Related references
Note: Only part of the references are listed.A Fake Online Repository Generation Engine for Cyber Deception
Tanmoy Chakraborty et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Extended Isolation Forest
Sahand Hariri et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments
Yulai Xie et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
A Taxonomy of Supervised Learning for IDSs in SCADA Environments
Jakapan Suaboot et al.
ACM COMPUTING SURVEYS (2020)
Online Mining Intrusion Patterns from IDS Alerts
Kai Zhang et al.
APPLIED SCIENCES-BASEL (2020)
Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees
Erkuden Rios et al.
SENSORS (2020)
A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics
Dimitrios Pliatsios et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Muneeb Ul Hassan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
A Survey on Big Multimedia Data Processing and Management in Smart Cities
Muhammad Usman et al.
ACM COMPUTING SURVEYS (2019)
Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues
Babatuni Omoniwa et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
A survey of network-based intrusion detection data sets
Markus Ring et al.
COMPUTERS & SECURITY (2019)
A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks
Chen Peng et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)
Securing Linux with a Faster and Scalable Iptables
Sebastiano Miano et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2019)
Security risk assessment for SDN-enabled smart grids
Hellen Maziku et al.
COMPUTER COMMUNICATIONS (2019)
Securing the Internet of Things: Challenges, threats and solutions
Panagiotis I. Radoglou Grammatikis et al.
INTERNET OF THINGS (2019)
A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
Adel Alshamrani et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A Survey of Deep Learning Methods for Cyber Security
Daniel S. Berman et al.
INFORMATION (2019)
Software Defined Networks-Based Smart Grid Communication: A Comprehensive Survey
Mubashir Husain Rehmani et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
Amrita Ghosal et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
Pardeep Kumar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Network Intrusion Detection for IoT Security Based on Learning Techniques
Nadia Chaabouni et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems
Panagiotis Radoglou-Grammatikis et al.
IEEE ACCESS (2019)
SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks
Pedro Manso et al.
INFORMATION (2019)
Toward Adaptive and Scalable OpenFlow-SDN Flow Control: A Survey
Mohammed Alsaeedi et al.
IEEE ACCESS (2019)
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
Vanga Odelu et al.
IEEE TRANSACTIONS ON SMART GRID (2018)
Survey of Security Advances in Smart Grid: A Data Driven Approach
Song Tan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Linear discriminant analysis: A detailed tutorial
Alaa Tharwat et al.
AI COMMUNICATIONS (2017)
Unifying intrusion detection and forensic analysis via provenance awareness
Yulai Xie et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization
Gilberto Fernandes et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Linear vs. quadratic discriminant analysis classifier: a tutorial
Alaa Tharwat
INTERNATIONAL JOURNAL OF APPLIED PATTERN RECOGNITION (2016)
Local outlier factor use for the network flow anomaly detection
Nerijus Paulauskas et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
The Path of the Smart Grid
Hassan Farhangi
IEEE POWER & ENERGY MAGAZINE (2010)
Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator
J Hardin et al.
COMPUTATIONAL STATISTICS & DATA ANALYSIS (2004)