A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
暂无分享,去创建一个
John Yearwood | Md. Shamsul Huda | Robin Doss | Md. Suruz Miah | Hmood Al-Dossari | Sultan Alyahya | J. Yearwood | H. Al-Dossari | R. Doss | Sultan Alyahya | Hmood Al-Dossari
[1] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[2] Dirk Schaefer,et al. Software-defined cloud manufacturing for industry 4.0 , 2016 .
[3] Birgit Vogel-Heuser,et al. Design, modelling, simulation and integration of cyber physical systems: Methods and applications , 2016, Comput. Ind..
[4] Mehmet Kayaalp,et al. Efficiently Securing Systems from Code Reuse Attacks , 2014, IEEE Transactions on Computers.
[5] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[6] Shigeng Zhang,et al. Deterministic Detection of Cloning Attacks for Anonymous RFID Systems , 2015, IEEE Transactions on Industrial Informatics.
[7] Kieran McLaughlin,et al. SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection , 2013, IEEE Transactions on Information Forensics and Security.
[8] Zhou,et al. An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection , 2010 .
[9] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[10] Insup Lee,et al. Model-Driven Safety Analysis of Closed-Loop Medical Systems , 2014, IEEE Transactions on Industrial Informatics.
[11] Nataasha Raul,et al. Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks , 2012, ArXiv.
[12] Richard Piggin,et al. Are industrial control systems ready for the cloud? , 2015, Int. J. Crit. Infrastructure Prot..
[13] Hung-Min Sun,et al. A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code , 2011, IEEE Transactions on Computers.
[14] Jaime A. Camelio,et al. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems , 2017 .
[15] Md. Rafiqul Islam,et al. Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data , 2017, Inf. Sci..
[16] Alécio Pedro Delazari Binotto,et al. A Cloud-based Architecture for the Internet of Things targeting Industrial Devices Remote Monitoring and Control , 2016 .
[17] Muttukrishnan Rajarajan,et al. Employing Program Semantics for Malware Detection , 2015, IEEE Transactions on Information Forensics and Security.
[18] Wanlei Zhou,et al. Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware , 2013, IEEE Transactions on Computers.
[19] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[20] Inderjit S. Dhillon,et al. Efficient Clustering of Very Large Document Collections , 2001 .
[21] Xin Wang,et al. Growing Grapes in Your Computer to Defend Against Malware , 2014, IEEE Transactions on Information Forensics and Security.
[22] Vicente Matellán Olivera,et al. Detection of Cyber-attacks to indoor real time localization systems for autonomous robots , 2018, Robotics Auton. Syst..
[23] Renata Imaculada Soares Pereira,et al. IoT embedded linux system based on Raspberry Pi applied to real-time cloud monitoring of a decentralized photovoltaic plant , 2018 .
[24] Cristina Alcaraz,et al. A three-stage analysis of IDS for critical infrastructures , 2015, Comput. Secur..