Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference25 articles.
1. Aggarwal CC (2017) An introduction to outlier analysis. In: Outlier analysis. Springer, pp 1–34
2. Bigham J, Gamez D, Lu N (2003) Safeguarding SCADA systems with anomaly detection. In: International workshop on mathematical methods, models, and architectures for computer network security. Springer, pp 171–182
3. Casanovas EE, Buchaillot TE, Baigorria F (2015) Vulnerability of radar protocol and proposed mitigation. In: ITU Kaleidoscope: trust in the information society (K-2015), 2015. IEEE, pp 1–6
4. Chan-Tin E, Heorhiadi V, Hopper N, Kim Y (2011) The frog-boiling attack: limitations of secure network coordinate systems. ACM Trans Inform Syst Secur (TISSEC) 14(3):1–23. Publisher: ACM New York, NY, USA
5. Cheung S, Dutertre B, Fong M, Lindqvist U, Skinner K, Valdes A (2007) Using model-based intrusion detection for SCADA networks. In: Proceedings of the SCADA security scientific symposium, vol 46. Citeseer, pp 1–12
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献