References
- S. Ata, D. Huang, X. Liu, A. Wada, T. Xing, P. Juluri, C. J. Chung, Y. Sato, and D. Medhi, "SeRViTR: a framework, implementation, and a testbed for a trustworthy future Internet," Computer Networks, vol. 63, pp. 128-146, 2014. https://doi.org/10.1016/j.bjp.2013.12.028
- A. Ghezzi and M. Dramitinos, "Towards a Future Internet infrastructure: analyzing the multidimensional impacts of assured quality Internet interconnection," Telematics and Informatics, vol. 33, no. 2, pp. 613-630, 2016. https://doi.org/10.1016/j.tele.2015.10.003
- P. Jappinen, R. Guarneri, and L. M. Correia, "An applications perspective into the Future Internet," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 249-254, 2013. https://doi.org/10.1016/j.jnca.2012.08.009
- K. C. Wang, M. Brinn, and J. Mambretti, "From federated software defined infrastructure to future Internet architecture," in Proceedings of International Science and Technology Conference Modern Networking Technologies (MoNeTeC), Moscow, Russia, 2014, pp. 1-6.
- M. Berman, J. S. Chase, L. Landweber, A. Nakao, M. Ott, D. Raychaudhuri, R. Ricci, and I. Seskar, "GENI: a federated testbed for innovative network experiments," Computer Networks, vol. 61, pp. 5-23, 2014. https://doi.org/10.1016/j.bjp.2013.12.037
- A. Hakiria, A. Gokhale, P. Berthou, D. C. Schmidt, and T. Gayraud "Software-defined networking: challenges and research opportunities for Future Internet," Computer Networks, vol. 75, pp. 453-471, 2014. https://doi.org/10.1016/j.comnet.2014.10.015
- C. Granell, D. Havlik, S. Schade, Z. Sabeur, C. Delaney, J. Pielorz, et al., "Future Internet technologies for environmental applications," Environmental Modelling & Software, vol. 78, pp. 1-15, 2016. https://doi.org/10.1016/j.envsoft.2015.12.015
- The Global Environment for Network Innovations (GENI) [Online]. Available: http://groups.geni.net.
- J. Kim and D. Kim, "A Future Internet testbed in Korea," in Proceedings of the 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing (WorldComp), Las Vegas, NV, 2011 [Online]. Available: http://weblidi.info.unlp.edu.ar/worldcomp2011-mirror/ICM.htm.
- A. Lanna, F. Liberati, L. Zuccaro, and A. Di Giorgio, "Electric vehicles charging control based on Future Internet generic enablers," in Proceedings of 2014 IEEE International Electric Vehicle Conference (IEVC), Florence, Italy, 2014, pp. 1-5.
- W. Tsai, C. F. Lai, and A. V. Vasilakos, "Future Internet of Things: open issues and challenges," Wireless Networks, vol. 20, no. 8, pp. 2201-2217, 2014. https://doi.org/10.1007/s11276-014-0731-0
- Y. Park, D. S. Reeves, and M. Stamp, "Deriving common malware behavior through graph clustering," Computers & Security, vol. 39, pp. 419-430, 2013. https://doi.org/10.1016/j.cose.2013.09.006
- C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42-57, 2013. https://doi.org/10.1016/j.jnca.2012.05.003
- S. J. Hashim, A. R. Ramli, F. Hashim, K. Samsudin, R. Abdullah, A. R. Azmir, L. B. Osamah, I. A. Al-Baltah, and M. M. Al-Habshi, "SCARECROW: scalable malware reporting, detection and analysis," Journal of Convergence Information Technology, vol. 8, no. 14, pp. 1-12, 2013.
- Y. Qiao, Y, Yabg, L. Ji, and J. He, "Analyzing malware by abstracting the frequent itemsets in API call sequences," in Proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 2013, pp. 265-270.
- R. Islam, R. Tian, L. M. Batten, and S. Versteeg, "Classification of malware based on integrated static and dynamic features," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 646-656, 2013. https://doi.org/10.1016/j.jnca.2012.10.004
- L. Feng, X. Liao, Q. Han, and H. Li, "Dynamical analysis and control strategies on malware propagation model," Applied Mathematical Modelling, vol. 37, no. 16, pp. 8225-8236, 2013. https://doi.org/10.1016/j.apm.2013.03.051
- D. DeBarr, V. Ramanathan, and H. Wechsler, "Phishing detection using traffic behavior spectral clustering and random forests," in Proceedings of 2013 IEEE International Conference on Intelligence and Security Informatics (ISI), Seattle, WA, 2013, pp. 67-72.
- B. Prelipcean, A. S. Popescu, and D. T. Gavrilut, "Improving malware detection response time with behaviorbased statistical analysis," in Proceedings of 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara, Romania, 2015, pp. 232-239.
- G. Aloi, M. Di Felice, V. Loscri, P. Pace, and G. Ruggeri, "Spontaneous smartphone networks as a user-centric solution for the Future Internet," IEEE Communications Magazine, vol. 52, no. 12, pp. 26-33, 2014. https://doi.org/10.1109/MCOM.2014.6979948
- G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, "Evolution, detection and analysis of malware for smart device," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 961-987, 2014. https://doi.org/10.1109/SURV.2013.101613.00077
- P. Wang and Y. S. Wang, "Malware behavioural detection and vaccine development by using a support vector model classifier," Journal of Computer and System Sciences, vol. 81, no. 6, pp. 1012-1026, 2015. https://doi.org/10.1016/j.jcss.2014.12.014
- P. Dewan, A. Kashyap, and P. Kumaraguru, "Analyzing social and stylometric features to identify spear phishing emails," in Proceedings of 2014 APWG Symposium on Electronic Crime Research (eCrime), Birmingham, AL, 2014, pp. 1-13.
- A. Mohaisen, O. Alrawi, and M. Mohaisen, "Amal: high-fidelity, behavior-based automated malware analysis and classification," Computer & Security, vol. 52, pp. 251-266, 2015. https://doi.org/10.1016/j.cose.2015.04.001
- N. Nissim, R. Moskovitch, L. Rokach, and Y. Elovici, "Novel active learning methods for enhanced PC malware detection in windows OS," Expert Systems with Applications, vol. 41, no. 13, pp. 5843-5857, 2014. https://doi.org/10.1016/j.eswa.2014.02.053
- S. Alam, R. N. Horspool, I. Traore, and I. Sogukpinar, "A framework for metamorphic malware analysis and real-time detection," Computers & Security, vol. 48, pp. 212-233, 2015. https://doi.org/10.1016/j.cose.2014.10.011