A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks
暂无分享,去创建一个
Dechang Pi | Asif Nawaz | Yasir Hussain | Zaheer Ullah Khan | Farman Ali | Izhar Ahmed Khan | Nasrullah Khan | D. Pi | Yasir Hussain | Farman Ali | Asif Nawaz | Nasrullah Khan | I. A. Khan | Z. Khan
[1] Christopher D. McDermott,et al. Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. , 2017 .
[2] Osmar R. Zaïane,et al. Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..
[3] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[4] Adnan Shaout,et al. An intelligent intrusion detection system , 2019, Applied Intelligence.
[5] Dechang Pi,et al. HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems , 2019, IEEE Access.
[6] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[7] Jill Slay,et al. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.
[8] Konstantinos E. Parsopoulos,et al. Initializing the Particle Swarm Optimizer Using the Nonlinear Simplex Method , 2002 .
[9] Sabina Jeschke,et al. Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications , 2017 .
[10] Hadis Karimipour,et al. An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System , 2020, IEEE Access.
[11] Kannan Krithivasan,et al. Detection of Cyberattacks in Industrial Control Systems Using Enhanced Principal Component Analysis and Hypergraph-Based Convolution Neural Network (EPCA-HG-CNN) , 2020, IEEE Transactions on Industry Applications.
[12] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[13] Yasha Zeinali,et al. Competitive probabilistic neural network , 2017, Integr. Comput. Aided Eng..
[14] Glenn A. Fink,et al. Security and Privacy in Cyber-Physical Systems , 2017 .
[15] Asif Nawaz,et al. Efficient behaviour specification and bidirectional gated recurrent units‐based intrusion detection method for industrial control systems , 2020 .
[16] Keke Gai,et al. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[17] Qiang Li,et al. iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting , 2020, IEEE Journal on Selected Areas in Communications.
[18] Xin Xie,et al. Multivariate Abnormal Detection for Industrial Control Systems Using 1D CNN and GRU , 2020, IEEE Access.
[19] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[20] A. Gandomi,et al. Probabilistic neural networks , 2020, Handbook of Probabilistic Models.
[21] Bin Luo,et al. Privacy‐preserving multisource transfer learning in intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..
[22] Russell C. Eberhart,et al. A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.
[23] Benjamin Turnbull,et al. A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks , 2021, IEEE Internet of Things Journal.
[24] Maurice Clerc,et al. The particle swarm - explosion, stability, and convergence in a multidimensional complex space , 2002, IEEE Trans. Evol. Comput..
[25] Xiangjian He,et al. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques , 2015, IEEE Transactions on Computers.
[26] Zhao Yang Dong,et al. Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.
[27] Raymond K. Wong,et al. Insider Threat Detection with Long Short-Term Memory , 2019, ACSW.
[28] N. Nagaveni,et al. Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario , 2013, Inf. Sci..
[29] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[30] Koji Nakao,et al. Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities , 2009, IEICE Trans. Inf. Syst..
[31] Ünal Çavusoglu,et al. A new hybrid approach for intrusion detection using machine learning methods , 2019, Applied Intelligence.
[32] Elena Sitnikova,et al. Privacy preservation intrusion detection technique for SCADA systems , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).
[33] Yong Wang,et al. MalInsight: A systematic profiling based malware detection framework , 2019, J. Netw. Comput. Appl..
[34] Biplab Sikdar,et al. An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication , 2019, IEEE Transactions on Smart Grid.
[35] Byeong Man Kim,et al. A layer-wise Perturbation based Privacy Preserving Deep Neural Networks , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[36] George J. Pappas,et al. Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[37] An Yang,et al. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method , 2020, Future Gener. Comput. Syst..
[38] Zahir Tari,et al. PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..
[39] Jiankun Hu,et al. An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems , 2019, IEEE Transactions on Sustainable Computing.
[40] Rebecca Petersen. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks , 2015 .
[41] Donald F. Specht,et al. Probabilistic neural networks , 1990, Neural Networks.
[42] Kuan-Ching Li,et al. An intrusion detection approach based on improved deep belief network , 2020, Applied Intelligence.
[43] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[44] Zuyi Li,et al. Impacts of Bad Data on the PMU based Line Outage Detection , 2015, ArXiv.
[45] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[46] Jiankun Hu,et al. A holistic review of Network Anomaly Detection Systems: A comprehensive survey , 2019, J. Netw. Comput. Appl..
[47] Mohsen Guizani,et al. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.