The Resource Usage Viewpoint of Industrial Control System Security: An Inference-Based Intrusion Detection System
暂无分享,去创建一个
William H. Robinson | Lanier Watkins | Pengyuan Wang | Rahul Nair | Kevin D. Fairbanks | Chinmohan Nayak | Kashif Memon
[1] Raheem A. Beyah,et al. A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[2] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[3] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[4] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[5] Garth V. Crosby,et al. Using network traffic to infer power levels in wireless sensor nodes , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[6] J. H. Reed,et al. Enhancing Smart Grid cyber security using power fingerprinting: Integrity assessment and intrusion detection , 2012, 2012 Future of Instrumentation International Workshop (FIIW) Proceedings.
[7] Raheem A. Beyah,et al. Using Network Traffic to Infer Hardware State , 2015, ACM Trans. Embed. Comput. Syst..
[8] Raheem A. Beyah,et al. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.
[9] William H. Robinson,et al. Remotely inferring device manipulation of industrial control systems via network behavior , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).
[10] Dimitris Gritzalis,et al. The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? , 2013, 2013 International Conference on Availability, Reliability and Security.
[11] Sang-Soo Yeo,et al. Secure Model against APT in m-Connected SCADA Network , 2014, Int. J. Distributed Sens. Networks.
[12] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[13] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[14] Raheem A. Beyah,et al. A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters , 2010, IEEE Transactions on Network and Service Management.
[15] Man-Ki Yoon,et al. Communication Pattern Monitoring: Improving the Utility of Anomaly Detection for Industrial Control Systems , 2014 .
[16] Leo Breiman,et al. Random Forests , 2001, Machine Learning.