• Koumar J, Hynek K, Pešek J and Čejka T. (2024). NetTiSA. Computer Networks: The International Journal of Computer and Telecommunications Networking. 240:C. Online publication date: 1-Feb-2024.

    https://doi.org/10.1016/j.comnet.2023.110147

  • Dey J. (2023). State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Computing and Applications. 35:13. (9517-9533). Online publication date: 1-May-2023.

    https://doi.org/10.1007/s00521-022-08169-2

  • Tiwari N and Hubballi N. (2023). Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling. IEEE Transactions on Network and Service Management. 20:1. (697-710). Online publication date: 1-Mar-2023.

    https://doi.org/10.1109/TNSM.2022.3212591

  • Afzal S, Asim M, Javed A, Beg M and Baker T. (2021). URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models. Journal of Network and Systems Management. 29:3. Online publication date: 1-Jul-2021.

    https://doi.org/10.1007/s10922-021-09587-8

  • Le D and Zincir-Heywood N. (2020). A Frontier: Dependable, Reliable and Secure Machine Learning for Network/System Management. Journal of Network and Systems Management. 28:4. (827-849). Online publication date: 1-Oct-2020.

    https://doi.org/10.1007/s10922-020-09512-5