A survey of clustering algorithms for big data: Taxonomy and empirical analysis
Clustering algorithms have emerged as an alternative powerful meta-learning tool to
accurately analyze the massive volume of data generated by modern applications. In …
accurately analyze the massive volume of data generated by modern applications. In …
Generating adversarial examples against machine learning-based intrusion detector in industrial control systems
Deploying machine learning (ML)-based intrusion detection systems (IDS) is an effective
way to improve the security of industrial control systems (ICS). However, ML models …
way to improve the security of industrial control systems (ICS). However, ML models …
Privacy preservation intrusion detection technique for SCADA systems
Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection
technique that can beat different types of intrusions and protect the data from disclosure …
technique that can beat different types of intrusions and protect the data from disclosure …
Real-time anomaly detection framework for many-core router through machine-learning techniques
In this article, we propose a real-time anomaly detection framework for an NoC-based many-
core architecture. We assume that processing cores and memories are safe and anomaly is …
core architecture. We assume that processing cores and memories are safe and anomaly is …
Cross-domain industrial intrusion detection deep model trained with imbalanced data
Y Chen, S Su, D Yu, H He, X Wang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Constrained by the high acquisition and labeling cost, traffic data in industrial control
systems (ICSs) are usually extremely imbalanced. Deep-learning-based (DL) industrial …
systems (ICSs) are usually extremely imbalanced. Deep-learning-based (DL) industrial …
[PDF][PDF] Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets
The occurrence of zero-day attacks in high-speed networks is increasingly common. As most
network intrusions are detrimental to the network via fast-spreading; real-time monitoring …
network intrusions are detrimental to the network via fast-spreading; real-time monitoring …
PPFSCADA: Privacy preserving framework for SCADA data publishing
Abstract Supervisory Control and Data Acquisition (SCADA) systems control and monitor
industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway …
industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway …
A two stage intrusion detection system for industrial control networks based on ethernet/IP
W Yu, Y Wang, L Song - Electronics, 2019 - mdpi.com
Standard Ethernet (IEEE 802.3 and the TCP/IP protocol suite) is gradually applied in
industrial control system (ICS) with the development of information technology. It breaks the …
industrial control system (ICS) with the development of information technology. It breaks the …
Identifying S7Comm protocol data injection attacks in cyber-physical systems
O Eigner, P Kreimel, P Tavolato - 5th International Symposium for …, 2018 - scienceopen.com
Cyber-physical systems are found in production and industrial systems, as well as critical
infrastructures which play a crucial role in our society. The integration of standard computing …
infrastructures which play a crucial role in our society. The integration of standard computing …
Cyber security for smart grid–The backbone of social economy
Ever-growing population of people and new electronic gadgets demand huge electricity.
Existing power grids mostly use non-renewable energy sources for electricity generation …
Existing power grids mostly use non-renewable energy sources for electricity generation …