Related references
Note: Only part of the references are listed.Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
Chong-zhi Gao et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
Arash Nourian et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Deep Learning for Smart Industry: Efficient Manufacture Inspection System With Fog Computing
Liangzhi Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
Naveed Akhtar et al.
IEEE ACCESS (2018)
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
Jun Wu et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
Jun Wu et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Rocio Lopez Perez et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems
Ming Wan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation
Margarita Osadchy et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
A Game-Theoretic Analysis of Adversarial Classification
Lemonia Dritsoula et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
The 2015 Ukraine Blackout: Implications for False Data Injection Attacks
Gaoqi Liang et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2017)
Optimization Under Uncertainty for Wake Steering Strategies
Julian Quick et al.
WAKE CONFERENCE 2017 (2017)
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
Nicholas R. Rodofile et al.
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II (2017)
ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services
Bela Genge et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems
Mianxiong Dong et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2016)
An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems
Abdulmohsen Almalawi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
Hamid Reza Ghaeini et al.
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY (2016)
lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems
Patric Nader et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
Justin M. Beaver et al.
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 (2013)
Anomaly Detection via One Class SVM for Protection of SCADA Systems
Jianmin Jiang et al.
2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC) (2013)
Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks
Sutharshan Rajasegarar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)
The security of machine learning
Marco Barreno et al.
MACHINE LEARNING (2010)
Vulnerability Assessment of Cybersecurity for SCADA Systems
Chee-Wooi Ten et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2008)
The quadruple-tank process: A multivariable laboratory process with an adjustable zero
KH Johansson
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2000)