-
1
-
-
36249010910
-
Lessons learned from the Maroochy water breach
-
Boston, MA, USA: Springer
-
J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection, vol. 253. Boston, MA, USA: Springer, 2007, pp. 73-82.
-
(2007)
Critical Infrastructure Protection
, vol.253
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
2
-
-
71649109185
-
An experimental investigation of malware attacks on SCADA systems
-
Dec.
-
I. N. Fovino, A. Carcano, M. Masera, A. Trombetta, "An experimental investigation of malware attacks on SCADA systems," Int. J. Critical Infrastruct. Protect., vol. 2, no. 4, pp. 139-145, Dec. 2009.
-
(2009)
Int. J. Critical Infrastruct. Protect.
, vol.2
, Issue.4
, pp. 139-145
-
-
Fovino, I.N.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
3
-
-
77954330725
-
ModBus/DNP3 state-based intrusion detection system
-
Apr.
-
I. N. Fovino, A. Carcano, T. De Lacheze Murel, A. Trombetta, M. Masera, "ModBus/DNP3 state-based intrusion detection system," in Proc. 24th IEEE Int. Conf. Adv. Inf. Netw. Appl. (AINA), Apr. 2010, pp. 729-736.
-
(2010)
Proc. 24th IEEE Int. Conf. Adv. Inf. Netw. Appl. (AINA)
, pp. 729-736
-
-
Fovino, I.N.1
Carcano, A.2
De Lacheze Murel, T.3
Trombetta, A.4
Masera, M.5
-
4
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in SCADA systems
-
May
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, A. Trombetta, "A multidimensional critical state analysis for detecting intrusions in SCADA systems," IEEE Trans. Ind. Informat., vol. 7, no. 2, pp. 179-186, May 2011.
-
(2011)
IEEE Trans. Ind. Informat.
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.N.5
Trombetta, A.6
-
5
-
-
84860491228
-
Critical statebased filtering system for securing SCADA network protocols
-
Oct.
-
I. N. Fovino, A. Coletta, A. Carcano, M. Masera, "Critical statebased filtering system for securing SCADA network protocols," IEEE Trans. Ind. Electron., vol. 59, no. 10, pp. 3943-3950, Oct. 2012.
-
(2012)
IEEE Trans. Ind. Electron.
, vol.59
, Issue.10
, pp. 3943-3950
-
-
Fovino, I.N.1
Coletta, A.2
Carcano, A.3
Masera, M.4
-
6
-
-
80054803633
-
Wind turbine condition monitoring and reliability analysis by SCADA information
-
Jul.
-
W. Yang and J. Jiang, "Wind turbine condition monitoring and reliability analysis by SCADA information," in Proc. 2nd Int. Conf. Mech. Autom. Control Eng. (MACE), Jul. 2011, pp. 1872-1875.
-
(2011)
Proc. 2nd Int. Conf. Mech. Autom. Control Eng. (MACE)
, pp. 1872-1875
-
-
Yang, W.1
Jiang, J.2
-
7
-
-
77955021006
-
Anomaly detection in electricity cyber infrastructures
-
X. Jin, J. Bigham, J. Rodaway, D. Gamez, C. Phillips, "Anomaly detection in electricity cyber infrastructures," in Proc. Int. Workshop Complex Netw. Infrastruct. Protect. (CNIP), 2006, pp. 1-12.
-
(2006)
Proc. Int. Workshop Complex Netw. Infrastruct. Protect. (CNIP)
, pp. 1-12
-
-
Jin, X.1
Bigham, J.2
Rodaway, J.3
Gamez, D.4
Phillips, C.5
-
8
-
-
79955988805
-
-
Ph.D. dissertation Dept. Comput. Sci., Univ. Milan, Milan, Italy Apr.
-
J. L. Rrushi, "Composite intrusion detection in process control networks," Ph.D. dissertation, Dept. Comput. Sci., Univ. Milan, Milan, Italy, Apr. 2009.
-
(2009)
Composite Intrusion Detection in Process Control Networks
-
-
Rrushi, J.L.1
-
9
-
-
84883829594
-
Application of data driven methods for condition monitoring maintenance
-
I. Marton, A. I. Sánchez, S. Carlos, S. Martorell, "Application of data driven methods for condition monitoring maintenance," Chem. Eng. Trans., vol. 33, pp. 301-306, 2013.
-
(2013)
Chem. Eng. Trans.
, vol.33
, pp. 301-306
-
-
Marton, I.1
Sánchez, A.I.2
Carlos, S.3
Martorell, S.4
-
10
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection
-
W. Gao, T. Morris, B. Reaves, D. Richey, "On SCADA control system command and response injection and intrusion detection," in Proc. eCrime Res. Summit (eCrime), 2010, pp. 1-9.
-
(2010)
Proc. ECrime Res. Summit (ECrime)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
11
-
-
70349311540
-
Online wind turbine fault detection through automated SCADA data analysis
-
A. Zaher, S. D. J. McArthur, D. G. Infield, Y. Patel, "Online wind turbine fault detection through automated SCADA data analysis," Wind Energy, vol. 12, no. 6, pp. 574-593, 2009.
-
(2009)
Wind Energy
, vol.12
, Issue.6
, pp. 574-593
-
-
Zaher, A.1
McArthur, S.D.J.2
Infield, D.G.3
Patel, Y.4
-
12
-
-
84928173034
-
Integrated ocsvm mechanism for intrusion detection in SCADA systems
-
L. Maglaras, J. Jiang, T. J. Cruz, "Integrated ocsvm mechanism for intrusion detection in SCADA systems," Electron. Lett., vol. 50, no. 25, pp. 1935-1936, 2014.
-
(2014)
Electron. Lett.
, vol.50
, Issue.25
, pp. 1935-1936
-
-
Maglaras, L.1
Jiang, J.2
Cruz, T.J.3
-
13
-
-
84963973422
-
A real time OCSVM intrusion detection module with low overhead for SCADA systems
-
L. A. Maglaras and J. Jiang, "A real time OCSVM intrusion detection module with low overhead for SCADA systems," Int. J. Adv. Res. Artif. Intell., vol. 3, no. 10, pp. 45-51, 2014.
-
(2014)
Int. J. Adv. Res. Artif. Intell.
, vol.3
, Issue.10
, pp. 45-51
-
-
Maglaras, L.A.1
Jiang, J.2
-
14
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
Jun.
-
O. Linda, T. Vollmer, M. Manic, "Neural network based intrusion detection system for critical infrastructures," in Proc. Int. Joint Conf. Neural Netw. (IJCNN), Jun. 2009, pp. 1827-1834.
-
(2009)
Proc. Int. Joint Conf. Neural Netw. (IJCNN)
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
15
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, A. Valdes, "Using model-based intrusion detection for SCADA networks," in Proc. SCADA Secur. Sci. Symp., 2007, pp. 127-134.
-
(2007)
Proc. SCADA Secur. Sci. Symp.
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
16
-
-
70449653118
-
Communication pattern anomaly detection in process control systems
-
May
-
A. Valdes and S. Cheung, "Communication pattern anomaly detection in process control systems," in Proc. IEEE Conf. Technol. Homeland Secur. (HST), May 2009, pp. 22-29.
-
(2009)
Proc IEEE Conf. Technol. Homeland Secur. (HST)
, pp. 22-29
-
-
Valdes, A.1
Cheung, S.2
-
17
-
-
84888316290
-
WASAM: A dynamic wide-area situational awareness model for critical domains in smart grids
-
Jan.
-
C. Alcaraz and J. Lopez, "WASAM: A dynamic wide-area situational awareness model for critical domains in smart grids," Future Generat. Comput. Syst., vol. 30, pp. 146-154, Jan. 2014.
-
(2014)
Future Generat. Comput. Syst.
, vol.30
, pp. 146-154
-
-
Alcaraz, C.1
Lopez, J.2
-
18
-
-
84892439359
-
Diagnosis mechanism for accurate monitoring in critical infrastructure protection
-
C. Alcaraz and J. Lopez, "Diagnosis mechanism for accurate monitoring in critical infrastructure protection," Comput. Standards Interfaces, vol. 36, no. 3, pp. 501-512, 2014.
-
(2014)
Comput. Standards Interfaces
, vol.36
, Issue.3
, pp. 501-512
-
-
Alcaraz, C.1
Lopez, J.2
-
19
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
L. Portnoy, E. Eskin, S. Stolfo, "Intrusion detection with unlabeled data using clustering," in Proc. ACM CSS Workshop Data Mining Appl. Secur. (DMSA), 2001, pp. 5-8.
-
(2001)
Proc ACM CSS Workshop Data Mining Appl. Secur. (DMSA)
, pp. 5-8
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
20
-
-
84906094761
-
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
-
Oct.
-
A. Almalawi, X. Yu, Z. Tari, A. Fahad, I. Khalil, "An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems," Comput. Secur., vol. 46, pp. 94-110, Oct. 2014.
-
(2014)
Comput. Secur.
, vol.46
, pp. 94-110
-
-
Almalawi, A.1
Yu, X.2
Tari, Z.3
Fahad, A.4
Khalil, I.5
-
21
-
-
34548080780
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
C. D. Manning, H. Schütze, P. Raghavan, Introduction to Information Retrieval, vol. 1. Cambridge, U.K.: Cambridge Univ. Press, 2008.
-
(2008)
Introduction to Information Retrieval
, vol.1
-
-
Manning, C.D.1
Schütze, H.2
Raghavan, P.3
-
22
-
-
78649934709
-
-
School Inf. Comput. Sci., Univ. California, Irvine, Irvine, CA, USA. [Online] Available
-
A. Frank and A. Asuncion. (2010). UCI machine learning repository. School Inf. Comput. Sci., Univ. California, Irvine, Irvine, CA, USA. [Online]. Available: http://archive.ics.uci.edu/ml
-
(2010)
UCI Machine Learning Repository
-
-
Frank, A.1
Asuncion, A.2
-
23
-
-
79952341640
-
Labelled data collection for anomaly detection in wireless sensor networks
-
Dec.
-
S. Suthaharan, M. Alzahrani, S. Rajasegarar, C. Leckie, M. Palaniswami, "Labelled data collection for anomaly detection in wireless sensor networks," in Proc. 6th Int. Conf. Intell. Sensors, Sensor Netw. Inf. Process. (ISSNIP), Dec. 2010, pp. 269-274.
-
(2010)
Proc. 6th Int. Conf. Intell. Sensors, Sensor Netw. Inf. Process. (ISSNIP)
, pp. 269-274
-
-
Suthaharan, S.1
Alzahrani, M.2
Rajasegarar, S.3
Leckie, C.4
Palaniswami, M.5
-
24
-
-
84963968841
-
-
ModBus/TCP Simulator. [Online]. Available accessed Nov. 2011
-
ModBus/TCP Simulator. [Online]. Available: http://www.modbustools. com, accessed Nov. 2011.
-
-
-
-
27
-
-
84963968826
-
-
Daily Residential Water Use for Melbourne. [Online]. Available accessed Nov. 2011
-
Daily Residential Water Use for Melbourne. [Online]. Available: http://www.melbournewater.com.au, accessed Nov. 2011.
-
-
-
-
28
-
-
84898045366
-
SCADAVT-A framework for SCADA security testbed based on virtualization technology
-
Oct.
-
A. Almalawi, Z. Tari, I. Khalil, A. Fahad, "SCADAVT-A framework for SCADA security testbed based on virtualization technology," in Proc. IEEE 38th Conf. Local Comput. Netw. (LCN), Oct. 2013, pp. 639-646.
-
(2013)
Proc IEEE 38th Conf. Local Comput. Netw. (LCN)
, pp. 639-646
-
-
Almalawi, A.1
Tari, Z.2
Khalil, I.3
Fahad, A.4
-
29
-
-
0003136237
-
Efficient and effective clustering methods for spatial data mining
-
R. T. Ng and J. Han, "Efficient and effective clustering methods for spatial data mining," in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 144-155.
-
(1994)
Proc. 20th Int. Conf. Very Large Data Bases
, pp. 144-155
-
-
Ng, R.T.1
Han, J.2
-
30
-
-
0030157145
-
BIRCH: An efficient data clustering method for very large databases
-
Jun.
-
T. Zhang, R. Ramakrishnan, M. Livny, "BIRCH: An efficient data clustering method for very large databases," ACM SIGMOD Rec., vol. 25, pp. 103-114, Jun. 1996.
-
(1996)
ACM SIGMOD Rec.
, vol.25
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
31
-
-
0003052357
-
WaveCluster: A wavelet-based clustering approach for spatial data in very large databases
-
G. Sheikholeslami, S. Chatterjee, A. Zhang, "WaveCluster: A wavelet-based clustering approach for spatial data in very large databases," in Proc. 24th Int. Conf. Very Large Data Bases, 1998, pp. 428-439.
-
(1998)
Proc. 24th Int. Conf. Very Large Data Bases
, pp. 428-439
-
-
Sheikholeslami, G.1
Chatterjee, S.2
Zhang, A.3
-
32
-
-
84994158589
-
STING: A statistical information grid approach to spatial data mining
-
Feb.
-
W. Wang, J. Yang, R. R. Muntz, "STING: A statistical information grid approach to spatial data mining," in Proc. 23rd Int. Conf. Very Large Data Bases, Feb. 1997, pp. 186-195.
-
(1997)
Proc. 23rd Int. Conf. Very Large Data Bases
, pp. 186-195
-
-
Wang, W.1
Yang, J.2
Muntz, R.R.3
-
33
-
-
85170282443
-
A density based algorithm for discovering clusters in large spatial databases with noise
-
M. Ester, H.-P. Kriegel, J. Sander, X. Xu, "A density based algorithm for discovering clusters in large spatial databases with noise," in Proc. KDD, vol. 7. 1996, pp. 226-231.
-
(1996)
Proc. KDD
, vol.7
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
34
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
M. M. Breunig, H.-P. Kriegel, R. T. Ng, J. Sander, "LOF: Identifying density-based local outliers," in Proc. ACM SIGMOD Int. Conf. Manage. Data (SIGMOD), 2000, pp. 93-104.
-
(2000)
Proc ACM SIGMOD Int. Conf. Manage. Data (SIGMOD)
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
35
-
-
84956852642
-
OPTICS-OF: Identifying local outliers
-
M. M. Breunig, H.-P. Kriegel, R. T. Ng, J. Sander, "OPTICS-OF: Identifying local outliers," in Proc. 3rd Eur. Conf. Principles Data Mining Knowl. Discovery, 1999, pp. 262-270.
-
(1999)
Proc. 3rd Eur. Conf. Principles Data Mining Knowl. Discovery
, pp. 262-270
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
36
-
-
0035788909
-
Mining top-n local outliers in large databases
-
W. Jin, A. K. H. Tung, J. Han, "Mining top-n local outliers in large databases," in Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2001, pp. 293-298.
-
(2001)
Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 293-298
-
-
Jin, W.1
Tung, A.K.H.2
Han, J.3
-
37
-
-
18644368589
-
Outlier detection based on the distribution of distances between data points
-
Aug.
-
V. Šaltenis, "Outlier detection based on the distribution of distances between data points," Informatica, vol. 15, no. 3, pp. 399-410, Aug. 2004.
-
(2004)
Informatica
, vol.15
, Issue.3
, pp. 399-410
-
-
Šaltenis, V.1
-
38
-
-
85039571873
-
A linear method for deviation detection in large databases
-
Aug.
-
A. Arning, R. Agrawal, P. Raghavan, "A linear method for deviation detection in large databases," in Proc. Knowl. Discovery Data Mining (KDD), Aug. 1996, pp. 164-169.
-
(1996)
Proc. Knowl. Discovery Data Mining (KDD)
, pp. 164-169
-
-
Arning, A.1
Agrawal, R.2
Raghavan, P.3
|