4.6 Article

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Learning Latent Representation for IoT Anomaly Detection

Ly Vu et al.

Summary: The Internet of Things (IoT) has had a significant impact on society, but it has also introduced new cybersecurity risks. This article proposes a novel method for detecting and preventing unknown attacks in IoT systems by using autoencoders to learn a latent representation of the data. The experiments conducted show that the proposed models significantly enhance the performance of supervised learning methods in detecting unknown IoT attacks.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Computer Science, Artificial Intelligence

Identify Significant Phenomenon-Specific Variables for Multivariate Time Series

Yifan Hao et al.

Summary: In this paper, we introduce a new problem of identifying significant Phenomenon-specific Variables (PVs) from Multivariate Time Series (MTS) datasets. We propose a solution framework, CNNmts-X, which is a new variant of Convolutional Neural Networks (CNN) and can embed other feature extraction techniques. Additionally, we design a CNNmts-LR method that implements a new feature identification approach utilizing Linear Discriminant Analysis (LDA) and Random Forest (RF) to achieve better performance in identifying important PVs from MTS datasets.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Computer Science, Theory & Methods

A Taxonomy of Supervised Learning for IDSs in SCADA Environments

Jakapan Suaboot et al.

ACM COMPUTING SURVEYS (2020)

Review Computer Science, Information Systems

Anomaly Detection for IoT Time-Series Data: A Survey

Andrew A. Cook et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments

Wissam Aoudi et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2020)

Article Computer Science, Information Systems

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems

Abdullah Alsaedi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems

Mariam Elnour et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Multivariate Abnormal Detection for Industrial Control Systems Using 1D CNN and GRU

Xin Xie et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Automation & Control Systems

Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data

Fan Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Engineering, Electrical & Electronic

Maximum Correntropy Criterion With Variable Center

Badong Chen et al.

IEEE SIGNAL PROCESSING LETTERS (2019)

Proceedings Paper Computer Science, Information Systems

Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network

Ya Su et al.

KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING (2019)

Proceedings Paper Computer Science, Information Systems

Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA

Shahroz Tariq et al.

KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING (2019)

Article Computer Science, Information Systems

Intrusion Detection Systems: A Cross-Domain Overview

Lionel N. Tidjon et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A systematic survey on multi-step attack detection

Julio Navarro et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

Muhamad Erza Aminanto et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Computer Science, Information Systems

IIoT Cybersecurity Risk Modeling for SCADA Systems

Gregory Falco et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems

Jairo Giraldo et al.

ACM COMPUTING SURVEYS (2018)

Proceedings Paper Computer Science, Theory & Methods

Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems

Wissam Aoudi et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

Yuqi Chen et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Artificial Intelligence

New Robust Metric Learning Model Using Maximum Correntropy Criterion

Jie Xu et al.

KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2018)

Article Automation & Control Systems

Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids

Adnan Anwar et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Information Systems

Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning methodInspec keywordsOther keywords

S. Armina Foroutan et al.

IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks

Jonathan Goh et al.

2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017) (2017)

Article Computer Science, Artificial Intelligence

Design of experiments and focused grid search for neural network parameter optimization

F. J. Pontes et al.

NEUROCOMPUTING (2016)

Article Computer Science, Information Systems

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

Abdulmohsen Almalawi et al.

COMPUTERS & SECURITY (2014)

Review Computer Science, Artificial Intelligence

Representation Learning: A Review and New Perspectives

Yoshua Bengio et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2013)

Article Automation & Control Systems

Control system design subject to SNR constraints

Eduardo I. Silva et al.

AUTOMATICA (2010)

Article Computer Science, Artificial Intelligence

Estimating the support of a high-dimensional distribution

B Schölkopf et al.

NEURAL COMPUTATION (2001)