The comparison network model for cyber anomaly detection
暂无分享,去创建一个
Hao Chen | Haicheng Qu | Jitao Qin | Haicheng Qu | Jitao Qin | Hao Chen
[1] Paul Honeine,et al. ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.
[2] Charu C. Aggarwal,et al. Outlier Analysis , 2013, Springer New York.
[3] Stanley B. Zdonik,et al. A New Model for Evaluating Range-Based Anomaly Detection Algorithms , 2018, ArXiv.
[4] Heiko Hoffmann,et al. Kernel PCA for novelty detection , 2007, Pattern Recognit..
[5] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[6] Randy C. Paffenroth,et al. Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.
[7] Thomas Morris,et al. A testbed for SCADA control system cybersecurity research and pedagogy , 2011, CSIIRW '11.
[8] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[9] Wei Gao,et al. Industrial Control System Traffic Data Sets for Intrusion Detection Research , 2014, Critical Infrastructure Protection.
[10] Hao Chen,et al. Instruction Detection in SCADA/Modbus Network Based on Machine Learning , 2017, MLICOM.
[11] Avishai Wool,et al. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems , 2013, Int. J. Crit. Infrastructure Prot..
[12] Lin Li,et al. Industrial communication intrusion detection algorithm based on improved one-class SVM , 2015, 2015 World Congress on Industrial Control Systems Security (WCICSS).
[13] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[14] Avishai Wool,et al. Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems , 2015, Int. J. Crit. Infrastructure Prot..
[15] Alexandros Iosifidis,et al. One-Class Classification Based on Extreme Learning and Geometric Class Information , 2016, Neural Processing Letters.
[16] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[17] Bo Zong,et al. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection , 2018, ICLR.
[18] Leandros A. Maglaras,et al. Intrusion detection in SCADA systems using machine learning techniques , 2014, 2014 Science and Information Conference.
[19] Slim Abdennadher,et al. Enhancing one-class support vector machines for unsupervised anomaly detection , 2013, ODD '13.