Intrusion Detection in Critical Infrastructures: A Literature Review
暂无分享,去创建一个
Mohamed Amine Ferrag | Leandros Maglaras | Fountas Panagiotis | Kouskouras Taxiarxchis | Kranas Georgios | L. Maglaras | M. Ferrag | Fountas Panagiotis | Kouskouras Taxiarxchis | Kranas Georgios
[1] T. Lewis. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation , 2006 .
[2] Inwhee Joe,et al. Autoencoder-Based on Anomaly Detection with Intrusion Scoring for Smart Factory Environments , 2018, PDCAT.
[3] Yang Yi,et al. Reservoir Computing Meets Smart Grids: Attack Detection Using Delayed Feedback Networks , 2018, IEEE Transactions on Industrial Informatics.
[4] Mohamed Amine Ferrag,et al. Deep Learning Techniques for Cyber Security Intrusion Detection : A Detailed Analysis , 2019 .
[5] Won Suk Lee,et al. Anomaly Intrusion Detection Based on Dynamic Cluster Updating , 2007, PAKDD.
[6] Maen Alzubi,et al. Evaluation of machine learning algorithms for intrusion detection system , 2017, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY).
[7] Xavier Clotet,et al. A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures , 2018, Int. J. Crit. Infrastructure Prot..
[8] M. A. Novotny,et al. An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection , 2018, Comput. Networks.
[9] Yong-kuo Liu,et al. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems , 2020, Nuclear Engineering and Technology.
[10] Juan C. Vasquez,et al. Smart-Building Applications: Deep Learning-Based, Real-Time Load Monitoring , 2021, IEEE Industrial Electronics Magazine.
[11] Srinivas Sampalli,et al. SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations , 2020, Comput. Secur..
[12] Shabnam Sharma,et al. Study on Phishing Attacks , 2018, International Journal of Computer Applications.
[13] Brij B. Gupta,et al. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2018, Journal of Ambient Intelligence and Humanized Computing.
[14] Mohamed Amine Ferrag,et al. Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures , 2018, EAI Endorsed Trans. Security Safety.
[15] Deris Stiawan,et al. Investigating Brute Force Attack Patterns in IoT Network , 2019, J. Electr. Comput. Eng..
[16] Neena Gupta,et al. Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller , 2021, Telecommun. Syst..
[17] Victor I. Chang,et al. From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions , 2017, Algorithms.
[18] Alessandro Orso,et al. A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.
[19] I. Santiago,et al. Electricity demand during pandemic times: The case of the COVID-19 in Spain , 2020, Energy Policy.
[20] Panagiotis G. Sarigiannidis,et al. An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree , 2018, 2018 Global Information Infrastructure and Networking Symposium (GIIS).
[21] Marcelo Azevedo Costa,et al. Extended Isolation Forests for Fault Detection in Small Hydroelectric Plants , 2020, Sustainability.
[22] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[23] Gillian Dobbie,et al. Phishing Detection on Twitter Streams , 2016, PAKDD Workshops.
[24] Onur Avci,et al. 1D Convolutional Neural Networks and Applications: A Survey , 2019, Mechanical Systems and Signal Processing.
[25] Gillian Dobbie,et al. Attack detection in recommender systems based on target item analysis , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).
[26] Athanasios V. Vasilakos,et al. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues , 2018, Telecommun. Syst..
[27] Hong Wen,et al. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT) , 2015, IEEE Transactions on Emerging Topics in Computing.
[28] Rana Alabdan,et al. Phishing Attacks Survey: Types, Vectors, and Technical Approaches , 2020, Future Internet.
[29] Amitabha Chakrabarty,et al. A comparative approach to email classification using Naive Bayes classifier and hidden Markov model , 2017, 2017 4th International Conference on Advances in Electrical Engineering (ICAEE).
[30] Leandros A. Maglaras,et al. Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System , 2016, INISCOM.
[31] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[32] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[33] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[34] Mohamed Amine Ferrag,et al. Vulnerability Assessment of Cyber Security for SCADA Systems , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.