Author:
Alanazi Manar,Mahmood Abdun,Chowdhury Mohammad Jabed Morshed
Funder
Saudi Arabian Cultural Mission
Subject
Law,General Computer Science
Reference172 articles.
1. Scada systems: challenges for forensic investigation;Ahmed;IEEE,2012
2. Ahmed, I., Obermeier, S., Sudhakaran, S., Roussev, V., 2017. Programmable logic controller forensics 15 (6).
3. Ahmed, I., Roussev, V., Johnson, W., Senthivel, S., Sudhakaran, S., 2016. A scada system testbed for cybersecurity and forensic research and pedagogy. In: Proceedings of the 2nd Annual Industrial Control System Security Workshop. Association for Computing Machinery, New York, NY, USA, p. 1–9. doi:10.1145/3018981.3018984.
4. Ahmed, M., Anwar, A., Shah, Z., Mahmood, A. N., Maher, M. J.,. An investigation of performance analysis of anomaly detection techniques for big data in scada systems. Ind. Netw. Intell. Syst. 2 (3).
5. Machine-learning-based feature selection techniques for large scale network intrusion detection;Al-Jarrah,2014
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献