-
3
-
-
0034427756
-
Testing that distributions are close
-
T. Batu, L. Fortnow, R. Rubinfeld, W. Smith, P. White, Testing that distributions are close, Proceedings of the Forty-First Annual Symposium on the Foundations of Computer Science, pp. 259-269, 2000.
-
(2000)
Proceedings of the Forty-First Annual Symposium on the Foundations of Computer Science
, pp. 259-269
-
-
Batu, T.1
Fortnow, L.2
Rubinfeld, R.3
Smith, W.4
White, P.5
-
4
-
-
78549288504
-
Detection, correlation and visualization of attacks against critical infrastructure systems
-
L. Briesemeister, S. Cheung, U. Lindqvist and A. Valdes, Detection, correlation and visualization of attacks against critical infrastructure systems, Proceedings of the Eighth International Conference on Privacy, Security and Trust, pp. 17-19, 2010.
-
(2010)
Proceedings of the Eighth International Conference on Privacy, Security and Trust
, pp. 17-19
-
-
Briesemeister, L.1
Cheung, S.2
Lindqvist, U.3
Valdes, A.4
-
6
-
-
78349299834
-
Stuxnet, the real start of cyber warfare?
-
Chen T. Stuxnet, the real start of cyber warfare?. IEEE Network 2010, vol. 24(6):2-3.
-
(2010)
IEEE Network
, vol.24
, Issue.6
, pp. 2-3
-
-
Chen, T.1
-
7
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, A. Valdes, Using model-based intrusion detection for SCADA networks, Proceedings of the SCADA Security Scientific Symposium, pp. 127-134, 2007.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
9
-
-
84904211301
-
-
InfoSec Reading Room, SANS Institute, Bethesda, Maryland
-
J. Diaz, Using Snort for Intrusion Detection in Modbus TCP/IP Communications, InfoSec Reading Room, SANS Institute, Bethesda, Maryland (), 2011. http://www.sans.org/reading-room/whitepapers/detection/%20snort-intrusion-detection-modbus-tcp-ip-communications-33844.
-
(2011)
Using Snort for Intrusion Detection in Modbus TCP/IP Communications
-
-
Diaz, J.1
-
10
-
-
84939273139
-
-
Digital Bond, Modbus TCP rules, Sunrise, Florida
-
Digital Bond, Modbus TCP rules, Sunrise, Florida . http://www.digitalbond.com/tools/quickdraw/modbus-tcp-rules.
-
-
-
-
11
-
-
84984477151
-
Exponential smoothing: The state of the art
-
Gardner E. Exponential smoothing: The state of the art. Journal of Forecasting 1985, vol. 4(1):1-28.
-
(1985)
Journal of Forecasting
, vol.4
, Issue.1
, pp. 1-28
-
-
Gardner, E.1
-
15
-
-
84857590925
-
-
Springer-Verlag, Berlin Heidelberg, Germany, O. Goldreich (Ed.)
-
Goldreich O., Ron D. On testing expansion in bounded-degree graphs, in Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation 2011, 68-75. Springer-Verlag, Berlin Heidelberg, Germany. O. Goldreich (Ed.).
-
(2011)
On testing expansion in bounded-degree graphs, in Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
, pp. 68-75
-
-
Goldreich, O.1
Ron, D.2
-
16
-
-
84872227101
-
Melissa: Towards automated detection of undesirable user actions in critical infrastructures
-
D. Hadiosmanovic, D. Bolzoni, P. Hartel and S. Etalle, Melissa: Towards automated detection of undesirable user actions in critical infrastructures, Proceedings of the Seventh European Conference on Computer Network Defense, pp. 41-48, 2011.
-
(2011)
Proceedings of the Seventh European Conference on Computer Network Defense
, pp. 41-48
-
-
Hadiosmanovic, D.1
Bolzoni, D.2
Hartel, P.3
Etalle, S.4
-
18
-
-
85001619835
-
Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics
-
Kleinmann A., Wool A. Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics. Journal of Digital Forensics, Security and Law 2014, vol. 9(2):37-50.
-
(2014)
Journal of Digital Forensics, Security and Law
, vol.9
, Issue.2
, pp. 37-50
-
-
Kleinmann, A.1
Wool, A.2
-
19
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy 2011, vol. 9(3):49-51.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
20
-
-
34247990255
-
On the Kolmogorov-Smirnov test for normality with mean and variance unknown
-
Lilliefors H. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. Journal of the American Statistical Association 1967, vol. 62(318):399-402.
-
(1967)
Journal of the American Statistical Association
, vol.62
, Issue.318
, pp. 399-402
-
-
Lilliefors, H.1
-
21
-
-
84941871856
-
The Kolmogorov-Smirnov test for goodness of fit
-
Massey F. The Kolmogorov-Smirnov test for goodness of fit. Journal of the American Statistical Association 1951, vol. 46(253):68-78.
-
(1951)
Journal of the American Statistical Association
, vol.46
, Issue.253
, pp. 68-78
-
-
Massey, F.1
-
23
-
-
77954330725
-
Modbus/DNP3 state-based intrusion detection system
-
I. Nai Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta and M. Masera, Modbus/DNP3 state-based intrusion detection system, Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications, pp. 729-736, 2010.
-
(2010)
Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications
, pp. 729-736
-
-
Nai Fovino, I.1
Carcano, A.2
De Lacheze Murel, T.3
Trombetta, A.4
Masera, M.5
-
25
-
-
0001454867
-
On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling
-
Pearson K. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 1900, vol. 50(302):157-175.
-
(1900)
The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science
, vol.50
, Issue.302
, pp. 157-175
-
-
Pearson, K.1
-
26
-
-
0018655271
-
On the power of the index of dispersion test to detect spatial patterns
-
Perry J., Mead R. On the power of the index of dispersion test to detect spatial patterns. Biometrics 1979, vol. 35(3):613-622.
-
(1979)
Biometrics
, vol.35
, Issue.3
, pp. 613-622
-
-
Perry, J.1
Mead, R.2
-
28
-
-
0000898845
-
An analysis of variance test for normality (complete samples)
-
Shapiro S., Wilk M. An analysis of variance test for normality (complete samples). Biometrika 1965, vol. 52(3-4):591-611.
-
(1965)
Biometrika
, vol.52
, Issue.3-4
, pp. 591-611
-
-
Shapiro, S.1
Wilk, M.2
-
30
-
-
84882738173
-
Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD)
-
Menlo Park, California ().
-
SRI International, Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California (). http://www.csl.sri.com/projects/emerald.
-
-
-
-
33
-
-
34047126237
-
Anomaly-based intrusion detection for SCADA systems
-
D. Yang, A. Usynin and J. Hines, Anomaly-based intrusion detection for SCADA systems, Proceedings of the Fifth International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies, pp. 12-16, 2006.
-
(2006)
Proceedings of the Fifth International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Hines, J.3
-
34
-
-
1942436335
-
Robustness of the Markov-chain model for cyber-attack detection
-
Ye N., Zhang Y., Borror C. Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 2004, vol. 53(1):116-123.
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.3
|