暂无分享,去创建一个
[1] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[2] Max Mühlhäuser,et al. Towards the creation of synthetic, yet realistic, intrusion detection datasets , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[3] José M. Fernandez,et al. Providing SCADA Network Data Sets for Intrusion Detection Research , 2016, CSET @ USENIX Security Symposium.
[4] Wei Gao,et al. Industrial Control System Traffic Data Sets for Intrusion Detection Research , 2014, Critical Infrastructure Protection.
[5] Wei Gao,et al. Industrial Control System Cyber Attacks , 2013, ICS-CSR.
[6] Andreas Hotho,et al. Flow-based benchmark data sets for intrusion detection , 2017 .
[7] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[8] Béla Genge,et al. A cyber-physical experimentation environment for the security analysis of networked industrial control systems , 2012, Comput. Electr. Eng..
[9] José M. Fernandez,et al. An isolated virtual cluster for SCADA network security research , 2013, ICS-CSR.
[10] Agata Sawicka,et al. A Framework for Human Factors in Information Security , 2002 .
[11] Hans D. Schotten,et al. The Dos and Don'ts of Industrial Network Simulation: A Field Report , 2019, ArXiv.
[12] B. Buchanan,et al. Attributing Cyber Attacks , 2015 .
[13] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[14] Béla Genge,et al. EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation , 2013, IEEE Transactions on Emerging Topics in Computing.
[15] Wei Gao,et al. A control system testbed to validate critical infrastructure protection concepts , 2011, Int. J. Crit. Infrastructure Prot..
[16] Hans D. Schotten,et al. Two decades of SCADA exploitation: A brief history , 2017, 2017 IEEE Conference on Application, Information and Network Security (AINS).