4.6 Article

Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network

Chong-zhi Gao et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet

Arash Nourian et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Automation & Control Systems

Deep Learning for Smart Industry: Efficient Manufacture Inspection System With Fog Computing

Liangzhi Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

Naveed Akhtar et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks

Jun Wu et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Article Computer Science, Information Systems

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks

Jun Wu et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Proceedings Paper Computer Science, Information Systems

Machine Learning for Reliable Network Attack Detection in SCADA Systems

Rocio Lopez Perez et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Computer Science, Theory & Methods

Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems

Ming Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation

Margarita Osadchy et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

A Game-Theoretic Analysis of Adversarial Classification

Lemonia Dritsoula et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

Gaoqi Liang et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2017)

Proceedings Paper Energy & Fuels

Optimization Under Uncertainty for Wake Steering Strategies

Julian Quick et al.

WAKE CONFERENCE 2017 (2017)

Proceedings Paper Computer Science, Information Systems

Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure

Nicholas R. Rodofile et al.

INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II (2017)

Article Computer Science, Information Systems

ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services

Bela Genge et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Hardware & Architecture

LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems

Mianxiong Dong et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2016)

Article Computer Science, Theory & Methods

An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems

Abdulmohsen Almalawi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Hardware & Architecture

HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems

Hamid Reza Ghaeini et al.

CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY (2016)

Article Automation & Control Systems

lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems

Patric Nader et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Proceedings Paper Computer Science, Artificial Intelligence

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

Justin M. Beaver et al.

2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 (2013)

Proceedings Paper Computer Science, Cybernetics

Anomaly Detection via One Class SVM for Protection of SCADA Systems

Jianmin Jiang et al.

2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC) (2013)

Article Computer Science, Theory & Methods

Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks

Sutharshan Rajasegarar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Computer Science, Artificial Intelligence

The security of machine learning

Marco Barreno et al.

MACHINE LEARNING (2010)

Article Engineering, Electrical & Electronic

Vulnerability Assessment of Cybersecurity for SCADA Systems

Chee-Wooi Ten et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2008)

Article Automation & Control Systems

The quadruple-tank process: A multivariable laboratory process with an adjustable zero

KH Johansson

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2000)