Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cybersecurity for industrial control systems: A survey
Abstract Industrial Control System (ICS) is a general term that includes supervisory control &
data acquisition (SCADA) systems, distributed control systems (DCS), and other control …
data acquisition (SCADA) systems, distributed control systems (DCS), and other control …
Machine learning-based network vulnerability analysis of industrial Internet of Things
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially
devastating consequences in case of an attack. Machine learning (ML) and big data …
devastating consequences in case of an attack. Machine learning (ML) and big data …
[PDF][PDF] Smart grid cyber security: An overview of threats and countermeasures
The smart grid is the next generation of power and distribution systems. The integration of
advanced network, communications, and computing techniques allows for the enhancement …
advanced network, communications, and computing techniques allows for the enhancement …
IDS detection based on optimization based on WI-CS and GNN algorithm in SCADA network
Industry control systems (ICS) are considered as one of the inevitable systems in this
contemporary smart world. In that supervisory control and data acquisition (SCADA) is the …
contemporary smart world. In that supervisory control and data acquisition (SCADA) is the …
An enhanced optimization based algorithm for intrusion detection in SCADA network
S Shitharth - Computers & Security, 2017 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are widely used in
many applications including power transmission and distribution for situational awareness …
many applications including power transmission and distribution for situational awareness …
Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network
The backbone of the economy, security and sustainability of a state is inseparably linked to
the security of its critical infrastructure. Critical infrastructures define goods, systems or …
the security of its critical infrastructure. Critical infrastructures define goods, systems or …
A spiking one-class anomaly detection framework for cyber-security on industrial control systems
Developments and upgrades in the field of industrial information technology, particularly
those relating to information systems' technologies for the collection and processing of real …
those relating to information systems' technologies for the collection and processing of real …
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems
In this paper, we propose a hierarchical monitoring intrusion detection system (HAMIDS) for
industrial control systems (ICS). The HAMIDS framework detects the anomalies in both level …
industrial control systems (ICS). The HAMIDS framework detects the anomalies in both level …
[PDF][PDF] Gaainet: A generative adversarial artificial immune network model for intrusion detection in industrial iot systems
The expansion of the Internet of Things (IoT) in various industrial sectors (also referred to as
the Industrial Internet of Things or IIoT) promises increased economic productivity and …
the Industrial Internet of Things or IIoT) promises increased economic productivity and …
Intrusion detection algorithm based on OCSVM in industrial control system
In order to detect abnormal communication behaviors efficiently in today's industrial control
system, a new intrusion detection algorithm based on One‐Class Support Vector Machine …
system, a new intrusion detection algorithm based on One‐Class Support Vector Machine …