A combined discriminative and generative behavior model for cyber physical system defense
暂无分享,去创建一个
[1] Dipankar Dasgupta,et al. Deriving behavior primitives from aggregate network features using support vector machines , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[2] John R. Goodall,et al. Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse , 2012 .
[3] John D. Lafferty,et al. Correlated Topic Models , 2005, NIPS.
[4] Salvatore J. Stolfo,et al. Combining Knowledge Discovery and Knowledge Engineering to Build IDSs , 1999, Recent Advances in Intrusion Detection.
[5] Stephen Kelley,et al. Automatic construction of anomaly detectors from graphical models , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[6] S.Y. Lim,et al. Network Anomaly Detection System: The State of Art of Network Behaviour Analysis , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[7] Stephen Brooks,et al. The need to consider both object identity and behavior in establishing the trustworthiness of network devices within a Smart Grid , 2010, CSIIRW '10.
[8] John McHugh,et al. Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments , 2010 .
[9] Michal Pechoucek,et al. Dynamic information source selection for intrusion detection systems , 2009, AAMAS.
[10] Sibel Adali,et al. Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.
[11] D. J. Robinson,et al. Cyber-based behavioral modeling , 2010 .
[12] Sandeep K. S. Gupta,et al. Security solutions for pervasive healthcare , 2007 .
[13] J. Cafazzo,et al. Design of an mHealth App for the Self-management of Adolescent Type 1 Diabetes: A Pilot Study , 2012, Journal of medical Internet research.
[14] Edward A. Lee,et al. Addressing Modeling Challenges in Cyber-Physical Systems , 2011 .