Data driven intrusion detection system for software defined networking enabled industrial internet of things
暂无分享,去创建一个
[1] Sridhar Adepu,et al. A Dataset to Support Research in the Design of Secure Water Treatment Systems , 2016, CRITIS.
[2] K. McLaughlin,et al. Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.
[3] Ing-Ray Chen,et al. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.
[4] Zonghua Zhang,et al. Enabling security functions with SDN: A feasibility study , 2015, Comput. Networks.
[5] Mohammad M. Masud,et al. Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[6] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[7] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[8] Jeong-dong Ryoo,et al. A Sophisticated Packet Forwarding Scheme with Deep Packet Inspection in an OpenFlow Switch , 2016, 2016 International Conference on Software Networking (ICSN).
[9] Stavros Ntalampiras,et al. Automatic identification of integrity attacks in cyber-physical systems , 2016, Expert Syst. Appl..
[10] Zahir Tari,et al. An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems , 2016, IEEE Transactions on Information Forensics and Security.
[11] Umamakeswari Arumugam,et al. Employing invariants for anomaly detection in software defined networking based industrial internet of things , 2018, J. Intell. Fuzzy Syst..
[12] Sakir Sezer,et al. A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.
[13] Stavros Ntalampiras,et al. Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling , 2015, IEEE Transactions on Industrial Informatics.
[14] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[15] Zhiliang Wang,et al. False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..
[16] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[17] Sun-il Kim,et al. Efficient tuning methodologies for a network payload anomaly inspection scheme , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[18] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[19] Salima Benbernou,et al. A survey on service quality description , 2013, CSUR.
[20] Sridhar Adepu,et al. An Investigation into the Response of a Water Treatment System to Cyber Attacks , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[21] Ing-Ray Chen,et al. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.