Related references
Note: Only part of the references are listed.An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset
Yamarthi Narasimha Rao et al.
SENSORS (2023)
CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-node Multi-class Classification Approach
Junyi Liu et al.
ACM Transactions on Sensor Networks (2023)
Deep learning-based intrusion detection approach for securing industrial Internet of Things
Sahar Soliman et al.
ALEXANDRIA ENGINEERING JOURNAL (2023)
A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks
Izhar Ahmed Khan et al.
APPLIED INTELLIGENCE (2021)
Cybersecurity for industrial control systems: A survey
Deval Bhamare et al.
COMPUTERS & SECURITY (2020)
Deep Least Squares Fisher Discriminant Analysis
David Diaz-Vico et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)
A new hybrid approach for intrusion detection using machine learning methods
Unal Cavusoglu
APPLIED INTELLIGENCE (2019)
A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System
Sydney Mambwe Kasongo et al.
IEEE ACCESS (2019)
Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection
Iftikhar Ahmad et al.
IEEE ACCESS (2018)
Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection
Jae-Hyun Seo et al.
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2018)
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM networks
Cheng Feng et al.
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2017)
A Novel Algorithm for Imbalance Data Classification Based on Genetic Algorithm Improved SMOTE
Kun Jiang et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2016)
An Investigation into the Response of a Water Treatment System to Cyber Attacks
Sridhar Adepu et al.
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE) (2016)
Combating advanced persistent threats: From network event correlation to incident detection
Ivo Friedberg et al.
COMPUTERS & SECURITY (2015)
Intrusion Detection Alarm Filtering Technology Based on Ant Colony Clustering Algorithm
Xu Yang et al.
PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015 (2015)
Potentials of Using One-class SVM for Detecting Protocol-specific Anomalies in Industrial Networks
Franka Schuster et al.
2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI) (2015)
lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems
Patric Nader et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Smart grid forensic science: applications, challenges, and open issues
M. Erol-Kantarci et al.
IEEE COMMUNICATIONS MAGAZINE (2013)
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
Justin M. Beaver et al.
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 (2013)
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
Bela Genge et al.
COMPUTERS & ELECTRICAL ENGINEERING (2012)
Stuxnet: Dissecting a Cyberwarfare Weapon
Ralph Langner
IEEE SECURITY & PRIVACY (2011)
Modbus/DNP3 State-based Intrusion Detection System
Igor Nai Fovino et al.
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2010)
A multiple resampling method for learning from imbalanced data sets
A Estabrooks et al.
COMPUTATIONAL INTELLIGENCE (2004)