Related references
Note: Only part of the references are listed.Fast and peer-to-peer vital signal learning system for cloud-based healthcare
Rongjun Xie et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks
Daesung Moon et al.
JOURNAL OF SUPERCOMPUTING (2017)
Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids
Adnan Anwar et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems
Ming Wan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks
Yi Yang et al.
IEEE TRANSACTIONS ON POWER DELIVERY (2017)
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
Adnan Anwar et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2017)
A local density-based approach for outlier detection
Bo Tang et al.
NEUROCOMPUTING (2017)
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
Aditya Ashok et al.
PROCEEDINGS OF THE IEEE (2017)
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System
Dhanalakshmi Krishnan Sadhasivan et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
Field classification, modeling and anomaly detection in unknown CAN bus networks
Moti Markovitz et al.
VEHICULAR COMMUNICATIONS (2017)
An enhanced optimization based algorithm for intrusion detection in SCADA network
S. Shitharth et al.
COMPUTERS & SECURITY (2017)
Assessing and augmenting SCADA cyber security: A survey of techniques
Sajid Nazir et al.
COMPUTERS & SECURITY (2017)
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems
Ahmed Patel et al.
COMPUTERS & SECURITY (2017)
Probabilistic models-based intrusion detection using sequence characteristics in control system communication
Takashi Onoda
NEURAL COMPUTING & APPLICATIONS (2016)
Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average
Tomasz Andrysiak et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2016)
Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems Toward Critical Infrastructure Security
Mahdi Jamei et al.
IEEE INTERNET COMPUTING (2016)
Industrial Control System Network Intrusion Detection by Telemetry Analysis
Stanislav Ponomarev et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
Tiago Cruz et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)
A framework for designing resilient distributed intrusion detection systems for critical infrastructures
Bela Genge et al.
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2016)
A System Substitution Mechanism for Hybrid Systems in Event-B
Guillaume Babin et al.
FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2016 (2016)
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Leandros A. Maglaras et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2016)
Combating advanced persistent threats: From network event correlation to incident detection
Ivo Friedberg et al.
COMPUTERS & SECURITY (2015)
Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid
Adnan Anwar et al.
INFORMATION SYSTEMS (2015)
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems
Noam Erez et al.
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2015)
Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems
Shengyi Pan et al.
IEEE TRANSACTIONS ON SMART GRID (2015)
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation
Chunjie Zhou et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2015)
Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850
Hyunguk Yoo et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
An Overview of Microsoft Academic Service (MAS) and Applications
Arnab Sinha et al.
WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (2015)
A Survey of Industrial Control System Testbeds
Hannes Holm et al.
SECURE IT SYSTEMS, NORDSEC 2015 (2015)
A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
Robert Mitchell et al.
ACM COMPUTING SURVEYS (2014)
Diagnosis mechanism for accurate monitoring in critical infrastructure protection
Cristina Alcaraz et al.
COMPUTER STANDARDS & INTERFACES (2014)
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
Abdulmohsen Almalawi et al.
COMPUTERS & SECURITY (2014)
Disturbance detection for optimal database storage in electrical distribution systems using artificial immune systems with negative selection
Fernando P. A. Lima et al.
ELECTRIC POWER SYSTEMS RESEARCH (2014)
lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems
Patric Nader et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
Y. Yang et al.
IEEE TRANSACTIONS ON POWER DELIVERY (2014)
Fault detection based on a robust one class support vector machine
Shen Yin et al.
NEUROCOMPUTING (2014)
SCADA communication and security issues
Jingcheng Gao et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
Big Data Analysis Techniques for Cyber-Threat Detection in Critical Infrastructures
William Hurst et al.
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) (2014)
A Probabilistic Model to Predict the Survivability of SCADA Systems
Carlos Queiroz et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems
A. Carcano et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2011)
Improved real-time data anomaly detection using context classification
Nemanja Branisavljevic et al.
JOURNAL OF HYDROINFORMATICS (2011)
A control system testbed to validate critical infrastructure protection concepts
Thomas Morris et al.
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2011)
Protecting Smart Grid Automation Systems Against Cyberattacks
Dong Wei et al.
IEEE TRANSACTIONS ON SMART GRID (2011)
SCADASim-A Framework for Building SCADA Simulations
Carlos Queiroz et al.
IEEE TRANSACTIONS ON SMART GRID (2011)
An Intrusion Detection System for IEC61850 Automated Substations
Upeka Kanchana Premaratne et al.
IEEE TRANSACTIONS ON POWER DELIVERY (2010)
Modbus/DNP3 State-based Intrusion Detection System
Igor Nai Fovino et al.
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2010)
A Digest and Pattern Matching-Based Intrusion Detection Engine
Zhongqiang Chen et al.
COMPUTER JOURNAL (2009)
Online Wind Turbine Fault Detection through Automated SCADA Data Analysis
A. Zaher et al.
WIND ENERGY (2009)
Support vector data description
DMJ Tax et al.
MACHINE LEARNING (2004)
Feature normalization and likelihood-based similarity measures for image retrieval
S Aksoy et al.
PATTERN RECOGNITION LETTERS (2001)