메뉴 건너뛰기




Volumn , Issue , 2015, Pages 2106-2113

Performance evaluation of cyber-physical intrusion detection on a robotic vehicle

Author keywords

Command injection; Cyber physical attack; Cyber physical systems; Decision tree; Denial of service (DoS); Detection latency; Intrusion detection; Malware; Mobile robots; Network security

Indexed keywords

DECISION TREES; DENIAL-OF-SERVICE ATTACK; EMBEDDED SYSTEMS; ENERGY UTILIZATION; FEATURE EXTRACTION; INTRUSION DETECTION; MALWARE; MERCURY (METAL); MOBILE ROBOTS; NETWORK SECURITY; ROBOTICS; TRANSMISSION CONTROL PROTOCOL; UBIQUITOUS COMPUTING;

EID: 84964257923     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.313     Document Type: Conference Paper
Times cited : (53)

References (25)
  • 8
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems", ACM Computing Surveys (CSUR), vol. 46, no. 4, p. 55, 2014.
    • (2014) ACM Computing Surveys (CSUR) , vol.46 , Issue.4 , pp. 55
    • Mitchell, R.1    Chen, I.-R.2
  • 12
    • 84929743589 scopus 로고    scopus 로고
    • Distributed intrusion detection for the security of industrial cooperative robotic systems
    • A. Fagiolini, G. Dini, and A. Bicchi, "Distributed intrusion detection for the security of industrial cooperative robotic systems", in World Congress, vol. 19, pp. 7610-7615, 2014.
    • (2014) World Congress , vol.19 , pp. 7610-7615
    • Fagiolini, A.1    Dini, G.2    Bicchi, A.3
  • 13
    • 84900600082 scopus 로고    scopus 로고
    • Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications
    • R. Mitchell and I.-R. Chen, "Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. PP, no. 99, p. 1, 2013.
    • (2013) IEEE Transactions on Systems, Man, and Cybernetics: Systems , vol.PP , Issue.99 , pp. 1
    • Mitchell, R.1    Chen, I.-R.2
  • 14
    • 84913552985 scopus 로고    scopus 로고
    • The behavioral approach to diagnostics of cyber-physical systems
    • IEEE
    • V. Skormin, A. Dolgikh, and Z. Birnbaum, "The behavioral approach to diagnostics of cyber-physical systems", in AUTOTESTCON, 2014 IEEE, pp. 26-30, IEEE, 2014.
    • (2014) AUTOTESTCON, 2014 IEEE , pp. 26-30
    • Skormin, V.1    Dolgikh, A.2    Birnbaum, Z.3
  • 16
    • 84888315965 scopus 로고    scopus 로고
    • A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
    • G. Kim, S. Lee, and S. Kim, "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection", Expert Systems with Applications, vol. 41, no. 4, pp. 1690-1700, 2014.
    • (2014) Expert Systems with Applications , vol.41 , Issue.4 , pp. 1690-1700
    • Kim, G.1    Lee, S.2    Kim, S.3
  • 22
    • 27544491192 scopus 로고    scopus 로고
    • Rocr: Visualizing classifier performance in r
    • T. Sing, O. Sander, N. Beerenwinkel, and T. Lengauer, "Rocr: visualizing classifier performance in r", Bioinformatics, vol. 21, no. 20, pp. 3940-3941, 2005.
    • (2005) Bioinformatics , vol.21 , Issue.20 , pp. 3940-3941
    • Sing, T.1    Sander, O.2    Beerenwinkel, N.3    Lengauer, T.4
  • 24
    • 84921442302 scopus 로고    scopus 로고
    • Latency of collaborative target detection for surveillance sensor networks
    • T.-L. Chin and W.-C. Chuang, "Latency of collaborative target detection for surveillance sensor networks", Parallel and Distributed Systems, IEEE Transactions on, vol. 26, no. 2, pp. 467-477, 2015.
    • (2015) Parallel and Distributed Systems, IEEE Transactions on , vol.26 , Issue.2 , pp. 467-477
    • Chin, T.-L.1    Chuang, W.-C.2
  • 25
    • 84990987405 scopus 로고    scopus 로고
    • A review of cyber threats and defence approaches in emergency management
    • G. Loukas, D. Gan, and T. Vuong, "A review of cyber threats and defence approaches in emergency management", Future Internet, vol. 5, no. 2, pp. 205-236, 2013.
    • (2013) Future Internet , vol.5 , Issue.2 , pp. 205-236
    • Loukas, G.1    Gan, D.2    Vuong, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.