Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods
暂无分享,去创建一个
[1] R Karthikeyan.K.,et al. Intrusion Detection Tools and Techniques –A Survey , 2010 .
[2] Yuan Xue,et al. Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.
[3] Jules White,et al. Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks? , 2015, IEEE Security & Privacy.
[4] Young B. Moon,et al. Performance Analysis of CyberManufacturing Systems: A Simulation Study , 2016, PLM.
[5] Jules White,et al. Cyber-physical security challenges in manufacturing systems , 2014 .
[6] Vir V. Phoha,et al. Detecting Malicious Defects in 3D Printing Process Using Machine Learning and Image Classification , 2016 .
[7] José Luís Calvo-Rolle,et al. Thermal Efficiency Supervision by NN Based Functional Approximation Techniques , 2011, SOCO.
[8] Zhang Xuewu,et al. A vision inspection system for the surface defects of strongly reflected metal based on multi-class SVM , 2011 .
[9] Roberto Uribeetxeberria,et al. A Review of SCADA Anomaly Detection Systems , 2011, SOCO.
[10] Pascal Poncelet,et al. Anomaly detection in monitoring sensor data for preventive maintenance , 2011, Expert Syst. Appl..
[11] Felix Naumann,et al. Data fusion , 2009, CSUR.
[12] Won Hyung Park,et al. A study on the live forensic techniques for anomaly detection in user terminals , 2013 .
[13] Zhengyi Song,et al. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example , 2017 .
[14] T.Y. Lin,et al. Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.
[15] N. Srinivasan,et al. Using Random Forests for Network-based Anomaly detection at Active routers , 2008, 2008 International Conference on Signal Processing, Communications and Networking.
[16] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[17] Nektarios Georgios Tsoutsos,et al. Manufacturing and Security Challenges in 3D Printing , 2016 .
[18] Lei Ren,et al. Cloud manufacturing: from concept to practice , 2015, Enterp. Inf. Syst..
[19] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Julian Padget,et al. Multi-sensor data fusion framework for CNC machining monitoring , 2016 .
[21] Cheng Li,et al. Automatic classification of weld defects in radiographic images , 2010 .
[22] Leif E. Peterson. K-nearest neighbor , 2009, Scholarpedia.
[23] N. Jazdi,et al. Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.
[24] Yi Lu Murphey,et al. An intelligent real-time vision system for surface defect detection , 2004, ICPR 2004.
[25] Jaime A. Camelio,et al. Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .
[26] Andrew Zisserman,et al. Image Classification using Random Forests and Ferns , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[27] Yunhao Liu,et al. Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.