On the practicality of detecting anomalies with encrypted traffic in AMI
暂无分享,去创建一个
Rakesh Bobba | Robin Berthier | Alvaro A. Cárdenas | Jun Ho Huh | Jorjeta G. Jetcheva | Daisuke Mashima | Ulrich Herberg | David I. Urbina | Michael Guerrero | J. Huh | A. Cárdenas | R. Bobba | U. Herberg | R. Berthier | D. Mashima | D. Urbina | Michael Guerrero
[1] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[2] William H. Sanders,et al. Monitoring Advanced Metering Infrastructures with Amilyzer , 2013 .
[3] Dmitry Podkuiko,et al. Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.
[4] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[5] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[6] William H. Sanders,et al. Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[7] Maarten Hoeve,et al. Detecting intrusions in encrypted control traffic , 2013, SEGS '13.
[8] Renata Teixeira,et al. Early application identification , 2006, CoNEXT '06.
[9] Gabi Dreo Rodosek,et al. Command Evaluation in Encrypted Remote Sessions , 2010, 2010 Fourth International Conference on Network and System Security.
[10] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[11] A.F. Snyder,et al. The ANSI C12 protocol suite - updated and now with network capabilities , 2007, 2007 Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources.
[12] Ehab Al-Shaer,et al. Configuration-based IDS for advanced metering infrastructure , 2013, CCS.