4.7 Article

A Taxonomy of Supervised Learning for IDSs in SCADA Environments

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Fast and peer-to-peer vital signal learning system for cloud-based healthcare

Rongjun Xie et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks

Daesung Moon et al.

JOURNAL OF SUPERCOMPUTING (2017)

Article Automation & Control Systems

Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids

Adnan Anwar et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Theory & Methods

Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems

Ming Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks

Yi Yang et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2017)

Article Computer Science, Hardware & Architecture

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

Adnan Anwar et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2017)

Article Computer Science, Artificial Intelligence

A local density-based approach for outlier detection

Bo Tang et al.

NEUROCOMPUTING (2017)

Article Engineering, Electrical & Electronic

Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

Aditya Ashok et al.

PROCEEDINGS OF THE IEEE (2017)

Article Computer Science, Information Systems

A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

Dhanalakshmi Krishnan Sadhasivan et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Telecommunications

Field classification, modeling and anomaly detection in unknown CAN bus networks

Moti Markovitz et al.

VEHICULAR COMMUNICATIONS (2017)

Article Computer Science, Information Systems

An enhanced optimization based algorithm for intrusion detection in SCADA network

S. Shitharth et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Assessing and augmenting SCADA cyber security: A survey of techniques

Sajid Nazir et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems

Ahmed Patel et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Artificial Intelligence

Probabilistic models-based intrusion detection using sequence characteristics in control system communication

Takashi Onoda

NEURAL COMPUTING & APPLICATIONS (2016)

Article Engineering, Electrical & Electronic

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average

Tomasz Andrysiak et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2016)

Article Computer Science, Software Engineering

Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems Toward Critical Infrastructure Security

Mahdi Jamei et al.

IEEE INTERNET COMPUTING (2016)

Article Computer Science, Hardware & Architecture

Industrial Control System Network Intrusion Detection by Telemetry Analysis

Stanislav Ponomarev et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Automation & Control Systems

A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems

Tiago Cruz et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)

Article Computer Science, Information Systems

A framework for designing resilient distributed intrusion detection systems for critical infrastructures

Bela Genge et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2016)

Proceedings Paper Computer Science, Software Engineering

A System Substitution Mechanism for Hybrid Systems in Event-B

Guillaume Babin et al.

FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2016 (2016)

Article Computer Science, Information Systems

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems

Leandros A. Maglaras et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Combating advanced persistent threats: From network event correlation to incident detection

Ivo Friedberg et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid

Adnan Anwar et al.

INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems

Noam Erez et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2015)

Article Engineering, Electrical & Electronic

Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems

Shengyi Pan et al.

IEEE TRANSACTIONS ON SMART GRID (2015)

Article Automation & Control Systems

Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation

Chunjie Zhou et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2015)

Article Computer Science, Information Systems

Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850

Hyunguk Yoo et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Proceedings Paper Computer Science, Theory & Methods

An Overview of Microsoft Academic Service (MAS) and Applications

Arnab Sinha et al.

WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (2015)

Proceedings Paper Computer Science, Information Systems

A Survey of Industrial Control System Testbeds

Hannes Holm et al.

SECURE IT SYSTEMS, NORDSEC 2015 (2015)

Article Computer Science, Theory & Methods

A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

Robert Mitchell et al.

ACM COMPUTING SURVEYS (2014)

Article Computer Science, Hardware & Architecture

Diagnosis mechanism for accurate monitoring in critical infrastructure protection

Cristina Alcaraz et al.

COMPUTER STANDARDS & INTERFACES (2014)

Article Computer Science, Information Systems

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

Abdulmohsen Almalawi et al.

COMPUTERS & SECURITY (2014)

Article Engineering, Electrical & Electronic

Disturbance detection for optimal database storage in electrical distribution systems using artificial immune systems with negative selection

Fernando P. A. Lima et al.

ELECTRIC POWER SYSTEMS RESEARCH (2014)

Article Automation & Control Systems

lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems

Patric Nader et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Engineering, Electrical & Electronic

Multiattribute SCADA-Specific Intrusion Detection System for Power Networks

Y. Yang et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2014)

Article Computer Science, Artificial Intelligence

Fault detection based on a robust one class support vector machine

Shen Yin et al.

NEUROCOMPUTING (2014)

Article Computer Science, Information Systems

SCADA communication and security issues

Jingcheng Gao et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Proceedings Paper Computer Science, Hardware & Architecture

Big Data Analysis Techniques for Cyber-Threat Detection in Critical Infrastructures

William Hurst et al.

2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) (2014)

Article Automation & Control Systems

A Probabilistic Model to Predict the Survivability of SCADA Systems

Carlos Queiroz et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)

Article Automation & Control Systems

A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems

A. Carcano et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2011)

Article Computer Science, Interdisciplinary Applications

Improved real-time data anomaly detection using context classification

Nemanja Branisavljevic et al.

JOURNAL OF HYDROINFORMATICS (2011)

Article Computer Science, Information Systems

A control system testbed to validate critical infrastructure protection concepts

Thomas Morris et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2011)

Article Engineering, Electrical & Electronic

Protecting Smart Grid Automation Systems Against Cyberattacks

Dong Wei et al.

IEEE TRANSACTIONS ON SMART GRID (2011)

Article Engineering, Electrical & Electronic

SCADASim-A Framework for Building SCADA Simulations

Carlos Queiroz et al.

IEEE TRANSACTIONS ON SMART GRID (2011)

Article Engineering, Electrical & Electronic

An Intrusion Detection System for IEC61850 Automated Substations

Upeka Kanchana Premaratne et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2010)

Proceedings Paper Computer Science, Information Systems

Modbus/DNP3 State-based Intrusion Detection System

Igor Nai Fovino et al.

2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2010)

Article Computer Science, Hardware & Architecture

A Digest and Pattern Matching-Based Intrusion Detection Engine

Zhongqiang Chen et al.

COMPUTER JOURNAL (2009)

Article Computer Science, Artificial Intelligence

Support vector data description

DMJ Tax et al.

MACHINE LEARNING (2004)

Article Computer Science, Artificial Intelligence

Feature normalization and likelihood-based similarity measures for image retrieval

S Aksoy et al.

PATTERN RECOGNITION LETTERS (2001)