Author:
Lin Chih-Yuan,Nadjm-Tehrani Simin,Asplund Mikael
Publisher
Springer International Publishing
Reference14 articles.
1. Bhatia, S., Kush, N., Djamaludin, C., Akane, J., Foo, E.: Practical Modbus flooding attack and detection. In: Proceedings of the Twelfth Australasian Information Security Conference, AISC (2014)
2. Valdes, A., Cheung S.: Communication pattern anomaly detection in process control systems. In: IEEE Conference on Technologies for Homeland Security, HST (2009)
3. Sayegh, N., Elhajj, H.I., Kayssi, A., Chehab, A.: SCADA Intrusion Detection System based on temporal behavior of frequent patterns. In: 17th IEEE Mediterranean Electrotechnical Conference (2014)
4. Barbosa, R.R.R., Sadre, R., Pras, A.: A first look into SCADA network traffic. In: IEEE Network Operations and Management Symposium, NOMS (2012)
5. Barbosa, R.R.R., Sadre, R., Pras, A.: Towards periodicity based anomaly detection in SCADA networks. In: IEEE Conference on Emerging Technologies & Factory Automation (2012)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献