Related references
Note: Only part of the references are listed.Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
Tao Zhang et al.
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)
Cyber security of critical infrastructures
Leandros A. Maglaras et al.
ICT EXPRESS (2018)
The 2015 Ukraine Blackout: Implications for False Data Injection Attacks
Gaoqi Liang et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2017)
A survey of deep neural network architectures and their applications
Weibo Liu et al.
NEUROCOMPUTING (2017)
An Effective Approach for Classification of Advanced Malware with High Accuracy
Ashu Sharma et al.
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2016)
Malware Detection with Deep Neural Network Using Process Behavior
Shun Tobiyama et al.
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2 (2016)
A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
Robert Mitchell et al.
ACM COMPUTING SURVEYS (2014)
Security Evaluation of Pattern Classifiers under Attack
Battista Biggio et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Igor Santos et al.
INFORMATION SCIENCES (2013)
Anomaly Detection via One Class SVM for Protection of SCADA Systems
Jianmin Jiang et al.
2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC) (2013)
A SCADA system for energy management in intelligent buildings
Joao Figueiredo et al.
ENERGY AND BUILDINGS (2012)
Methodology for a Security/Dependability Adaptive Protection Scheme Based on Data Mining
Emanuel E. Bernabeu et al.
IEEE TRANSACTIONS ON POWER DELIVERY (2012)
Andromaly: a behavioral malware detection framework for android devices
Asaf Shabtai et al.
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2012)
Automatic analysis of malware behavior using machine learning
Konrad Rieck et al.
JOURNAL OF COMPUTER SECURITY (2011)
Stuxnet and the Future of Cyber War
James P. Farwell et al.
SURVIVAL (2011)
Microgrid Protection Using Communication-Assisted Digital Relays
Eric Sortomme et al.
IEEE TRANSACTIONS ON POWER DELIVERY (2010)
The security of machine learning
Marco Barreno et al.
MACHINE LEARNING (2010)
Content-based multimedia information retrieval: State of the art and challenges
Michael S. Lew et al.
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2006)
An efficient k-means clustering algorithm:: Analysis and implementation
T Kanungo et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)