Author:
Kim HyungKwan,Choi Seungoh,Yun Jeong-Han,Min Byung-Gil,Kim Hyoung Chun
Publisher
Springer International Publishing
Reference5 articles.
1. Studies in Systems, Decision and Control;T Bajtoš,2020
2. Briesemeister, L., Cheung, S., Lindqvist, U., Valdes, A.: Detection, correlation, and visualization of attacks against critical infrastructure systems. In: 2010 Eighth International Conference on Privacy, Security and Trust, pp. 15–22. IEEE (2010)
3. Kavousi, F., Akbari, B.: Automatic learning of attack behavior patterns using Bayesian networks. In: 6th International Symposium on Telecommunications (IST), pp. 999–1004. IEEE (2012)
4. Lee, S., Chung, B., Kim, H., Lee, Y., Park, C., Yoon, H.: Real-time analysis of intrusion detection alerts via correlation. Comput. Secur. 25(3), 169–183 (2006)
5. Shin, H.K., Lee, W., Yun, J.H., Kim, H.: Implementation of programmable CPS testbed for anomaly detection. In: 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2019). USENIX Association, Santa Clara, August 2019.
https://www.usenix.org/conference/cset19/presentation/shin