Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of intrusion detection techniques for cyber-physical systems
R Mitchell, IR Chen - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of
Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As …
Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As …
[HTML][HTML] A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
A Ayodeji, Y Liu, N Chao, L Yang - Nuclear engineering and technology, 2020 - Elsevier
Most of the machine learning-based intrusion detection tools developed for Industrial
Control Systems (ICS) are trained on network packet captures, and they rely on monitoring …
Control Systems (ICS) are trained on network packet captures, and they rely on monitoring …
A unified deep learning anomaly detection and classification approach for smart grid environments
The interconnected and heterogeneous nature of the next-generation Electrical Grid (EG),
widely known as Smart Grid (SG), bring severe cybersecurity and privacy risks that can also …
widely known as Smart Grid (SG), bring severe cybersecurity and privacy risks that can also …
An ensemble deep learning-based cyber-attack detection in industrial control system
The integration of communication networks and the Internet of Things (IoT) in Industrial
Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing …
Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing …
[HTML][HTML] Security of smart manufacturing systems
N Tuptuk, S Hailes - Journal of manufacturing systems, 2018 - Elsevier
A revolution in manufacturing systems is underway: substantial recent investment has been
directed towards the development of smart manufacturing systems that are able to respond …
directed towards the development of smart manufacturing systems that are able to respond …
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …
and manufacturing services and devices. The communication and data exchange …
Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …
the analysis of network package contents that are transacted between ICS nodes and their …
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
N Goldenberg, A Wool - international journal of critical infrastructure …, 2013 - Elsevier
The Modbus/TCP protocol is commonly used in SCADA systems for communications
between a human–machine interface (HMI) and programmable logic controllers (PLCs) …
between a human–machine interface (HMI) and programmable logic controllers (PLCs) …
Through the eye of the PLC: semantic security monitoring for industrial processes
Off-the-shelf intrusion detection systems prove an ill fit for protecting industrial control
systems, as they do not take their process semantics into account. Specifically, current …
systems, as they do not take their process semantics into account. Specifically, current …
HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems
Critical infrastructures, eg, electricity generation and dispersal networks, chemical
processing plants, and gas distribution, are governed and monitored by supervisory control …
processing plants, and gas distribution, are governed and monitored by supervisory control …