4.6 Article

ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

A Fake Online Repository Generation Engine for Cyber Deception

Tanmoy Chakraborty et al.

Summary: This paper discusses the defense of enterprises successfully hacked by increasing a posteriori costs for attackers. The FORGE system generates highly believable fake documents using innovations involving multi-layer graphs and meta-centrality.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Extended Isolation Forest

Sahand Hariri et al.

Summary: The Extended Isolation Forest (EIF) proposes improvements to the Isolation Forest algorithm, addressing issues with assigning anomaly scores to data points. The paper explains the artifacts in anomaly score heat maps and suggests two different approaches for enhancement, with using hyperplanes with random slopes being the preferred method. The study shows that the algorithm's robustness is significantly improved using this method, without notable differences in convergence rate or computation time compared to the standard Isolation Forest.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments

Yulai Xie et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

A Taxonomy of Supervised Learning for IDSs in SCADA Environments

Jakapan Suaboot et al.

ACM COMPUTING SURVEYS (2020)

Article Chemistry, Multidisciplinary

Online Mining Intrusion Patterns from IDS Alerts

Kai Zhang et al.

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Information Systems

A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics

Dimitrios Pliatsios et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Differential Privacy Techniques for Cyber Physical Systems: A Survey

Muneeb Ul Hassan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Theory & Methods

A Survey on Big Multimedia Data Processing and Management in Smart Cities

Muhammad Usman et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues

Babatuni Omoniwa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A survey of network-based intrusion detection data sets

Markus Ring et al.

COMPUTERS & SECURITY (2019)

Article Automation & Control Systems

A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Review Computer Science, Information Systems

Securing Linux with a Faster and Scalable Iptables

Sebastiano Miano et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2019)

Article Computer Science, Information Systems

Security risk assessment for SDN-enabled smart grids

Hellen Maziku et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Securing the Internet of Things: Challenges, threats and solutions

Panagiotis I. Radoglou Grammatikis et al.

INTERNET OF THINGS (2019)

Article Computer Science, Information Systems

A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities

Adel Alshamrani et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Review Computer Science, Information Systems

A Survey of Deep Learning Methods for Cyber Security

Daniel S. Berman et al.

INFORMATION (2019)

Article Computer Science, Information Systems

Software Defined Networks-Based Smart Grid Communication: A Comprehensive Survey

Mubashir Husain Rehmani et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey

Amrita Ghosal et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

Panagiotis Radoglou-Grammatikis et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks

Pedro Manso et al.

INFORMATION (2019)

Article Computer Science, Information Systems

Toward Adaptive and Scalable OpenFlow-SDN Flow Control: A Survey

Mohammed Alsaeedi et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

Provably Secure Authenticated Key Agreement Scheme for Smart Grid

Vanga Odelu et al.

IEEE TRANSACTIONS ON SMART GRID (2018)

Article Computer Science, Information Systems

Survey of Security Advances in Smart Grid: A Data Driven Approach

Song Tan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Artificial Intelligence

Linear discriminant analysis: A detailed tutorial

Alaa Tharwat et al.

AI COMMUNICATIONS (2017)

Article Computer Science, Theory & Methods

Unifying intrusion detection and forensic analysis via provenance awareness

Yulai Xie et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Hardware & Architecture

Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization

Gilberto Fernandes et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Linear vs. quadratic discriminant analysis classifier: a tutorial

Alaa Tharwat

INTERNATIONAL JOURNAL OF APPLIED PATTERN RECOGNITION (2016)

Article Computer Science, Information Systems

Local outlier factor use for the network flow anomaly detection

Nerijus Paulauskas et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Engineering, Electrical & Electronic

The Path of the Smart Grid

Hassan Farhangi

IEEE POWER & ENERGY MAGAZINE (2010)

Article Computer Science, Interdisciplinary Applications

Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator

J Hardin et al.

COMPUTATIONAL STATISTICS & DATA ANALYSIS (2004)