A Model for Auditing Smart Intrusion Detection Systems (IDSs) and Log Analyzers in Cyber-Physical Systems (CPSs)

[1]  M. Steinbach,et al.  Introduction to Data Mining , 2019, Scalable Comput. Pract. Exp..

[2]  Dazhong Wu,et al.  Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation , 2015, Comput. Aided Des..

[3]  Peter Gorm Larsen,et al.  Collaborative Design for Embedded Systems: Co-modelling and Co-simulation , 2014 .

[4]  Olaf Zimmermann,et al.  Compliance by design - Bridging the chasm between auditors and IT architects , 2011, Comput. Secur..

[5]  Joshua Ojo Nehinbe,et al.  Automated Technique for Debugging Network Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Systems, Modelling and Simulation.

[6]  Richard E. Cascarino Auditor's Guide to Information Systems Auditing , 2007 .

[7]  W. Stallings Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .

[8]  Rafeeq Ur Rehman,et al.  Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID , 2003 .

[9]  William H. Murray,et al.  Principles and Applications of Key Management , 2000 .

[10]  Frederick Gallegos,et al.  Information Technology Control and Audit , 2000 .

[11]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[12]  T. Phatak,et al.  SMART INTRUSION DETECTION SYSTEM , 2017 .

[13]  Ciprian-Radu Rad,et al.  Smart Monitoring of Potato Crop: A Cyber-Physical System Architecture Model in the Field of Precision Agriculture , 2015 .

[14]  Stamatis Karnouskos,et al.  Towards the Next Generation of Industrial Cyber-Physical Systems , 2014 .

[15]  Peter Gorm Larsen,et al.  Collaborative Design for Embedded Systems , 2014, Springer Berlin Heidelberg.

[16]  Jeremy Epstein,et al.  Security Lessons Learned from Société Générale , 2008, IEEE Security & Privacy.

[17]  Software Maintenance , 2005, IEEE Softw..