var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2F285%2F3540.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2F285%2F3540.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2F285%2F3540.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2025\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy.\n \n \n \n \n\n\n \n Jha, P.; Singh, G.; Kumar, A.; Agrawal, D.; Patel, Y. S.; and Forough, J.\n\n\n \n\n\n\n In Korman, A.; Chakraborty, S.; Peri, S.; Boldrini, C.; and Robinson, P., editor(s), Proceedings of the 26th International Conference on Distributed Computing and Networking, ICDCN 2025, Hyderabad, India, January 4-7, 2025, pages 402–407, 2025. ACM\n \n\n\n\n
\n\n\n\n \n \n \"NetProbe:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdcn/JhaSKAPF25,\n  author       = {Prianshu Jha and\n                  Gurpreet Singh and\n                  Amit Kumar and\n                  Dewesh Agrawal and\n                  Yashwant Singh Patel and\n                  Javad Forough},\n  editor       = {Amos Korman and\n                  Sandip Chakraborty and\n                  Sathya Peri and\n                  Chiara Boldrini and\n                  Peter Robinson},\n  title        = {NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation\n                  Strategy},\n  booktitle    = {Proceedings of the 26th International Conference on Distributed Computing\n                  and Networking, {ICDCN} 2025, Hyderabad, India, January 4-7, 2025},\n  pages        = {402--407},\n  publisher    = {{ACM}},\n  year         = {2025},\n  url          = {https://doi.org/10.1145/3700838.3703687},\n  doi          = {10.1145/3700838.3703687},\n  timestamp    = {Sat, 25 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdcn/JhaSKAPF25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2024\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints.\n \n \n \n \n\n\n \n Forough, J.; Haddadi, H.; Bhuyan, M. H.; and Elmroth, E.\n\n\n \n\n\n\n IEEE Access, 12: 171897–171910. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/ForoughHBE24,\n  author       = {Javad Forough and\n                  Hamed Haddadi and\n                  Monowar H. Bhuyan and\n                  Erik Elmroth},\n  title        = {Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource\n                  Constraints},\n  journal      = {{IEEE} Access},\n  volume       = {12},\n  pages        = {171897--171910},\n  year         = {2024},\n  url          = {https://doi.org/10.1109/ACCESS.2024.3492815},\n  doi          = {10.1109/ACCESS.2024.3492815},\n  timestamp    = {Tue, 07 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/ForoughHBE24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Anomaly Detection and Resolution on the Edge: Solutions and Future Directions.\n \n \n \n \n\n\n \n Forough, J.; Bhuyan, M. H.; and Elmroth, E.\n\n\n \n\n\n\n In IEEE International Conference on Service-Oriented System Engineering, SOSE 2023, Athens, Greece, July 17-20, 2023, pages 227–238, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AnomalyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sose/ForoughBE23,\n  author       = {Javad Forough and\n                  Monowar H. Bhuyan and\n                  Erik Elmroth},\n  title        = {Anomaly Detection and Resolution on the Edge: Solutions and Future\n                  Directions},\n  booktitle    = {{IEEE} International Conference on Service-Oriented System Engineering,\n                  {SOSE} 2023, Athens, Greece, July 17-20, 2023},\n  pages        = {227--238},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/SOSE58276.2023.00034},\n  doi          = {10.1109/SOSE58276.2023.00034},\n  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/sose/ForoughBE23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM Approach.\n \n \n \n \n\n\n \n Forough, J.; Bhuyan, M. H.; and Elmroth, E.\n\n\n \n\n\n\n In Hu, J.; Min, G.; Wang, G.; and Georgalas, N., editor(s), 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023, pages 595–604, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"UnifiedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/trustcom/ForoughBE23,\n  author       = {Javad Forough and\n                  Monowar H. Bhuyan and\n                  Erik Elmroth},\n  editor       = {Jia Hu and\n                  Geyong Min and\n                  Guojun Wang and\n                  Nektarios Georgalas},\n  title        = {Unified Identification of Anomalies on the Edge: {A} Hybrid Sequential\n                  {PGM} Approach},\n  booktitle    = {22nd {IEEE} International Conference on Trust, Security and Privacy\n                  in Computing and Communications, TrustCom 2024, Exeter, UK, November\n                  1-3, 2023},\n  pages        = {595--604},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/TrustCom60117.2023.00092},\n  doi          = {10.1109/TRUSTCOM60117.2023.00092},\n  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/trustcom/ForoughBE23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Sequential credit card fraud detection: A joint deep neural network and probabilistic graphical model approach.\n \n \n \n \n\n\n \n Forough, J.; and Momtazi, S.\n\n\n \n\n\n\n Expert Syst. J. Knowl. Eng., 39(1). 2022.\n \n\n\n\n
\n\n\n\n \n \n \"SequentialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/es/ForoughM22,\n  author       = {Javad Forough and\n                  Saeedeh Momtazi},\n  title        = {Sequential credit card fraud detection: {A} joint deep neural network\n                  and probabilistic graphical model approach},\n  journal      = {Expert Syst. J. Knowl. Eng.},\n  volume       = {39},\n  number       = {1},\n  year         = {2022},\n  url          = {https://doi.org/10.1111/exsy.12795},\n  doi          = {10.1111/EXSY.12795},\n  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/es/ForoughM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge.\n \n \n \n \n\n\n \n Forough, J.; Bhuyan, M. H.; and Elmroth, E.\n\n\n \n\n\n\n In 42nd IEEE International Conference on Distributed Computing Systems, ICDCS 2022, Bologna, Italy, July 10-13, 2022, pages 1155–1165, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DELA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdcs/ForoughBE22,\n  author       = {Javad Forough and\n                  Monowar H. Bhuyan and\n                  Erik Elmroth},\n  title        = {{DELA:} {A} Deep Ensemble Learning Approach for Cross-layer VSI-DDoS\n                  Detection on the Edge},\n  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,\n                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},\n  pages        = {1155--1165},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/ICDCS54860.2022.00114},\n  doi          = {10.1109/ICDCS54860.2022.00114},\n  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdcs/ForoughBE22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Ensemble of deep sequential models for credit card fraud detection.\n \n \n \n \n\n\n \n Forough, J.; and Momtazi, S.\n\n\n \n\n\n\n Appl. Soft Comput., 99: 106883. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"EnsemblePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/asc/ForoughM21,\n  author       = {Javad Forough and\n                  Saeedeh Momtazi},\n  title        = {Ensemble of deep sequential models for credit card fraud detection},\n  journal      = {Appl. Soft Comput.},\n  volume       = {99},\n  pages        = {106883},\n  year         = {2021},\n  url          = {https://doi.org/10.1016/j.asoc.2020.106883},\n  doi          = {10.1016/J.ASOC.2020.106883},\n  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/asc/ForoughM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach.\n \n \n \n \n\n\n \n Forough, J.; Bhuyan, M. H.; and Elmroth, E.\n\n\n \n\n\n\n In Reinhardt, D.; and Müller, T., editor(s), ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pages 20:1–20:10, 2021. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DetectionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/IEEEares/ForoughBE21,\n  author       = {Javad Forough and\n                  Monowar H. Bhuyan and\n                  Erik Elmroth},\n  editor       = {Delphine Reinhardt and\n                  Tilo M{\\"{u}}ller},\n  title        = {Detection of VSI-DDoS Attacks on the Edge: {A} Sequential Modeling\n                  Approach},\n  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability\n                  and Security, Vienna, Austria, August 17-20, 2021},\n  pages        = {20:1--20:10},\n  publisher    = {{ACM}},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3465481.3465757},\n  doi          = {10.1145/3465481.3465757},\n  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/IEEEares/ForoughBE21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);