Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
暂无分享,去创建一个
Salim Hariri | Youakim Badr | Jesus Pacheco | Xiaoyang Zhu | S. Hariri | J. Pacheco | Y. Badr | Xiaoyang Zhu
[1] Gregory A. Witte,et al. Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .
[2] Salim Hariri,et al. IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[3] Azeddine Bilami,et al. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things , 2015, Comput. Networks.
[4] Philippe Aniorte,et al. Challenges in Security Engineering of Systems-of-Systems , 2014 .
[5] Emil C. Lupu,et al. Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..
[6] David Cooper,et al. Server-Based Certificate Validation Protocol (SCVP) , 2007, RFC.
[7] Tai-Myung Chung,et al. Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security , 2007, International Conference on Computational Science.
[8] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[9] Vinod Namboodiri,et al. Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids , 2014, IEEE Systems Journal.
[10] Youakim Badr,et al. Managing End-to-End Security Risks with Fuzzy Logic in Service-Oriented Architectures , 2013, 2013 IEEE Ninth World Congress on Services.
[11] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[12] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[13] Yang Xiao,et al. A Survey of Security in Telemedicine with Wireless Sensor Networks , 2008 .
[14] Youakim Badr,et al. Risk management and security in service-based architectures , 2009, 2009 International Conference on Advances in Computational Tools for Engineering Applications.
[15] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[16] Ping Zhang,et al. Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).
[17] Yoshiaki Kakuda,et al. A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.
[18] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.