Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining
暂无分享,去创建一个
[1] Chris Clifton,et al. Developing custom intrusion detection filters using data mining , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[2] Pieter H. Hartel,et al. A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.
[3] Antonio Gomariz,et al. VGEN: Fast Vertical Mining of Sequential Generator Patterns , 2014, DaWaK.
[4] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[5] Antonio Gomariz,et al. SPMF: a Java open-source pattern mining library , 2014, J. Mach. Learn. Res..
[6] Amedeo Napoli,et al. Towards Rare Itemset Mining , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).
[7] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[8] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[9] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[10] Tai-Wen Yue,et al. A Q'tron Neural-Network Approach to Solve the Graph Coloring Problems , 2007 .
[11] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .