-
1
-
-
84879051898
-
Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
-
Hamid Al-Hamadi and Ing-Ray Chen. 2013. Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management 19, 2, 189-203.
-
(2013)
IEEE Transactions on Network and Service Management
, vol.19
, Issue.2
, pp. 189-203
-
-
Al-Hamadi, H.1
Chen, I.2
-
3
-
-
79957620499
-
Host-based anomaly detection for pervasive medical systems
-
Montreal, QC, Canada
-
B. Asfaw, D. Bekele, B. Eshete, A. Villafiorita, and K. Weldemariam. 2010. Host-based anomaly detection for pervasive medical systems. In Proceedings of the 5th International Conference on Risks and Security of Internet and Systems. Montreal, QC, Canada, 1-8.
-
(2010)
Proceedings of the 5th International Conference on Risks and Security of Internet and Systems
, pp. 1-8
-
-
Asfaw, B.1
Bekele, D.2
Eshete, B.3
Villafiorita, A.4
Weldemariam, K.5
-
4
-
-
80052171869
-
Trust-based intrusion detection in wireless sensor networks
-
Kyoto, Japan
-
Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho. 2011. Trust-based intrusion detection in wireless sensor networks. In Proceedings of the International Conference on Communications. Kyoto, Japan, 1-6.
-
(2011)
Proceedings of the International Conference on Communications
, pp. 1-6
-
-
Bao, F.1
Chen, I.2
Chang, M.3
Cho, J.4
-
5
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
June 2012
-
Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9, 2 (June 2012), 169-183.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, I.2
Chang, M.3
Cho, J.4
-
6
-
-
77954883964
-
Intrusion detection in SCADA networks
-
Burkhard Stiller and Filip De Turck (Eds.). Lecture Notes in Computer Science
-
Rafael Barbosa and Aiko Pras. 2010. Intrusion detection in SCADA networks. In Mechanisms for Autonomous Management of Networks and Services, Burkhard Stiller and Filip De Turck (Eds.). Lecture Notes in Computer Science, Vol. 6155. 163-166.
-
(2010)
Mechanisms for Autonomous Management of Networks and Services
, vol.6155
, pp. 163-166
-
-
Barbosa, R.1
Pras, A.2
-
7
-
-
0037709592
-
Reliability of systems with fuzzy-failure criterion
-
Anaheim, California, USA
-
Farokh B. Bastani, Ing-Ray Chen, and Tai-Wei Tsao. 1994. Reliability of systems with fuzzy-failure criterion. In Proceedings of the Annual Reliability and Maintainability Symposium. Anaheim, California, USA, 442-448.
-
(1994)
Proceedings of the Annual Reliability and Maintainability Symposium
, pp. 442-448
-
-
Bastani, F.B.1
Chen, I.2
Tsao, T.3
-
9
-
-
33847767196
-
Safeguarding SCADA systems with anomaly detection
-
Vladimir Gorodetsky, Leonard Popyack, and Victor Skormin (Eds.). Lecture Notes in Computer Science
-
John Bigham, David Gamez, and Ning Lu. 2003. Safeguarding SCADA systems with anomaly detection. In Computer Network Security, Vladimir Gorodetsky, Leonard Popyack, and Victor Skormin (Eds.). Lecture Notes in Computer Science, Vol. 2776. 171-182.
-
(2003)
Computer Network Security
, vol.2776
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
11
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in SCADA systems
-
May 2011
-
and rea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Igor Nai Fovino, and Alberto Trombetta. 2011. A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Transactions on Industrial Informatics 7, 2 (May 2011), 179-186.
-
(2011)
IEEE Transactions on Industrial Informatics
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Nai Fovino, I.5
Trombetta, A.6
-
12
-
-
77955015254
-
State-based network intrusion detection systems for SCADA protocols: A proof of concept
-
Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science
-
and rea Carcano, Igor Nai Fovino, Marcelo Masera, and Alberto Trombetta. 2010. State-based network intrusion detection systems for SCADA protocols: A proof of concept. In Critical Information Infrastructures Security, Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science, Vol. 6027. 138-150.
-
(2010)
Critical Information Infrastructures Security
, vol.6027
, pp. 138-150
-
-
Carcano, A.1
Nai Fovino, I.2
Masera, M.3
Trombetta, A.4
-
14
-
-
82255176038
-
Trust management for encounterbased routing in delay tolerant networks
-
Miami, FL, USA
-
Ing-Ray Chen, Fenye Bao, MoonJeong Chang, and Jin-Hee Cho. 2010. Trust management for encounterbased routing in delay tolerant networks. In Proceedings of the Global Communications Conference. Miami, FL, USA, 1-6.
-
(2010)
Proceedings of the Global Communications Conference
, pp. 1-6
-
-
Chen, I.1
Bao, F.2
Chang, M.3
Cho, J.4
-
16
-
-
0042084285
-
Effect of artificial-intelligence planning-procedures on system reliability
-
Ing-Ray Chen and Farokh B. Bastani. 1991. Effect of artificial- intelligence planning-procedures on system reliability. IEEE Transactions on Reliability 40, 3, 364-369.
-
(1991)
IEEE Transactions on Reliability
, vol.40
, Issue.3
, pp. 364-369
-
-
Chen, I.1
Bastani, F.B.2
-
17
-
-
0029250814
-
On the reliability of AI planning software in real-time applications
-
Ing-Ray Chen, Farokh B. Bastani, and Tai-Wei Tsao. 1995. On the reliability of AI planning software in real-time applications. IEEE Transactions on Knowledge and Data Engineering 7, 1, 4-13.
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.1
, pp. 4-13
-
-
Chen, I.1
Bastani, F.B.2
Tsao, T.3
-
18
-
-
0032309753
-
Performance evaluation of forwarding strategies for location management in mobile networks
-
Ing-Ray Chen, Tsong-Min Chen, and Chiang Lee. 1998. Performance evaluation of forwarding strategies for location management in mobile networks. Computer Journal 41, 4, 243-253.
-
(1998)
Computer Journal
, vol.41
, Issue.4
, pp. 243-253
-
-
Chen, I.1
Chen, T.2
Lee, C.3
-
19
-
-
78751676469
-
Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks
-
Ing-Ray Chen, Anh Speer, and Mohamed Eltoweissy. 2011. Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 8, 2, 161-176.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.2
, pp. 161-176
-
-
Chen, I.1
Speer, A.2
Eltoweissy, M.3
-
20
-
-
0141858950
-
Analysis of replicated data with repair dependency
-
Ing-Ray Chen and Ding-Chau Wang. 1996a. Analysis of replicated data with repair dependency. Computer Journal 39, 9, 767-779.
-
(1996)
Computer Journal
, vol.39
, Issue.9
, pp. 767-779
-
-
Chen, I.1
Wang, D.2
-
22
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
Miami, FL, USA
-
Steven Cheung, Bruno Dutertre,Martin Fong, Ulf Lindqvist, Kieth Skinner, and Alfonso Valdes. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA Security Scientific Symposium. Miami, FL, USA, 127-134.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
23
-
-
77949264858
-
Effect of intrusion detection on reliability of missionoriented mobile group systems in mobile ad hoc networks
-
Jin-Hee Cho, Ing-Ray Chen, and Phu-Gui Feng. 2010. Effect of intrusion detection on reliability of missionoriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59, 1, 231-241.
-
(2010)
IEEE Transactions on Reliability
, vol.59
, Issue.1
, pp. 231-241
-
-
Cho, J.1
Chen, I.2
Feng, P.3
-
25
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials 13, 4, 562-583.
-
(2011)
IEEE Communications Surveys and Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.1
Swami, A.2
Chen, I.3
-
26
-
-
84858050885
-
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
-
Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2012. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications 35, 3, 1001-1012.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 1001-1012
-
-
Cho, J.1
Swami, A.2
Chen, I.3
-
28
-
-
34249753618
-
Support-vector networks
-
Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine Learning 20, 3, 273-297.
-
(1995)
Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
29
-
-
0034226287
-
A revised taxonomy for intrusion-detection systems
-
Herve Debar, Marc Dacier, and and reas Wespi. 2000. A revised taxonomy for intrusion-detection systems. Annales Des Tele communications 55, 7-8, 361-378.
-
(2000)
Annales des Tele Communications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, R.3
-
30
-
-
10044254666
-
A distributed architecture for online power systems security analysis
-
December 2004
-
Michele Di Santo, Alfredo Vaccaro, Domenico Villacci, and Eugenio Zimeo. 2004. A distributed architecture for online power systems security analysis. IEEE Transactions on Industrial Electronics 51, 6 (December 2004), 1238-1248.
-
(2004)
IEEE Transactions on Industrial Electronics
, vol.51
, Issue.6
, pp. 1238-1248
-
-
Di Santo, M.1
Vaccaro, A.2
Villacci, D.3
Zimeo, E.4
-
32
-
-
77955029557
-
Cyber-critical infrastructure protection using real-time payload-based anomaly detection
-
Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science
-
Patrick Dussel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Christof Stormann, and Jan Kastner. 2010. Cyber-critical infrastructure protection using real-time payload-based anomaly detection. In Critical Information Infrastructures Security, Erich Rome and Robin Bloomfield (Eds.). Lecture Notes in Computer Science, Vol. 6027. 85-97.
-
(2010)
Critical Information Infrastructures Security
, vol.6027
, pp. 85-97
-
-
Dussel, P.1
Gehl, C.2
Laskov, P.3
Bußer, J.4
Stormann, C.5
Kastner, J.6
-
34
-
-
27544503196
-
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
-
Yokohama, Japan
-
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, and Eugene Spafford. 2005. ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment. In Proceedings of the International Conference on Dependable Systems and Networks. Yokohama, Japan, 508-517.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 508-517
-
-
Foo, B.1
Wu, Y.2
Mao, Y.3
Bagchi, S.4
Spafford, E.5
-
35
-
-
77954330725
-
Modbus/DNP3 state-based intrusion detection system
-
Perth, Australia
-
Igor Nai Fovino, and rea Carcano, T. De Lacheze Murel, Alberto Trombetta, and Marcelo Masera. 2010. Modbus/DNP3 state-based intrusion detection system. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications. Perth, Australia, 729-736.
-
(2010)
Proceedings of the 24th International Conference on Advanced Information Networking and Applications
, pp. 729-736
-
-
Fovino, I.N.1
Carcano, A.2
De Lacheze Murel, T.3
Trombetta, A.4
Masera, M.5
-
36
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection
-
Dallas, TX, USA
-
Wei Gao, Thomas Morris, Bradley Reaves, and Drew Richey. 2010. On SCADA control system command and response injection and intrusion detection. In Proceedings of the 5th Annual Anti-Phishing Working Group eCrime Researchers Summit (eCrime). Dallas, TX, USA, 1-9.
-
(2010)
Proceedings of the 5th Annual Anti-Phishing Working Group ECrime Researchers Summit (ECrime)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
37
-
-
77951144015
-
Intrusion detection system combining misuse detection and anomaly detection using Genetic Network Programming
-
Fukuoka, Japan
-
Yunlu Gong, S. Mabu, Ci Chen, Yifei Wang, and K. Hirasawa. 2009. Intrusion detection system combining misuse detection and anomaly detection using Genetic Network Programming. In Proceedings of the International Conference on Control, Automation and Systems-The Society of Instrument and Control Engineers. Fukuoka, Japan, 3463-3467.
-
(2009)
Proceedings of the International Conference on Control, Automation and Systems-The Society of Instrument and Control Engineers
, pp. 3463-3467
-
-
Gong, Y.1
Mabu, S.2
Chen, C.3
Wang, Y.4
Hirasawa, K.5
-
38
-
-
20844443098
-
Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems
-
Baoshan Gu and Ing-Ray Chen. 2005. Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems. ACM Mobile Networks and Applications 10, 4, 453-463.
-
(2005)
ACM Mobile Networks and Applications
, vol.10
, Issue.4
, pp. 453-463
-
-
Gu, B.1
Chen, I.2
-
40
-
-
77949908962
-
Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration
-
Palma de Mallorca, Spain
-
Hadeli Hadeli, Ragnar Schierholz, Markus Braendle, and Cristian Tuduce. 2009. Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration. In Proceedings of the Conference on Emerging Technologies Factory Automation. Palma de Mallorca, Spain, 1-8.
-
(2009)
Proceedings of the Conference on Emerging Technologies Factory Automation
, pp. 1-8
-
-
Hadeli, H.1
Schierholz, R.2
Braendle, M.3
Tuduce, C.4
-
41
-
-
84867893847
-
N-Gram against the machine: On the feasibility of the N-Gram network analysis for binary protocols
-
Davide Balzarotti, Salvatore J. Stolfo, and Marco Cova (Eds.). Lecture Notes in Computer Science
-
Dina Had?ziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, and Sandro Etalle. 2012. N-Gram against the machine: On the feasibility of the N-Gram network analysis for binary protocols. In Research in Attacks, Intrusions, and Defenses, Davide Balzarotti, Salvatore J. Stolfo, and Marco Cova (Eds.). Lecture Notes in Computer Science, Vol. 7462. 354-373.
-
(2012)
Research in Attacks, Intrusions, and Defenses
, vol.7462
, pp. 354-373
-
-
Hadziosmanovic, D.1
Simionato, L.2
Bolzoni, D.3
Zambon, E.4
Etalle, S.5
-
42
-
-
0036930259
-
Using data mining to discover signatures in networkbased intrusion detection
-
Beijing, China
-
Hong Han, Xin-Liang Lu, and Li-Yong Ren. 2002. Using data mining to discover signatures in networkbased intrusion detection. In Proceedings of the International Conference on Machine Learning and Cybernetics, Vol. 1. Beijing, China, 13-17.
-
(2002)
Proceedings of the International Conference on Machine Learning and Cybernetics
, vol.1
, pp. 13-17
-
-
Han, H.1
Lu, X.2
Ren, L.3
-
43
-
-
80051660608
-
Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
-
Prague, Czech Republic
-
Qian He and Rick S. Blum. 2011. Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. Prague, Czech Republic, 3852-3855.
-
(2011)
Proceedings of the International Conference on Acoustics, Speech and Signal Processing
, pp. 3852-3855
-
-
He, Q.1
Blum, R.S.2
-
48
-
-
78249240878
-
Why did my detector do that?
-
Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.) Lecture Notes in Computer Science
-
Kevin Killourhy and Roy Maxion. 2010. Why did my detector do that? In Recent Advances in Intrusion Detection, Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.). Lecture Notes in Computer Science, Vol. 6307. 256-276.
-
(2010)
Recent Advances in Intrusion Detection
, vol.6307
, pp. 256-276
-
-
Killourhy, K.1
Maxion, R.2
-
49
-
-
72949113634
-
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks
-
Adrian P. Lauf, Richard A. Peters, and William H. Robinson. 2010. A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Networks 8, 3, 253-266.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.3
, pp. 253-266
-
-
Lauf, A.P.1
Peters, R.A.2
Robinson, W.H.3
-
50
-
-
78751620590
-
Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
-
Yinan Li and Ing-Ray Chen. 2011. Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks. IEEE Transactions on Mobile Computing 10, 3, 349-361.
-
(2011)
IEEE Transactions on Mobile Computing
, vol.10
, Issue.3
, pp. 349-361
-
-
Li, Y.1
Chen, I.2
-
51
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
Atlanta, GA, USA
-
Ondrej Linda, Todd Vollmer, and Milos Manic. 2009. Neural network based intrusion detection system for critical infrastructures. In Proceedings of the International Joint Conference on Neural Networks. Atlanta, GA, USA, 1827-1834.
-
(2009)
Proceedings of the International Joint Conference on Neural Networks
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
53
-
-
78649656786
-
The research of Bayesian classifier algorithms in intrusion detection system
-
Guangzhou, China
-
Yang-Xia Luo. 2010. The research of Bayesian classifier algorithms in intrusion detection system. In Proceedings of the International Conference on E-Business and E-Government. Guangzhou, China, 2174-2178.
-
(2010)
Proceedings of the International Conference on E-Business and E-Government
, pp. 2174-2178
-
-
Luo, Y.1
-
54
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Christopher Kruegel, and Erland Jonsson (Eds.). Lecture Notes in Computer Science
-
Matthew V. Mahoney and Philip K. Chan. 2003. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection, Giovanni Vigna, Christopher Kruegel, and Erland Jonsson (Eds.). Lecture Notes in Computer Science, Vol. 2820. 220-237.
-
(2003)
Recent Advances in Intrusion Detection, Giovanni Vigna
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
55
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
November 2000
-
John McHugh. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4 (November 2000), 262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
60
-
-
84900600082
-
Adaptive intrusion detection for unmanned aircraft systems based on behavior rule specification
-
Robert Mitchell and Ing-Ray Chen. 2013a. Adaptive intrusion detection for unmanned aircraft systems based on behavior rule specification. IEEE Transactions on Systems, Man and Cybernetics.
-
(2013)
IEEE Transactions on Systems, Man and Cybernetics
-
-
Mitchell, R.1
Chen, I.2
-
61
-
-
84883281959
-
Behavior rule based intrusion detection systems for safety critical smart grid applications
-
Robert Mitchell and Ing-Ray Chen. 2013b. Behavior rule based intrusion detection systems for safety critical smart grid applications. IEEE Transactions on Smart Grid 4, 3, 1254-1263.
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.2
-
62
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
Robert Mitchell and Ing-Ray Chen. 2013c. Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Transactions on Reliability 62, 1, 199-210.
-
(2013)
IEEE Transactions on Reliability
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.2
-
63
-
-
84879190317
-
On survivability of mobile cyber physical systems with intrusion detection
-
Robert Mitchell and Ing-Ray Chen. 2013d. On survivability of mobile cyber physical systems with intrusion detection. Wireless Personal Communications 68, 4, 1377-1391.
-
(2013)
Wireless Personal Communications
, vol.68
, Issue.4
, pp. 1377-1391
-
-
Mitchell, R.1
Chen, I.2
-
66
-
-
84901215382
-
-
NASA. Astrobiology Magazine.
-
NASA. 2005. Swarming for success. Astrobiology Magazine.
-
(2005)
Swarming for Success
-
-
-
68
-
-
38049052560
-
An unsupervised intrusion detection method combined clustering with chaos simulated annealing
-
Hong Kong, China
-
Lin Ni and Hong-Ying Zheng. 2007. An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In Proceedings of the International Conference on Machine Learning and Cybernetics, Vol. 6. Hong Kong, China, 3217-3222.
-
(2007)
Proceedings of the International Conference on Machine Learning and Cybernetics
, vol.6
, pp. 3217-3222
-
-
Ni, L.1
Zheng, H.2
-
69
-
-
36249007497
-
Intrusion detection and event monitoring in SCADA networks
-
Eric Goetz and Sujeet Shenoi (Eds.). International Federation for Information Processing
-
Paul Oman and Matthew Phillips. 2007. Intrusion detection and event monitoring in SCADA networks. In Critical Infrastructure Protection, Eric Goetz and Sujeet Shenoi (Eds.). International Federation for Information Processing, Vol. 253. 161-173.
-
(2007)
Critical Infrastructure Protection
, vol.253
, pp. 161-173
-
-
Oman, P.1
Phillips, M.2
-
70
-
-
77956274462
-
Abnormal human behavioral pattern detection in assisted living environments
-
Kyungseo Park, Yong Lin, Vangelis Metsis, Zhengyi Le, and Fillia Makedon. 2010. Abnormal human behavioral pattern detection in assisted living environments. In Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments. 9:1-9:8.
-
(2010)
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments
, pp. 91-98
-
-
Park, K.1
Lin, Y.2
Metsis, V.3
Le, Z.4
Makedon, F.5
-
71
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Vern Paxson. 1999. Bro: A system for detecting network intruders in real-time. Computer Networks 31, 2324, 2435-2463. http://www.sciencedirect.com/ science/article/pii/S1389128699001127.
-
(1999)
Computer Networks
, vol.31
, Issue.2324
, pp. 2435-2463
-
-
Paxson, V.1
-
72
-
-
77956987558
-
An intrusion detection system for IEC61850 automated substations
-
October 2010
-
Upeka K. Premaratne, Jagath Samarabandu, Tarlochan S. Sidhu, Robert Beresh, and Jian-Cheng Tan. 2010. An intrusion detection system for IEC61850 automated substations. IEEE Transactions on Power Delivery 25, 4 (October 2010), 2376-2383.
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.4
, pp. 2376-2383
-
-
Premaratne, U.K.1
Samarabandu, J.2
Sidhu, T.S.3
Beresh, R.4
Tan, J.5
-
73
-
-
84901215374
-
-
Rockwell Automation Technologies, Inc
-
Rockwell Automation Technologies, Inc. 2009. Introduction to Historian System Management. http://samplecode.rockwellautomation.com/idc/groups/ literature/documents/gr/hsepis-gr021-en-e.pdf.
-
(2009)
Introduction to Historian System Management
-
-
-
74
-
-
78149468870
-
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
-
November 2010
-
Sooyeon Shin, Taekyoung Kwon, Gil-Yong Jo, Youngman Park, and H. Rhy. 2010. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Transactions on Industrial Informatics 6, 4 (November 2010), 744-757.
-
(2010)
IEEE Transactions on Industrial Informatics
, vol.6
, Issue.4
, pp. 744-757
-
-
Shin, S.1
Kwon, T.2
Jo, G.3
Park, Y.4
Rhy, H.5
-
75
-
-
84901215375
-
-
Snort. 2012. Snort. http://www.snort.org.
-
(2012)
-
-
-
76
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Oakland, CA, USA
-
Robin Sommer and Vern Paxson. 2010. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 305-316.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
77
-
-
84901228893
-
Quantifying resiliency and detection latency of intrusion detection structures
-
Boston, MA, USA
-
Maria Striki, Kyriakos Manousakis, Darrell Kindred, Dan Sterne, Geoff Lawler, Natalie Ivanic, and George Tran. 2009. Quantifying resiliency and detection latency of intrusion detection structures. In Proceedings of the Military Communications Conference. Boston, MA, USA, 1-8.
-
(2009)
Proceedings of the Military Communications Conference
, pp. 1-8
-
-
Striki, M.1
Manousakis, K.2
Kindred, D.3
Sterne, D.4
Lawler, G.5
Ivanic, N.6
Tran, G.7
-
78
-
-
84901215376
-
-
Stuxnet. 2013. Stuxnet. http://en.wikipedia.org/wiki/Stuxnet.
-
(2013)
-
-
-
79
-
-
35048836274
-
Activity recognition in the home using simple and ubiquitous sensors
-
Alois Ferscha and Friedemann Mattern (Eds.). Lecture Notes in Computer Science
-
Emmanuel Munguia Tapia, Stephen S. Intille, and Kent Larson. 2004. Activity recognition in the home using simple and ubiquitous sensors. In Pervasive Computing, Alois Ferscha and Friedemann Mattern (Eds.). Lecture Notes in Computer Science, Vol. 3001. 158-175.
-
(2004)
Pervasive Computing
, vol.3001
, pp. 158-175
-
-
Tapia, E.M.1
Intille, S.S.2
Larson, K.3
-
80
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
Hong Kong, China
-
Chi-Ho Tsang and Sam Kwong. 2005. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In Proceedings of the International Conference on Industrial Technology. Hong Kong, China, 51-56.
-
(2005)
Proceedings of the International Conference on Industrial Technology
, pp. 51-56
-
-
Tsang, C.1
Kwong, S.2
-
81
-
-
84947547225
-
Experiences with specification-based intrusion detection
-
Wenke Lee, Ludovic M, and and reas Wespi (Eds.). Lecture Notes in Computer Science
-
Prem Uppuluri and R. Sekar. 2001. Experiences with Specification-Based Intrusion Detection. In Recent Advances in Intrusion Detection, Wenke Lee, Ludovic M, and and reas Wespi (Eds.). Lecture Notes in Computer Science, Vol. 2212. 172-189.
-
(2001)
Recent Advances in Intrusion Detection
, vol.2212
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
82
-
-
50649107305
-
Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
-
Idaho Falls, ID, USA
-
Jared Verba and M. Milvich. 2008. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS). In Proceedings of the Conference on Technologies for Homeland Security. Idaho Falls, ID, USA, 469-473.
-
(2008)
Proceedings of the Conference on Technologies for Homeland Security
, pp. 469-473
-
-
Verba, J.1
Milvich, M.2
-
83
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
January/February 1996
-
Gregory B. White, Eric A. Fisch, and Udo W. Pooch. 1996. Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10, 1 (January/February 1996), 20-23.
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
85
-
-
38549122472
-
A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment
-
Minneapolis, MN, USA
-
Kun Xiao, Nianen Chen, Shangping Ren, Limin Shen, Xianhe Sun, K. Kwiat, and M. Macalik. 2007. A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment. In Proceedings of the 3rd InternationalWorkshop on Software Engineering for Secure Systems. Minneapolis, MN, USA.
-
(2007)
Proceedings of the 3rd InternationalWorkshop on Software Engineering for Secure Systems
-
-
Xiao, K.1
Chen, N.2
Ren, S.3
Shen, L.4
Sun, X.5
Kwiat, K.6
Macalik, M.7
-
86
-
-
34047126237
-
Anomaly-based intrusion detection for SCADA systems
-
Albuquerque, NM, USA
-
Dayu Yang, Alexander Usynin, and J. Wesley Hines. 2005. Anomaly-based intrusion detection for SCADA systems. In Proceedings of the 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies. Albuquerque, NM, USA, 12-16.
-
(2005)
Proceedings of the 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Wesley Hines, J.3
-
88
-
-
82855168142
-
Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid
-
Detroit, MI, USA
-
Yichi Zhang, Lingfeng Wang, Weiqing Sun, R. C. Green, and M. Alam. 2011a. Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid. In Proceedings of the Power and Energy Society General Meeting. Detroit, MI, USA, 1-8.
-
(2011)
Proceedings of the Power and Energy Society General Meeting
, pp. 1-8
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, R.C.4
Alam, M.5
-
89
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
December 2011
-
Yichi Zhang, Lingfeng Wang, Weiqing Sun, R. C. Green, and M. Alam. 2011b. Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid 2, 4 (December 2011), 796-808.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, R.C.4
Alam, M.5
-
91
-
-
77954606031
-
Time-based intrusion detection in cyber-physical systems
-
Stockholm, Sweden
-
Christopher Zimmer, Balasubramanya Bhat, Frank Mueller, and Sibin Mohan. 2010. Time-based intrusion detection in cyber-physical systems. In Proceedings of the 1st International Conference on Cyber-Physical Systems. Stockholm, Sweden, 109-118.
-
(2010)
Proceedings of the 1st International Conference on Cyber-Physical Systems
, pp. 109-118
-
-
Zimmer, C.1
Bhat, B.2
Mueller, F.3
Mohan, S.4
|