메뉴 건너뛰기




Volumn 4, Issue 1, 2007, Pages 88-103

Novelty detection and management to safeguard information-intensive critical infrastructures

Author keywords

Case based reasoning; CBR; Critical infrastructures; Data mining; Neural networks; Novelty detection; Wrong signatures

Indexed keywords

ALARM SYSTEMS; CASE BASED REASONING; COMPUTER SIMULATION; DATA MINING; ELECTRIC FAULT LOCATION; NEURAL NETWORKS; SCADA SYSTEMS;

EID: 33947501709     PISSN: 14714825     EISSN: 17415071     Source Type: Journal    
DOI: 10.1504/IJEM.2007.012391     Document Type: Article
Times cited : (7)

References (19)
  • 1
    • 33947535103 scopus 로고    scopus 로고
    • 'Modelling attack scenarios against software intensive critical infrastructures'
    • Sophia-Antipolis. Provence, France, 3-6 June
    • Balducelli, C. (2003) 'Modelling attack scenarios against software intensive critical infrastructures', 10th Annual Conference of the International Emergency Management Society, Sophia-Antipolis. Provence, France, 3-6 June.
    • (2003) 10th Annual Conference of the International Emergency Management Society
    • Balducelli, C.1
  • 2
    • 0343943300 scopus 로고    scopus 로고
    • 'A CBR tool to simulate diagnostic case-based operator's model'
    • Genoa, Italy, October
    • Balducelli, C. and Brusoni. F. (1996) 'A CBR tool to simulate diagnostic case-based operator's model', Proceedings of 8th European Simulation Symposium, Genoa, Italy, October, pp.298-301.
    • (1996) Proceedings of 8th European Simulation Symposium , pp. 298-301
    • Balducelli, C.1    Brusoni, F.2
  • 6
    • 0003881962 scopus 로고    scopus 로고
    • 'Dynamically discovering likely program invariants'
    • PhD Thesis, University of Washington
    • Ernst, M. (2000) 'Dynamically discovering likely program invariants', PhD Thesis, University of Washington.
    • (2000)
    • Ernst, M.1
  • 7
    • 0034546374 scopus 로고    scopus 로고
    • 'Architecture for an artificial immune system'
    • Hofmeyr, S.A. and Foorest, S. (2000) 'Architecture for an artificial immune system', Evolutionary Computing Journal, Vol. 8, No. 4, pp.443-473.
    • (2000) Evolutionary Computing Journal , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.A.1    Foorest, S.2
  • 9
    • 0038226150 scopus 로고    scopus 로고
    • 'Attack modeling for information security and survivability'
    • CMU/SEI-2001-TN-001, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March. Technical Note
    • Moore, A., Ellison. R. and Linger, R. (2001) 'Attack modeling for information security and survivability', Technical Note, CMU/ SEI-2001-TN-001, Survivable Systems Group, Software Engineering Institute, Carnegie Mellon University, March.
    • (2001)
    • Moore, A.1    Ellison, R.2    Linger, R.3
  • 10
    • 36248976561 scopus 로고    scopus 로고
    • 'Concerns about intrusions into remotely accessible substation controllers and SCADA systems'
    • 23-26 October, Spokane, WA, Paper No 4
    • Oman, P., Schweitzer. E. and Frincke, D. (2000) 'Concerns about intrusions into remotely accessible substation controllers and SCADA systems', 27th Annual Western Protective Relay Conference, 23-26 October, Spokane, WA, Paper No 4, http://www.selinc.com.
    • (2000) 27th Annual Western Protective Relay Conference
    • Oman, P.1    Schweitzer, E.2    Frincke, D.3
  • 11
    • 34047136329 scopus 로고    scopus 로고
    • 'Safeguarding IEDs, substations, and SCADA systems against electronic intrusions'
    • 10-12 April, Spokane, WA, Paper No. 1
    • Oman, P., Schweitzer, E. and Roberts, J. (2001) 'Safeguarding IEDs, substations, and SCADA systems against electronic intrusions', Western Power Delivery Automation Conference, 10-12 April, Spokane, WA, Paper No. 1.
    • (2001) Western Power Delivery Automation Conference
    • Oman, P.1    Schweitzer, E.2    Roberts, J.3
  • 12
    • 4544295836 scopus 로고    scopus 로고
    • 'An agent system that integrates case-base reasoning and active databases'
    • Spriger-Verlag
    • Sheng, L. and Quiang, Y. (2001) 'An agent system that integrates case-base reasoning and active databases', International Journal of Knowledge and Information System, Spriger-Verlag, Vol. 3, pp.225-251.
    • (2001) International Journal of Knowledge and Information System , vol.3 , pp. 225-251
    • Sheng, L.1    Quiang, Y.2
  • 14
    • 1042267106 scopus 로고    scopus 로고
    • 'A graph-based network-vulnerability analysis system'
    • SAND97-3010/1, Sandia National Laboratories, Albuquerque, New Mexico, USA, January
    • Swiler, L.P., Phillips, C. and Gaylor, T. (1998) 'A graph-based network-vulnerability analysis system', Sandia Report, SAND97-3010/1, Sandia National Laboratories, Albuquerque, New Mexico, USA, January.
    • (1998) Sandia Report
    • Swiler, L.P.1    Phillips, C.2    Gaylor, T.3
  • 15
  • 18
    • 0007733078 scopus 로고    scopus 로고
    • 'Cybercrime.. cyberterrorism.. cyberwarfare..: Averting an electronic waterloo'
    • Washington, DC. November. Center for Strategic and International Studies (CSIS)
    • Webster, W.H., De Borchgrave, A., Gallagher, P.R., Cilluffo, F.J., Berkowitz, B.D. and Lanz, S. (1998) 'Cybercrime.. cyberterrorism.. cyberwarfare..: averting an electronic waterloo', Center for Strategic and International Studies (CSIS), Washington, DC. November.
    • (1998)
    • Webster, W.H.1    De Borchgrave, A.2    Gallagher, P.R.3    Cilluffo, F.J.4    Berkowitz, B.D.5    Lanz, S.6
  • 19
    • 0004204162 scopus 로고    scopus 로고
    • San Francisco, CA: Morgan Kaufmann Publisher
    • Witten, H. and Frank, E. (2000) Data Mining, San Francisco, CA: Morgan Kaufmann Publisher.
    • (2000) Data Mining
    • Witten, H.1    Frank, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.