메뉴 건너뛰기




Volumn 46, Issue 4, 2014, Pages

A survey of intrusion detection techniques for cyber-physical systems

Author keywords

Classification; Cyber physical systems; Intrusion detection; Security

Indexed keywords

CLASSIFICATION (OF INFORMATION); EMBEDDED SYSTEMS; RESEARCH; SURVEYS;

EID: 84901192690     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2542049     Document Type: Review
Times cited : (593)

References (91)
  • 1
    • 84879051898 scopus 로고    scopus 로고
    • Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
    • Hamid Al-Hamadi and Ing-Ray Chen. 2013. Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management 19, 2, 189-203.
    • (2013) IEEE Transactions on Network and Service Management , vol.19 , Issue.2 , pp. 189-203
    • Al-Hamadi, H.1    Chen, I.2
  • 5
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • June 2012
    • Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9, 2 (June 2012), 169-183.
    • (2012) IEEE Transactions on Network and Service Management , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1    Chen, I.2    Chang, M.3    Cho, J.4
  • 6
    • 77954883964 scopus 로고    scopus 로고
    • Intrusion detection in SCADA networks
    • Burkhard Stiller and Filip De Turck (Eds.). Lecture Notes in Computer Science
    • Rafael Barbosa and Aiko Pras. 2010. Intrusion detection in SCADA networks. In Mechanisms for Autonomous Management of Networks and Services, Burkhard Stiller and Filip De Turck (Eds.). Lecture Notes in Computer Science, Vol. 6155. 163-166.
    • (2010) Mechanisms for Autonomous Management of Networks and Services , vol.6155 , pp. 163-166
    • Barbosa, R.1    Pras, A.2
  • 9
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding SCADA systems with anomaly detection
    • Vladimir Gorodetsky, Leonard Popyack, and Victor Skormin (Eds.). Lecture Notes in Computer Science
    • John Bigham, David Gamez, and Ning Lu. 2003. Safeguarding SCADA systems with anomaly detection. In Computer Network Security, Vladimir Gorodetsky, Leonard Popyack, and Victor Skormin (Eds.). Lecture Notes in Computer Science, Vol. 2776. 171-182.
    • (2003) Computer Network Security , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 12
    • 77955015254 scopus 로고    scopus 로고
    • State-based network intrusion detection systems for SCADA protocols: A proof of concept
    • Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science
    • and rea Carcano, Igor Nai Fovino, Marcelo Masera, and Alberto Trombetta. 2010. State-based network intrusion detection systems for SCADA protocols: A proof of concept. In Critical Information Infrastructures Security, Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science, Vol. 6027. 138-150.
    • (2010) Critical Information Infrastructures Security , vol.6027 , pp. 138-150
    • Carcano, A.1    Nai Fovino, I.2    Masera, M.3    Trombetta, A.4
  • 14
    • 82255176038 scopus 로고    scopus 로고
    • Trust management for encounterbased routing in delay tolerant networks
    • Miami, FL, USA
    • Ing-Ray Chen, Fenye Bao, MoonJeong Chang, and Jin-Hee Cho. 2010. Trust management for encounterbased routing in delay tolerant networks. In Proceedings of the Global Communications Conference. Miami, FL, USA, 1-6.
    • (2010) Proceedings of the Global Communications Conference , pp. 1-6
    • Chen, I.1    Bao, F.2    Chang, M.3    Cho, J.4
  • 16
    • 0042084285 scopus 로고
    • Effect of artificial-intelligence planning-procedures on system reliability
    • Ing-Ray Chen and Farokh B. Bastani. 1991. Effect of artificial- intelligence planning-procedures on system reliability. IEEE Transactions on Reliability 40, 3, 364-369.
    • (1991) IEEE Transactions on Reliability , vol.40 , Issue.3 , pp. 364-369
    • Chen, I.1    Bastani, F.B.2
  • 18
    • 0032309753 scopus 로고    scopus 로고
    • Performance evaluation of forwarding strategies for location management in mobile networks
    • Ing-Ray Chen, Tsong-Min Chen, and Chiang Lee. 1998. Performance evaluation of forwarding strategies for location management in mobile networks. Computer Journal 41, 4, 243-253.
    • (1998) Computer Journal , vol.41 , Issue.4 , pp. 243-253
    • Chen, I.1    Chen, T.2    Lee, C.3
  • 19
    • 78751676469 scopus 로고    scopus 로고
    • Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks
    • Ing-Ray Chen, Anh Speer, and Mohamed Eltoweissy. 2011. Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 8, 2, 161-176.
    • (2011) IEEE Transactions on Dependable and Secure Computing , vol.8 , Issue.2 , pp. 161-176
    • Chen, I.1    Speer, A.2    Eltoweissy, M.3
  • 20
    • 0141858950 scopus 로고    scopus 로고
    • Analysis of replicated data with repair dependency
    • Ing-Ray Chen and Ding-Chau Wang. 1996a. Analysis of replicated data with repair dependency. Computer Journal 39, 9, 767-779.
    • (1996) Computer Journal , vol.39 , Issue.9 , pp. 767-779
    • Chen, I.1    Wang, D.2
  • 23
    • 77949264858 scopus 로고    scopus 로고
    • Effect of intrusion detection on reliability of missionoriented mobile group systems in mobile ad hoc networks
    • Jin-Hee Cho, Ing-Ray Chen, and Phu-Gui Feng. 2010. Effect of intrusion detection on reliability of missionoriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59, 1, 231-241.
    • (2010) IEEE Transactions on Reliability , vol.59 , Issue.1 , pp. 231-241
    • Cho, J.1    Chen, I.2    Feng, P.3
  • 24
    • 70749147824 scopus 로고    scopus 로고
    • Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
    • Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2009. Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In Proceediings of the International Conference on Computational Science and Engineering. 641-650.
    • (2009) Proceediings of the International Conference on Computational Science and Engineering , pp. 641-650
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 25
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials 13, 4, 562-583.
    • (2011) IEEE Communications Surveys and Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 26
    • 84858050885 scopus 로고    scopus 로고
    • Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    • Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2012. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications 35, 3, 1001-1012.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 1001-1012
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 28
    • 34249753618 scopus 로고
    • Support-vector networks
    • Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine Learning 20, 3, 273-297.
    • (1995) Machine Learning , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 29
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • Herve Debar, Marc Dacier, and and reas Wespi. 2000. A revised taxonomy for intrusion-detection systems. Annales Des Tele communications 55, 7-8, 361-378.
    • (2000) Annales des Tele Communications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, R.3
  • 30
    • 10044254666 scopus 로고    scopus 로고
    • A distributed architecture for online power systems security analysis
    • December 2004
    • Michele Di Santo, Alfredo Vaccaro, Domenico Villacci, and Eugenio Zimeo. 2004. A distributed architecture for online power systems security analysis. IEEE Transactions on Industrial Electronics 51, 6 (December 2004), 1238-1248.
    • (2004) IEEE Transactions on Industrial Electronics , vol.51 , Issue.6 , pp. 1238-1248
    • Di Santo, M.1    Vaccaro, A.2    Villacci, D.3    Zimeo, E.4
  • 32
    • 77955029557 scopus 로고    scopus 로고
    • Cyber-critical infrastructure protection using real-time payload-based anomaly detection
    • Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science
    • Patrick Dussel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Christof Stormann, and Jan Kastner. 2010. Cyber-critical infrastructure protection using real-time payload-based anomaly detection. In Critical Information Infrastructures Security, Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science, Vol. 6027. 85-97.
    • (2010) Critical Information Infrastructures Security , vol.6027 , pp. 85-97
    • Dussel, P.1    Gehl, C.2    Laskov, P.3    Bußer, J.4    Stormann, C.5    Kastner, J.6
  • 38
    • 20844443098 scopus 로고    scopus 로고
    • Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems
    • Baoshan Gu and Ing-Ray Chen. 2005. Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems. ACM Mobile Networks and Applications 10, 4, 453-463.
    • (2005) ACM Mobile Networks and Applications , vol.10 , Issue.4 , pp. 453-463
    • Gu, B.1    Chen, I.2
  • 40
    • 77949908962 scopus 로고    scopus 로고
    • Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration
    • Palma de Mallorca, Spain
    • Hadeli Hadeli, Ragnar Schierholz, Markus Braendle, and Cristian Tuduce. 2009. Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration. In Proceedings of the Conference on Emerging Technologies Factory Automation. Palma de Mallorca, Spain, 1-8.
    • (2009) Proceedings of the Conference on Emerging Technologies Factory Automation , pp. 1-8
    • Hadeli, H.1    Schierholz, R.2    Braendle, M.3    Tuduce, C.4
  • 41
    • 84867893847 scopus 로고    scopus 로고
    • N-Gram against the machine: On the feasibility of the N-Gram network analysis for binary protocols
    • Davide Balzarotti, Salvatore J. Stolfo, and Marco Cova (Eds.). Lecture Notes in Computer Science
    • Dina Had?ziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, and Sandro Etalle. 2012. N-Gram against the machine: On the feasibility of the N-Gram network analysis for binary protocols. In Research in Attacks, Intrusions, and Defenses, Davide Balzarotti, Salvatore J. Stolfo, and Marco Cova (Eds.). Lecture Notes in Computer Science, Vol. 7462. 354-373.
    • (2012) Research in Attacks, Intrusions, and Defenses , vol.7462 , pp. 354-373
    • Hadziosmanovic, D.1    Simionato, L.2    Bolzoni, D.3    Zambon, E.4    Etalle, S.5
  • 43
    • 80051660608 scopus 로고    scopus 로고
    • Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
    • Prague, Czech Republic
    • Qian He and Rick S. Blum. 2011. Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. Prague, Czech Republic, 3852-3855.
    • (2011) Proceedings of the International Conference on Acoustics, Speech and Signal Processing , pp. 3852-3855
    • He, Q.1    Blum, R.S.2
  • 48
    • 78249240878 scopus 로고    scopus 로고
    • Why did my detector do that?
    • Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.) Lecture Notes in Computer Science
    • Kevin Killourhy and Roy Maxion. 2010. Why did my detector do that? In Recent Advances in Intrusion Detection, Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.). Lecture Notes in Computer Science, Vol. 6307. 256-276.
    • (2010) Recent Advances in Intrusion Detection , vol.6307 , pp. 256-276
    • Killourhy, K.1    Maxion, R.2
  • 49
    • 72949113634 scopus 로고    scopus 로고
    • A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
    • Adrian P. Lauf, Richard A. Peters, and William H. Robinson. 2010. A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Networks 8, 3, 253-266.
    • (2010) Ad Hoc Networks , vol.8 , Issue.3 , pp. 253-266
    • Lauf, A.P.1    Peters, R.A.2    Robinson, W.H.3
  • 50
    • 78751620590 scopus 로고    scopus 로고
    • Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
    • Yinan Li and Ing-Ray Chen. 2011. Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks. IEEE Transactions on Mobile Computing 10, 3, 349-361.
    • (2011) IEEE Transactions on Mobile Computing , vol.10 , Issue.3 , pp. 349-361
    • Li, Y.1    Chen, I.2
  • 53
    • 78649656786 scopus 로고    scopus 로고
    • The research of Bayesian classifier algorithms in intrusion detection system
    • Guangzhou, China
    • Yang-Xia Luo. 2010. The research of Bayesian classifier algorithms in intrusion detection system. In Proceedings of the International Conference on E-Business and E-Government. Guangzhou, China, 2174-2178.
    • (2010) Proceedings of the International Conference on E-Business and E-Government , pp. 2174-2178
    • Luo, Y.1
  • 54
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
    • Christopher Kruegel, and Erland Jonsson (Eds.). Lecture Notes in Computer Science
    • Matthew V. Mahoney and Philip K. Chan. 2003. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection, Giovanni Vigna, Christopher Kruegel, and Erland Jonsson (Eds.). Lecture Notes in Computer Science, Vol. 2820. 220-237.
    • (2003) Recent Advances in Intrusion Detection, Giovanni Vigna , vol.2820 , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 55
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • November 2000
    • John McHugh. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4 (November 2000), 262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 60
    • 84900600082 scopus 로고    scopus 로고
    • Adaptive intrusion detection for unmanned aircraft systems based on behavior rule specification
    • Robert Mitchell and Ing-Ray Chen. 2013a. Adaptive intrusion detection for unmanned aircraft systems based on behavior rule specification. IEEE Transactions on Systems, Man and Cybernetics.
    • (2013) IEEE Transactions on Systems, Man and Cybernetics
    • Mitchell, R.1    Chen, I.2
  • 61
    • 84883281959 scopus 로고    scopus 로고
    • Behavior rule based intrusion detection systems for safety critical smart grid applications
    • Robert Mitchell and Ing-Ray Chen. 2013b. Behavior rule based intrusion detection systems for safety critical smart grid applications. IEEE Transactions on Smart Grid 4, 3, 1254-1263.
    • (2013) IEEE Transactions on Smart Grid , vol.4 , Issue.3 , pp. 1254-1263
    • Mitchell, R.1    Chen, I.2
  • 62
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • Robert Mitchell and Ing-Ray Chen. 2013c. Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Transactions on Reliability 62, 1, 199-210.
    • (2013) IEEE Transactions on Reliability , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.2
  • 63
    • 84879190317 scopus 로고    scopus 로고
    • On survivability of mobile cyber physical systems with intrusion detection
    • Robert Mitchell and Ing-Ray Chen. 2013d. On survivability of mobile cyber physical systems with intrusion detection. Wireless Personal Communications 68, 4, 1377-1391.
    • (2013) Wireless Personal Communications , vol.68 , Issue.4 , pp. 1377-1391
    • Mitchell, R.1    Chen, I.2
  • 66
    • 84901215382 scopus 로고    scopus 로고
    • NASA. Astrobiology Magazine.
    • NASA. 2005. Swarming for success. Astrobiology Magazine.
    • (2005) Swarming for Success
  • 68
    • 38049052560 scopus 로고    scopus 로고
    • An unsupervised intrusion detection method combined clustering with chaos simulated annealing
    • Hong Kong, China
    • Lin Ni and Hong-Ying Zheng. 2007. An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In Proceedings of the International Conference on Machine Learning and Cybernetics, Vol. 6. Hong Kong, China, 3217-3222.
    • (2007) Proceedings of the International Conference on Machine Learning and Cybernetics , vol.6 , pp. 3217-3222
    • Ni, L.1    Zheng, H.2
  • 69
    • 36249007497 scopus 로고    scopus 로고
    • Intrusion detection and event monitoring in SCADA networks
    • Eric Goetz and Sujeet Shenoi (Eds.). International Federation for Information Processing
    • Paul Oman and Matthew Phillips. 2007. Intrusion detection and event monitoring in SCADA networks. In Critical Infrastructure Protection, Eric Goetz and Sujeet Shenoi (Eds.). International Federation for Information Processing, Vol. 253. 161-173.
    • (2007) Critical Infrastructure Protection , vol.253 , pp. 161-173
    • Oman, P.1    Phillips, M.2
  • 71
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Vern Paxson. 1999. Bro: A system for detecting network intruders in real-time. Computer Networks 31, 2324, 2435-2463. http://www.sciencedirect.com/ science/article/pii/S1389128699001127.
    • (1999) Computer Networks , vol.31 , Issue.2324 , pp. 2435-2463
    • Paxson, V.1
  • 73
    • 84901215374 scopus 로고    scopus 로고
    • Rockwell Automation Technologies, Inc
    • Rockwell Automation Technologies, Inc. 2009. Introduction to Historian System Management. http://samplecode.rockwellautomation.com/idc/groups/ literature/documents/gr/hsepis-gr021-en-e.pdf.
    • (2009) Introduction to Historian System Management
  • 74
    • 78149468870 scopus 로고    scopus 로고
    • An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
    • November 2010
    • Sooyeon Shin, Taekyoung Kwon, Gil-Yong Jo, Youngman Park, and H. Rhy. 2010. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Transactions on Industrial Informatics 6, 4 (November 2010), 744-757.
    • (2010) IEEE Transactions on Industrial Informatics , vol.6 , Issue.4 , pp. 744-757
    • Shin, S.1    Kwon, T.2    Jo, G.3    Park, Y.4    Rhy, H.5
  • 75
    • 84901215375 scopus 로고    scopus 로고
    • Snort. 2012. Snort. http://www.snort.org.
    • (2012)
  • 76
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Oakland, CA, USA
    • Robin Sommer and Vern Paxson. 2010. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 305-316.
    • (2010) Proceedings of the IEEE Symposium on Security and Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 78
    • 84901215376 scopus 로고    scopus 로고
    • Stuxnet. 2013. Stuxnet. http://en.wikipedia.org/wiki/Stuxnet.
    • (2013)
  • 79
    • 35048836274 scopus 로고    scopus 로고
    • Activity recognition in the home using simple and ubiquitous sensors
    • Alois Ferscha and Friedemann Mattern (Eds.). Lecture Notes in Computer Science
    • Emmanuel Munguia Tapia, Stephen S. Intille, and Kent Larson. 2004. Activity recognition in the home using simple and ubiquitous sensors. In Pervasive Computing, Alois Ferscha and Friedemann Mattern (Eds.). Lecture Notes in Computer Science, Vol. 3001. 158-175.
    • (2004) Pervasive Computing , vol.3001 , pp. 158-175
    • Tapia, E.M.1    Intille, S.S.2    Larson, K.3
  • 80
    • 33847299487 scopus 로고    scopus 로고
    • Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    • Hong Kong, China
    • Chi-Ho Tsang and Sam Kwong. 2005. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In Proceedings of the International Conference on Industrial Technology. Hong Kong, China, 51-56.
    • (2005) Proceedings of the International Conference on Industrial Technology , pp. 51-56
    • Tsang, C.1    Kwong, S.2
  • 81
    • 84947547225 scopus 로고    scopus 로고
    • Experiences with specification-based intrusion detection
    • Wenke Lee, Ludovic M, and and reas Wespi (Eds.). Lecture Notes in Computer Science
    • Prem Uppuluri and R. Sekar. 2001. Experiences with Specification-Based Intrusion Detection. In Recent Advances in Intrusion Detection, Wenke Lee, Ludovic M, and and reas Wespi (Eds.). Lecture Notes in Computer Science, Vol. 2212. 172-189.
    • (2001) Recent Advances in Intrusion Detection , vol.2212 , pp. 172-189
    • Uppuluri, P.1    Sekar, R.2
  • 82
    • 50649107305 scopus 로고    scopus 로고
    • Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
    • Idaho Falls, ID, USA
    • Jared Verba and M. Milvich. 2008. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS). In Proceedings of the Conference on Technologies for Homeland Security. Idaho Falls, ID, USA, 469-473.
    • (2008) Proceedings of the Conference on Technologies for Homeland Security , pp. 469-473
    • Verba, J.1    Milvich, M.2
  • 83
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • January/February 1996
    • Gregory B. White, Eric A. Fisch, and Udo W. Pooch. 1996. Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10, 1 (January/February 1996), 20-23.
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3
  • 88
    • 82855168142 scopus 로고    scopus 로고
    • Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid
    • Detroit, MI, USA
    • Yichi Zhang, Lingfeng Wang, Weiqing Sun, R. C. Green, and M. Alam. 2011a. Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid. In Proceedings of the Power and Energy Society General Meeting. Detroit, MI, USA, 1-8.
    • (2011) Proceedings of the Power and Energy Society General Meeting , pp. 1-8
    • Zhang, Y.1    Wang, L.2    Sun, W.3    Green, R.C.4    Alam, M.5
  • 89
    • 82155167665 scopus 로고    scopus 로고
    • Distributed intrusion detection system in a multi-layer network architecture of smart grids
    • December 2011
    • Yichi Zhang, Lingfeng Wang, Weiqing Sun, R. C. Green, and M. Alam. 2011b. Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid 2, 4 (December 2011), 796-808.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 796-808
    • Zhang, Y.1    Wang, L.2    Sun, W.3    Green, R.C.4    Alam, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.