A filtering approach to anomaly and masquerade detection . University of Wisconsin , Tech. Rep ( 2004 ). S Jha, L Kruger, T Kurtx, Y Lee, and A Smith. 2004. A filtering approach to anomaly and masquerade detection. University of Wisconsin, Tech. Rep (2004)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2015.7177845"},{"key":"e_1_3_2_1_25_1","volume-title":"Apple's Partnership With IBM Leaves CIOs Hanging. (Jul","author":"Kaneshige Tom","year":"2014","unstructured":"Tom Kaneshige . 2014. Apple's Partnership With IBM Leaves CIOs Hanging. (Jul 2014 ). http:\/\/www.cio.com\/article\/2455120\/byod\/apple-s-partnership-with-ibm-leaves-cios-hanging.html Tom Kaneshige. 2014. Apple's Partnership With IBM Leaves CIOs Hanging. (Jul 2014). http:\/\/www.cio.com\/article\/2455120\/byod\/apple-s-partnership-with-ibm-leaves-cios-hanging.html"},{"key":"e_1_3_2_1_26_1","volume-title":"International Workshop on Information Security Applications. Springer, 165--176","author":"Kang Dongwan","year":"2014","unstructured":"Dongwan Kang , Joohyung Oh , and Chaetae Im . 2014 . Context based smart access control on BYOD environments . In International Workshop on Information Security Applications. Springer, 165--176 . Dongwan Kang, Joohyung Oh, and Chaetae Im. 2014. Context based smart access control on BYOD environments. In International Workshop on Information Security Applications. Springer, 165--176."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"M. Ketel and T. Shumate. 2015. Bring Your Own Device: Security technologies. In SoutheastCon 2015. 1--7.  M. Ketel and T. Shumate. 2015. Bring Your Own Device: Security technologies. In SoutheastCon 2015. 1--7.","DOI":"10.1109\/SECON.2015.7132981"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2016.7840112"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354798"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.50"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015492"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.400"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38027-3_98"},{"key":"e_1_3_2_1_34_1","volume-title":"Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices.","author":"Malcolm Harkins","year":"2013","unstructured":"Harkins Malcolm . 2013 . Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices. (2013). http:\/\/www.govinfosecurity.com\/webinars\/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264 Harkins Malcolm. 2013. Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices. (2013). http:\/\/www.govinfosecurity.com\/webinars\/mobile-learn-from-intels-ciso-on-securing-employee-owned-devices-w-264"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069314"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/2158244015580372"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920295"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9121-4"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.79"},{"key":"e_1_3_2_1_42_1","unstructured":"Dave Shackleford. 2016. Real-Time Adaptive Security. (2016).  Dave Shackleford. 2016. Real-Time Adaptive Security. (2016)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30006-X"},{"key":"e_1_3_2_1_44_1","unstructured":"Rob Smith Bryan Taylor Chris Silva Manjunath Bhat Terrence Cosgrove and John Girard. 2016. Magic Quadrant for Enterprise Mobility Management Suites. (2016). https:\/\/www.gartner.com\/doc\/reprints?id=1-390IMNG&ct=160608&st=sb  Rob Smith Bryan Taylor Chris Silva Manjunath Bhat Terrence Cosgrove and John Girard. 2016. Magic Quadrant for Enterprise Mobility Management Suites. (2016). https:\/\/www.gartner.com\/doc\/reprints?id=1-390IMNG&ct=160608&st=sb"},{"key":"e_1_3_2_1_45_1","volume-title":"CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from http:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. (June","author":"Uluagac A. Selcuk","year":"2014","unstructured":"A. Selcuk Uluagac . 2014. CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from http:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. (June 2014 ). A. Selcuk Uluagac. 2014. CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from http:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. (June 2014)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682720"},{"key":"e_1_3_2_1_47_1","volume-title":"Consumer Communications and Networking Conference (CCNC)","author":"Wang Yong","year":"2014","unstructured":"Yong Wang , Jinpeng Wei , and K. Vangury . 2014. Bring your own device security issues and challenges . In Consumer Communications and Networking Conference (CCNC) , 2014 IEEE 11th. 80--85. Yong Wang, Jinpeng Wei, and K. Vangury. 2014. Bring your own device security issues and challenges. In Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th. 80--85."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.44"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.011"}],"event":{"name":"ICFNDS '17: International Conference on Future Networks and Distributed Systems","sponsor":["LABSTICC Labsticc"],"location":"Cambridge United Kingdom","acronym":"ICFNDS '17"},"container-title":["Proceedings of the International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3105573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3102304.3105573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:05Z","timestamp":1750217825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3105573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":49,"alternative-id":["10.1145\/3102304.3105573","10.1145\/3102304"],"URL":"https:\/\/doi.org\/10.1145\/3102304.3105573","relation":{},"subject":[],"published":{"date-parts":[[2017,7,19]]},"assertion":[{"value":"2017-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}