A survey of clustering algorithms for big data: Taxonomy and empirical analysis

A Fahad, N Alshatri, Z Tari, A Alamri… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Clustering algorithms have emerged as an alternative powerful meta-learning tool to
accurately analyze the massive volume of data generated by modern applications. In …

Generating adversarial examples against machine learning-based intrusion detector in industrial control systems

J Chen, X Gao, R Deng, Y He, C Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deploying machine learning (ML)-based intrusion detection systems (IDS) is an effective
way to improve the security of industrial control systems (ICS). However, ML models …

Privacy preservation intrusion detection technique for SCADA systems

M Keshk, N Moustafa, E Sitnikova… - 2017 military …, 2017 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection
technique that can beat different types of intrusions and protect the data from disclosure …

Real-time anomaly detection framework for many-core router through machine-learning techniques

A Kulkarni, Y Pino, M French, T Mohsenin - ACM Journal on Emerging …, 2016 - dl.acm.org
In this article, we propose a real-time anomaly detection framework for an NoC-based many-
core architecture. We assume that processing cores and memories are safe and anomaly is …

Cross-domain industrial intrusion detection deep model trained with imbalanced data

Y Chen, S Su, D Yu, H He, X Wang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Constrained by the high acquisition and labeling cost, traffic data in industrial control
systems (ICSs) are usually extremely imbalanced. Deep-learning-based (DL) industrial …

[PDF][PDF] Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets

PV Amoli, T Hamalainen, G David… - … Journal of Digital …, 2016 - researchgate.net
The occurrence of zero-day attacks in high-speed networks is increasingly common. As most
network intrusions are detrimental to the network via fast-spreading; real-time monitoring …

PPFSCADA: Privacy preserving framework for SCADA data publishing

A Fahad, Z Tari, A Almalawi, A Goscinski, I Khalil… - Future generation …, 2014 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems control and monitor
industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway …

A two stage intrusion detection system for industrial control networks based on ethernet/IP

W Yu, Y Wang, L Song - Electronics, 2019 - mdpi.com
Standard Ethernet (IEEE 802.3 and the TCP/IP protocol suite) is gradually applied in
industrial control system (ICS) with the development of information technology. It breaks the …

Identifying S7Comm protocol data injection attacks in cyber-physical systems

O Eigner, P Kreimel, P Tavolato - 5th International Symposium for …, 2018 - scienceopen.com
Cyber-physical systems are found in production and industrial systems, as well as critical
infrastructures which play a crucial role in our society. The integration of standard computing …

Cyber security for smart grid–The backbone of social economy

V Rohokale, R Prasad - Journal of Cyber Security and …, 2016 - journals.riverpublishers.com
Ever-growing population of people and new electronic gadgets demand huge electricity.
Existing power grids mostly use non-renewable energy sources for electricity generation …