Can industrial intrusion detection be simple?
Cyberattacks against industrial control systems pose a serious risk to the safety of humans
and the environment. Industrial intrusion detection systems oppose this threat by …
and the environment. Industrial intrusion detection systems oppose this threat by …
[HTML][HTML] False Data Injection Attack Detection, Isolation, and Identification in Industrial Control Systems Based on Machine Learning: Application in Load Frequency …
S Mokhtari, KK Yen - Electronics, 2024 - mdpi.com
The integration of advanced information and communication technology in smart grids has
exposed them to increased cyber attacks. Traditional model-based fault detection systems …
exposed them to increased cyber attacks. Traditional model-based fault detection systems …
Anomaly detection using smartphone sensors for a bullying detection
Anomaly Detection is a fundamental process of detecting a situation different from the
ordinary. The following work deals with anomalies in the human behavioral domain while …
ordinary. The following work deals with anomalies in the human behavioral domain while …
Enhancing industrial control system security: An isolation forest-based anomaly detection model for mitigating cyber threats
In the evolving landscape of industrial control systems (ICS), the sophistication of cyber
threats has necessitated the development of advanced anomaly detection mechanisms to …
threats has necessitated the development of advanced anomaly detection mechanisms to …
[PDF][PDF] Applied Computing and Intelligence: A new open access journal
The journal was founded in 2021 to match the increasing importance of computing, artificial
intelligence, and their many applications. This is now our fourth year of operation. We have …
intelligence, and their many applications. This is now our fourth year of operation. We have …
A review on intrusion detection system for distributed network based on Machine Learning
V Shrivastava, AK Chaturvedi - Journal of Integrated Science …, 2024 - pubs.thesciencein.org
The distributed mobility management (DMM) in ID/locator separation architectures has
recently received extensive attention to provide load-balanced and scalable mobility …
recently received extensive attention to provide load-balanced and scalable mobility …
Poster: Vulcan--Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation
C van Sloun, K Wehrle - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The generation of datasets is one of the most promising approaches to collecting the
necessary behavior data to train machine learning models for host-based intrusion …
necessary behavior data to train machine learning models for host-based intrusion …
Learning-based Fault Detection and Mitigation Model in Industrial Control Systems Based on Measurement Data
S Mokhtari - 2022 - digitalcommons.fiu.edu
Industrial control systems (ICSs) play a significant role in supervising, controlling, and
automating critical infrastructures, such as power plants, water treatment, and civil …
automating critical infrastructures, such as power plants, water treatment, and civil …