Author:
Choi Seungoh,Yun Jeong-Han,Kim Sin-Kyu
Publisher
Springer International Publishing
Reference24 articles.
1. Beaver, J.M., Borges-Hink, R.C., Buckner, M.A.: An evaluation of machine learning methods to detect malicious scada communications. In: 2013 12th International Conference on Machine Learning and Applications, vol. 2, pp. 54–59 (2013). https://doi.org/10.1109/ICMLA.2013.105
2. CIPedia$$\copyright $$. https://publicwiki-01.fraunhofer.de/CIPedia/index.php . Last Accessed 30 Apr 2018
3. DEFCON23: compilation of ICS PCAP files indexed by protocol. https://media.defcon.org/DEFCON 23/DEFCON23villages/DEFCON23icsvillage/DEFCON23ICS Village packet captures.rar . Last Accessed 30 Apr 2018
4. Lecture Notes in Computer Science;J Goh,2017
5. Hink, R.C.B., Beaver, J.M., Buckner, M.A., Morris, T., Adhikari, U., Pan, S.: Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 7th International Symposium on Resilient Control Systems (ISRCS), pp. 1–8 (2014). https://doi.org/10.1109/ISRCS.2014.6900095
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献